6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
6th European Conference - Academic Conferences
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
The Proceedings<br />
of the<br />
11th <strong>European</strong><br />
<strong>Conference</strong> on<br />
eGovernment<br />
Faculty of Administration,<br />
University of Ljubljana, Ljubljana,<br />
Slovenia<br />
16-17 June 2011<br />
Edited by<br />
Maja Klun, Mitja Decman and Tina Jukić<br />
University of Ljubljana
Copyright The Authors, 2011. All Rights Reserved.<br />
No reproduction, copy or transmission may be made without written permission from the individual authors.<br />
Papers have been doubleblind peer reviewed before final submission to the conference. Initially, paper<br />
abstracts were read and selected by the conference panel for submission as possible papers for the<br />
conference.<br />
Many thanks to the reviewers who helped ensure the quality of the full papers.<br />
These <strong>Conference</strong> Proceedings have been submitted to the Thomson ISI for indexing.<br />
Further copies of this book can be purchased from http://academic-conferences.org/2-proceedings.htm<br />
ISBN:978-1-908272-01-0 CD<br />
Published by <strong>Academic</strong> Publishing Limited<br />
Reading<br />
UK<br />
44-118-972-4148<br />
www.academic-publishing.org
Contents<br />
Paper Title Author(s) Page<br />
No.<br />
Preface vi<br />
Biographies of <strong>Conference</strong> Chairs, Programme Chair,<br />
Keynote Speaker and Mini-track Chairs<br />
Biographies of contributing authors ix<br />
Evaluation of eGovernment Implementation at Federal,<br />
State and Local government Levels in Malaysia<br />
ICT Education and Access as Strategies to Generate<br />
and Distribute eGovernment Content<br />
The Role of National Culture on Citizen Adoption of<br />
eGovernment websites<br />
i<br />
Ahmad Bakeri Abu Bakar 1<br />
Fatemeh Ahmadi Zeleti and Erja<br />
Mustonen-Ollila<br />
Omar Al-Hujran and Mahmoud Aldalahmeh<br />
A Framework for Transitioning to Mobile Government Shadi Al-khamayseh and Elaine<br />
Lawrence<br />
The Stages of eGovernment: Correlation Between<br />
Characteristics That Affect eGovernment Systems<br />
Social Media in <strong>European</strong> Governmental<br />
Communication<br />
Technology Adoption and Innovation in Public Services:<br />
The Case of eGovernment in Italy<br />
Pan-<strong>European</strong> eGovernment and eHealth Services in<br />
Slovenia<br />
Enhancement of Public Service Effectiveness by<br />
Partially Automating Service Request Paper Forms<br />
Using Citizen ID Smartcard<br />
Development of User Authentication for web<br />
Application Sign-on Mechanism Using Oasis SAML<br />
Standard With Thai Citizen ID Card<br />
A Pilot Development of PKI Digital Signatures on<br />
Electronic Correspondence Using Citizen ID<br />
Smartcards<br />
Development of an Electronic Correspondence Time-<br />
Stamping Service Using Oasis Digital Signature<br />
Services<br />
Framework Guidelines to Measure the Impact of<br />
Business Intelligence and Decision Support<br />
Methodologies in the Public Sector<br />
vii<br />
10<br />
17<br />
27<br />
Madi Al-Sebie 36<br />
Isabel Anger and Christian Kittl 43<br />
Davide Arduini, Mario Denni and<br />
Gerolamo Giungat and Antonello<br />
Zanfei<br />
Jaro Berce, Vasja Vehovar, Ana<br />
Slavec and Mirko Vintar<br />
Choompol Boonmee, Rattapol<br />
Chatchumsai, Tawa Khampachoa<br />
and Chakri Chuenurah<br />
Choompol Boonmee, Peera<br />
Tharaphant and Pipop Damtongsuk<br />
Choompol Boonmee, Peera<br />
Tharaphant and Pipop Damtongsuk<br />
Choompol Boonmee, Rattapol<br />
Chatchumsai and Sunet Boonmee<br />
Roberto Boselli, Mirko Cesarini and<br />
Mario Mezzanzanica<br />
Avoiding Disasters – Ensuring PKI-Service Availability Harald Bratko, Peter Lipp and<br />
Christof Rath<br />
Achieving Optimum Balance in the Simplification of tax<br />
Compliance Obligations for Business Customers and<br />
Management of Compliance and Collection Risks by<br />
Revenue<br />
53<br />
65<br />
74<br />
80<br />
87<br />
97<br />
107<br />
116<br />
Leonard Burke and Kieran Gallery 124
Paper Title Author(s) Page<br />
No.<br />
Risk Management in a Cooperation Context Walter Castelnovo 132<br />
The Effect of User's Satisfaction of web Security on<br />
Trust in eGovernment<br />
A Common Process Model to Improve eService<br />
Solutions - the Municipality Case<br />
Measuring Performance of eGovernment to the<br />
Disabled: Theory and Practice in Taiwan<br />
Predictive Analytics in the Public Sector: Using Data<br />
Mining to Assist Better Target Selection for Audit<br />
Citizen Participation in Urban Planning: Looking for the<br />
“E” Dimension in the EU National Systems and Policies<br />
Social Media and Local Government in England: Who<br />
is Doing What?<br />
Electronic Health Records Management and<br />
Preservation: The Case of Slovenia<br />
Sustaining Electronic Governance Programs in<br />
Developing Countries<br />
Adapting Family Card System by Means of Smart<br />
Cards<br />
Collaborative Network Analysis of two eGovernment<br />
<strong>Conference</strong>s: Are we Building a Community?<br />
E-Identity, E-Activities and E-Political Participation:<br />
How are College Students Embracing the Promise of<br />
the Internet?"<br />
Semantic-Driven eGovernment: Correlating<br />
Development Phases with Semantic eGovernment<br />
Specific Ontology Models<br />
Towards a Unified Semantic-Driven Methodology<br />
Framework for eGovernment Systems Development<br />
An Information System to Collect and Analyze Data<br />
From Educational Units During Epidemy Spread<br />
Periods<br />
Interoperability in the Justice Field: Variables That<br />
Affect Implementation<br />
eGovernment and Service Delivery at the Local Level:<br />
A Comparative Analysis of Three Canadian<br />
Municipalities<br />
ii<br />
Lichun Chiang, Ching-Yuan Huang<br />
and Wu-Chuan Yang<br />
140<br />
Marie-Therese Christiansson 149<br />
Pin-yu Chu, Tong-yi Huang and<br />
Ning-wan Huang<br />
158<br />
Duncan Cleary 168<br />
Grazia Concilio and Francesco<br />
Molinari<br />
177<br />
Martin De Saulles 187<br />
Mitja Decman 193<br />
Zamira Dzhusupova, Tomasz<br />
Janowski, Adegboyega Ojo and Elsa<br />
Estevez<br />
Magdy Elhennawy, Tarek Saad,<br />
Ashraf abdel Wahab and Sameh<br />
Bedair<br />
203<br />
213<br />
Nuša Erman and Ljupčo Todorovski 225<br />
Marcoux Faiia 234<br />
Jean Vincent Fonou Dombeu and<br />
Magda Huisman<br />
Jean Vincent Fonou Dombeu and<br />
Magda Huisman<br />
John Garofalakis, Andreas Koskeris,<br />
Evangelia Boufardea, Theofanis<br />
Michail and Flora Oikonomou<br />
245<br />
254<br />
263<br />
Mila Gascó and Carlos E Jiménez 272<br />
John Grant, Frank Ohemeng and<br />
Roberto Leone<br />
280
Paper Title Author(s) Page<br />
No.<br />
Crowd-sourcing Techniques: Participation,<br />
Transparency and the Factors Determining the Co-<br />
Production of Policy<br />
Implementation of a Contact Centre in a Swedish<br />
Municipality<br />
An Outline of the Technical Requirements on<br />
Governmental Electronic Record Systems Derived from<br />
the <strong>European</strong> Legal Environment<br />
Examining Influences on eGovernment Growth in the<br />
Transition Economies of Central and Eastern Europe:<br />
Evidence from Panel Data<br />
Management of Latvian Government Communications<br />
During an Economic Crisis: The Role of Information<br />
Strategies in the Public Sector<br />
Business/IT Alignment as Enabler for eGovernment in<br />
Syria<br />
iii<br />
Mary Griffiths 288<br />
Kerstin Grundén 296<br />
Bernhard Horn, Gerald Fischer,<br />
Roman Trabitsch and Thomas<br />
Grechenig<br />
303<br />
Princely Ifinedo 310<br />
Aleksis Jarockis 320<br />
Raed Kanaan, Kamal Atieh and<br />
Omar Subhi Aldabbas<br />
Does eTaxation Reduce Taxation Compliance Costs Maja Klun 335<br />
International Assistance Relationship to eGovernment<br />
Development and Benchmarking<br />
Challenges to the Design and use of Stages-of-Growth<br />
Models in eGovernment<br />
Developing Measures for Benchmarking the<br />
Interoperability of Public Organizations<br />
Barriers to Developing eGovernment Projects in<br />
Developing Countries<br />
328<br />
Endrit Kromidha 339<br />
Devender Maheshwari, Anne Fleur<br />
van Veenstra and Marijn Janssen<br />
Devender Maheshwari, Anne Fleur<br />
van Veenstra and Marijn Janssen<br />
347<br />
354<br />
Zaigham Mahmood 363<br />
Digital Inclusion: a target not always desirable Fausto Marcantoni and Alberto<br />
Polzonetti<br />
Multi-Level Interoperability for ICT-Enabled<br />
Governance: A Framework for Assessing Value Drivers<br />
and Implications for <strong>European</strong> Policies<br />
Strategies for eGovernment Implementation in<br />
Developing Countries: A Case Study of The Botswana<br />
Government<br />
The use of ICT by Government Departments and<br />
Parastatals in South Africa<br />
The Workload for the Structural Implementation of<br />
eDemocracy: Local Government Policy Issues<br />
Combined With the Policy Cycle and Styles of<br />
Citizenship.<br />
Gianluca Misuraca, Giuseppe Alfano<br />
and Gianluigi Viscusi<br />
Racious Moilamashi Moatshe and<br />
Zaigham Mahmood<br />
369<br />
377<br />
386<br />
Matsobane Frans Mosetja 394<br />
Bert Mulder and Martijn Hartog 399<br />
Channel Shift - a UK Customer Response Darren Mundy, Qasim Umer, and<br />
Alastair Foster<br />
406
Paper Title Author(s) Page<br />
No.<br />
eGovernment in Social and Economic Development:<br />
The Asymmetric Roles of Information,<br />
Institutionalization and Diffusion<br />
iv<br />
Bongani Ngwenya 413<br />
National Electronic Government Strategies in Austria Birgit Oberer and Alptekin Erkollar 422<br />
Smoke and Mirrors: Can a Useful Approximation of the<br />
Cigarette tax gap be Determined?<br />
Adopting Web 2.0 in Building Participatory<br />
eGovernment: A Perception Contour From Inside the<br />
Government<br />
Combating Identity Fraud in the Public Domain:<br />
Information Strategies for Healthcare and Criminal<br />
Justice<br />
Approaching eGovernment as a Strategic Driver for<br />
Improving the Ethical Model: An Empirical Analysis<br />
From Business Economics<br />
Public Procurement and Internet-purchasing: the<br />
Defence Sector Evidence<br />
Evaluating the Development of eGovernment Systems:<br />
The Case of Polish Local Government Websites<br />
Comparative Analysis of Information Security<br />
Governance Frameworks: A Public Sector Approach<br />
Clare Omelia 432<br />
Ching-Heng Pan and Lichun Chian 443<br />
Marijn Plomp and Jan Grijpink 451<br />
Massimo Pollifroni 459<br />
Nataša Pomazalová and Zbyšek<br />
Korecki<br />
469<br />
Leszek Porębski 475<br />
Oscar Rebollo, Daniel Mellado , Luis<br />
Enrique Sánchez and Eduardo<br />
Fernández-Medina<br />
Web 2.0 on the Mexican State Sites: An Overview Rodrigo Sandoval Almazán, Gabriela<br />
Díaz Murillo , Ramón Gil-Garcia, Luis<br />
Luna-Reyes and Dolores Luna-<br />
Reyes<br />
eGovernment in Serbia: Prospects and Challenges Laslo Šereš and Ivana Horvat 502<br />
An Organizational Framework for Managing<br />
eGovernment Systems in Developing Countries: The<br />
Case of Kurdistan Region of Iraq<br />
Outsourcing of IT Projects in the Public Sector –<br />
Sustainable Solution or Erosion of the Public Sector?<br />
Closing the Digital Divide gap in <strong>European</strong> Union: A<br />
Unique Solution for Different Tiers?<br />
Towards Estimating Users’ Strength of Opinion in<br />
Forum Texts about Governmental Decisions<br />
An Efficient, Effective eGovernment Enterprise<br />
Resource Planning Model<br />
Citizen-Government Interaction in Russia:<br />
eGovernment as Tradition Bearer<br />
Shareef Shareef, Elias Pimenidis,<br />
Hamid Jahankhani and J. Arreymbi<br />
482<br />
491<br />
513<br />
Dalibor Stanimirovic and Mirko Vintar 522<br />
Virgil Stoica and Andrei Ilas 531<br />
George Stylios, Christos<br />
KatsisVasiliki Simaki, Sofia Stamou<br />
and Dimitris Christodoulakis<br />
547<br />
John Douglas Thomson 553<br />
Anna Trakhtenberg 564<br />
eGovernment Openness Index Nataša Veljković, Sanja Bogdanović-<br />
Dinić and Leonid Stoimenov<br />
571
Paper Title Author(s) Page<br />
No.<br />
Exploring Facilitators and Challenges Facing ICT4D in<br />
Tanzania<br />
v<br />
Jim Yonazi 578<br />
PHD 589<br />
Maturity Models Transition from eGovernment<br />
Interoperability to T-Government: Restyling Dynamic<br />
Public Services Through Integrated Transformation of<br />
Service Delivery<br />
Quality of Services and Citizen Profiling in<br />
eGovernment<br />
A Quest for an Applicable Model of Growth for<br />
Directgov<br />
Mohamed Mohyi Eddine El Aichi and<br />
Mohamed Dafir Ech-Cherif El Kettani<br />
Guillaume Gronier, Sandrine Reiter<br />
and Mélanie Becker<br />
591<br />
603<br />
Panos Hahamis 612<br />
Non <strong>Academic</strong>s Papers 621<br />
Providing Public Services Through Digital Postal<br />
Networks: A Position Paper<br />
An Evaluation of Expression of Doubt in the context of<br />
Self-Assessment: Section 955(4) Taxes Consolidation<br />
Act 1997<br />
Liam Church and Maria Moloney 623<br />
Anne Corbett and Francis Rossney 630<br />
Moving Fast Forward to National Data Standardization Asanee Kawtrakul, Intiraporn<br />
Mulasastra, Tawa Khampachua and<br />
Somchoke Ruengittinun<br />
Work in Progress 655<br />
Bridging the IT/Process Divide in Public Administrations<br />
by Simple Semantic Interoperability Artefacts<br />
643<br />
Robert Orlowski and Veit Jahns 657
Preface<br />
These proceedings represent the work of presenters at the 11th <strong>European</strong> <strong>Conference</strong> on e-Government<br />
(ECEG 2011).<br />
The <strong>Conference</strong> this year is being hosted by the Faculty of Administration, University of Ljubljana, Ljubljana,<br />
Slovenia. The <strong>Conference</strong> Chair is Professor Maja Klun and the Programme Co-Chairs are Mitja Decman<br />
and Tina Jukić, all from the University of Ljubljana.<br />
The opening keynote address is given by Dr. Aleš Dobnikar, E-Government and Administrative Processes<br />
Directorate, Ministry of Public Administration, Slovenia.<br />
This <strong>Conference</strong> brings together practitioners and researchers in the area of e-Government from some 40<br />
different countries. Participants will be able to share their research findings and explore the latest<br />
developments and trends in the field which can then be disseminated in the wider community.<br />
With an initial submission of 192 abstracts, after the double blind, peer review process there are 74 papers<br />
published in these <strong>Conference</strong> Proceedings. These papers represent research from countries including<br />
Australia, Austria, Belgium, Brazil, Canada, Czech Republic, Eygpt, Estonia, Finland, France, Germany,<br />
Greece, India, Ireland, Italy, Jordan, Latvia, Luxembourg, Macao, Malaysia, Mexico, Norway, Poland,<br />
Romania, Russia, Saudi Arabia, Serbia, Slovenia, South Africa, Spain, Sweden, Taiwan, Tanzania, Thailand,<br />
The Netherlands, Turkey, UK, USA and Zimbabwe. This will ensure a very interesting two days.<br />
I hope that you have an stimulating conference, and enjoy your time in Ljubljana.<br />
Maja Klun, Mitja Decman and Tina Jukić<br />
Co-Programme Chairs<br />
University of Ljubljana<br />
June 2011<br />
vi
Biographies of <strong>Conference</strong> Chairs, Programme Chairs<br />
and Keynote Speakers<br />
<strong>Conference</strong> Chair<br />
Maja Klun is a vice-dean for Scientific and Research Activities at the Faculty of<br />
Administration, University of Ljubljana. Holding her first, master and Ph. D. degrees in<br />
economy from The Faculty of Economics, the Ljubljana University, her main theoretical<br />
and professional experience is in the field of Public sector Economics and Taxation<br />
System. She is an Assistant Professor at the Faculty of Administration, teaching at both<br />
the undergraduate and postgraduate levels in Economics, Public Finance, and Public<br />
Sector Economics. Her research interests focus mainly on Public sector Economics,<br />
Administrative Burden Reduction, Performance Budgeting, and Performance Measuring in Public Sector.<br />
Programme Chairs<br />
Mitja Decman is a Senior Lecturer in Informatics and Information Systems in<br />
Public Administration at Faculty of Administration, teaching at undergraduate level.<br />
He holds a first and master degree in Computer and Information Science, from the<br />
Faculty of Computer and Information Science, and a Ph. D. in Administration<br />
Science from the Faculty of Administration. His project and research work<br />
includes: development of information systems, benchmarking systems, digital<br />
preservation, information security, e-government, e-governance, web 2.0 and<br />
others.<br />
Keynote Speakers<br />
Tina Jukić is a researcher and PhD student at Faculty of Administration, University of<br />
Ljubljana, Slovenia, where she also completed her master’s degree. Her research is<br />
currently focused on ex-ante and ex-post evaluation of e-government projects, but she<br />
has been and still is active in other fields of e-government research as well (e.g.<br />
measuring e-government user satisfaction, e-democracy, evaluation of e-government<br />
development etc.). She is collaborating on several national and international egovernment-related<br />
projects, and same holds for her publications.<br />
Dr. Aleš Dobnikar is Director-General of the e-Government and Administrative<br />
Processes Directorate at the Ministry of Public Administration of the Republic of<br />
Slovenia. He is also a senior assistant in the Department of Intelligent Systems at the<br />
Jožef Stefan Institute, the biggest technological institute in Slovenia and an assistant<br />
professor of strategic management, development of modern systems and the field of<br />
information-communication technologies at the University of Primorska. He is a<br />
member of several national, <strong>European</strong> and international bodies and associations and<br />
a leader or member of many international teams, including the Centre for<br />
eGovernance Development in South East Europe (CeGD) Supervisory Board. He is<br />
the author of numerous expert and scientific articles and books. He earned his doctorate degree in 1997<br />
from the Faculty of Electrical Engineering, University of Ljubljana.<br />
Mini track chairs<br />
Christian Breitenstom works as software architect with focus on privacy enhancing<br />
technologies and enterprise applications. Among his projects were the central news<br />
system for the German government (BPAVIS) and the distributed information system of<br />
the German police (INPOL). With Fraunhofer FOKUS he developed the Electronic Safe<br />
for Data and Documents as trustworthy e-Government infrastructure. As OMG certified<br />
professional Christian trained software engineering teams in modelling and JEE<br />
technologies.<br />
vii
Tom Collins lectures in International Tax and Advanced Tax in the B.A. (Hons.) in<br />
Applied Taxation and in Wealth Management for the MSc (Computational Finance) at<br />
the National Centre for Taxation Studies, University of Limerick. Tom has over 25 years<br />
experience with Big-4 tax practices in Ireland and New Zealand. Prior to joining the<br />
University of Limerick, Tom was a Tax Director with Deloitte specialising in international<br />
tax, real estate and wealth management. Tom is NCTS director since September 2009.<br />
Mila Gascó holds a Ph. D. in public policy evaluation and a Master in Business<br />
Administration. She is a researcher at the Institute of Governance and Public<br />
Management of ESADE as well as an associate professor at both the Open University<br />
of Catalonia and the Pompeu Fabra University. She also has a lot of consulting<br />
experience on the information and knowledge society. Her main interests are related to<br />
public policies that allow the transition of a society to the so-called knowledge era (in<br />
particular, e-government and e-governance), to the use of ICTs for human development<br />
and to public policy evaluation.<br />
Carlos Jiménez is a Computer Engineer and holds a diploma on Information Systems<br />
Management. He is finishing his MSc. on the Information Society. He is in charge of the<br />
change management of the e-Justice project sponsored by the Information Systems<br />
Service of the Justice Department of the Autonomous Government of Catalonia. His<br />
main interests include information systems, e-governance, and interoperability. In these<br />
areas he has and carried out international training and consulting work for important<br />
organizations worldwide such as CLAD, the Government of Brazil, the Externado<br />
University of Colombia or the Pompeu Fabra University in Spain.<br />
government.<br />
Zaigham Mahmood is a Principal Researcher and Reader in Applied Computing in<br />
the School of Computing and Mathematics, University of Derby, UK. He has an MSc in<br />
Mathematics, an MSc in Computer Science and a PhD in Modeling of Phase<br />
Equilibria. He is also a Chartered Engineer and a Chartered Information Technology<br />
Professional. Zaigham has in excess of 50 publications in proceedings of international<br />
conferences and journals as well as chapters in books. He is also Editor-in-Chief of<br />
Journal of E-Government Studies and Best Practices. His research interests are in the<br />
areas of software engineering, project management, enterprise computing and e-<br />
Pat Molan is a Principal Officer with the Irish Revenue Commissioners and Limerick<br />
District Manager. Pat has worked with Revenue for almost thirty years having worked in<br />
a number of government departments previously. Pat has been centrally involved in the<br />
delivery of new and innovative IT solutions that have helped transform the Irish Revenue<br />
Commissioners into an organisation that is internationally regarded as the flagship for e-<br />
Government in the Irish Public Service.<br />
Biographies of contributing authors (in alphabetical<br />
order)<br />
Ahamed Bakeri Abu Bakar is Currently a professor at the Department of Library and Information Science,<br />
International Islamic University Malaysia, Kuala Lumpur, Malaysia. Has published a good number of articles<br />
in refereed journals and has presented numerous papers at international conferences worldwide covering<br />
areas such as digital libraries, e-governments, and information access.<br />
Fatemeh Ahmadi Zeleti is a Master of Science in Software Engineering. She has investigated the progress<br />
and obstacles of implementing and improving e-government in Iran. Prior to this, she completed her Bachelor<br />
of Science in Information Technology. Fatemeh's research interests include ICTs, e-government and its<br />
security issues, e-services, trust management, and technology and knowledge management.<br />
Shadi Al-khamayseh is a lecturer at Dubai Women's College, Higher College of Technology, Dubai City,<br />
UAE. He completed his PhD on Mobile Government at the University of Technology Sydney, Australia where<br />
viii
he lectured and tutored in a number of Information Technology subjects. He has published widely on<br />
electronic and mobile government.<br />
Madi Al-Sebie is an assistant professor in IT at Taibah University, Saudi Arabia. He received his PhD from<br />
School of Information Systems and Computing, Brunel University (UK). He received his M.Sc. in Computer<br />
Studies (Department of Computer Science) from the University of Essex.<br />
Isabel Anger studied journalism and organizational communication at FH JOANNEUM, University of Applied<br />
Sciences. After finishing her studies in 2010, she has been working as junior researcher at evolaris next level<br />
GmbH in Graz, Austria. Her research focus lies on Social Media and mobile web.<br />
Davide Arduini is Lecturer of International Industrial Economics at University of Urbino. He holds a PhD in<br />
Economics from Polytechnic University of Marche. He has collaborated with the National Centre for<br />
Information technology in the Public Administration. He works on Economics of technical change and<br />
technology policy, diffusion of ICT and e-Government.<br />
Jaro Berce, PhD, an assistant professor. Research interests: Information Society technologies (IST) and<br />
socio-economics implications; Knowledge management, Learning organization and Governance<br />
models.Lecturing: Project management, Secondary data and information resources, Information systems<br />
and eGovernance, Analyse of Information Society. Publishing topics: eGovernance, IST, Knowledge<br />
management and Learning organisation culture at conferences, journals and books.<br />
Choompol Boonmee is a lecturer at faculty of engineering Thammasat university. He also works as an ICT<br />
consultant of Thai government. He led many e-government projects. He is also the president of the electronic<br />
data interchange promotion association (EDIPA). His interests include e-government interoperability, ICT<br />
benefit management, national ID smartcard, software engineering, service oriented architecture and scientific<br />
computation.<br />
Roberto Boselli is professor assistant in Computer Science at the Department of Statistics, University of<br />
Milan Bicocca. His research activities focus on Information Systems, Semantic Web, Web 2.0 and egovernment<br />
services. He published many scientific papers in books, international journals, proceedings of<br />
national and international conferences.<br />
Leonard Burke is a Principal Officer with the Irish Revenue Commissioners in the Collector General’s<br />
Division. Leonard has worked with Revenue since 2006 having previously worked in the Department of<br />
Social Protection for 28 years. He is centrally involved in identifying and delivering new and innovative IT<br />
solutions in an organisation that is internationally regarded as the flagship for e-Government in the Irish<br />
Public Service.<br />
Walter Castelnovo is assistant professor of Information Systems and Organization at the University of<br />
Insubria (Italy). His research interests concern technological and organizational innovation in Public<br />
Administration and Interorganizational Information Systems. He is a member of the Department of<br />
Institutional Reforms, E-Government, Cooperation and Communitarian Policies of the Association of<br />
Municipalities of Lombardia (italy).<br />
Lichun Chiang is an associate professor at the Department of Political Science at the National Chung Kung<br />
University in Tainan, Taiwan. She earned her Ph.D. in Political Science, and obtained her Master in Public<br />
Administration from the University of Southern California, USA. Her recent research interests are mainly in<br />
e-governance, information technology and public organizations.<br />
Marie-Therese Christiansson, PhD, is an Assistant Professor in Information Systems at Karlstad University<br />
in Sweden. Her research interest covers process oriented driven business- and system development. Focus<br />
in her research is a co-production in an established network for practitioners, in private as well as public<br />
organisations, with interest in knowledge development and lightweight process methodologies.<br />
Pin-Yu Chu serves as Distinguished Professor of National Chengchi University, Taiwan. Her research<br />
interests include technology development and management and digital governance. Her publications can be<br />
found in Government Information Quarterly, Omega: The International Journal of Management Science,<br />
Journal of Management & Organization, Public Performance and Management Review, International Journal<br />
of Technology Management, etc.<br />
Liam Church is president and CEO of Escher Group Ltd. During his 22 year career in the postal system, he<br />
has been responsible for numerous, large-scale business and IT projects. He has considerable expertise in<br />
ix
the use of technology to manage change, to drive business growth and to help accelerate profitability in<br />
postal organizations.<br />
Duncan Cleary Senior Statistician in Revenue, Ireland, based in the Research and Analytics Branch;<br />
specialising in the application of Knowledge Discovery/ Data Mining methodologies and their application in<br />
the Irish Tax & Customs Authority, using predictive analytics, customer segmentation, real time risk<br />
analyses, large scale surveys, social network analysis, spatial analyses, time series and evidence based<br />
experiements.<br />
Grazia Concilio- Degree in Engineering, PhD in Evaluation Methods for the Integrated Conservation of<br />
Architectural, Urban and Environmental Heritage, assistant professor in Urban Planning at the Polytechnic of<br />
Milan and author of several articles. Research work mainly developed around the implementation of<br />
methodologies and techniques of knowledge representation and management for decision-making in spatial<br />
planning.<br />
Anne Corbett has worked for the Irish Revenue Commissioners for over 25 years and has extensive<br />
experience in a wide range of areas and roles. Currently she is involved in comprehensive audit (Corporation<br />
Tax, PAYE, VAT, CGT) with responsibility for the audit of high worth individuals, professionals and large<br />
companies. She also has a particular focus on anti-avoidance issues and her job entails sourcing and<br />
investigating such issues, schemes, and risks. She has recently completed an Honours Degree course in<br />
Applied Taxation with the University of Limerick.<br />
Martin De Saulles is a Principal Lecturer at the University of Brighton in the UK where he teaches and<br />
carries out research on knowledge management, social media management and innovation in the<br />
information sector. Prior to joining the University of Brighton in 2003, Martin worked in the advertising and<br />
management consulting sectors.<br />
Mitja Dečman is a Senior Lecturer in Informatics and Information Systems in Public Administration at<br />
Faculty of Administration, teaching at undergraduate level. He holds a Ph. D. in Administration Science from<br />
the Faculty of Administration. His project and research work includes: development of information systems,<br />
benchmarking systems, digital preservation, information security, e-government, web 2.0 and others.<br />
Amanda Derrick (MA Cantab) is Programme Director for Connect Digitally a multiple award-winning<br />
programme. The programme is leading central and local government in transforming key services for<br />
citizens across England by streamlining delivery and innovative use of digital technology. Amanda has a<br />
strong leadership and delivery record in government.<br />
Mohamed Mohyi Eddine El AichiI a Software Development manager, is currently preparing his PhD at<br />
ENSIAS. The aim of his thesis is to model transformational government process. His experience in<br />
implementing e-government solutions in Morocco and his interest in best practices for managing information<br />
systems, enable him to understand the weakness of implementation of a t-government solution.<br />
Magdy El-Hennawy is the project manager for the Family Card System in MSAD. Meanwhile, working as<br />
a lecturer in the Higher Institute of Computer Science & Information Technology, El-Shorouk Academy.<br />
Before, since 1978, working as chief of the System Engineering team, deputy manager then manager of<br />
software development center specialized in mission critical software systems.<br />
Nuša Erman graduated from the University of Ljubljana's Faculty of Social Sciences (social informatics) in<br />
2007. Most of her research is focused on social network, citation, and scientific network analysis (mostly in egovernment<br />
domain). She collaborates with Faculty of administration as a young researcher and an assistant<br />
in the field of Informatics.<br />
Marcoux Faiia is a Professor of Sociology at Rivier College in Nashua, N.H., U.S.A.. Dr. Marcoux Faiia has<br />
a Masters of Social Work from Boston College and a Ph.D. in Sociology/Anthropology from Northeastern<br />
University. Dr. Marcoux Faiia's research interests are in deviant behavior, popular culture and youth and<br />
women's Issues.<br />
Jean Vincent Fonou Dombeu is a PhD candidate at the School of Computer, Statistical and Mathematical<br />
Sciences at the North-West University and a lecturer in the Department of Software Studies at the Vaal<br />
University of Technology. His research interests include: Biometric for Personal Identification, Ontology,<br />
Agent Modelling, and Semantic Knowledge representation in egovernment<br />
x
John Garofalakis is Professor at the Department of Computer Engineering and Informatics, Patra’s<br />
University, Greece, and Director of Research <strong>Academic</strong> Computer Technology Institute’s Sector for Regional<br />
Development. His experience includes R&D work (and relevant publications) in the fields of: Web and Mobile<br />
Technologies, Performance Analysis of Computer Systems, Computer Networks and Telematics, Distributed<br />
Computer Systems, Queuing Theory.<br />
Mila Gascó holds a MBA and a Ph. D. in public policy evaluation. She is a researcher at the Institute of<br />
Governance and Public Management of ESADE as well as an associate professor at both the Open<br />
University of Catalonia and the Pompeu Fabra University, all of them in Spain.<br />
John Grant holds a Ph. D in Political Science from McMaster University. His fields of expertise include<br />
policy research, public administration, performance management, statistical analysis and data collection. He<br />
is a senior policy analyst for a consulting company and maintains a current appointment as an external<br />
researcher for the York Centre for International and Security Studies.<br />
Mary Griffiths teaches in communications and media and is Head of Media at the University of Adelaide.<br />
Current research includes Creative Tactics; and Digital Citizenship and Youth Participation, a comparative<br />
study (with Youn-Min Park). She is guest editor of ‘Trading with China’ (2012), a special issue of<br />
Communications, Politics and Culture.<br />
Guillaume Gronier has realised a PhD in ergonomic psychology on computer supported cooperative work.<br />
Currently Research and Development Engineer at the Public Research Centre Henri Tudor in Luxembourg,<br />
he works on issues related to ergonomics, collective and organizational performance, digital trust and user<br />
profiling for online government services.<br />
Kerstin Grundén is senior lecturer in informatics at the West University of Sweden. She has also a<br />
background as a sociologist. She is participating in an on-going interdisciplinary research project Innoveta<br />
funded by Vinnova for the study of customer centres implementation and e-services within municipalities in<br />
Sweden.<br />
Panos Hahamis is a Senior Lecturer in Business Information Management and Operations at the<br />
Westminster Business School and a Henley DBA Research Associate. He holds a BA (Hons) in Politics, an<br />
MSc in Advanced Information Technology, a PGCHE and a Post-Graduate Advanced Diploma in<br />
Management Consultancy-ADipC. A former diplomatic agent and military officer, in recent years his research<br />
interests have focused on e-Government.<br />
Martijn Hartog is a project leader and researcher at the eSociety Institute. He functioned as advisor within<br />
several Dutch governmental agencies, such as the Ministry of General Affairs / Ministry of Transport, Public<br />
Works and Water Management / Dutch Public Broadcast Agency and Municipality of Rotterdam. His current<br />
field of research concerns applied e-democracy.<br />
Bernhard Horn is a research assistant in the research group for Industrial Software at Vienna University of<br />
Technology and his research and science focus is in the field of e-government, IT law and medical<br />
informatics. He holds master diplomas in Business Informatics and Law from the University of Vienna.<br />
Currently he works on his PhD thesis about the Austrian legal regulations for the electronic delivery of<br />
governmental documents.<br />
Ivana Horvat is a student of PhD studies, module Business informatics at University of Novi Sad, Faculty of<br />
Economics. Most of the research period she was interested in business informatics and, therefore, she<br />
defined research areas that comprise of XML databases, services that use XML to exchange documents,<br />
with special concern on e-government processes.<br />
Princely Ifinedo is an Associate Professor at Cape Breton University, Canada. He holds a doctoral degree<br />
in Information Systems Science from the University of Jyväskylä and masters degrees from the University of<br />
London and Tallinn University. He has presented research at various international IS conferences.<br />
Aleksis Jarockis is a PhD candidate of the University of Latvia, Department of Communications Studies. In<br />
2009 acquired Latvian University Social Sciences master's degree in Communicational Sciences with<br />
honors. Research interests: public administration communication, crisis communication in the public sector,<br />
organization communication, media and public in public current issues research and interpretation.<br />
Raed Kanaan is an assistant Professor in Management Information System at the Arab Academy for<br />
Banking and Financial Sciences. He received his PhD in Information systems from the De Montfort<br />
xi
University, and MSc in management information systems form the Arab Academy for Banking and Financial<br />
Sciences. His research interests include e-government in developing countries, e-commerce, impact of<br />
culture on IT adoption and implementations in the Middle East, and Intellectual capital in the Arab<br />
universities.<br />
Maja Klun oriented her research in public finance, and economics of public sector. The government<br />
appointed her as a member of government group for development of performance-oriented budgeting for the<br />
period 2005-2007. She cooperates with the government in the field of better regulation, and in the board for<br />
public sector.<br />
Endrit Kromidha (MSc) is a researcher and lecturer in Royal Holloway, University of London and other UK<br />
higher institutions in management, information systems, e-business and information society. Having a<br />
background in international economics and work experience in business, non-profit sector and academia, his<br />
current interest is on e-government, international assistance, sustainability, information systems, and<br />
institutionalisation.<br />
Peter Lipp is Assistant Professor at IAIK, Graz University of Technology, and is heading the Java Crypto<br />
development team at IAIK and Stiftung Secure Information and Communication SIC, where he also is one of<br />
the CEOs. He has been involved in PKI-projects and standardisation for about 20 years.<br />
Devender Maheshwari is a PhD researcher at Information and Communication Technologies (ICT)<br />
Department, Delft University of Technology, The Netherlands He holds a master degree in<br />
Telecommunication from Delft University. His research is focused on E-government growth and readiness,<br />
interoperability, e-governance, measuring and benchmarking, and enterprise architectures of public<br />
organizations.<br />
Zaigham Mahmood is a Reader in Applied Computing at the University of Derby UK. He is a Chartered<br />
Engineer and has in excess of 60 articles published in conference proceedings, journals and books. His<br />
research is in the areas of software engineering, project management, enterprise computing and egovernment.<br />
Gianluca Misuraca is a Scientific Officer at the Information Society Unit of the Institute for Prospective<br />
Technological Studies of the <strong>European</strong> Commission's Joint Research Centre (JRC-IPTS). Also a Research<br />
Associate at the Ecole Polytechnique Fédérale de Lausanne (EPFL) where previously he was the Managing<br />
Director of the Global Executive Master in e-Governance.<br />
Racious Moatshe is a PhD student at the University of Derby, UK. He is pursuing a research project on<br />
Barriers to successful implementation of e-government in developing countries, taking the case of Botswana<br />
government. Racious has experience and knowledge in business finance, banking, and business needs<br />
analysis, portfolio management, and people and business management.<br />
Maria Moloney is an IT consultant with Escher Group Ltd and a lecturer at Trinity College Dublin. After<br />
earning a BSc degree and an MSc degree in Information Systems, she is currently reading towards a PhD at<br />
Trinity College Dublin. Her research interests include informational privacy, e-government and information<br />
systems design theory.<br />
Frans Mosetja is a junior lecturer in the department of Information Systems at the Faculty of Commerce,<br />
North West University-Mafikeng campus, South Africa, teaching the undergraduate courses. He is currently<br />
busy with his Masters degree in Information Systems. His research is focused on the use of Information<br />
Technology by government departments in South Africa.<br />
Bert Mulder is an associate professor of Information, Technology and Society at The Hague University of<br />
Applied Sciences and founder of the eSociety Institute. His main objective concerns strategy development<br />
for a broad and innovative appliance of ICT within the society. Prior to this he worked as an information<br />
advisor at the Dutch parliament.<br />
Darren Mundy holds a PhD in the field of Healthcare Informatics (2004) and a first class honours degree in<br />
Computer Science (2000) both of which were obtained from the University of Salford. Darren is the Director<br />
of Undergraduate Studies in the School of Arts and New Media at the University of Hull. His research<br />
interests range from Computer Security through web personalisation systems to innovative educational<br />
technologies.<br />
Gianluca Misuraca Scientific Officer at the Information Society Unit of the Institute for Prospective<br />
Technological Studies of the <strong>European</strong> Commission's Joint Research Centre (JRC-IPTS). Also a Research<br />
xii
Associate at the Ecole Polytechnique Fédérale de Lausanne (EPFL) where previously he was the Managing<br />
Director of the Global Executive Master in e-Governance.Gianluca held several positions as policy advisor<br />
for various International Organisations, bilateral cooperation agencies and consulting companies.<br />
Francesco Molinari -MSc & MA in Local Public Management (Siena University, 2007 & 2005) and BSc in<br />
Social and Economic Disciplines (Milan “L. Bocconi” University, 1990). Currently an independent research<br />
and project manager for several public and private organizations in Europe. His background includes a 5years<br />
service as strategic advisor of a middle-sized Italian City Mayor.<br />
Bongani Ngwenya is the Dean, Faculty of Business, MBA Thesis Defense Panel Chair, Lecturer and<br />
Master’s thesis supervisor at Solusi University, in Zimbabwe.Currently studying PhD in Business<br />
Management & Administration, with specialization in Strategic Management with North West University,<br />
Mafeking Campus in South Africa. Research interests are mainly in the areas of Organisational Decision-<br />
Making Research & Business in general.<br />
Birgit Oberer is amember of the Faculty of Arts and Science at Kadir Has University. Currently, her<br />
academic interests are public management, process management and information technology. She actively<br />
takes part in a number of international networks and task forces on Management and IT and member of<br />
editorial reviewer boards for international journals<br />
Clare Omelia is an Assistant Principal Officer with the Irish Revenue Commissioners and is Dublin<br />
Enforcement District Manager, based at Dublin Port. With Revenue since 2004, Clare has previously worked<br />
in other Government Departments, and in the private sector.<br />
Robert Orlowski (B.Sc.) is a student of Information Systems at the University of Duisburg-Essen. His<br />
academic areas of interest include ontological engineering and semantic interoperability of information<br />
systems.<br />
Ching-Heng Pan is an assistant professor at the National Chung Hsing University in Taiwan. He earned his<br />
Ph.D. in Public Administration from University of Southern California, and obtained his Master in Public<br />
Administration from Columbia University. His recent research interests are mainly in e-governance,<br />
innovation diffusion, and public organizations.<br />
Marijn Plomp has an MSc in Information Science from Utrecht University and currently works there as a<br />
PhD Researcher at the Department of Information and Computing Sciences. His research focuses on the<br />
adoption of chain information systems. He also has a position as researcher/consultant at Dialogic innovation<br />
& interaction in Utrecht, The Netherlands.<br />
Massimo Pollifroni (2001) L’economia dell’azienda universitaria, Giappichelli, Turin.(2003) Processi e<br />
modelli di e-government ed e-governance applicati all’azienda pubblica, Giuffrè, Milan.(2007) Public Sector<br />
Social Responsibility. Strumenti di rendicontazione etico-sociale per l’azienda pubblica, Giuffrè, Milan.(2009)<br />
Green Public Accounting. Profili di rendicontazione ambientale per un’azienda pubblica responsabile e<br />
sostenibile, Giappichelli, Turin.<br />
Nataša Pomazalová, Ph.D.Nataša is lecturer at University of Defence in Brno (CZ). Her research interests<br />
include managerial education, outsourcing use in the public sector and e-government. Her research is<br />
focusing on public procurement and knowledge management.<br />
Leszek Porębski is a professor of political science, employed in the Department of Political Science and<br />
Contemporary History, at the Faculty of Humanities, AGH University of Science and Technology, Kraków,<br />
Poland. Major fields of interest: e-democracy, e-government, societal consequences of the ICT use as well<br />
as the political theory of Harold D. Lasswell.<br />
Oscar Rebollo is MSc in Computer Science and Networks from the University of Alcalá de Henares (Spain).<br />
He is currently a PhD student and a member of the GSYA research group at the School of Computer<br />
Science at the University of Castilla-La Mancha. His research activity is in the field of security in Information<br />
Systems.<br />
Laslo Šereš is an assistant professor at University of Novi Sad, Department of Business Informatics. He’s<br />
interest and active involvement with databases is already 20 years long. Nowadays his primary research<br />
interest is in XML database constraints and usage of XML databases in different areas, including e-Business<br />
processes. His other interests are database design, query optimization issues, and Data Warehousing.<br />
xiii
Shareef Shareef BSc in Physics from Mousel University in 1990 in Iraq. Received an MSc in Digital<br />
Communications Networks in 2005 from London Metropolitan University with distinction. worked as an expert<br />
in ICT Centre at the Ministry of Higher Education & Scientific Research in Kurdistan Region of Iraq (KRI) in<br />
2007Currently at the University of East London as a PhD student.<br />
Dalibor Stanimirovic finished his master's studies at the University of Ljubljana’s Faculty of Administration.<br />
He is an assistant in the field of Informatics in public administration and an active member of Institute for<br />
Informatization of Administration. He is involved in various IT projects and his research interests include egovernment,<br />
e-democracy and social dimensions of ICT.<br />
Virgil Stoica, Ph.D.Head of Political Science Department – Alexandru Ioan Cuza University of Iasi, Faculty<br />
of Philosophy, Social and Political Sciences; Courses taught: Public Policy, Public Administration, and<br />
Political Science Research Methods; Scientific research fields: e-government, public policies, local<br />
government, and political elites.<br />
John Douglas Thomson, PhD: Research interests include corporate governance policy and ethics, ebusiness<br />
and government/industry policies, infrastructure development and high tech project delivery,<br />
business systems and marketing. He has published four books, five book chapters, and 32 refereed<br />
conference/journal publications/papers.<br />
Natasa Veljkovic received the BSc and MSc degrees in Computer Science at the Faculty of Electronic<br />
Engineering, University of Nis, Serbia. She is currently working as a Teaching Assistant at Faculty of<br />
Electronic Engineering with the Department of Computer Science. Her PhD research is concerned with<br />
Sensor Web systems, E-systems, GIS and e-Government solutions and implementation.<br />
Jim Yonazi is a Lecture and a researcher from the Institute of Finance Management (IFM) in Dar es Salaam<br />
Tanzania. His research interest is on the areas of e-Government, ICT4D, and ICT innovations. Jim has a<br />
PhD in e-Government from the University of Groningen (Netherlands) and MSc Information Technology and<br />
Management from Keele University (UK).<br />
xiv
Evaluation of eGovernment Implementation at Federal, State<br />
and Local government Levels in Malaysia<br />
Ahmad Bakeri Abu Bakar<br />
International Islamic University Malaysia, Kuala Lumpur, Malaysia<br />
bakeri@iiu.edu.my<br />
Abstract: The Malaysian Government has been implementing eGovernment initiatives since 1997. One way that the<br />
government can demonstrate physically to meet public demands for greater transparency and accountability is to<br />
offer online services and products through the eGovernment websites or portals. The eGovernment websites at<br />
Federal government, State government and Local government levels vary from one another considerably in terms of<br />
their technological design as well as their contents. For the purpose of measuring the generic aptitude of the State,<br />
Federal and Local government authorities to employ eGovernment, the Web Presence Measurement Model<br />
employed by the United Nations for the Global eGovernment Survey 2003, was used to evaluate the websites.<br />
Evaluation of MyGovernment, the Malaysia’s Government official portal,13 State government websites as well as<br />
State agencies websites and 145 local government authorities websites was conducted. The study was able to<br />
identify the current state of maturity of eGovernment websites and the stage of fitness of those websites in the cyber<br />
space. It was found that the portal, MyGovernment was far ahead in term of sophistication, followed closely by the<br />
websites of the Ministry of Agriculture and Agro-Based Industry and the Ministry of Tourism. The websites of all the<br />
State Governments in Malaysia are fairly good but the State Agencies websites have several deficiencies especially<br />
in incorporating the eGovernment applications such as E-procurement in their websites. At the Local government<br />
Authorities level the implementation of eGovernment is fairly good for those in rich States such as Selangor while<br />
those in poor States such as Sabah they are deficient in several aspects such as the absence of online payment, e-<br />
Procurement and online application in their websites. This sort of indicate that local government authorities with<br />
money to spend can develop their websites/portals to a sophisticated level of maturity while other less fortunate<br />
States could only provide the barest minimum for their websites/portals as in the case of Sabah.<br />
Keywords: eGovernment, Malaysia, state government, local government, website evaluation<br />
1. Introduction<br />
The Malaysian Government has been implementing eGovernment initiatives since 1997. This initiative by<br />
the government is in reality a product of the efforts under the Multimedia Super Corridor (MSC). It was<br />
designed to improve information flow and processes within the government, improve the speed and<br />
quality of policy development, and improve coordination and enforcement. This would enable the<br />
government to be more responsive to the needs of its citizens. The MSC is a project created by the<br />
government to hasten the process of the nation to become first world status by the year 2020. For this<br />
purpose the government has embarked in various initiatives and investments related to information and<br />
communication technology (ICT). The MSC now known as MSC Malaysia was responsible for<br />
establishing the eGovernment flagship under its flagship applications programme. Under the<br />
eGovernment flagship, seven main projects were identified to be the core of the eGovernment<br />
applications. The eGovernment projects are Project Monitoring System (PMS), Electronic Procurement<br />
(eP), Generic Office Environment (GOE), E-Syariah, Human Resource Management Information System<br />
(HRMIS Electronic Services Delivery (eServices)), and Electronic Labour Exchange (ELX).<br />
As citizens are responsible for electing the government at the Federal, State and Local government levels<br />
in Malaysia they expect the government to adopt strategies that improve citizen access to government<br />
information and expertise to ensure citizen participation in and satisfaction with the government process.<br />
This situation arises from the Malaysian government structure of having a three-tiered government<br />
administrative systems namely Federal, State government and Local authorities. One way that the<br />
government can accede to this inquisition is to offer online services and products through the<br />
eGovernment websites or portals. The eGovernment applications would not have succeeded had it not<br />
been for the might and evolution of information and communication technology (ICT) sectors. The<br />
commitment of the government towards investments in the ICT sector has been enhanced recently.<br />
During the tabling of the 10th Malaysia Plan (10MP) 2011-2015 in parliament in June 2010, the Prime<br />
Minister outlined several investments in ICT sectors. At the same time several States announced ICT<br />
plans to complement the development of the MSC. For example, Selangor state government including<br />
the local governments at state level has set up the Selangor Networking and the Web homepage for its<br />
various agencies which would link the state administration and all government departments and agencies<br />
with every business organisation, office, factory, school and home in the state. Johor state government<br />
announced the establishment of Johor Information Infrastructure (JII) costing RM30 million, the first state<br />
1
Ahmad Bakeri Abu Bakar<br />
to set up such a system in order to provide the public with a more efficient information service (Erlane<br />
and Jamaliah, 2010).<br />
Governments of both developed and developing countries have embraced ICT to improve the quality of<br />
public service, increase public access to information and to energise more participation in civic affairs<br />
(Moon, 2000; Schedler, 2003). The citizens also are accustomed to the developments of ICT through the<br />
escalating rate of utilization of Internet. In the case of Malaysia Internet usage has increased at a<br />
remarkable rate. This can be visualized from the figures provided by the Malaysian Communications and<br />
Multimedia Commission (MCMC). In 2000 the number of subscribers was only about 2 million ( Abd<br />
Rozan,2008). Currently it is estimated that the number of Internet subscribers have reached close to 12<br />
million (11.76 million at the end of 2007) (MCMC, 2008). The current Internet penetration rate is at 16.9<br />
million (ITU, 2010). The Internet is an important element in eGovernment as the term itself is defined as”<br />
exclusively an Internet-driven activity that improves citizen access to government information ,services<br />
and expertise to ensure citizen participation in, and satisfaction with the government process”<br />
(UNDPEPA, 2002).<br />
The presence of eGovernment websites, however, might not change the status quo as they could just be<br />
displaying information in an attractive manner and nothing more to the public. Benjamin and Whitley<br />
(2004) opined that “ No longer can a website justify itself merely by being a website – the bottom line is<br />
apparently clear : web pages must reach concrete goals and prove their investment”. In order to<br />
understand whether the creation of the eGovernment websites has benefited the public or not then the<br />
question of how usable these websites are to the public has to be evaluated. The evaluation of<br />
eGovernment websites and portals can be done at several levels of the government machinery. Some<br />
scholars have accessed for features such as information availability, service delivery, and public access<br />
at global level ( West, 2007), at national level (Benjamin and Whitley,2004) and at municipality level (<br />
Kunsteij and Decman,2005).<br />
Malaysia, a federal constitutional elective monarchy, is nominally headed by the Paramount Ruler or<br />
Yang di-Pertuan Agong , commonly referred to as the King of Malaysia. The state governments are led<br />
by chief ministers , nominated by the state assemblies and advising their respective sultans or governors.<br />
There are 13 states and three federal territories which are Kuala Lumpur, Labuan Island and the<br />
Putrajaya federal administrative territory. The local authorities are under the jurisdiction of the state<br />
governments. Three types of administrative councils are in existence. These are the City, Municipal, and<br />
District councils. A city council refers to a local authority in which the population of the jurisdiction area<br />
exceeds 500,000 people and the collection of the annual revenue is more than RM100 million. City<br />
councils are led by mayors. A local authority is known as the municipal council if the population of the<br />
jurisdiction area is not less than 150,000 and the annual revenue collection is more than RM20m. A<br />
municipal council is led by a president. On the other hand, a local authority is known as a district council if<br />
the population of the jurisdiction area is less than 150,000 and the collection of annual revenue is less<br />
than RM20m (Hazman, 2006). In Malaysia the eGovernment projects are monitored closely by the<br />
Director-General of the Malaysian Administrative Modernisation and Management Planning Unit (<br />
MAMPU) of the Prime Minister’s Department. The national committee responsible for overseeing the<br />
development of public sector websites or portals is the Public Sector Portal/Website Steering Committee<br />
headed by the Director General of MAMPU. Amongst the tasks given to this Committee are to: coordinate<br />
and monitor implementation of public sector websites/portals, monitor effectiveness of public sector<br />
websites/portals and identify improvement efforts and solve problems and issues. It does not come as a<br />
surprise to record some accolade attributed to the Malaysian public sector eGovernment websites or<br />
portals given the fact that the quality of these websites or portals are always never compromised by<br />
MAMPU. Consequently, at the World Congress on Information Technology 2008 (WCIT2008) held in May<br />
2008 Malaysia’s MyGovernment portal (http://www.gov.my) beat about 70 others around the world to take<br />
the top prize in its category in the 2008 Global ICT Awards (Star,2008). MyGovernment was initiated by<br />
MAMPU in 2003 and according to MAMPU the portal had 6.5 million visitors as at May 2008. This portal<br />
acts as the main gateway to access government information and online services ( 900 websites across<br />
Federal, State and Local authorities (MAMPU,2008). The global eGovernment ranking for Malaysia has<br />
also improved significantly. For example in the Brown University’s Global EGovernment survey,<br />
Malaysia’s ranking was 157 out of 199 countries in 2005 and it moved to 36 in 2006. In the latest 2007<br />
survey its position has improved further to 25 (West,2007). With such an improvement in the global<br />
ranking it is expected that the scenario is not just an outcome of the display of reengineering done only at<br />
Federal Government level but also at State Government and Local authorities level.<br />
2
2. Purpose of study<br />
Ahmad Bakeri Abu Bakar<br />
The aim of the study is to determine the maturity level of implementation of eGovernment applications at<br />
the Federal, State and Local Government levels based on the evaluation of the eGovernment websites or<br />
portals at Federal ,State and Local Authorities level in order to understand more clearly the actual<br />
situation on the ground.<br />
3. Methodology<br />
A Model called Web Presence Measurement Model WPMM) was employed to evaluate the current status<br />
of those websites or portals in Malaysia selected for the study. The Web Presence Measurement Model<br />
(WPMM) was introduced in the UN eGovernment Survey 2003 as an assessment towards United Nations<br />
member countries specifically for their capability providing services electronically via the Internet. The<br />
WPMM shows 5 progressively ascending stages of presence that consists of Emerging Presence,<br />
Enhanced Presence, Interactive Presence, Transactional Presence and Networked Presence. WPMM<br />
quantification considers the development of maturity of EGovernment presence on-line.<br />
Indicators are used to measure the presence or absence of specific electronic facilities or services<br />
available in the government agency websites or portals. The WPMM model is shown in Table 1 and<br />
some refinements or adjustments have been made to some indicators to ease the evaluation process.<br />
Table 1: Web presence measurement model indicators<br />
Stage 1 Emerging Presence<br />
Existence of an Official Website or National portal<br />
Archived information<br />
Message from Head of organization<br />
Link to Ministries or other organizations<br />
Stage II: Enhanced Presence<br />
Provide current and archived information<br />
Policies, budgets, regulations and downloadable databases<br />
Search enabled<br />
Site map<br />
Menu provided<br />
Help features such as FAQ provided<br />
Product, service details and downloadable brochures<br />
Stage III: Interactive Presence<br />
Downloadable forms for printing and to be mailed back<br />
Audio and video capability<br />
E-mail, fax, telephone and physical address provided for ease of participation from public<br />
Updated regularly<br />
Stage IV : Transactional Presence<br />
Instruction to support any transaction<br />
Online application of identity cards, birth certificate and license renewal<br />
3
Ahmad Bakeri Abu Bakar<br />
Able to make online payments via credit, bank or debit cards<br />
E-procurement facilities provided<br />
Online bidding via secure links for public contracts<br />
Stage V: Networked Presence<br />
Use of Web Comment forms<br />
Other innovative dialog mechanism such as chat or forum facilities<br />
Web rating<br />
Extracted from the UN Global EGovernment Survey 2003.<br />
(http://unpan1.un.org/intradoc/groups/public/documents/un/unpan016066)<br />
A weight scoring method to gauge the presence of the relevant indicators is adopted in analyzing the<br />
maturity of the respective websites or portals. The weightage is computed on the basis of 1 unit score is<br />
given to the presence of a particular indicator. Based on this procedure the scoring weight for the five<br />
stages of presence is shown in Table 2.<br />
Table 2: Scoring weightage<br />
Stages Weightage<br />
Stage 1 Emerging Presence 4<br />
Stage II: Enhanced Presence 7<br />
Stage III: Interactive Presence 4<br />
Stage IV: Transactional Presence 5<br />
Stage V: Networked Presence 3<br />
The data for this study were obtained from an assessment of the Federal government authorities,<br />
MyGovernment portal from MAMPU, two Federal Ministry websites, namely from the Ministry of<br />
Agriculture and Agro-Based Industry (MOA) and Ministry of Tourism (MOTOU) and the Malaysian local<br />
authorities websites. The assessment for the local authorities was based on the official local government<br />
websites or portals covering all the 14 states in Malaysia while for the State government authorities, the<br />
assessment will be based on the official state government websites covering all the 14 states in Malaysia<br />
and in addition the state agency websites that deal with the subject of tourism and agriculture. The<br />
scoring process will be based on whether the indicators as stipulated in the WPMM are present or<br />
absent. In the case where indicators are present they will be provided with an appropriate weightage as<br />
stipulated above. Table 3: Shows the scores obtained from the portal of the Federal Government,<br />
MyGovernment from MAMPU<br />
Table 3: Scoring weightage for MyGovernment portal<br />
Stages Weightage<br />
Stage 1 Emerging Presence 3<br />
Stage II: Enhanced Presence 7<br />
Stage III: Interactive Presence 4<br />
Stage IV: Transactional Presence 5<br />
Stage V: Networked Presence 2<br />
4
Ahmad Bakeri Abu Bakar<br />
As expected the MyGovernment portal shows the existence of the indicators in all the five stages.<br />
However, contrary to expectation is the absence of the indicator for message from head of organization.<br />
Usually government agencies receive a high score for this indicator as they are supposed to convey their<br />
mission, vision and aspirations to the public for awareness purposes. One of the plausible explanations<br />
could be due to the fact that this portal is not representing any particular government agency but the<br />
Federal government as a whole.<br />
Table 4 shows the scores obtained from the two Federal ministries websites, i.e. Ministry of Agriculture<br />
and Agro-Based Industry ( MOA) and the Ministry of Tourism (MOTOU).<br />
Table 4: Scoring weightage for (MOA) and (MOTOU) websites<br />
Stages Weightage for MOA Weightage for MOTOU<br />
Stage 1: Emerging Presence 4 4<br />
Stage II: Enhanced Presence 7 6<br />
Stage III: Interactive Presence 4 4<br />
Stage IV: Transactional Presence 3 2<br />
Stage V: Networked Presence 1 1<br />
Table 4 shows the existence of the indicators in all the five stages for both MOA and MOTOU websites.<br />
All the indicators in stage II are present for MOA including the display of products and services offered by<br />
MOA while in the case of MOTOU there is no site map available which could affect the accessibility of the<br />
website. There are no indicators for online payment and online bidding for public contracts for both<br />
websites. Feedback from the public related to the online rating of the websites is also absent. Overall,<br />
MOA website is found to be more mature and sophisticated as compared to MOTOU website.<br />
Table 5 shows the scoring pattern of the State Government websites. Assessment of State Government<br />
websites involved only the official website or portal of the 13 State Government websites.<br />
Table 5: Scoring weightage for State Governments websites<br />
Stages Sg Kdah Ktan Tnu Prlis Sbah Swak Jhr Mka Phg Png Ns Pk<br />
Stage 1 4 4 4 4 4 3 4 4 4 4 4 4 4<br />
Stage II 6 5 5 5 3 5 6 6 6 6 6 5 5<br />
Stage III 4 3 2 2 2 2 3 3 3 3 3 3 2<br />
Stage IV 3 1 1 1 1 3 4 2 2 1 4 2 3<br />
Stage V 1 1 1 1 0 1 1 1 2 1 2 1 2<br />
It is evident from Table 5 that the differences between weightage of the Federal Government Ministry<br />
websites and the State Government websites are just marginal for the first 3 stages. However, in the<br />
case of stage 5 there is one state , Perlis that carries no weightage. This might be due to the fact that<br />
MAMPU has kept a close watch on the implementation of EGovernment applications in the public sector.<br />
The other point is that as the party involved are the 13 State Governments they have to lead by example,<br />
and therefore they have to comply as closely as possible with the instruction coming from Federal<br />
Government related to the development of websites. Should they not comply with the request of the<br />
Federal Government then it is highly likely that those Agencies under the State Government will also act<br />
5
Ahmad Bakeri Abu Bakar<br />
otherwise. As such there is a need to discover whether the State Agencies have complied with what the<br />
Federal and State Government wish them to practice. An assessment of the State Agencies websites<br />
could help us in the discovery.<br />
Table 6 and Table 7 shows the scoring for the State Agencies related to tourism and agriculture. These<br />
two fields are selected because of the importance of these sectors for the Malaysian economy. For<br />
example tourism sectors brought in US$15 billions, the Malaysian tourism income<br />
for 2007, the second national income after the industry sector (US$60 billions in 2007)<br />
(Tradersdailynews,2008).<br />
Table 6: Scoring weightage for State Agency in tourism websites<br />
Stages Sg Kdah Ktan Tnu Prlis Sbah Swak Jhr Mka Phg Png Ns Pk<br />
Stage 1 3 2 2 3 3 4 3 3 3 2 2 3 3<br />
Stage II 4 3 3 3 3 4 3 4 5 4 3 3 5<br />
Stage III 1 1 1 2 0 2 2 2 2 2 2 0 1<br />
Stage IV 0 0 0 0 0 1 1 1 0 1 0 0 0<br />
Stage V 0 0 0 1 0 1 1 1 2 1 2 1 2<br />
Table 6 shows clearly that State Agency websites have not developed to a state of maturity or<br />
sophistication expected of them. Most of the State Agency websites as shown in Table 6 manage to get a<br />
weightage of 1 or 0 for stage 4 and 5. This result demonstrates clearly that although MAMPU has<br />
implemented the E-Procurement applications, this initiative has not trickled down to those Agencies<br />
under the State Government.<br />
Table 7 shows a replication of the results as demonstrated in Table 6. As in Table 6 stage 4 and 5 have<br />
mostly a weightage of 1 or 0. This happens despite the fact that they belong to a separate Ministry with<br />
different leadership and work culture.<br />
Table 7: Scoring weightage for State Agency in agriculture websites<br />
Stages Sg Kdah Ktan Tnu Prlis Sbah Swak Jhr Mka Phg Png Ns Pk<br />
Stage 1 2 3 3 3 3 4 3 2 3 3 2 3 4<br />
Stage II 2 3 3 4 3 5 4 3 3 3 3 4 4<br />
Stage III 0 1 1 2 1 1 1 1 2 1 1 2 3<br />
Stage IV 0 0 1 0 1 1 1 0 1 0 0 0 2<br />
Stage V 0 0 0 0 0 0 1 0 1 0 0 0 2<br />
Based on this finding we can infer that the success story is up to the level of State Government websites.<br />
When comes to the websites of Agencies at State Government level another story unfolds.<br />
6
Ahmad Bakeri Abu Bakar<br />
Table 8 shows the scores obtained from an assessment of the City councils websites/portals in Malaysia.<br />
As shown in Table 8 not all states in Malaysia have their own City councils. Only 9 states are represented<br />
with City councils. In cases where the City council operates it can be seen that all have passed Stage I :<br />
Emerging Presence, while in Stage II : Enhanced Presence two City councils operating in the states of<br />
Sabah and Sarawak have 71% achievement which means that there are certain indicators in the Stage II<br />
that are absent. All the City councils have passed Stage III: Interactive Presence while in Stage IV :<br />
Transactional Presence the City council of Federal Territory (Kuala Lumpur City council) has the highest<br />
achievement of 80%. As expected the Stage V: Networked Presence is found to be difficult for the City<br />
councils to achieve a high score. Their best current achievement score for most of them is only at 67%.<br />
Table 8: Scoring weightage for City council websites/portals<br />
Stages Fed Slg Kda Ktan Tg<br />
Ter<br />
h<br />
g<br />
Stage 100 100 100 Nil 100<br />
1 % % %<br />
%<br />
Stage 100 100 100 Nil 100<br />
II % % %<br />
%<br />
Stage 100 !00% 100 Nil 100<br />
III %<br />
%<br />
%<br />
Stage 80% 60% 40% Nil 40<br />
IV<br />
%<br />
Stage 67% 67% 67% Nil 67<br />
V<br />
%<br />
Plis Sba<br />
h<br />
Swak Jhr Mka Phg Png Ns Pk<br />
Nil 100 100% 100 100 Nil Nil Nil 100<br />
%<br />
% %<br />
%<br />
Nil 71% 71% 100 100 Nil Nil Nil 100<br />
% %<br />
%<br />
Nil 100 100% 100 100 Nil Nil Nil 100<br />
%<br />
% %<br />
%<br />
Nil 0 40% 40% 60% Nil Nil Nil 40%<br />
Nil 0 33% 67% 67% Nil Nil Nil 33%<br />
Table 9 shows the scores obtained from an assessment of the Municipal councils websites/portals in<br />
Malaysia. As shown in Table 9 all states in Malaysia except for the Federal Territory have their own<br />
Municipal councils. These Municipal councils usually operate in the main towns of the States. As<br />
expected their scope of operations are much smaller than the City councils and as such their<br />
achievements would be likely less than that of the City councils . As shown in Table 9 there are several<br />
Municipal councils websites/portals that have not passed Stage II especially in the States of Sabah and<br />
Sarawak where they manage to achieve 43% and 57% respectively. This is in stark contrast with the<br />
achievements obtained by the City councils websites/portals in which only the two States of Sabah and<br />
Sarawak that managed to obtain 71% achievement while the rest obtained 100% achievement.<br />
Table 9: Scoring weightage for Municipal council websites/portals<br />
Sta<br />
ges<br />
Sta<br />
ge 1<br />
Sta<br />
ge II<br />
Sta<br />
ge<br />
III<br />
Sta<br />
ge<br />
IV<br />
Sta<br />
ge<br />
V<br />
Fed<br />
Ter<br />
Not<br />
avai<br />
l<br />
Not<br />
avai<br />
l<br />
Not<br />
avai<br />
l<br />
Not<br />
avai<br />
l<br />
Not<br />
avai<br />
l<br />
Slg Kda<br />
h<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
Ktan Tgg Plis Sba<br />
h<br />
100<br />
%<br />
90% 100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
Swa<br />
k<br />
100<br />
%<br />
Jhr Mka Phg Png Ns Pk<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
43% 57% 95% 76% 100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
96% 92% 100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
86% 100<br />
%<br />
86% 100<br />
%<br />
43% 27% 0 40% 40% 40% 20% 13% 13% 40% 20% 40% 40<br />
%<br />
67% 33% 33% 33% 33% 0 0 67% 44% 78% 0 78% 33<br />
%<br />
In the case of Stage IV, Table 9 shows that all the Municipal councils websites/portals obtained<br />
achievements below 50% which means that there are three indicators that are absent from their<br />
websites. For Stage V, the Municipal councils websites/portals achievement s are almost similar to that of<br />
the City councils.<br />
Table 10 shows that even at Stage I the District councils websites/portals have not obtained 100 %<br />
achievement. The States of Sabah and Perak have obtained an achievement of 94% and 98%<br />
respectively while all the Malaysian states that have City councils and Municipal councils have an<br />
achievement of 100 % which means that all the indicators in Stage I are present in their websites.<br />
7<br />
10<br />
0<br />
%<br />
93<br />
%<br />
94<br />
%
Ahmad Bakeri Abu Bakar<br />
Table 10: Scoring weightage for District council websites/portals<br />
Stage<br />
s<br />
Stage<br />
1<br />
Stage<br />
II<br />
Stage<br />
III<br />
Stage<br />
IV<br />
Stage<br />
V<br />
Fed<br />
Ter<br />
Not<br />
avai<br />
l<br />
Not<br />
avai<br />
l<br />
Not<br />
avai<br />
l<br />
Not<br />
avai<br />
l<br />
Not<br />
avai<br />
l<br />
Slg Kdah Ktan Tgg Plis Sbah Swa<br />
k<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
Not<br />
Avai<br />
l<br />
76% 82% 93% Not<br />
Avai<br />
l<br />
89% 91% 50% Not<br />
Avai<br />
l<br />
50% 29% 33% 40% Not<br />
Avai<br />
l<br />
75% 33% 33% 33% Not<br />
Avai<br />
l<br />
100<br />
%<br />
94% 100<br />
%<br />
29% 37% 100<br />
%<br />
75% 71% 100<br />
%<br />
Jhr Mka Phg Png Ns P<br />
k<br />
100<br />
%<br />
100<br />
%<br />
76% 100<br />
%<br />
100<br />
%<br />
100<br />
%<br />
86% 100<br />
%<br />
92% 86% 86% 100<br />
%<br />
9<br />
8<br />
%<br />
9<br />
7<br />
%<br />
13% 20% 15% 13% 20% 20% 8% 2<br />
0<br />
%<br />
0 0 67% 44% 71% 0 67% 3<br />
3<br />
%<br />
Table 10 also shows for Stage II the District councils websites/portals of the State of Sabah obtained the<br />
lowest achievement of 29% followed by the State of Sarawak at 37%. In the case of Stage IV the<br />
achievement of the District councils websites/portals are relatively lower than the City councils and<br />
Municipal councils websites/portals and in the case of the District council of Negeri Sembilan websites<br />
they obtained merely 8% achievement which means four out of the five indicators are absent from the<br />
websites. In respect of Stage V the number of indicators present in the District council werbsites/portals<br />
are almost similar to those exhibited by the City councils and Municipal councils websites/portals.<br />
4. Conclusion<br />
Based on the findings we can infer that the success story in the case of Malaysia’s e- government<br />
implementation is up to the level of the Federal government and its Agencies. At the State government<br />
level the implementation of eGovernment is fairly good but deteriorates rapidly at the level of State<br />
government Agencies where there are several deficiencies especially in incorporating the eGovernment<br />
applications of e-Procurement in their websites. At the Local government Authorities level the<br />
implementation of eGovernment is fairly good for those in rich States such as Selangor while those in<br />
poor States such as Sabah they are deficient in several aspects such as the absence of online payment,<br />
e-Procurement and online application in their websites. This sort of indicate that local government<br />
authorities with money to spend can develop their websites/portals to a sophisticated level of maturity<br />
while other less fortunate States could only provide the barest minimum for their websites/portals as in<br />
the case of Sabah. Having identified the shortcomings the relevant authorities especially MAMPU should<br />
take steps to improve the situation of the public sector websites especially those related to local<br />
government authorities operating at State level as they are found to be deficient in several areas.<br />
References<br />
Benjamin, M and Whitley, E. (2004). “ Assessing UK EGovernment Websites : Classification and Benchmarking<br />
Proceedings of the 12th <strong>European</strong> <strong>Conference</strong> on Information Systems, Turku, Finland,<br />
Ghani, E and Said, J. (2010) “Digital Reporting Practices among Malaysian Local Authorities” Electronic Journal of<br />
eGovernment Volume 8, 1, 2010, pp33 – 44.<br />
Hazman, S.A (2006), “From customer satisfaction to citizen satisfaction: Rethinking local government service<br />
delivery”, Paper presented at the Service delivery by local authorities: Issues and Challenges conference,<br />
Malaysia<br />
ITU (2010) “Malaysia: Internet Usage Stats and Marketing Report” http://www.internetworldstats.com/asia/my.htm<br />
Kunstelj, M. and Decman, M (2005). “ Current State of eGovernment in Slovenian Municipalities” The Electronic<br />
Journal of eGovernment, 3(3), pp117-128.<br />
“ Malaysian tourism to invest in the Arab World”. Retrieved on 12 June 2008 from<br />
http://www.traveldailynews.com/pages/show_page/25774.<br />
8<br />
1<br />
0<br />
0<br />
%
Ahmad Bakeri Abu Bakar<br />
MAMPU (2007) “MyGovernment Portal”.<br />
http://www.mampu.gov.my/pdf/semict07/Portal%20Presentation%Bluewave%20K3.pdf.<br />
MCMC. (2008). “Facts and figures: A report” http://www.skmm.gov.my/facts_figures/stats/index.asp.<br />
Moon, S. Y. (2000).” The utilization of the Internet technology in the Public Services of Korea”.<br />
Proceedings of the EROPA Hong Kong <strong>Conference</strong>.<br />
MSC Malaysia.( 2008). “ Flagship applications progress status (as of 28th November 2007)” Retrieved on 12 June<br />
2008 from http://www.mscmalaysia.my/topic/Governments.<br />
Rozan, M. Z.A. and Mikami, Y. ( 2005) “ An exploratory analysis of 200 Malaysian Enterprise websites based on Web<br />
Presence Measurement Model (WPMM)”. Proceedings of the International <strong>Conference</strong> on E-commerce,<br />
Subang, Malaysia .<br />
Schedler, K. and Summermatter, L (2003). “EGovernment: What Countries Do and Why: A <strong>European</strong> Perspective”,<br />
Journal of Political Marketing, 2 (3/4), pp255-277.<br />
Shafie, Shaidin. (2007). “ eGovernment Initiatives in Malaysia and the role of the National Archives of Malaysia in<br />
Digital Records Management. Retrieved on 12 June 2008 from<br />
http://www.archives.go.jp/news/pdf/MrShaidin2/pdf.<br />
STAR (2008) “ My Government portal wins Global ICT awards”<br />
UNDPEPA. (2002). “ Benchmarking EGovernment: A global perspective“<br />
http://www.unpan.org/egovernment2.asp<br />
West, D. M. (2003). “ Global EGovernment ” , http://www.insidepolitics.org/egovt03int.html.<br />
Yttersad, P. and Watson, R. (1996). “ Teledemocracy : Using information technology to enhance political work”, MIS<br />
Quarterly, 20(3). 15<br />
9
ICT Education and Access: As Strategies to Generate and<br />
Distribute eGovernment Content<br />
Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />
Lappeenranta University of technology, Lappeenranta, Finland<br />
Sanaz.Ahmadi@lut.fi<br />
Erja.Mustonen-Ollila@lut.fi<br />
Abstract Low-level citizens’ education and adoption of Information and Communication Technology (ICT) is a<br />
common problem in both the developed and developing countries. EGovernment, which is defined as the application<br />
of ICTs to improve the activities of government, is widely seen as a means to promote efficiency of the government<br />
activities and services. In eGovernment context, the citizens play a vital role in the success of eGovernment services,<br />
initiatives, plans, strategies, and overall activities. This can be achieved if citizens are well educated in ICT and have<br />
wider access to ICTs. Furthermore, ICT, as a new and supporting tool to improve eGovernment, should be<br />
accessible in social places aside from home and work. The goal is to increase and widen citizens’ access to ICTs<br />
regardless of age, gender, profession, income, education, ethnicity, and religion. On the other hand, proper and<br />
adequate ICT education in schools, universities, and public and private organizations should be offered to citizens<br />
and encourage them to utilize and take advantage of ICTs in their everyday life. The purpose of this paper is to study<br />
the following two factors and their impact on eGovernment: Citizens’ wider access to ICTs, and citizens’ ICT<br />
education. We will attempt to find out if these factors have an impact on generating and distributing eGovernment<br />
content. In this study we have investigated the various ways of ICT education and how to widen citizens’ access to<br />
ICT. We will evaluate if these two factors can work and contribute to greater success in regard to generating and<br />
distributing eGovernment content. Through a comprehensive review of the relevant literature, and using both the<br />
qualitative and quantitative research approaches, the main result of the study showed that citizens’ ICT education<br />
and the expansion of citizens’ access to ICT both have an essential impact on generating and distributing<br />
eGovernment content.<br />
Keywords: ICT, ICT education, citizen government, eGovernment<br />
1. Introduction<br />
In recent years, ICT has played a pivotal role in the development of digital economy. This technology<br />
facilitates the rapid accumulation and dissemination of information, group interaction, communication,<br />
and collaboration (Shirazi et al., 2010). Currently, ICT has become one of the core elements of<br />
managerial reform around the world (Zimmermann and Finger, 2005). Government authorities around the<br />
world are fully cognizant of the potential and importance of ICT to improve the delivery of government<br />
information and services to citizens, businesses, and organizations, and thereby employ ICT to support<br />
all the government activities (Wangpipatwong et al., 2008; Abanumy et al., 2005). Therefore, many<br />
governments use ICT and eGovernment, which offer services that are cheaper, more convenient, and<br />
easy to provide (Alsaghier et al., 2009). Some governments have launched their eGovernment initiatives<br />
globally to provide and offer citizens, businesses, and organisations with more convenient ways to<br />
access government information and services (Turban et al., 2002). The Internet and World Wide Web<br />
has embraced the concept of delivering information and services to citizens (Abanumy et al., 2005).<br />
Consequently, the Internet has changed the way people communicate and work, and therefore it requires<br />
innovative designs and features to make it accessible to every citizen, including people with disabilities.<br />
The internet is indeed one of the most powerful means for making this communication and eGovernment<br />
service delivery possible. Educating constituents about ICT is important because it will help facilitate and<br />
engage citizens’ interaction with eGovernment and will help increase efficiency when government<br />
information and services are utilized via government websites and other channels of communication. It<br />
will also contribute to broader access to citizens. Hence, the government is responsible for providing<br />
access to ICTs in social places aside from home and work. In addition to this, citizens’ education should<br />
be adequately fulfilled by universities, schools, institutions, public and private organizations, and other<br />
training centres. It is also important that these participants adapt to an evolving global economy and<br />
base their efforts and expectations on concepts such as transparency, flexibility, and competitiveness.<br />
In this paper, citizens’ wider access to ICTs, and citizens’ ICT education will be identified and studied.<br />
The study aims to evaluate if the ICT education and widening citizens’ access to ICTs can have an<br />
impact on generating and distributing eGovernment content. The rest of the article is organised as<br />
follows: In section two, the main terms, EGovernment and ICT, are presented. In section three, citizens’<br />
wider access to ICTs is outlined. In section four, we present citizens’ ICT education and the strategies for<br />
ICT and eGovernment promotion. Finally, in section five, we present the conclusions and discussion.<br />
10
2. eGovernment and ICT<br />
Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />
Through a comprehensive review of the relevant literature, we found various definitions to eGovernment.<br />
Most of them, however, revolve around the concepts of government’s employment of ICTs, in particular<br />
web-based application to improve the access and delivery of the government services to the citizens,<br />
businesses, and government organizations. Many governments globally are moving towards<br />
eGovernment. Nevertheless, the introduction and implementation of eGovernment has encountered<br />
many problems, both in the developed and in the developing countries (Abanumy et al., 2005).<br />
In this study, eGovernment is defined as the application of ICT by government organizations. Therefore,<br />
the main purpose of using the ICT for eGovernment is to enhance the effectiveness and efficiency of<br />
government and government organizations’ processes (Abanumy et al., 2005). Hence, it is permitting the<br />
government to transform the ICT to be more citizen-oriented. EGovernment also calls for a change and<br />
new forms of management. It calls for the transformation of public and private business to make its<br />
impact effective, and it requires changing processes, which means changing policy and organizational<br />
culture. Changing policy results in changing the way people do things, which in turn changes the culture.<br />
Given its surrounding impact, it is expected that eGovernment will affect economic, legal, and democratic<br />
values in for public administratiors (Snijkers 2005). The greatest challenge in eGovernment is how to<br />
manage the changes systematically and effectively in a specific organizational context (Mirandilla 2008).<br />
Development of ICTs such as the telegraph, telephones, personal computers, satellites, fiber-optic cable,<br />
and the early version of the World Wide Web, are a few examples of dynamic forces behind the<br />
phenomenon of global integration (Mirandilla 2008). Innovation in ICTs has stimulated many current<br />
transformations that the world is undergoing. ICT, then, has reduced the cost of communications,<br />
logistics, and information processing, which, in turn has transform the way the people communicate, live,<br />
and do businesses. These technological changes have various impacts on government performance.<br />
In our study, we base the ICT definition to Shirazi et al. (2009), who claims that ICT will contribute to<br />
improvement of basic social services, help economic development, improve the efficiency of the<br />
government services and activities, and also help to enhance the provision of education and health.<br />
Shirazi et al. (2009) pointed that firms using ICT in developing countries are 5.1% more profitable, own<br />
1.2% more employment growth, reinvest 6% more that other countries, and produce $3400 more valueadded<br />
per worker than enterprises that do not use ICT or have limited access to ICT. We claim that ICT<br />
helps businesses with technological and advanced tools and enables them to enter the global market and<br />
increases their productivity and competitiveness. Furthermore, ICT promotes a more effective, efficient,<br />
accountable, and democratic government which can provide employment opportunities for those who are<br />
skilled and appropriately trained.<br />
This paper is based on a literature review on past studies based on a large-scale of surveys. Surveys<br />
were collected from selected groups, such as citizens who had ICT education and knowledge, and<br />
citizens who were still unfamiliar with this phrase and its advantages. We will outline some past studies in<br />
the next sections and try to give answers to the two aforementioned factors and their impact to<br />
eGovernment.<br />
3. Citizens’ wider access to ICTs<br />
Citizens in all nations are expecting the creation and delivery of high quality services from their<br />
governments. This expectation is creating a pressure on governments to perform the Government to<br />
Citizen (G2C) eGovernment. Therefore, the G2C is designed to facilitate the interaction between the<br />
government and citizens by the use of the government web portals as an electronic medium for G2C'<br />
interactions and is perceived to be the main goal of the eGovernment (Seifert 2008). G2C is thus, an<br />
online non-commercial interaction between the local and central government and the private individuals<br />
(Sarpoulaki et al., 2008). However, this is not entirely true, since not all government services and<br />
information can be posted online as the users may face different obstacles in making full use of all these<br />
government resources online. The obstacles can be the inadequate infrastructure, low speed internet and<br />
network connections, low PC penetration, or also varying degrees of literacy levels and physical<br />
constraints of some groups of the society (e.g. elderly, children, and people with disabilities) (Yong 2004).<br />
In order to reach the citizens as quickly as possible, government should design the G2C initiatives based<br />
on the multi channel access method. Figure 1 depicts the G2C multi channel access methods in citizens’<br />
wider access to the ICTs.<br />
11
Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />
Telephone<br />
Postal mail PC/Internet<br />
G2C<br />
Face to face Information Kiosk<br />
Services<br />
Mobile Phones Call Center<br />
PDA<br />
Figure 1: G2C multi channel access method in citizens’ wider access to the ICTs (Yong 2004)<br />
While the internet and information kiosks are the primary means to provide the government services and<br />
information, the other channels, such as telephones, emails, postal mail, and face to face contact, remain<br />
as critical in G2C interaction (Yong 2004). However, in developing countries, information kiosks are<br />
particularly very useful in the rural areas since accessing online channels may not be easily done.<br />
However, in more modern societies with wider mobile usage, services and information are provided<br />
through mobile phones.<br />
Usage of online centres and public access points is high, even for those who have home access to the<br />
internet. This may be because citizens want to reduce the access costs, or that citizens are offered lowlevel<br />
internet access, especially at work. Therefore, when planning eGovernment initiatives, authorities<br />
should bear in mind the importance of encouraging citizens and employees to broaden the access to the<br />
internet and ICT in the working place (Foley 2004).<br />
Moreover, the level of citizens’ knowledge on the analysis and assessment of information and using the<br />
library to access information will increase if the wider access and usage of ICT increases among the<br />
users (Usluel 2007). More local online centres should assist citizens to get online. Centres with a few<br />
resources can then develop their activities and reach a sufficient level that users require. However, these<br />
centres should also expand their ICT training and access to staff and employees of the government<br />
organizations (Foley 2004).<br />
Foley (2004) has suggested the organization of a regional conference in order to encourage citizens to<br />
increase internet and ICTs usage. This is because there is a need to share the results of the different<br />
studies, which can be the first step towards identifying what these centres are.<br />
According to Selwyn (2002), the results of the survey of 1001 respondents over 21 years of age reporting<br />
where they have access to public ICT are as follows: 28 per cent of the respondents cited the libraries, 14<br />
per cent of the commercial pay-per-use sites, and 10 per cent of the local educational institutions are<br />
offering potential access to the ICTs. However, only 5 per cent of the respondents cited having access to<br />
ICTs in community centre sites. While public access sites were substantially less likely to be cited, only a<br />
third of the respondents cited the workplace as providing access to the ICTs.<br />
While developing the eGovernment programmes has been a challenge for the many public<br />
administrations, encouraging the citizens to use the available services can often be equally daunting. To<br />
increase the take-up rate of the eGovernment content and offerings to citizens, Yong (2004), has outlined<br />
the following six strategies that the governments have to implement to encourage citizens to adapt to<br />
ICTs and eGovernment.<br />
Providing the infrastructure: Providing the ICT infrastructure serves as an essential backbone for the<br />
agenda of the eGovernment. The absence of the sufficient high bandwidth network can seriously<br />
hinder the delivery of the ICT access and services and also the eGovernment information and<br />
services. Therefore, ICT infrastructure is the key success for the overall measure of the ICT maturity<br />
in a society. Some maturity metrics such as the fixed and mobile phone penetration, networks,<br />
microwaves, satellite, and internet are the critical factors to increase the ICT maturity in a society.<br />
12
Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />
Raising the IT and internet awareness: To benefit and make the greater usage of the ICTs and<br />
eGovernment services and information, effort must be made to raise the IT and internet familiarities<br />
for both the public who are the users of the services and also to the civil servants who should be<br />
implementing and maintaining the services. In these circumstances, educating and training the<br />
citizens are very critical to achieve the goals. The public and media communications are also very<br />
important to allow any public concerns regarding privacy and security issues.<br />
Facilitating affordable access: The authorities should be able to facilitate the citizens with an<br />
affordable access to the computers, and internet connection. The low-cost computer built with the<br />
low-cost hardware and software and also the cheaper internet connection charges can be offered to<br />
the citizens. Though, to keep the software costs affordable, some governments have adopted the<br />
open source software as an alternative to proprietary software products.<br />
Making the online services more appealing than offline: To be able to convince and encourage the<br />
citizens to use more ICTs and government services online, the government authorities need to make<br />
ICTs and government services delivery more online than the conservative way like visiting the<br />
government agency physically. At its fundamental level, the ICTs and eGovernment services should<br />
be available any time and anywhere. Another level may be the reengineering of the existing<br />
government processes and services to be able to make the online process more convincing to the<br />
citizens. Moreover, another level would be to apply the tool of the Customer Relationship<br />
Management (CRM) in the eGovernment initiatives to build up better knowledge of the citizens.<br />
Offering incentives: In order to encourage the citizens to go under ICT training and education and to<br />
regularly exercise and use the ICT and eGovernment services in their everyday life, the authorities<br />
should introduce various incentives. More incentives can be allocated for the citizens who use the<br />
ICT and eGovernment services frequently. These incentives can be in different forms, such as the<br />
financial incentives like cash rebates, lucky draw, and fast-food coupons, and the non-financial<br />
incentives like priority and personalized services.<br />
Promoting local language content: If there is a little online content in the local language, the citizens<br />
are not encouraged to make use of the ICTs and eGovernment services and information. Therefore,<br />
it is very essential that the authorities provide the ICTs and eGovernment services and information in<br />
the local language. In this way the authorities encourage the citizens to enter the Internet.<br />
Foley (2004) claimd that there is a considerable lack of interest in using the internet among the nonusers.<br />
It was mentioned that nearly all the socially excluded citizens have high level of curiosity for the<br />
use of the internet. Hence, policymakers should put more efforts to promote curiosity of the citizens for<br />
using ICTs and internet. Foley (2004) has proposed the following two stages.<br />
First, the decision to use the internet in the public access points, such as in the community groups,<br />
malls, streets, and other locations. This is considered to be a ‘trial’ period for the citizens or the noninternet<br />
users, and it usually lasts several months. Foley (2004) has shown that only 26 per cent of<br />
the public internet users, using the internet for less than a period of twelve months have access from<br />
their homes. This stage should be taken into account by the authorities since, accessing to internet<br />
can increase the ICT knowledge and awareness.<br />
Second, purchasing personal computers for the home access, instead of the public access. This will<br />
usually be taken by the socially excluded groups several months after they have first tried the ‘trial’<br />
period of the access to the public access points. At this stage, curiosity on using the internet will be<br />
substituted by the better understanding of the benefits and advantages of using internet and going<br />
online to increase the ICT and internet knowledge and awareness.<br />
In both stages, Foley (2004) claimed that the policymakers, and internet service providers are playing an<br />
important role in clarifying the real cost of the computing equipments and the internet access to the<br />
citizens.<br />
4. Citizens’ ICT education: Strategies for ICT and eGovernment promotion<br />
Usluel (2007) argues that the lowest self-efficacy is in making use of the ICT to access information.<br />
While, using information technologies is a determining factor in the establishment of information literacy<br />
skills (Usluel 2007), in the computer, internet, and ICT world, many participants are still requesting for<br />
“helping hands” to assist them when they deal with internet and ICTs (Foley 2007). By definition, many<br />
old people do not have a wide range of access to their friends who can assist them. Therefore, the focus<br />
of the many governments is to provide and offer training centres to give a general internet and ICT help<br />
13
Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />
and to support to the citizens regardless of their age, gender, income level, occupation, ethnic minorities,<br />
and religion.<br />
Furthermore, the kindergarten is the starting point for the education. When improving kindergarten<br />
practices, Mooij (2005) pointed that improving the development and learning progress starts when<br />
improving a child’s entry characteristics. The researchers and kindergarten teachers searched for a tool<br />
to estimate the entry characteristics of a child, and finally a psychometrically controlled screening<br />
procedures instrument was selected. This instrument contains forms of questionnaires including the<br />
seven category rating. The parents and the teachers must take this in use after the first month a child has<br />
been in the kindergarten. The seven categories are as follows.<br />
Social interaction/communication,<br />
General cognition,<br />
Language proficiency,<br />
Pre-arithmetic,<br />
Emotional-expressive,<br />
Sensory-motor, and<br />
Expected educational behaviour.<br />
In practical experiences the possible difficulties of the children were seen in playing, developing, and<br />
learning especially when it came to the computer, internet, and ICT education (Mooij 2005).<br />
Furthermore, Ahmadi Zeleti (2010) mentioned that for a better technology society and environment, the<br />
ICT education and training should be offered in kindergarten as playing tools for early age children to get<br />
familiar with the technology and its devices. The intermediary courses could be offered in the elementary<br />
schools through the wide range of internet and ICT. The extension to the professional ICT education and<br />
training, however, should be offered in the high schools and universities as well (Ahmadi Zeleti 2010).<br />
Hsu (2010) has shown that about 95 per cent of the teachers used the word processor for making the<br />
handouts and tests, and 91 per cent used the internet to search for the information and material. Only 1<br />
per cent of the teachers reported never using the word processor during the previous semester. Using<br />
the presentation software applications was less frequent, as compared to the use of the word processors<br />
and the internet. About 10 per cent of the teachers reported that they had never used presentation<br />
software once during the last semester. Building or managing the websites for instruction, presentation,<br />
or sharing material, however, was even less frequent than the use of presentation software. About 20 per<br />
cent of the teachers never built or managed the websites once during the last semester, and only 53 per<br />
cent reported doing so often or very frequent. Finally, using the computers to record or edit sound or<br />
music is the least practised ICT activity, with only 9.3 per cent reporting the frequent use. In other words,<br />
the teachers frequently used the word processing software and searched the internet, sometimes used<br />
the presentation software or built or managed the websites, and seldom used the software for recording<br />
or editing sounds. With this encouragement, the teachers can devote greater attention to those students<br />
who need more guidance and support. It is usually the teachers who must specify how the learning<br />
activities should proceed when a student encounters problems. Therefore, the teachers should also be<br />
well trained in both the social, technology and ICT affairs (Mooij 2005).<br />
Furthermore, the education environment should be designed so that the students can collaborate with<br />
each other in the problem solving issues, which means that they need not suffer from the less teacher<br />
attention (Mooij 2005). Additionally, with the use of the integrated systems, it is possible to monitor and<br />
measure the progress of students. By this system, the teachers can involve other students, teachers, and<br />
parents from outside the school to interact with the learning process (Mooij 2005). This will increase the<br />
students’ and teachers’ motivation in the use of the ICT in the learning process. According to Sang et al.<br />
(2010), strong relationship of the computer-related attitude among the students and all the citizens should<br />
be emphasized and taken into the consideration. Positive attitude towards the computers, internet, and<br />
ICT influences teachers’ acceptance of the usefulness of the technology in the learning process.<br />
Ahmadi Zeleti (2010) drowned the projection line to the ICT education, training, and skills of the<br />
government authorities and employees, and businesses. The intensive courses should be obligatory to<br />
these groups who are running the country. However, the government authorities should also establish<br />
more IT and ICT education centres free of charge for those citizens who cannot afford it (Ahmadi 2010).<br />
14
Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />
Ahmadi Zeleti (2010) mentioned that ICT and its applications like an email can be used through personal<br />
computers, mobile phones, and smart devices such as mp4s. People around the world are willing to<br />
communicate with each other with a lower cost. The internet and ICT are the effective tools to be used for<br />
this purpose and can substitute the use of the telephone lines which is expensive.<br />
5. Conclusions and discussion<br />
In this study we have highlighted the two factors and their impact to the eGovernment. The factors are<br />
the citizens’ wider access to the ICTs, and the citizens’ ICT education.<br />
First, the citizens’ wider access to the ICTs and its impact to the eGovernment. This study shows that it is<br />
important to provide citizens with cheap internet access and computer equipments to their home and<br />
office use. Moreover, the local libraries should offer the ICT technologies and applications. However, to<br />
encourage the citizens, it is crucial to provide them more ICT infrastructure, government online services<br />
in local language, and incentives. Hence, the internet, and ICT awareness through the commercial sites,<br />
media, local educational institutions, schools and universities, regional conferences, and etc. is strongly<br />
considered as the precondition factor to citizens awareness and the ICT use.<br />
Second, the citizens’ ICT education shows that the ICT must be used in the education and learning<br />
process. The classrooms can be utilized with the computers, and the learning process and progress can<br />
be then more efficient and faster, and students will be more competitive and technology oriented<br />
(Sa´nchez et al., 2011). However, to make an effective use of ICT in learning process, the teachers<br />
should be well ICT trained, and have a positive attitude toward using the computers, internet, and other<br />
ICT technologies in their teaching processes. They should also be capable of establishing a strong<br />
relationship of computer-related tasks and attitude in their respective students. The integrated systems as<br />
a tool can be used in schools to motivate teachers and students in using ICTs. Moreover, building the<br />
websites for sharing materials, instructions, and presentations can be the other striking technique.<br />
Therefore, training centres can be established to offer the internet and ICT help and support to the<br />
teachers and parents. Education of ICT and its applications through the training centres can also be<br />
offered to the governments, parliament and justice, public and private sector organizations, businesses,<br />
policy makers, politicians, citizens, health centres, and the public administrations in order to get<br />
advantage from the ICTs and to strength their daily activities (Ahmadi Zeleti 2010; Zimmermann 2005).<br />
Yong’s (2004) six strategies and Foley’s (2004) instructions should be taken very carefully into account<br />
when encouraging the citizens’ to utilize ICT.<br />
Furthermore, some authors highlighted that when some certain conditions are achieved, the use of the<br />
ICT can have a positive effect on education and learning. These conditions are sufficient access to<br />
technology, adequate training for teachers, an effective curriculum, relevant and pertinent evaluations, a<br />
stimulating educational system, and a motivating family and community (Norris et al., 2002; Roschelle et<br />
al., 2000).<br />
The research investigating on the impact of citizens' ICT education and access to generate and distribute<br />
eGovernment content is complex. Different strategies, regulations, and approaches are being defined<br />
every day by different governments. However, in every study on the ICTs, the role of the internet is<br />
considered primary. Hence, in this study, when talking about the ICTs, it is assumed that an accepted<br />
internet connection and speed is fully achieved.<br />
To sum up, the level of contribution on using the online information and services is increasing by the<br />
citizens especially in the education systems. Citizens can feel the advantage, easiness, and usefulness<br />
of accessing online information and services through the government sites. More citizens are now eager<br />
to connect to internet and access to wide range of information. The governments on the other hand are<br />
trying to increase the ICT awareness, access, education, and use in order to react more effectively and<br />
efficiently to the citizens needs by offering them online information and services. The governments then<br />
can take this advantage of the citizens’ willingness to participate in making a technology-based<br />
environment to generate and distribute eGovernment contents.<br />
References<br />
Abanumy, A., Al-Badi, A. and Mayhew, P. (2005) EGovernment Website Accessibility: In-Depth Evaluation of Saudi<br />
Arabia and Oman, The Electronic Journal of eGovernment, Vol 3, No. 3, pp 99-106.<br />
Ahmadi Zeleti, F. (2010) The progress and Obstacles of Implementing and Improving eGovernment in Islamic<br />
Republic of IRAN. Master of Science Thesis, Lappeenranta University of Technology, Lappeenranta, Finland.<br />
15
Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />
Alsaghier, H., Ford, M., Nguyen, A. and Hexel, R. Conceptualising Citizen’s Trust in eGovernment: Application of Q<br />
Methodology Electronic Journal of eGovernment, Vol 7, No. 4, pp 295- 310.<br />
Foley, P. (2004) Does the Internet help to overcome social exclusion? Electronic Journal of eGovernment, Vol 2, No.<br />
2, pp 139-146.<br />
Hsu, S. (2010) Who assigns the most ICT activities? Examining the relationship between teacher and student usage,<br />
Computers & Education.<br />
Loveless, A., Burton, J. and Turvey, V. (2006) Developing conceptual frameworks for creativity, ICT and teacher<br />
education, Electronic Journal of Thinking Skills and Creativity, Vol 1, No. 1, pp 3-13.<br />
Mirandilla, M (2008) Promoting eGovernment in the Context of New Public Management: The Case of the Local<br />
Government of Cebu, Philippines 3rd Communication Policy Research: South <strong>Conference</strong>, Beijing, China.<br />
Mooij, T. (2007) Design of educational and ICT conditions to integrate differences in learning: Contextual learning<br />
theory and a first transformation step in early education, Electronic Journal of Computers in Human Behavior,<br />
Vol 23, No. 3, pp 1499-1530.<br />
Norris, C., Soloway, E. and Sullivan, T. (2002) Examining 25 years of technology in US education, Communications<br />
of the ACM, Vol 45, No. 8, pp 15–18.<br />
Roschelle, J., Pea, R., Hoadley, C., Gordin, D. and Means, B. (2000) Changing how and what children learn in<br />
school with computer-based technologies, The Future of Children, Vol 10, No.2, 76–101.<br />
Sa´nchez, J., Salinas, A. and Harris, J. (2010) Education with ICT in South Korea and Chile International Journal of<br />
Educational Development, Vol 31, No. 2, pp 126-148.<br />
Sang, G., Valcke, M., Braak, J. and Tondeur, J. (2010) Student teachers’ thinking processes and ICT integration:<br />
Predictors of prospective teaching behaviors with educational technology, Electronic Journal of Computers and<br />
Education, Vol 54, No. 2, pp 103-112.<br />
Sarpoulaki, M., Eslami Rad, A. and Saleknia A (2008) EGovernment concept and spatial information: A case study in<br />
Islamic republic of Iran, The International Archives of the Photogrammetry, Remote Sensing and Spatial<br />
Information Sciences, [e- journal] XXXVIIB4, pp 19- 23.<br />
Seifert, J. W. (2008) A Primer on EGovernment: Sectors, Stages, Opportunities, and Challenges of Online<br />
Governance. In R. B. Ventura (Ed.), EGovernment in High Gear. New York: Nova Science Publishers.<br />
Selwyn, N. (2002) Widening access to ICT via public sites – a research report, Cardiff University School of Social<br />
Sciences.<br />
Shirazi, F., Ngwenyama, O. and Morawczynski, O. (2010) ICT expansion and the digital divide in democratic<br />
freedoms: An analysis of the impact of ICT expansion, education and ICT filtering on democracy, Electronic<br />
Journal of Telematics and Informatics, Vol 27, No. 1, pp 21-31.<br />
Shirazi, F., Gholami, R. and Higo´n, D. (2009) The impact of information and communication technology (ICT),<br />
education and regulation on economic freedom in Islamic Middle Eastern countries, Electronic Journal of<br />
Electronic and Management, Vol 46, No. 8, pp 426-433.<br />
Snijkers, K. (2005) EGovernment: ICT from a Public Management Perspective. Paper presented at the 13th Annual<br />
NISPAcee <strong>Conference</strong>, Moscow Russia, May 19-21.<br />
Turban, E., King, D., Lee, J., Warkentin, M. and Chung, H. M. (2002). Electronic Commerce : A Managerial<br />
Perspective (2nd ed.). Upper Saddle, New Jersey: Prentice Hall.<br />
Usluel, Y. (2007) Can ICT usage make a difference on student teachers' information literacy self-efficacy, Library &<br />
Information Science Research, Vol 29, No. 1, pp 92-102.<br />
Wangpipatwong, S., Chutimaskul, W. and Papasratorn, B (2008) Understanding Citizen’s Continuance Intention to<br />
Use eGovernment Website: a Composite View of Technology Acceptance Model and Computer Self-Efficacy,<br />
The Electronic Journal of eGovernment, Vol 6, No. 1, pp 55 – 64.<br />
Yong, J. (2004). Promoting Citizen-Centred Approaches to eGovernment Programmes - Strategies & Perspectives<br />
from Asian Economies, Second APEC High-Level Symposium on eGovernment. Acapulco, Mexico. October 6-<br />
8.<br />
Zimmermann, P. and Finger, M. (2005) Information- and Communication Technology (ICT) and Local Power<br />
16
The Role of National Culture on Citizen Adoption of<br />
eGovernment web sites<br />
Omar Al-Hujran 1 and Mahmoud Al-dalahmeh 2<br />
1<br />
Princess Sumaya University for Technology, Amman, Jordan<br />
2<br />
University of Jordan, Amman, Jordan<br />
o.hujran@psut.edu.jo<br />
dalahmeh2@yahoo.com<br />
Abstract: Increasingly governments around the world have realized the imperative of providing the public with not<br />
only improved government information and services but also improved public governance, transparency and<br />
accountability through eGovernment services. However, many governments still face the problem of low level<br />
adoption of eGovernment websites. It is because the issue of eGovernment adoption is complex and multidimensional<br />
in nature. In consequence, it must be carefully addressed not only from technological perspectives but<br />
also from social, cultural, and organizational perspectives. The business case for developing sustainable successful<br />
eGovernment initiatives critically depends on our knowledge and understanding of how to increase citizen adoption<br />
of eGovernment websites. A review of the literature, however, shows that much of extant eGovernment research has<br />
focused on eGovernment adoption in developed countries. In consequence, little is known about national cultural<br />
factors that may influence eGovernment adoption in developing countries. This knowledge gap is particularly<br />
apparent in Jordan. Therefore, the objective of this paper is to examine national cultural factors that may influence<br />
citizen adoption of eGovernment websites in this culturally different part of the world. We developed an integrated<br />
model by extending the technology acceptance model (TAM) with Hofstede’s national culture dimensions, which is<br />
used to evaluate the impact of national culture on eGovernment adoption in this paper. Based on survey data<br />
collected from a total of 197 Jordanian citizens, evidence shows that while two cultural dimensions: power distance<br />
and uncertainty avoidance had significant impacts on citizens' intention to adopt eGovernment, the other three<br />
cultural dimensions: individualism, masculinity, and long-term orientation had no discernible impacts. The results also<br />
indicate that perceived usefulness, perceived ease of use, attitude are significant indicators of citizens’ intention to<br />
use state government services online.<br />
Keywords: eGovernment adoption, technology acceptance model, culture, Jordan<br />
1. Introduction<br />
Information and communication technology (ICT) and resulting online capabilities such as the Internet<br />
provide the foundation for the transformation of the traditional government service. Over the past decade<br />
governments all over the world have realized the importance of providing government services and<br />
information via the Internet and world-wide-web to improve the efficiency, cost and quality of the<br />
government information and services provided to the public. However, although the adoption of<br />
eGovernment has the potential to provide better services to citizens at lower costs, it has acceptance<br />
problems. In fact, understanding why people accept or reject new information technology (IT) has proven<br />
to be one of the most challenging issues in IT/IS research (Al-Adawi et al., 2005). The acceptance and<br />
success of eGovernment is dependent upon citizen willingness to adopt this innovation (Carter and<br />
Bélanger, 2005). Yet, many governments worldwide still face the problem of low-level of citizen adoption<br />
of eGovernment websites (Belanger and Carter, 2008; Choudrie and Dwivedi, 2005; Gupta et al., 2008;<br />
Kumar et al., 2007; Fu et al., 2006; Wang, 2003). EGovernment adoption occurs in a turbulent socialpolitical<br />
environment. In consequence, it must be carefully addressed not only from technological<br />
perspectives, but also from social, political, and cultural perspectives. Without understanding what<br />
motivates the public to use eGovernment services, governments will not be able to take strategic actions<br />
to increase the eGovernment up-take (Gilbert et al., 2004). Hence, more empirical studies are required in<br />
the area of eGovernment adoption to help governments to improve their understanding of the issues that<br />
affect citizen adoption of eGovernment services.<br />
In addition, while the academic literature on eGovernment adoption has focused upon the adoption of<br />
eGovernment websites in developed countries, relatively little attention has been given to the citizen<br />
adoption of eGovernment websites in developing countries (Alhujran and Chatfield, 2008). The study,<br />
therefore, aims to fill this gap in the literature by conducting empirical field research on eGovernment<br />
adoption in the Arab world, specifically Jordan. Grounded in the Technology Acceptance Model (TAM)<br />
(Davis et al., 1989), this study develops a conceptual model by integrating the TAM with two of<br />
Hofstede’s national culture dimensions - power distance, uncertainty avoidance. The extended TAM<br />
model is to examine the impacts of these cultural dimensions upon citizen adoption of eGovernment<br />
websites in developing countries with different national cultures and values.<br />
17
Omar Al-Hujran and Mahmoud Al-dalahmeh<br />
Moreover, although culture is being considered as a contributing factor in the IT/IS adoption, very limited<br />
research attempted to explore the impact of the culture on IT/IS adoption in the Arab region. Most of the<br />
previous research has focused on economical, political, and technological factors that impact technology<br />
transfer to the Arab world (e.g. Al-Gahtani, 2004; Straub et al., 2001). Furthermore, to date, no prior<br />
research has considered the influence of national culture on eGovernment adoption in the Arab world in<br />
general and Jordan in particular.<br />
In terms of achievements, Jordan's efforts to provide eGovernment services to the public have been<br />
recognized. Recently, the ministry of Information and Communication Technologies (MoICT) has<br />
introduced more than three main eGovernment services to the public. Examples of these services are:<br />
police clearance, higher education admissions, and public jobs applications and tracking. However,<br />
despite some success, the eGovernment services and websites in Jordan are facing the challenge of<br />
increasing the usage level of these services and websites (Al-Hujran and Shahateet, 2010). Therefore, a<br />
better understanding of the factors that influence citizen adoption of eGovernment is a critically important<br />
policy issue in this country. This study provides the eGovernment officials with a useful guideline for<br />
achieving better eGovernment websites and increasing the citizen's adoption of these websites.<br />
The remainder of this paper is organized as follows. Section 2 presents the theoretical background and<br />
research model. Section 3 describes the research methodology. Section 4 presents the analysis and<br />
results. Finally, we present our discussions and conclusion.<br />
2. Theoretical background and research model<br />
The research model used to guide the study is shown in Figure 1. In the following sections, the meaning<br />
and the theories supporting the relationship are presented.<br />
Figure 1: Research model of citizen’s intention to use eGovernment websites<br />
2.1 Technology Acceptance Model (TAM)<br />
The technology acceptance model (TAM) (Davis, 1989; Davis et al., 1989), is one of the various models<br />
that IT/IS researchers have used to predict and explain the underlying factors that motivate users to<br />
accept and adopt new information technology systems. This model (Figure 2) is derived from the theory<br />
of reasoned action (TRA) (Fishbein and Ajzen, 1975; Ajzen and Fishbein, 1980).<br />
According to TRA, the individual attitudes and subjective norms influence the user’s behavioural<br />
intention, which, in turn, influences his/her actual behaviour. Building upon this, TAM was proposed to<br />
explain and predict users’ acceptance of IT and IS systems by assuming that the constructs - perceived<br />
ease of use (PEOU) and perceived usefulness (PU) - are the key determinants of IT and IS acceptance<br />
behaviour. Davis (1989, p.320) defined perceived usefulness as “the degree to which a person believes<br />
that using a particular system would enhance his or her job performance”, and defined perceived ease of<br />
use as “the degree to which a person believes that using a particular system would be free of effort”.<br />
Fishbein and Ajzen (1975, p.216) defined behavioural intention as “the strength of one’s intention to<br />
perform a specified behaviour”.<br />
18
Omar Al-Hujran and Mahmoud Al-dalahmeh<br />
In TAM, the perceived usefulness of the system is predicted to be positively influenced by its perceived<br />
ease of use. TAM also theorises that all other external variables are fully mediated by PU and PEOU<br />
(Heijden, 2003). Figure 2 illustrates TAM constructs and their relations. According to TAM, greater PU<br />
and PEOU of an IT/IS system will positively influence an attitude toward this system. The attitude, in turn,<br />
leads to a greater intention to use the system, which positively affects one’s actual use of the system<br />
(Davis, 1989).<br />
Several meta-analysis studies have provided sufficient data about TAM to be highly credible (King and<br />
He, 2006; Shumaila et al., 2007), and routinely explain up to 40 per cent of the behavioural intentions to<br />
use (Venkatesh and Davis, 2000). It also received substantial empirical support by means of validations<br />
and replications from numerous researchers (Adams et al., 1992; Davis, 1993; Venkatesh and Davis,<br />
2000). In addition, several studies have applied TAM to evaluate users’ adoption in different settings such<br />
as e-mail, voice-mail, graphics, spreadsheet, and word processing, electronic commerce electronic<br />
learning, internet banking, and eGovernment. Furthermore, TAM has reliable instruments, and is<br />
empirically sound (Pavlou, 2003). Although TAM is criticised for ignoring the social influence on<br />
technology adoption (Mathieson, 1991), social and human factors could be integrated with TAM to<br />
improve its predictive power (Venkatesh and Davis, 2000).<br />
However, most of prior TAM research relatively focused on IT/IS adoption by employees in organizations<br />
context (Phang et al. 2005), where the use in most cases is mandatory. Nevertheless, researchers need<br />
to be cautious when applying the results of these studies to a different context such as the eGovernment,<br />
where the use of technology is voluntary. Therefore, it is essential to study the adoption of new IT/IS with<br />
different population such as citizens.<br />
Figure 2: TAM source: Davis (1989)<br />
Based on the above-mentioned assumptions of the original TAM, the following hypotheses are proposed<br />
in this study:<br />
H1: There is a direct and positive relationship between perceived usefulness and attitude toward using<br />
eGovernment websites.<br />
H2: There is a direct and positive relationship between perceived ease of use and attitude toward using<br />
eGovernment websites.<br />
H3: There is a direct and positive relationship between attitude and behavioural intentions to use<br />
eGovernment websites.<br />
H4: There is a direct and positive relationship between perceived ease of use and the perceived<br />
usefulness of eGovernment websites.<br />
H5: There is a direct and positive relationship between perceived usefulness and the behavioural<br />
intentions to use eGovernment websites.<br />
2.2 eGovernment adoption and TAM<br />
Although TAM has been applied to a wide range of IT/IS settings, only a few empirical and conceptual<br />
studies have explored citizen adoption of eGovernment using TAM as a theoretical framework. Table 1<br />
summarizes the findings of these studies using TAM. Conceptual but not empirical studies are shown by<br />
single astrict (*). However, due to the words limit, only the findings concerning our model variables are<br />
reported in this table.<br />
19
2.3 National culture<br />
Omar Al-Hujran and Mahmoud Al-dalahmeh<br />
The culture is not an easy concept to define (Davison and Martinsons, 2003). In addition, there is no<br />
generally accepted definition for national culture. Hofstede (1997 p.21) defines national culture as “the<br />
collective programming of the mind which distinguishes the members in one human group from another”.<br />
Although Hofstede’s national culture framework has been criticized due to some methodological<br />
weaknesses (Baskerville, 2003), Leidner and Kayworth, (2006) found, after an extensive literature review<br />
of national culture studies, that over 60 percent used one or more of Hofstede’s cultural dimensions.<br />
Hofstede (1997) identified five dimensions of cultural variation. These dimensions have been<br />
conceptually defined (Hofstede, 1997) as follows:<br />
Power Distance (PD): the extent to which the less powerful members of group or society accept and<br />
expect that power is unequally distributed;<br />
Uncertainty Avoidance (UA): the extent to which the members of group or society feel threatened by<br />
unknown situations;<br />
Individualism vs. Collectivism (IDV): the extent to which individuals are integrated into groups;<br />
Masculinity vs. Femininity (MAS): the extent to which gender roles are assigned in a culture;<br />
Long-Term vs. Short-Term Orientation (LTO): a society’s preference to be more forward looking or<br />
future oriented.<br />
Table 1: eGovernment adoption studies using TAM<br />
TAM core variables Authors Findings<br />
Perceived usefulness(PU) Carter and Belanger 2004; Fu et al. 2006;<br />
Kumar et al. 2007*; Phang et al. 2005;<br />
Perceived ease of use(PEOU)<br />
Warkentin et al. 2002*; Wang 2003<br />
Citizens’ PU is a significant<br />
predictor of their intention to<br />
use eGovernment.<br />
Carter and Belanger 2004 PEOU did not have a direct<br />
effect on citizens’ BI to<br />
Carter and Belanger 2005; Fu et al. 2006;<br />
Kumar et al. 2007*; Phang et al. 2005;<br />
Warkentin et al. 2002*; Wang 2003<br />
Fu et al. 2006; Phang et al. 2005; Wang<br />
2002<br />
adopt eGovernment.<br />
Citizens’ PEOU is a<br />
significant predictor of their<br />
intention to use<br />
eGovernment.<br />
PEOU was a significant<br />
determinant of PU.<br />
Culture Warkentin et al. 2002* They hypothesized that the<br />
cultural dimensions (power<br />
distance and uncertainty<br />
avoidance) were most likely<br />
associated with<br />
eGovernment adoption.<br />
The importance of both national and organizational culture to the success of IT/IS adoption has been<br />
widely recognized (e.g. Bagchi et al., 2003; Straub, 1994; Twati, 2006). Researchers also explored the<br />
impact of the national culture on TAM variables (e.g. Twati, 2006; Veiga et al., 2001). They concluded<br />
that the cultural dimensions influence the model variables. However, In their study, Warkentin et al.<br />
(2002) proposed that of the five cultural dimensions, power distance and uncertainty avoidance are the<br />
most likely to differentiate eGovernment adoption and use. Therefore, the following hypotheses are<br />
proposed:<br />
H6a: There is a direct and positive relationship between uncertainty avoidance and the perceived<br />
usefulness of eGovernment websites.<br />
H6b: There is a direct and positive relationship between power distance and the perceived usefulness of<br />
eGovernment websites.<br />
H7a: There is a direct and positive relationship between uncertainty avoidance and the perceived ease of<br />
use of eGovernment websites.<br />
20
Omar Al-Hujran and Mahmoud Al-dalahmeh<br />
H7b: There is a direct and positive relationship between power distance and the perceived ease of use of<br />
eGovernment websites.<br />
3. Methodology<br />
3.1 Instrument development<br />
The survey items were adopted from prior research. The TAM scales of PU and PEOU were measured<br />
using items adopted from Davis (1989) and Davis et al. (1989). TAM scales of ATU were adopted from<br />
Taylor and Todd (1995). BI items were adopted from Malhotra & Galletta (1999) and Pavlou (2003).<br />
Culture items were adopted from Al-Sukkar (2005). All items were measured using a five-point Likert-type<br />
scale, ranging from "strongly agree" to "strongly disagree".<br />
Sekaran (2003) stresses the importance of choosing the questionnaire language that approximates the<br />
level of understanding of the respondents. Given that the majority of the Jordanians are communicating in<br />
Arabic language, questionnaire items of this study have been translated into Arabic language. The<br />
English version of the questionnaire has been translated into Arabic language by two independent<br />
translators. The Arabic version which has been translated by the first translator has been translated back<br />
to English by the second translator. The same was repeated to the second translator's version. The two<br />
versions in both languages have been compared to resolve any differences. The final version has been<br />
used in the study.<br />
3.2 Evaluating the validity and the reliability of the instrument<br />
Content validity is concerned with the degree to which the scale items represent the domain of the<br />
concept under study. According to Sekaran (2003), face validity is a basic index of content validity.<br />
Experts in the field can be solicited to advice on whether scale items have face validity (Straub et al.,<br />
2005). Therefore, instrument was pre-tested with three academics and one student in the field of IS. An<br />
academically excellent student has been asked to fill the survey. When he finished it, he was questioned<br />
to find out if there are any problems to understand the survey questions. Based on this feedback, the<br />
wording of some questions was modified to improve clarity. After this step, three academics were asked<br />
to answer the survey questions and to provide their feedback on whether the questions would accurately<br />
measure each construct, whether the questions were vague, ambiguous, and difficult to understand, or<br />
contained contradictions. The instrument was then modified to reflect feedback received from the experts.<br />
Final survey items are in Appendix 1.<br />
To insure that the instrument items are measuring the same construct, Cronbach’s alpha used to<br />
evaluate the reliability of the instrument items (Cronbach, 1970). Although researchers suggest 0.7 as the<br />
accepted reliability cut-off, a value more than 0.6 is regarded as a satisfactory level (Hair et al., 2006).<br />
The reliability function in the SPSS 17 was used to test the internal consistency for the items of each<br />
scale. The results are presented in Table 2. The outcomes of the statistical analysis demonstrate<br />
satisfactory reliabilities, ranging from 0.745 to 0.896 all of scales.<br />
Table 2: Reliability statistics<br />
Scale No. of Items Mean Cronbach Alpha (α)<br />
Perceived Usefulness (PU) 5 3.995 .798<br />
Perceived ease of use (PEOU) 5 3.698 .831<br />
Attitude Toward Using (ATU) 3 4.198 .745<br />
Behavioral Intention to Use (BI) 2 4.028 .756<br />
Culture: Uncertainty Avoidance<br />
4 4.199 .781<br />
Power Distance 5 2.459 .867<br />
Total 24<br />
3.3 Data collection and participants<br />
Prior research showed that the educated Jordanian citizens are the early adopters of the Internet (Al-<br />
Jaghoub and Westrup, 2003) and are likely users of eGovernment websites in Jordan. For this study,<br />
therefore, we identify the university students and internet cafes users who are Jordanian citizens as our<br />
population. A face-to-face personally administered survey was the research method adopted in this<br />
study. The final survey (see Appendix 1) was distributed to a sample of 265 students drawn from the<br />
different Universities and internet cafes in Jordan. A total of 208 surveys were returned, achieving a<br />
21
Omar Al-Hujran and Mahmoud Al-dalahmeh<br />
78.4% survey response rate. Eleven incomplete surveys were exempted from the analysis. Thus, 197 of<br />
the returned surveys were usable responses.<br />
Table 3: Demographic characteristics of participants<br />
Characteristics<br />
Frequency Percent<br />
Gender Male 128 65.0<br />
Female 69 35.0<br />
Age Less than 20 29 14.7<br />
20-30 132 67.0<br />
31-40 25 12.7<br />
41-50 10 5.1<br />
More than 50 1 .5<br />
Education High school 9 4.6<br />
Community College 11 5.6<br />
Bachelor 156 79.2<br />
Postgraduate 21 10.7<br />
Income Less than 200 99 50.3<br />
201-500 65 33.0<br />
501-800 14 7.1<br />
More than 800 19 9.6<br />
Occupation Private sector employee 23 11.7<br />
Public sector employee 43 21.8<br />
Student 131 66.5<br />
Computer experience Less than 3 years 36 18.3<br />
3-5 47 23.9<br />
More than 5 years 114 57.9<br />
Internet usage frequencies Once a month 39 19.8<br />
Several times monthly 42 21.3<br />
Several times weekly 55 27.9<br />
Once a day 20 10.2<br />
Several times daily 41 20.8<br />
Demographic characteristics of the overall participants are presented in Table 3. Of the surveys analyzed,<br />
69 respondents (52.3%) were female and 128 (65.0%) were male. Most of them are between 20−30<br />
years of age (67.0%), have a bachelor’s degree (79.8%). In addition, most of the respondents have<br />
considerable experience in using a computer. 81.8% of the respondents had more than 3 years of<br />
computer use. Moreover, around 60% of them are using the Internet in daily or weekly bases. These<br />
results indicated that university students in Jordan have considerable experience in using computers and<br />
the Internet. Demographic characteristics of the overall participants are presented in Table 3.<br />
3.4 Data analyses<br />
A set of multiple linear regressions and analyses of variance (ANOVA) were used to analyze the sample<br />
data, and to test the hypothesis associated with the research model. Multiple regression analysis is a<br />
statistical technique used to explore the relationship between a single dependent variable and several<br />
predictors (independent variables) (Hair et al, 2006). There were no associated with violation of the<br />
regression assumptions.<br />
4. Analysis and results<br />
Table 3 shows the results of regression analysis based on the relationships proposed in the research<br />
model and Figure 3 is a graphical representation of the analysis results (only significant relations appear<br />
in this Figure). To investigate the research hypotheses, several multiple regression analyses were<br />
performed by using SPSS 17.0 package for Windows. For example, to investigate hypothesis H6a and<br />
H6b, UA and PD were simultaneously regressed on simultaneously regressed on perceived usefulness.<br />
A summary of the research hypotheses and test results are provided in Table 3 and Figure 3. The nine<br />
research hypotheses (H1, H2, H3, H4, H5, H6a, H6b, H7a, H7b) have been supported from the empirical<br />
22
Omar Al-Hujran and Mahmoud Al-dalahmeh<br />
test. In addition, the results indicated that the research model explained around 43% of the variance in<br />
citizens’ intention to adopt and use eGovernment websites (R 2 = 0.433).<br />
Table 3: Path coefficients and hypothesis testing<br />
Analyses<br />
Type<br />
Multiple<br />
Linear<br />
Regression<br />
Statistical Significance<br />
Hypothesis Independent Variable Dependent<br />
Variable<br />
Cultural dimensions PU<br />
Beta Supported<br />
H6a UA 0.137* Yes<br />
H6b PD 0.187* Yes<br />
Cultural dimensions PEOU<br />
H7a UA 0.223** Yes<br />
H7b PD 0.202** Yes<br />
H1 - PU Attitude 0.236** Yes<br />
H2 - PEOU Attitude 0.182** Yes<br />
H4 - PEOU PU 0.505*** Yes<br />
H5 - PU BI 0.236** Yes<br />
H3 - Attitude BI 0.534*** Yes<br />
*** Correlation is Significant at
Omar Al-Hujran and Mahmoud Al-dalahmeh<br />
example, they could achieve this by increasing the citizen's awareness about the usefulness of using<br />
eGovernment; providing eGovernment and ICT training workshops; and refining IT/IS systems selections<br />
to meet different citizens’ needs. However, Perceived usefulness was the strongest predictor of citizens’<br />
attitude toward using eGovernment websites. This finding is in accordance with earlier TAM research that<br />
consistently finds that perceived usefulness is a more powerful predictor than perceived ease of use (e.g.<br />
Davis, 1989; Fu et al., 2006). This outcome yields the implication that usefulness is more interesting to<br />
some citizens than others. In addition, perceived ease of use of eGovernment websites indirectly<br />
enhanced a citizen’s attitude toward using eGovernment websites through perceived usefulness. The<br />
influence of perceived ease of use on perceived usefulness was strong. This supports TAM which asserts<br />
the easier a system is to use, the more useful it can be. Hence, developing eGovernment websites that<br />
are easy to use will enhance the usefulness of the websites and indirectly increase citizen’s attitude<br />
toward using eGovernment websites. This study also hypothesised that there would be a positive<br />
relationship between two of the national culture dimensions and TAM core constructs (perceived<br />
usefulness and perceived ease of use). Findings showed that the two cultural dimensions: power<br />
distance and uncertainty avoidance had a significant positive impact on perceived ease of use and<br />
perceived usefulness. These findings are consistent with previous research (Warkentin et al., 2002). In<br />
their study, Warkentin et al. (2002) proposed that of the five cultural dimensions, power distance and<br />
uncertainty avoidance are the most likely to differentiate eGovernment adoption and use.<br />
6. Conclusion<br />
This study integrates the technology acceptance model (TAM) and Hofstede’s national culture<br />
dimensions to evaluate citizen adoption of eGovernment. The results of a multiple regression analysis<br />
indicate that perceived usefulness, perceived ease of use, attitude are significant indicators of citizens’<br />
intention to use state government services online. In addition, the results show that the two cultural<br />
dimensions: power distance and uncertainty avoidance had significant impacts on citizens' intention to<br />
adopt eGovernment. As government agencies continue to invest in eGovernment services, it is very<br />
important for agencies to enhance their understanding of the factors that influence citizen adoption of<br />
eGovernment websites and services.<br />
7. Appendix 1: Survey items<br />
Behavioral Intention to Use (BI)<br />
BI1<br />
BI2<br />
Attitude toward Using (ATU)<br />
ATU1<br />
ATU2<br />
ATU3<br />
Perceived Usefulness (PU)<br />
PU1<br />
PU2<br />
PU3<br />
PU4<br />
PU5<br />
I intend to use the eGovernment portal and/or Ministry's website(s) to access government<br />
services frequently.<br />
I predict that I should use the eGovernment portal and/or Ministry's website(s) to access<br />
government services in the future.<br />
Using the eGovernment portal and/or Ministry's website(s) to access government services is a<br />
good idea.<br />
I like the use of eGovernment portal and/or Ministry's website(s) to access government<br />
services.<br />
Using the eGovernment portal and/or Ministry's website(s) to access government services<br />
would be pleasant.<br />
Using eGovernment portal and/or Ministry's website(s) enable me to access government<br />
services (e.g. getting national exam result online, getting national number) more quickly.<br />
Using eGovernment portal and/or Ministry's website(s) enhances my effectiveness in<br />
accessing government services (e.g. find the most relevant information about a service).<br />
Using eGovernment portal and/or Ministry's website(s) allows me to access more government<br />
services than would otherwise possible.<br />
Using eGovernment portal and/or Ministry's website(s) to access government services<br />
increases my productivity (e.g. find information about services within shortest time frame).<br />
Overall, I find eGovernment portal and/or Ministry's website(s) useful for me to access<br />
government services.<br />
24
Perceived Ease of Use (PEOU)<br />
PEOU1<br />
PEOU2<br />
Omar Al-Hujran and Mahmoud Al-dalahmeh<br />
Learning how to use eGovernment portal and/or Ministry's website(s) to access government<br />
services is easy for me.<br />
I find it easy to use eGovernment portal and/or Ministry's website(s) to find what I want.<br />
PEOU3<br />
My interaction with eGovernment portal and/or Ministry's website(s) to access government<br />
services is clear and understandable.<br />
PEOU4 EGovernment portal and/or Ministry's website(s) is flexible to interact with.<br />
PEOU5<br />
Overall, I find using eGovernment portal and/or Ministry's website(s) to access government<br />
services easy to use.<br />
Uncertainty Avoidance (UA)<br />
UA1<br />
It is important to have job requirements and instructions spelled out in detail so that people<br />
always know what they are expected to do<br />
UA2<br />
Rules and regulation are important because they inform workers what the organization expects<br />
of them<br />
UA3 Order and structure are very important in a work environment<br />
UA4<br />
Working in a structured environment is better than working (rules and regulations) in an<br />
unstructured work environment<br />
Power Distance (PD)<br />
PD1 Managers should be careful not to ask the opinions of subordinates too frequently, otherwise<br />
the manager might appear to be weak and incompetent<br />
PD2 Manager should make most decisions without consulting subordinates<br />
PD3 Employees should not question their manager’s decisions<br />
PD4 Manager should not ask subordinates for advice, because they might appear less powerful<br />
PD5 Decision making power should stay with top management in the organization and not be<br />
delegated to lower level employees<br />
References<br />
Abu-Samaha, A. & Abdel Samad, Y. (2007) "Challenges to the Jordanian Electronic Government Initiative", Journal<br />
of Business Systems, Governance and Ethics, Vol 2, No. 3, pp 101-109.<br />
Ajzen, I. & Fishbein, M. (1980) Understanding Attitudes and Predicting Social Behaviour, Prentice-Hall, Englewood<br />
Cliffs, NJ.<br />
Al-Adawi, Z, Yousafza, S & Pallister, J (2005) "Conceptual Model of Citizen Adoption of EGovernment", in<br />
Proceedings of the Second International <strong>Conference</strong> on Innovations in Information Technology (IIT’05), Dubai,<br />
United Arab, 26-28 September 2005, p 1-10.<br />
Al-Gahtani, S. (2004) "Computer Technology Acceptance Success Factors In Saudi Arabia: An Exploratory Study",<br />
Journal of Global Information Technology Management, Vol 7, pp 5-29.<br />
Alhujran, O. & Chatfield, A. (2008) "Toward a Model for EGovernment Services Adoption: The Case of Jordan", in<br />
Proceedings of the 8th <strong>European</strong> <strong>Conference</strong> on eGovernment, Ecole Polytechnique, Lausanne, Switzerland,<br />
10-11 July 2008, pp 13-22.<br />
Alhujran, O & Shahateet, M (2010) "Citizen adoption of eGovernment initiatives in developing countries: A case study<br />
of Jordan", in Proceedings of the 10th <strong>European</strong> <strong>Conference</strong> on EGovernment, Limerick, Ireland.<br />
Al-Jaghoub, S. & Westrup, C. (2003) "Jordan and ICT-led development: towards a competition state?”, Information<br />
Technology & People, Vol 16, pp 93-110.<br />
Al-Sukkar, A. (2005) "The application of Information Systems in the Jordanian Banking Sector: A study of the<br />
Acceptance of the Internet", PhD thesis, University of Wollongong, Australia.<br />
Bagchi, K, Cerveny, R, Hart, P & Peterson, M (2003) "The Influence of National Culture in Information Technology<br />
Product Adoption", in Proceedings of the Ninth Americas <strong>Conference</strong> on Information Systems, Tampa, Florida,<br />
USA, 4-6 August 2003, pp 957-965.<br />
Baskerville, R (2003) "Hofstede Never Studied Culture", Accounting, Organizations and Society, vol. 28, no. 1, pp 1-<br />
14.<br />
Carter, L. & Belanger, F. (2004) "Citizen Adoption of Electronic Government Initiatives", in the 37th Hawaii<br />
International <strong>Conference</strong> on System Sciences, Hawaii, USA.<br />
Carter, L. & Bélanger, F. (2005) "The utilization of eGovernment services: citizen trust, innovation and acceptance<br />
factors", Information Systems Journal, Vol 15, No. 1, pp 5-25.<br />
Chatfield, A. & Alhujran, O. (2009) "A Cross-Country Comparative Analysis of EGovernment Service Delivery among<br />
Arab Countries", Information Technology for Development, Vol 15, No. 3, pp 151-170.<br />
Choudrie, J. & Dwivedi, Y. (2005) "A Survey of Citizens’ Awareness and Adoption of EGovernment Initiatives, The<br />
‘Government Gateway’: A United Kingdom Perspective", in eGovernment Workshop ’05 (eGOV05), Brunel<br />
University, London, UK.<br />
25
Omar Al-Hujran and Mahmoud Al-dalahmeh<br />
Cronbach, L. (1970) Essentials of Psychology Testing, Harper & Row, New York.<br />
Davis, F. (1989) "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology",<br />
MIS Quarterly, Vol 13, No. 3, pp 319-340.<br />
Davis, F, Bagozzi, R & Warshaw, P (1989) "User Acceptance of Computer Technology: A Comparison of Two<br />
Theoretical Models", Management Science, vol. 35, no. 8, pp 982-1005.<br />
Davison, R & Martinsons, M (2003) "Guest Editorial; Cultural Issues and IT Management: Past and Present", IEEE<br />
Transactions on Engineering Management, vol. 50, no. 1, pp 3-7.<br />
Fishbein, M. & Ajzen, I. (1975) Belief, Attitude, Intentions and Behavior: An Introduction to Theory and Research,<br />
Addison-Wesley, Boston.<br />
Fu, J.-R., Farn, C.-K. & Chao, W.-P. (2006) "Acceptance of Electronic Tax Filing: A study of taxpayer intentions ",<br />
Information & Management, Vol 43, No. 1, pp 109-126.<br />
Gefen, D., Pavlou, P., Warkentin, M. & Gregory, M. (2002) "EGovernment Adoption", in Proceedings of the AIS 2002<br />
Americas <strong>Conference</strong> on Information Systems, Dallas, Texas, USA, 9-11 August 2002, pp 569-576.<br />
Gilbert, D., Balestrini, P. & Littleboy, D. (2004) "Barriers and Benefits in the Adoption of E- government", International<br />
Journal of Public Sector Management, Vol 17, No. 4, pp 286-301.<br />
Gupta, B., Dasgupta, S. & Gupta, A. (2008) "Adoption of ICT in a Government Organization in a Developing Country:<br />
An Empirical Study", Journal of Strategic Information Systems, Vol 17, No. 2, pp 140-154.<br />
Heijden, H. (2003) "Factors influencing the usage of websites: the case of a generic portal in the Netherlands",<br />
Information & Management, Vol 40, No. 6, pp 541-549.<br />
Hofstede, G. (1997) Cultures and Organizations: Software of the Mind, McGraw-Hill, New York.<br />
King, W & He, J (2006) "A Meta-Analysis of the Technology Acceptance Model", Information & Management, vol. 43,<br />
no. 6, pp 740-755.<br />
Kumar, V., Mukerji, B., Butt, I. & Persaud, A. (2007) "Factors for Successful eGovernment Adoption: a Conceptual<br />
Framework", Electronic Journal of eGovernment, Vol 5, No. 1, pp 63-76.<br />
Leidner, D. & Kayworth, T. (2006) "A Review of Culture in Information Systems Research: Toward A Theory of<br />
Information Technology Culture Conflict", MIS Quarterly, Vol 30, No. 2, pp 357-399.<br />
Malhotra, Y. & Galletta, D. (1999) "Extending the technology acceptance model to account for social influence:<br />
Theoretical bases and empirical validation", in Thirty-Second Annual Hawaii International <strong>Conference</strong> on<br />
System Sciences-Volume 1, Hawaii, USA.<br />
Mathieson, K (1991) "Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of<br />
Planned Behavior", Information Systems Research, vol. 2, no. 3, pp 173-191.<br />
Pavlou, P. (2003) "Consumer acceptance of electronic commerce: integrating trust and risk with the technology<br />
acceptance model", International Journal of Electronic Commerce, Vol 7, No. 3, pp 69-103.<br />
Phang, C., Sutanto, J., Li, Y. & Kankanhalli, A. (2005) "Senior Citizens' Adoption of EGovernment: In Quest of the<br />
Antecedents of Perceived Usefulness", in the 38th Hawaii International <strong>Conference</strong> on System Sciences,<br />
Hawaii, USA.<br />
Sekaran, U. (2003) Research Method for Business: A Skill Building Approach, John Wiely and Sons, New York.<br />
Shumaila, Y, Gordon, R & John, G (2007) "Technology Acceptance: A Meta-Analysis of the TAM: Part 2", Journal of<br />
Modelling in Management, vol. 2, no. 3, pp 251-280.<br />
Straub, D (1994) "The Effect of Culture on IT Diffusion: Email and Fax in Japan and the US", Information Systems<br />
Research, vol. 5, no. 1, pp 23-47.<br />
Straub, D. W. (1989) "Validating Instruments in MIS Research", MIS Quarterly, Vol 13, No. 2, pp 146-169.<br />
Straub, D., Loch, K. & Hill, C. (2001) "Transfer of information technology to the Arab world: a test of cultural influence<br />
modeling", Journal of Global Information Management, Vol 9, No 4, pp.141-172.<br />
Straub, D. W., Gefen, D. & Boudreau, M. C. (2005) Quantitative Research ,In Research in Information Systems: A<br />
Handbook for Research Supervisors and Their Students, D. Avison and J. Pries-Heje, Amsterdam.<br />
Taylor, S. & Todd, P. (1995) "Understanding Information Technology Usage: A Test of Competing Models",<br />
Information Systems Research, Vol 6, No. 2, pp 144-176.<br />
Twati, J. (2006) "Societal and Organisational Culture and the Adoption of Management Information Systems in Arab<br />
Countries", PhD thesis, Griffith University, Brisbane, Australia.<br />
Veiga, J, Floyd, S & Dechant, K (2001) "Toward Modeling the Effects of National Culture on IT Implementation and<br />
Acceptance", Journal of Information Technology, vol. 16, no. 3, pp 145-158.<br />
Venkatesh, V. & Davis, F. (2000) "A theoretical extension of the technology adoption model: Four longitudinal field<br />
studies", Management Science, Vol 46, pp 186-204.<br />
Wang, Y. (2003) "The Adoption of Electronic Tax Filing Systems: An Empirical Study", Government Information<br />
Quarterly, Vol 20, No. 4, pp 333–352.<br />
Warkentin, M., Gefen, D., Pavlou, P. & Rose, G. (2002) "Encouraging Citizen Adoption of eGovernment by Building<br />
Trust", Electronic Markets, Vol 12, pp 157-162.<br />
26
A Framework for Transitioning to Mobile Government<br />
Shadi Al-khamayseh 1 and Elaine Lawrence 2<br />
1 Dubai Women's College, Higher College of Technology, Dubai City, UAE<br />
2 University of Technology Sydney, Australia<br />
shadi.alkhamayseh@gmail.com<br />
Elaine.Lawrence@uts.edu.au<br />
Abstract: Over the past decade, many Governments have moved towards providing services to their citizens via the<br />
web, with varying degrees of success. This paper reports on research concerning the transition from eGovernment to<br />
mobile government (m-Government). This research contributes to the field by developing a successful m-<br />
Government framework as a basis for a transition methodology, either from eGovernment to m-Government or<br />
directly to m-Government. Transitioning from eGovernment to m-Government requires an investigation of the<br />
integration process between eGovernment and m-Government. We need to examine all the pressures and obstacles<br />
that hinder the transition process, as well as those that determine m-Government success factors. Such obstacles<br />
and success factors differ between nations, such as a nation’s technological and information infrastructure, mobile<br />
device penetration and acceptance, public and social pressures, and security. Finally an m-Government initiative is<br />
required. Yet mobile government, despite its potential, has not reached anticipated adoption levels. The main aim of<br />
this study is to discover what is needed to improve the adoption and implementation of mobile government systems.<br />
Specific objectives proposed to achieve this aim include: a) identifying all the factors that may influence the adoption<br />
and implementation of mobile services, b) integrating such factors and relations between them in a framework, and c)<br />
providing specific recommendations and guidelines in all the various perspectives. Case Studies was the<br />
methodology employed to fulfil these objectives. A qualitative approach was found to be most suitable to this study,<br />
and open ended Web survey questions, as well as various kinds of interviews, including email, face-to- face, and<br />
phone, were used to obtain detailed, in-depth information from industry and user participants. A total of nine such<br />
studies were carried out in Australia, the United Arab Emirates and Jordan. Interviews were recorded and<br />
transcribed, and all the material was analysed using nVivo, a qualitative data analysis (QDA) computer software<br />
package. The final contribution of this study is an adaptive theoretical framework that explains the specific factors<br />
that influence the adoption, diffusion and implementation of mobile government systems.<br />
Keywords: mobile, electronic, government, success factors, framework<br />
1. Introduction<br />
eGovernment is defined as the transformation of government work through the use of wired Information<br />
Communication Technologies (ICTs), such as the wired Internet, for faster delivery of governmental<br />
services to constituents (Australian Government Information Management Office (AGIMO) 2007) and to<br />
improve government efficiency, effectiveness, transparency and accountability (The World Bank Group<br />
2005). m-Government is a subset of eGovernment that complements it by delivering services through<br />
wireless channels (Kuscu, Kushchu & Yu 2007b; Lallana 2004). Both electronic and mobile governments<br />
share the same objectives of improving government efficiency, effectiveness, transparency and<br />
accountability, and facilitating constituents’ access to government information and services. Although the<br />
Internet is expanding rapidly, the number of users is still fewer than envisaged by many observers of the<br />
Internet’s development. To achieve eGovernment goals, different communication channels need to be<br />
considered. eGovernment needs to become mobile, offering the ability to engage with government<br />
services “anytime, anywhere” (Heeks & Lallana 2008). “After eGovernment comes mobile government<br />
(M-Government); the idea of permanently streaming data to and from a user’s mobile phone may be<br />
some people’s nightmare. In Sweden, it is already reality” (Cross 2004). Although there is a lower-thanexpected<br />
uptake of m-Government in many countries and cities, some have been advancing, such as<br />
Sacramento which received an award for Mobile Government Leadership in 2007 (Government<br />
Technology Magazine 2009).<br />
Section 2 provides the background to the paper, while in Section 3 we outline the results of our online<br />
survey of experts in the field. In Section 4, we describe the next phase of the investigation, namely the<br />
case studies undertaken to a) identify all the factors that may influence the adoption and implementation<br />
of mobile services, b) integrate such factors and relations between them into a framework, and c) provide<br />
specific recommendations and guidelines in all the various perspectives. Finally, we present the finished<br />
Framework and our recommendations.<br />
2. Background<br />
An m-Government definition that emerged from the analysis of expert surveys and interviews along with<br />
the literature review is presented below:<br />
27
Shadi Al-khamayseh and Elaine Lawrence<br />
“m-Government is a strategic system that extends stationary eGovernment systems to<br />
enable interoperability with heterogeneous wireless and mobile technologies through<br />
applications for constituents (Governments, Employees, Businesses, and Citizens). This<br />
allows them to interact within/with their government(s) or any government regardless of time<br />
and location, and to enhance the delivery of service in order to support government’s<br />
operations and decision making, and to support constituents’ business with the government.”<br />
In order to highlight the similarities and differences, we compare and contrast the features of electronic<br />
and mobile government in Table 1.<br />
Table 1: Features of electronic and mobile government: eGovernment and m-Government<br />
Criteria eGovernment m-Government<br />
Mobile devices: mobile phones, PDAs,<br />
Access devices PCs, Laptops, telephones<br />
Laptops and pocket PCs (Lallana 2004),<br />
iPads, Tablets.<br />
Personalization<br />
Always on<br />
Mobility<br />
eGovernment access devices can be<br />
used by many users, and are not<br />
personalised in a way that allows sending<br />
personal information to the constituent’s<br />
device (Yu & Kushchu 2004).<br />
eGovernment access devices are often<br />
switched off when they are not in use.<br />
When the devi♣ce is switched off it can<br />
neither receive any information nor switch<br />
itself on to do so.<br />
eGovernment access devices such as<br />
PCs are location fixed, so the citizen has<br />
to find the access device and an Internet<br />
connection to access services.<br />
Accessibility 24x7 fixed location access (Carroll 2005).<br />
Limitations<br />
Service coverage<br />
3. Findings of online survey<br />
The ICTs related to eGovernment, such<br />
as computers, have minor limitations.<br />
Many rural areas cannot access<br />
eGovernment services because of lack of<br />
land-lines (Hossan, Chowdhury &<br />
Kushchu 2005).<br />
Mobile devices are usually used by a single<br />
user (but not necessarily in underdeveloped<br />
countries). This facilitates sending<br />
personalised information to a specific<br />
constituent at any time through his/her<br />
mobile device (Yu & Kushchu 2004).<br />
m-Government devices, especially mobile<br />
phones and PDAs, are always switched on.<br />
These devices shift to an inactive mode<br />
when not in use, but are immediately<br />
activated by applications or information sent<br />
to the device (Yu & Kushchu 2004).<br />
m-Government access devices are mobile<br />
and designed to provide instant access to<br />
users by delivering, for example, warning<br />
SMS.<br />
24x7 with the advantage of access<br />
anywhere due to the mobility of the<br />
accessing devices (Carroll 2005).<br />
Small screen size limits the volume and type<br />
of information accessed (Carroll 2005).<br />
Nearly 100% country coverage in many<br />
countries (Kushchu & Kuscu 2003).<br />
The first stage of our study was an extensive literature review, the second involved the identification of<br />
eGovernment and m-Government experts for surveying, and the third involved a series of nine case<br />
study interviews with twelve officials from government departments and local councils in Australia and the<br />
Middle East. In this section, the data or empirical materials (Myers 1997) were collected through an openended<br />
online survey. The online survey included general open-ended questions of an exploratory nature,<br />
to prevent any influence on the experts’ point of view. The research question analysed here was:<br />
“Do you think that eGovernment is a necessary prerequisite to m-Government? Why/Why<br />
not?”<br />
This general open-ended question elicited rich data. According to Strauss and Corbin (1990) it is up to<br />
the researcher to determine when a sufficient number of surveys have been collected for analysis. Thus,<br />
a response of forty-three (43) participants was the saturation point used to develop a preliminary<br />
consensus of opinions as, at this stage, the results were becoming repetitious and no new information<br />
was being added. The participants targeted were mainly <strong>Academic</strong>s (i.e. Professors, Assistant<br />
Professors) researchers (i.e. a Research Director) and industry experts (i.e. an eGovernment<br />
Programmes Manager, a service design consultant, Business Development Manager, Mobile Portal<br />
Project Manager, eGovernment consultant, eService Provisioning Officer). The participants had authored<br />
28
Shadi Al-khamayseh and Elaine Lawrence<br />
or co-authored at least one published paper on m-Government. Figure 1 shows the location of the 43<br />
respondents and it is noted that the largest sample came from Europe which reflects the bulk of cutting<br />
edge research and implementation of mobile government.<br />
Figure 1: Location and number of respondents<br />
The respondents’ opinions were divided about this issue, with the majority agreeing with the question.<br />
Some answered confidently in the negative: “No[,] eGovernment is not a necessary prerequisite to m-<br />
Government”. Many others agreed, but added that “m-Government is an alternative or further<br />
development of eGovernment”, which means m-Government complements eGovernment “They are<br />
complementary”. According to one respondent, “ eGovernment is about building Internet-based<br />
solutions…” and m-Government “is the same, but using wireless as well as fixed networking<br />
technologies”, so “m-Government is a complimentary channel” and thus, an “m-Government solution is<br />
therefore an eGovernment solution”. Another respondent shared the same opinion but stated that the<br />
previous existence of eGovernment also contributes to awareness: “you need the people's awareness of<br />
"eGovernment in order to be familiar with the m-Government”. “Once people use and trust eGovernment<br />
services they will shift towards m-Government.” Thus, “ eGovernment plays an important role as a driving<br />
force”.<br />
Another respondent sums up that, “m-Government is a kind of eGovernment service [where] users can<br />
use mobile (wireless) devices as an interaction device”. Additionally, eGovernment programs contribute<br />
to devising successful m-Government programs and applications: “the eGovernment management [team]<br />
will have a good idea of what services to provide through the mobile”. According to these comments,<br />
eGovernment seems to be a core factor for m-Government. “ eGovernment is fundament [fundamental]<br />
for m-Government” and, “Surely eGovernment is a key enabler for m-Government” and therefore, “There<br />
should be first the backbone of eGovernment” as “ eGovernment services are the back-end Information<br />
Technology systems of the governmental agencies”. These systems support m-Government as “m-<br />
Government will often work alongside eGovernment, e.g. people using the Internet to register for an m-<br />
Government service”.<br />
These respondents see m-Government as a subset of existing eGovernment infrastructure which it<br />
complements by adding the wireless channel. eGovernment services contribute to awareness and trust<br />
which motivate people to use m-Government applications devised by the eGovernment management.<br />
Thus, eGovernment is a driver and a core enabler of mobile government. While most respondents<br />
recommended having an eGovernment infrastructure, some did disagree with the idea of requiring<br />
eGovernment as a pre-requisite of m-Government: “No[,] eGovernment is not a necessary prerequisite of<br />
m-Government”, as a global government industry manager said, adding that “Initially, the two initiatives<br />
did not require one as a prerequisite to the other”. m-Government applications that do not rely on<br />
eGovernment infrastructure have their own benefits too: “There is no reason however why m-<br />
Government applications on their own cannot increase efficiency and quality of service.” This means that<br />
“There are practical advantages to be gained from standalone m-Government applications as an initial or<br />
pilot stage in development, particularly as they may be quicker to develop and introduce”. It is also<br />
29
Shadi Al-khamayseh and Elaine Lawrence<br />
important to understand that although a standalone m-Government application is possible, “not all<br />
government services can be rendered using m-Government technologies”. Thus, some respondents did<br />
not provide a clear cut answer, but agreed with both views: “yes and no”. As explained by the<br />
eGovernment Corporate Programmes Manager, “m-Government can be achieved without eGovernment,<br />
but is somehow limited”. A researcher respondent added that “some innovative services can be<br />
accomplished without eGovernment” as it depends on the functionality level of the service/application: “It<br />
depends on what kind of m-Government you are considering. For example, ‘Light’ mobile applications<br />
might be implemented without a comprehensive eGovernment framework”. Figure 2 shows views on m-<br />
Government and its dependence or otherwise on eGovernment.<br />
Figure 2: Percentages of participants’ answer to: Do you think that eGovernment is a necessary<br />
prerequisite of m-Government?<br />
4. Case study interviews<br />
For the next stage of our investigation, we chose Case Studies methodology as, according to Tellis<br />
(1997): “Case study can be seen to satisfy the three tenets of the qualitative method: describing,<br />
understanding, and explaining”. The goals of this study included an exploration of the (a) success factors<br />
and (b) economic aspects of the acquisition of wireless and mobile technologies in the public sector. The<br />
objectives deriving from those goals are set out in Table 2.<br />
Table 2: Objectives and questions<br />
Objectives Questions<br />
An assessment of the categories of mobile and wireless<br />
technologies use in the public sector.<br />
The establishment of a basis for understanding the<br />
current and future success aspects of mobile government.<br />
An evaluation of the mobile government adoption issues,<br />
including managerial issues and the centralization and/or<br />
decentralization of decision making.<br />
The establishment of a basis for understanding the<br />
current and future economic aspects of mobile<br />
government.<br />
What patterns of acquisition emerge from the current<br />
wireless and mobile technologies and the perceived<br />
needs for mobile government?<br />
What characteristics of the categories of mobile<br />
government services contribute to the patterns of<br />
acquisition?<br />
What issues arise from the rapid acquisition of<br />
mobile and wireless technologies and how important<br />
have those technologies become to the<br />
organization?<br />
How will the organization balance the need for<br />
technological changes with the need to continue the<br />
accomplishment of routine tasks?<br />
These questions were used for all the case studies from Australia, Jordan and the United Arab Emirates<br />
and the answers were recorded, transcribed and later analyzed using nVivo, a qualitative data analysis<br />
software package. The above questions along with the main research question: “What are the factors that<br />
contribute to successful mobile government? How? Why?” reinforce the exploratory nature of this<br />
research. As can be seen from Table 3, twelve persons were interviewed for the case studies.<br />
30
Shadi Al-khamayseh and Elaine Lawrence<br />
Table 3: Interviewees, location, government type and positions<br />
Pseudonym Government Type No Positions<br />
QLDCC1 (AUST) Local City Council 2 IT manager and project manager<br />
QLDCC2(AUST) Local Regional Council 1 Team Leader of Technical Service<br />
NSWCC1(AUST) Local City Council 1 IT Manager<br />
NSWCC2(AUST) Local City Council 1 IT manager<br />
NSWCC3(AUST) Local City Council 1 IT Manager<br />
JorFed (JORDAN) Federal Government Department 1 IT Manager<br />
JorState (JORDAN) State Government Department 3 Customer Service Manager; IT Director;<br />
Head of Customer Information System<br />
(CIS) and Quality Unit.<br />
UAEstate01 (UAE) State Government Department 1 The Director General of eGov<br />
UAEstate02 (UAE) State Government Department 1 IT Manager<br />
Our study, by using a variety of methodologies – extensive literature review, online surveys and<br />
interviews with local, state and federal government personnel in Australia, Jordan and the United Arab<br />
Emirates - enabled us to identify many more success factors than we orginally found in the literature<br />
review, as depicted in Table 4.<br />
Table 4: Success factors identified by literature review<br />
Acceptance<br />
Access<br />
Coherent M-Gov framework<br />
Cost<br />
eGovernment<br />
High mobile penetration<br />
Infrastructure<br />
Infrastructure management<br />
IT literacy<br />
Legal issues deregulation of telecommunication sector<br />
M-Gov awareness<br />
M-Government Portal and exclusive Gateway GW<br />
Partnership with private sector<br />
Privacy and security<br />
Quality and user friendly applications<br />
Standards and data exchange protocols<br />
Strategy<br />
User needs and preferences applications<br />
As a result of the high number of success factors identified from our surveys and interviews, we<br />
organized the success factors in the framework around ten perspectives. The ten groups – Drivers,<br />
Solutions, Constituents (Citizens), Constituents (Employees), Providers, Business Case, Security,<br />
Government Role, and Benefits are the ones that have been proven in the collected data. Figure 3 below<br />
depicts the theoretical framework of m-Government as it emerged from the data analysis in the form of a<br />
visual model. The framework is adaptive as its components are rich and detailed, and they are not<br />
specific to one country, technology, organisational factor, economic factor, or social and human factor.<br />
The richness and level of detail provides any government with the capacity to adapt. The framework<br />
brings the issues facing the implementation of m-Government into sharp relief. We discuss each of the<br />
perspectives below.<br />
4.1 Drivers perspective<br />
Although different government departments have quite different responsibilities, tasks, structures, and<br />
customers, they share very similar drivers for the development and adoption of m-Government. The<br />
investigation conducted in this research shows that many of these drivers were and remain the same.<br />
31
Shadi Al-khamayseh and Elaine Lawrence<br />
Mallett, Millar and Beane (2006) acknowledge the flexibility driver, and theorize that work is no longer a<br />
place to go to but an activity to be undertaken. Thus, employees demand work flexibility in order to<br />
undertake their work whenever and wherever it is convenient for them. These drivers essentially oblige<br />
government departments to request the use of mobile and wireless technologies by proposing a business<br />
case.<br />
Figure 3: The adaptive m-Government framework<br />
4.2 Business case perspective<br />
The business case, according to the case studies findings, must be developed with mutual efforts from<br />
both the department or business group and the IT group. The business case needs to justify an m-<br />
Government project based on a cost/benefit analysis. Benefit/cost justification would typically answer the<br />
following question: How will the system improve the organisation? Potential benefits of implementing m-<br />
Government systems are discussed in Section 4.10.<br />
4.3 Solutions perspective<br />
The category included twenty-four success factors, some of which overlapped with other Perspectives<br />
such as the Providers and Business Case. The in-depth knowledge gained from the analysis of the case<br />
studies shows that mobile government solutions can change business processes within government<br />
departments. It also suggests that the mobile government platform is the most important factor in<br />
achieving functional and quality mobile government solutions (Olmstead et al. 2007). The Jordanian case<br />
study is therefore a good example to follow, as the Ministry of Information and Communication<br />
Technology (MOICT) has developed a central platform that hosts all services from all participating<br />
departments. Olmstead et al. (2007) confirmed this method and, as a result, started the USE-ME.GOV<br />
project to make available an open and interoperable platform for sharing across different local authorities<br />
and diverse organisational units. Such a platform reduces the cost of providing services and should<br />
address openness, interoperability, usability, and security (Decker & Bulander 2009; Olmstead et al.<br />
2007; Tadwalkar, Xiaoli & Lim 2007).<br />
32
4.4 Security perspective<br />
Shadi Al-khamayseh and Elaine Lawrence<br />
Literature has acknowledged that m-Government involves hidden risks due to the insecurity of the air<br />
medium and the vulnerabilities of wireless systems, and security has therefore been highlighted as a<br />
major success perspective (Carroll 2005; Kumar, Hanumanthappa & Reddy 2008; Mallett, Millar & Beane<br />
2006; Tadwalkar, Xiaoli & Lim 2007). The case studies shows the use of networks such as GSM, 3G, and<br />
NextG, with the majority of the cases using the 3G networks. Kumar, Hanumanthappa and Reddy (2008)<br />
stated that, in the past, wireless protocols had several security vulnerabilities, however, newer protocols<br />
such as 3G and WiMAX had the necessary requisites for secure deployment and utilisation. The case<br />
studies also recommend utilising the Virtual Private Networks (VPNs), and Kumar, Hanumanthappa and<br />
Reddy (2008) conclude that a preferable solution in the case of m-Government lies in session layer<br />
security. Finally, the case studies and literature suggest that to secure m-Government systems, an<br />
understanding of all possible threats to any part of the system is required in order to source suitable<br />
defence measures (i.e. algorithms, mechanisms and policies).<br />
4.5 Devices perspective<br />
The analysis of the mobile government services implemented in the different case studies highlighted<br />
Devices as an important mobile government perspective. Choosing input/output modalities for a mobile<br />
government solution should be based primarily on service characteristics, then on user-preferred<br />
modalities. Olmstead et al. (2007) recommend utilising multimodal User interfaces (UI), so that users can<br />
switch between input modalities if a situation requires it. Due to the special characteristics of mobile<br />
devices, such as size and battery life, Olmstead et al. (2007) and Decker and Bulander (2009)<br />
recommend considering context-awareness mechanisms. Geihs et al. (2006) highlight that the<br />
performance and quality of mobile applications crucially depend on the dynamically changing properties<br />
of the execution context, such as changing bandwidth and noisy environments which affect the sound<br />
output. To provide the best possible service to the user, they recommend developing self-adapting<br />
applications that automatically adapt to context changes and/or user preferences. Self-adapting<br />
applications is added to the solution’s success factors. Responsiveness is a measure of the quality of any<br />
m-Government service when selecting the access devices to be used.<br />
4.6 Providers perspective<br />
The analysis of the case studies has revealed the importance of Providers, as providers already<br />
partnering with other departments have more experience than those who have not taken that step. It can<br />
be seen that partnering with experienced providers has advantages such as lower cost and faster<br />
provisioning of services, due to established infrastructure. Although pricing is a reflection of user value<br />
(Kar 2008), Mallat (2007) identified premium pricing as one of the major barriers to mobile services<br />
adoption. The Ministry of Information and Communication Technology (MOICT) in Jordan has recognised<br />
this adoption barrier and therefore reduced the cost of the m-Government pull services [mobile<br />
services/information requested by citizens through SMS] twice in less than a year. The Jordanian MOICT<br />
also bears the cost of the Push SMSs [SMS sent by public organisations users] (Jordan eGovernment<br />
2009a). Consequently, the SMS Gateway is the most popular E-Service used by Jordanians (Jordan<br />
eGovernment 2009b). A Gartner report reported that mobile messaging services were worth $68.1 billion<br />
in regional revenues during 2007 while text message volumes were forecast to reach 5.6 trillion in 2012<br />
(Ingelbrecht et al. 2008). This demonstrates in favour of using SMS due to its lower pricing. Kar (2008, p.<br />
49) concludes that the ‘pricing model [structure] should be part of the design process’.<br />
4.7 Government role perspective<br />
The analysis of the case studies indicates that high level government should play a positive role in<br />
encouraging organisational willingness to adopt mobile government systems by devising a mobile<br />
government policy which incorporates a strategy for all concerned parties to follow. JorFed discussed the<br />
importance of having an m-Government strategy, either within the eGovernment strategy or separate<br />
from it. He highlighted the importance of having an m-Government vision set by the central government<br />
to guide and drive all agencies’ efforts towards the successful implementation of m-Government. This<br />
practice can be found in Sweden, where central government envisages facilitating and stimulating<br />
development among the agencies. (Capra, Francalanci & Marinoni 2007).<br />
33
Shadi Al-khamayseh and Elaine Lawrence<br />
4.8 The constituents’ (employees’) perspective<br />
m-Government has a major impact on employees and thus adaption may take longer than anticipated,<br />
hindering the success of the project or causing delays in outcomes. Kar (2008) affirms that mobile<br />
workforce solutions represent a crucial domain for developing mobile services, and explains that mobile<br />
workers are “considered to be people whose professional tasks can only be completed in a ‘mobile<br />
environment’, which refers to the user’s mobility and the need for technology that supports this mobility”<br />
(Kar 2008, p. 8). The case studies revealed consideration of different user sectors (e.g. age groups) as a<br />
success factor. The interviewees did mention privacy concerns occasionally. Straub and Heinemann<br />
(2004) acknowledge these concerns and highlight the importance of ensuring users’ privacy to increase<br />
acceptance of the system. The second stage in the process of assuring privacy is “that there have to<br />
exist means that enable them [users] to protect and control data about themselves” (Trček 2006). For<br />
example, a location-based or location-aware G2E solution could track or monitor workers for efficiency<br />
purposes, but this may have legal repercussions (Kushchu, Arat & Borucki 2007). All parties involved in<br />
any mobile government transaction need to make a reasonable effort to demonstrate that the user’s<br />
information is private, and this must be governed through legislation (Trček 2006). According to Kar<br />
(2008), privacy and security can be considered as opposite values; thus, to ensure privacy, security is<br />
required as a key condition (Macumber & Cheung 2007; Trček 2006).<br />
4.9 The constituents’ (citizens’) perspective<br />
Adopting and diffusing m-Government systems in the public sector and their use by employees impacts<br />
on citizens. Governments have to be able to introduce new public services and processes that are<br />
available to their citizens as well as public sector employees. Also, although a government department<br />
can impose the use of m-Government applications on its employees, it is not possible to make the same<br />
imposition on citizens. Thus, it is important to attain representative figures of mobile usage to predict<br />
citizens’ acceptance and accessibility. According to the interviewee NSWCC3, the implementation of<br />
G2C m-Government applications is poor due to “no demand from customers”.<br />
4.10 The benefits perspective<br />
The adoption of mobile technologies by the public sector not only benefits parties who use these<br />
services, but also has a positive impact on the internal workings of the public sector (Kushchu, Arat &<br />
Borucki 2007). No doubt the major benefit of m-Government is obtaining services anywhere, anytime<br />
(ubiquity), but the analysis of the nine case studies has identified twenty five more benefits that need to<br />
be understood by government to encourage the adoption and diffusion of m-Government.<br />
5. Conclusion<br />
This study aims to qualitatively identify successful aspects of m-Government and the relevant factors<br />
required for successful adoption and diffusion of m-Government systems. The basic assumption is that<br />
m-Government is still in its infancy, and there is not yet full awareness of the adoption and diffusion<br />
factors that contribute to its success, which therefore became the focus of this research. Research of any<br />
kind into m-Government research is quite a recent development, and there is a significant lack of<br />
literature. For this reason, the search for data by desk analysis, as well as by online surveys, and in-field<br />
interviews, is very challenging. The results achieved are presented in the m-Government framework<br />
model, developing a successful m-Government framework as a basis for a transition methodology, either<br />
from eGovernment to m-Government or directly to m-Government.<br />
References<br />
Australian Government Information Management Office (AGIMO) (2007) “Australians’ use of and satisfaction with<br />
eGovernment services – 2007”, [online] <br />
Capra, E. Francalanci, C. and Marinoni, C. (2007) “Soft Success Factors for M-Government”, in I. Kushchu (ed.),<br />
Mobile Government: An Emerging Direction in eGovernment, IGI Publishing, Hershey, PA, pp. 106-133.<br />
Carroll, J. (2005) “Risky Business: Will Citizens Accept m-Government in the Long Term?” URO mGOV 2005,<br />
Brighton, UK, pp. 77-87.<br />
Cross, M. (2004) “Channel for Change”, The Guardian, [online]<br />
.<br />
Decker, M. and Bulander, R. (2009) “A Platform for Mobile Service Provisioning Based on SOA-Integration”, ebusiness<br />
and Telecommunications, vol. 23, pp. 72-84.<br />
34
Shadi Al-khamayseh and Elaine Lawrence<br />
Geihs, K., Khan, M.U., Reichle, R., Solberg, A. and Hallsteinsen, S. (2006) “Modeling of Component-Based Self-<br />
Adapting Context-Aware Applications for Mobile Devices”, IFIP International Federation for Information<br />
Processing, vol. 227, pp. 85-96.<br />
Government Technology Magazine (2009) “City of Sacramento Awarded for Mobile Government Leadership”,<br />
[Online] <br />
Heeks, R. and Lallana, E.C. (2008) “mGovernment Benefits and Challenges, eGovernment for Development”,<br />
[online] .<br />
Hossan, G.C., Chowdhury, M. and Kushchu, I. (2005) “Prospects of Using m-Technologies for Disaster Information<br />
Management in Bangladesh and other LDCs”, EURO mGOV 2005, Brighton, UK, pp. 243-253.<br />
Ingelbrecht, N., Baghdassarian, S., Gupta, M., Hart, T.J., Shen, S. and Tazaki, K. (2008) “Forecast: Mobile<br />
Messaging, Worldwide, 2007-2012”, Gartner Research.[online] http://www.gartner.com/technology/home.jsp<br />
Jordan eGovernment (2009a) “ eGovernment Program Reduces Cost of SMS’s”, [online]<br />
.<br />
Jordan eGovernment (2009b) SMS Gateway is the Number One E-Service Used Amongst the Jordanian Society<br />
[online].<br />
Kar, E.v.d. (2008) Designing Mobile Service Systems, 2nd edn, IOS Press, Amsterdam<br />
Kumar, M., Hanumanthappa, M. and Reddy, B.L. (2008) “Security Issues in m-Government”, International Journal of<br />
Electronic Security and Digital Forensics, vol. 1, no. 4, pp. 401-412.<br />
Kuscu, M.H., Kushchu, I. and Yu, B.( 2007a), “Introducing Mobile Government”, I. Kushchu (ed.), Mobile<br />
Government: An Emerging Direction in eGovernment, IGI Publishing, Hershey, PA.<br />
Kuscu, M.H., Kushchu, I. and Yu, B. (2007b) “Introducing Mobile Government”, in I. Kushchu (ed.), Mobile<br />
Government: An Emerging Direction in eGovernment, 1st edn, IGI Pub, Hershey, PA, pp. 1-11.<br />
Kushchu, I. (ed.) (2007), Mobile Government: An Emerging Direction in eGovernment, IGI Publishing, Hershey, PA.<br />
Kushchu, I., Arat, S. and Borucki, C.( 2007) “The Impact of M-Government on Organisations: A Mobility Response<br />
Model”, in I. Kushchu (ed.), Mobile Government: An Emerging Direction in eGovernment, IGI Publishing,<br />
Hershey, PA, pp. 134-153.<br />
Kushchu, I. and Borucki, C. 2004 “A Mobility Response Model for Government”, [online]<br />
.<br />
Kushchu, I. and Kuscu, M.H. (2003) “From eGovernment to m-Government: Facing the Inevitable”, 3rd <strong>European</strong><br />
<strong>Conference</strong> on eGovernment, Dublin, Ireland, [online]<br />
.<br />
Lallana, E.C. (2004) “mGovernment Definitions and Models, eGovernment for Development”, [online]<br />
.<br />
Lallana, E. (2008a), “mGovernment: Mobile/Wireless Applications in Government”, [online]<br />
.<br />
Lallana, E.C. (2008b,) “mGovernment Definitions and Models, eGovernment for Development”, [online]<br />
<br />
Macumber, H. and Cheung, B. (2007) “A Secure Wireless Data Access Service for the Government of Canada”, in I.<br />
Kushchu (ed.), Mobile Government: An Emerging Direction in eGovernment, IGI Publishing, Hershey, PA, pp.<br />
318-338<br />
Mallat, N.( 2007) “Exploring Consumer Adoption of Mobile Payments: A Qualitative Study”, The Journal of Strategic<br />
Information Systems, vol. 16, no. 4, pp. 413-432.<br />
Mallett, C.T., Millar, W. and Beane, H. (2006) “Perspectives on Next Generation Mobile”, BT Technology Journal, vol.<br />
24, no. 4, pp. 151 - 160.<br />
Myers, M. D. (1997) "Qualitative Research in Information Systems", MISQ Discovery, vol.21, pp. 241-242, 1997<br />
Olmstead, P.M., Abramowicz, W., Bassara, A., Filipowska, A., Wisniewski, M. and Zebrowski, P. (2007) “Usability<br />
Driven Open Platform for Mobile Government (USE-ME.GOV)”, in I. Kushchu (ed.), Mobile Government: An<br />
Emerging Direction in eGovernment, IGI Publishing, Hershey, PA, pp. 30-59.<br />
Straub, T. and Heinemann, A. (2004) “An Anonymous Bonus Point System for Mobile Commerce Based on Word-of-<br />
Mouth Recommendation”, Symposium on Applied Computing, Nicosia, Cyprus, pp. 766 - 773<br />
Strauss, A. and Corbin, J. (1990) Basics of Qualitative Research Grounded Theory Procedures and Techniques,<br />
Sage, London.<br />
Tadwalkar, Y., Xiaoli, Y. and Lim, R. (2007) “Usability Evaluation of a Mobile Government Service: mPAL-my cpf”,<br />
4th International <strong>Conference</strong> on Mobile Technology, Applications, and Systems and the 1st International<br />
Symposium on Computer Human Interaction in Mobile Technology ACM, Singapore, pp. 547-551.<br />
Tellis, W. (1997) “Introduction to Case Study”, The Qualitative Report, vol. 3, no. 2. [online]<br />
http://www.nova.edu/ssss/QR/QR3-3/tellis2.html<br />
Trček, D. (2006) Managing Information Systems Security and Privacy, Springer-Verlag, Berlin Heidelberg.<br />
World Bank 2008, “m-Government” [online],<br />
<br />
Yu, B. and Kushchu, I. (2004) “Evaluating Mobility for Citizens”, mGovLab.<br />
35
The Stages of eGovernment: Correlation Between<br />
Characteristics That Affect eGovernment System<br />
Madi Al-Sebie<br />
Taibah University, Al-Madinah Al-Munawarah, Saudi Arabia<br />
mrmah1997@yahoo.com<br />
Abstract: It is clear that the stages of eGovernment are the central point and significant issue of eGovernment<br />
system. The stages of eGovernment can be represented in different ways. Through a review of the normative<br />
literature in the field of e- government, it appears that there is a lack of studies that discuss the use of the stages of<br />
eGovernment as criteria to make correlation between different characteristics that affect the eGovernment system.<br />
This paper, therefore, focuses mainly on discussion of correlation between different characteristics that affect<br />
eGovernment in light of stages of the eGovernment system. Furthermore, this paper discusses the comparison<br />
between traditional and electronic government services, and the tool of delivering eGovernment services.<br />
Keywords: stages of eGovernment; criteria; characteristics.<br />
1. Introduction<br />
In the last decade, eGovernment has made rapid progress (Datar et al (2010)). E- Government has<br />
become the next wave of technology application in the public sector, now that e-commerce, in the private<br />
sector is maturing (Eyob 2004). Abie, et. al, (2004) claim that eGovernment could be considered a<br />
powerful tool that can effectively manage and integrate the huge amount of existing information, as well<br />
as seamlessly integrate citizen interaction with its services.<br />
EGovernment is the use of Information and Communication Technology (ICT) to promote more efficient<br />
and cost effective government, facilitate more convenient government services, allow greater public<br />
access to information, and make government more accountable to citizens (Monga 2008). The process of<br />
the government delivering information and services to customers (citizens, businesses and public<br />
administrations) electronically can play a significant role, not only in improving customer services,<br />
developing businesses, the economy, and society but also in renewing the role of government itself.<br />
However, the stages of eGovernment are essential to the eGovernment system, because eGovernment<br />
systems pass through a number of stages, until they reach the highest potential of providing customers<br />
with full online interaction with their governments, thus enabling them to get government information and<br />
services from a single point of access (Al-Sebie and Irani 2005).<br />
Comprehensive review of the relevant literature shows there is a lack of studies that focus on the use of<br />
eGovernment stages as criteria to make correlation between different characteristics that affect the<br />
eGovernment system. This paper, therefore, will try to fill in that gap.<br />
This paper will start with a comparison of government services: traditional and electronic ways. This will<br />
be followed by discussing the tool of delivering eGovernment services. Finally, correlation between<br />
characteristics that affect the eGovernment system in the light of its stages will be discussed.<br />
2. Government services; traditional and electronic<br />
The eGovernment system can play a significant role in providing government services to customers<br />
efficiently. Yu and Janssen (2010) claim that the major goal for launching eGovernment is creating value<br />
for citizens, businesses and government agencies through public service delivery. Metaxiotis and Psarras<br />
(2004) argue that the traditional model of government is no longer functional. Furthermore, Chandler and<br />
Emanuels (2002) point out that the traditional form of government is failing, because their hierarchical<br />
structure is based on central systems that have been unable to reflect the needs and beliefs of its<br />
citizens. So, this deficit in the traditional model of government may be a significant motivation for<br />
governments to adopt eGovernment. The essential motivating point behind initiating eGovernment is the<br />
need for more efficiency in public sectors (Affisco and Soliman, 2006). However, as argued by Larson<br />
(2001), eGovernment has an opportunity to improve the delivery of government services and create<br />
significant cost-savings; this can lead to governments becoming more efficient and more effective.<br />
Furthermore, Al-kaabi and Hattab (2009) claim that eGovernment is a way for governments to use the<br />
most innovative information and communication technology to provide customers with efficient access to<br />
government information and services.<br />
36
Madi Al-Sebie<br />
On the other hand, Atallab (2001) claims that eGovernment cannot be considered as a solution for failed<br />
development and routine systems. However, it can be said that eGovernment, if it is implemented<br />
successfully, can be considered a significant tool that can help to overcome the shortcomings of<br />
traditional systems, and increase the efficiency and effectiveness of government. The key to a successful<br />
eGovernment is, to have the ability to provide a citizen-centric view of government model (Sanati and Lu<br />
2010).<br />
There are several characteristics that differentiate between delivering government services electronically<br />
and the traditional methods (Warkentin et al 2002). These characteristics include wide use of<br />
communication technology, smooth collection and processing of information, the development of<br />
communication mediums, the impersonal feature of the online environment, and the full benefit of using<br />
high standards of technological infrastructure for transactions.<br />
Morris (2002) compared government services of the traditional and electronic paths, as shown in figures<br />
1 and 2 below. Traditionally, public services can be delivered by direct interaction between a citizen or<br />
business and representatives or agents of government, who are considered transaction processors or<br />
gatekeepers to the desired transactions or information.<br />
Figure 1: Traditional path to government service (source: (Morris, 2002))<br />
On the other hand, delivering of public services electronically, leads to a change in the role of<br />
government representatives, from gatekeeper to problem solver or service provider. Furthermore,<br />
electronic public service delivery, enables citizens and businesses to serve themselves.<br />
Figure 2: E-Path to government services (source (Morris, 2002))<br />
Howard (2001) argues that eGovernment services at all levels will increasingly be delivered through<br />
electronic methods, but this will not replace the traditional ways of delivering government services.<br />
Instead, electronic channels will be additional paths of delivery for eGovernment services.<br />
However, governments still need to provide citizens and businesses with public services through<br />
traditional channels, because not all services are suited for electronic delivery, additionally, not all citizens<br />
and businesses have the desire or ability to access public services via electronic channels (Morris 2002).<br />
3. The tool of delivering eGovernment services<br />
eGovernment uses information technology (IT) to provide unlimited access to a wide range of public<br />
services (Sagheb, 2010). Aggarwal (2009) claims that advances in information and communication<br />
technologies (ICT) provide opportunities for governments to offer e-services on the web. Governments<br />
37
Madi Al-Sebie<br />
deliver their services more, through different service delivery channels such as phone, web and physical<br />
offices (Bajnath et al 2010). Internet is one of the most significant tools for delivering government services<br />
electronically. Abdel-Fattah and Galal-Edeen (2008) claim, that delivering services through electronic<br />
means -such as the Internet- forms an important component of most eGovernment strategies.<br />
One-stop public services and single window systems are primary goals for many eGovernment projects<br />
(Lee et al 2009). The most important trend in eGovernment is the increasing concentration on the web<br />
portal. According to Teicher et al (2002, P.389) “A portal is a point of entry which enables citizens to have<br />
access to a full range of services without any consciousness of movement between Internet sites and<br />
where those services may be tailored to user’s profile”. As shown in table 1 below, portals provide<br />
citizens with easy and single access to government services without the need to know which agency is<br />
responsible for them. An eGovernment portal is based on the concept of “intentions-based design” so the<br />
site is organized to meet the citizens needs rather than the structure of government. So, a true<br />
eGovernment portal is much better than a website (Howard 2001). Morris (2002) argues that portals lead<br />
to saving time spent by citizens, businesses and employees, on access and searching for information<br />
and services.<br />
A portal requires comprehensive technology, project management skills and systems integration, as well<br />
as graphics design, interactive media and user interface construction abilities (Sharma and Gupta, 2002).<br />
However, it can be said that eGovernment is not about creating a web site nor new technology; it is about<br />
transforming the delivery of government services via the use of technology.<br />
Table 1: Differences between portals and websites (source: Howard, (2001))<br />
Web Site Enterprise Portal<br />
Basic home page Organized by customer groups or Internet<br />
List of agencies List key services<br />
Mainly static information Information and interactions<br />
Some transactions Transactions rich<br />
Organized by agency Organized for user needs<br />
Separate from IT Fully integrated to IT systems<br />
Weak customer support Full customer support<br />
4. The correlation between characteristics that affect the eGovernment system in<br />
light of its stages<br />
As mentioned previously, the process of implementing an eGovernment system passes through different<br />
stages, until it reaches its highest potential, whereas government information and services integrate in<br />
different departments, for different functions and at different levels of the government system, enabling<br />
customers to obtain government services and information online from a single point of access.<br />
When issues related to the stages of eGovernment systems are discussed, some points should be taken<br />
into account (Al-Sebie et al 2005):<br />
A specific approach to the stages of eGovernment systems has not been agreed on between the<br />
researchers, nor has there been an agreement on the number of stages required for an eGovernment<br />
system; the stages required for an eGovernment system have been classified into either three, four,<br />
five or six stages.<br />
Most studies have classified eGovernment into four stages, although, some studies have classified<br />
eGovernment into three, five and six stages.<br />
Different models of the eGovernment stages show that there is almost a consensus that the first<br />
stage of an eGovernment system aims to create a static website that contains information and<br />
services of eGovernment without interaction. However, this first stage has been given different<br />
names such as ‘information’, ‘presence’ and ‘emerging’.<br />
There is a significant total agreement that the main purpose of the final stage is, to integrate<br />
government information and services in different departments, functions and levels of the government<br />
system, to enable citizens to obtain government services and information online, from a single point<br />
of access.<br />
38
Madi Al-Sebie<br />
The final stage of eGovernment is also given different names; such as ‘transformation’ and<br />
‘integration’. Finally, the different models of the stages of eGovernment show that there remains an<br />
argument between the researchers of eGovernment systems on the perception, and number of<br />
stages which arise between the first and final stages.<br />
As shown in table 2 below, some scholars use the stages of eGovernment as criteria to make correlation<br />
between different characteristics that affect eGovernment.<br />
Table 2: Correlation between different characteristics of eGovernment in the light of the stages of<br />
eGovernment<br />
Correlation between different characteristics of eGovernment Reference<br />
Positive correlation between value of eGovernment to citizen / business and complexity. (See Backus (2001)<br />
figure: 3)<br />
Positive correlation between sophistication of eGovernment and benefits. (See figure: 4) Howard (2001)<br />
Positive correlation between technology and organizational complexity and integration. (See<br />
figure: 5)<br />
Positive correlation between web based application functionality and enterprise integration.<br />
(See figure: 6)<br />
Layne and Lee<br />
(2001)<br />
Eyob (2004)<br />
In light of the above table, Backus (2001) claims that eGovernment can be categorized into four stages:<br />
information, interaction, transaction and transformation. These stages can be represented by correlation<br />
between the value to citizens/businesses and complexity, as shown in figure 3 below:<br />
Figure 3: Relationship between value to Citizens/Businesses and Increasing Complexity source (Backus,<br />
2001)<br />
Howard (2001) notes that there are at least three stages of eGovernment - publishing, interaction and the<br />
transaction stage. These stages can be represented by the correlation between eGovernment<br />
sophistication and benefits, as shown in figure 4:<br />
Layne and Lee (2001) - as shown in figure 5 below – divided the eGovernment system into four stages,<br />
namely: cataloguing, transaction, and vertical and horizontal integration. They note that there is<br />
correlation between technology and organisational complexity of the stages and various levels of<br />
integration.<br />
Additionally, Eyob (2004) notes that there are at least four stages of eGovernment, namely: websites for<br />
information dissemination, web based two-way transactions, portals for government services, and<br />
39
Madi Al-Sebie<br />
enterprise wide integration of government services. He claims that these stages can be represented by<br />
correlation between web based application functionality and enterprise integration, as shown in figure 6<br />
Figure 4: The relationship between eGovernment sophistication and benefits source (Howard, 2001)<br />
Figure 5: The relationship between technology and the organizational complexity of the stages of<br />
eGovernment and various levels of integration. source (Layne and Lee, 2001)<br />
As a result of the above discussion, and in light of the stages of the eGovernment system, it can be noted<br />
that, the closer the stages of eGovernment system get to its highest potential:<br />
The more the value to citizen/ business and complexity of eGovernment increase.<br />
The more eGovernment sophistication and benefits for customers increase.<br />
The more technology and organisational complexity of the stages and various levels of integration<br />
increase.<br />
40
Madi Al-Sebie<br />
Figure 6: Correlation between web based application functionality and enterprise integration Source<br />
(Eyob, 2004)<br />
The more web based application functionality and enterprise integration increase.<br />
However, governments seeking to reach the highest level of delivering services to customers, should<br />
take into account that the closer the stages of eGovernment system get to its highest potential, the more<br />
the value, sophisticated, benefits, complexity of technology, web based application functionality and<br />
enterprise integration increase, as shown in figure (7) below:<br />
Figure 7: The stages of eGovernment as criteria to make correlation between different characteristics<br />
that affect eGovernment<br />
5. Conclusion<br />
It has been shown in this paper that although the benefits of providing government services to customers<br />
electronically are essential, governments still need to provide citizens and businesses with public<br />
services through traditional channels. There are several reasons for that, such as, not all services are<br />
suited for electronic delivery, furthermore, not all customers have the desire or the ability to access public<br />
services via electronic channels. According to the discussion of the tool of delivering eGovernment<br />
services, it has been concluded that the eGovernment is not about creating a web site nor new<br />
technology; it is about transforming the delivery of government services via the use of technology. The<br />
stages of eGovernment can be considered as a central point and significant issue of the eGovernment<br />
system. Due to the lack of studies that focus on the use of the stages of eGovernment as criteria to make<br />
41
Madi Al-Sebie<br />
correlation between different characteristics that affect eGovernment, this paper has focused on filling in<br />
this information gap. Consequently, the closer the stages of eGovernment system get to its highest<br />
potential enabling customers to obtain government services and information online from a single point of<br />
access, the more the value, sophistication, benefits, complexity of technology, web based application<br />
functionality and enterprise integration increase. However, comprehensive literature review shows that<br />
correlation between different characteristics that affect eGovernment in light of stages of the<br />
eGovernment system has been discussed from theoretical perspective. Empirical studies should be taken<br />
into account in this area.<br />
References<br />
Abdel-Fattah, M., and Galal-Edeen, G. (2008). ‘Towards Flexible Evaluation for eGovernment Websites Quality:, A<br />
Multi-Perspective Evaluation Framework, Proceedings of 8th <strong>European</strong> <strong>Conference</strong> on EGovernment, Ecole<br />
Polytechnique, Lausanne,, Switzerland, 2008, pp.1-12.<br />
Abie, H., Foyn, B., Bing, J., Blobel, B., Pharow, P., Delgado, J., Krnouskos, S., Pitkanen, O. and Tzovaras, D. (2004)<br />
‘The need for a digital rights management framework for the next generation of eGovernment services’,<br />
Electronic Government, Vol. 1, No. 1, pp.8– 28.<br />
Affisco, F., and Soliman, K. (2006). ‘EGovernment: a strategic operations management framework for service<br />
delivery’ ,Business Process Management Journal, Vol. 12, No. 1.<br />
Aggarwal, A.K (2009). 'A training model for e-readiness in e-governance' Electronic Government, an International<br />
Journal 2009 - Vol. 6, No.2 pp. 111 - 128.<br />
Al-kaabi, R., and Hattab, E. (2009). ‘eGovernment Success Factors: A Survey, Proceedings of 9th <strong>European</strong><br />
<strong>Conference</strong> on EGovernment, University of Westminster, London, 2009, pp.39-44.<br />
Al-sebie,M., and Irani, Z. ‘Technical and organisational challenges facing transactional eGovernment systems: an<br />
empirical Study‘ Electronic Government, an International Journal 2005 - Vol. 2, No.3 pp. 247 - 276<br />
Al-sebie,M., Irani, Z., and Eldabi,T. ‘Issues relating to the transaction stage of the eGovernment system‘ Electronic<br />
Government, an International Journal 2005 - Vol. 2, No.4 pp. 446 - 459<br />
Atallab ,S. (2001). ‘EGovernment , Considerations For Arab States’, online, http://www.surf-as.org/Papers/e-govenglish.PDF.<br />
Backus, M. (2001). ‘E-governance in Developing Countries’, online,<br />
http://www.ftpiicd.org/files/research/briefs/brief1.pdf<br />
Bajnath, S., Janssen, M., Bharosa, N., Both, C., Klievink, B., Overbeek, S., and Veenstra, A. (2010). ‘Driving Service<br />
Delivery Principles Using a Role Playing Game’, Proceedings of 10th <strong>European</strong> <strong>Conference</strong> on EGovernment,<br />
University of Limerick, Ireland, 2003, pp.36-43.<br />
Chandler,S and Emanuels, S. 2002. ‘Transformation Not Automation’, Proceedings of 2 nd <strong>European</strong> <strong>Conference</strong> on<br />
EGovernment, St Catherine’s College Oxford 2002, United Kingdom, pp.91-102.<br />
Datar, M., Kothari, D., and Kumta, G. (2010). ‘Cloud Computing and its Impact on eGovernance Architecture,<br />
Proceedings of 10th <strong>European</strong> <strong>Conference</strong> on EGovernment, University of Limerick, Ireland, 2010, pp.114-121.<br />
Eyob, E. (2004) ‘EGovernment: breaking the frontiers of inefficiencies in the public sector’, Electronic Government,<br />
Vol. 1, No. 1, pp.107 – 114.<br />
Howard, M. (2001). ‘eGovernment Across the Globe: How Will “e” Change Government’, Government Finance<br />
Review, 17(Part 4): 6-9.<br />
Larson ,A. (2001). ‘EGovernment: Promoting Efficiency and Openness’, online,<br />
http://www.state.gov/e/rls/rm/2001/4531.htm.<br />
Layne, K and Lee, J. (2001). ‘Developing fully functional EGovernment: A four-stage model’, Government Information<br />
Quarterly 18, pp.122 - 136.<br />
Lee, T., Hon, C., and Cheung, D. (2009). ‘XML Schema Design and Management for eGovernment Data<br />
Interoperability, Proceedings of 9th <strong>European</strong> <strong>Conference</strong> on EGovernment, University of Westminster, London,<br />
2009, pp.436-444.<br />
Mextaxiotis, K. and Parras, J. (2004) ‘EGovernment: new concept, big challenge, success stories’, Electronic<br />
Government, Vol. 1, No. 2, pp.141 – 151.<br />
Monga, A. (2008). EGovernment in India: Opportunities and challenges, JOAAG, Vol. 3. No. 2<br />
Morris (2002). ‘Electronic Service Delivery – More Than Just Technology’, Proceedings of 2 nd <strong>European</strong> <strong>Conference</strong><br />
on EGovernment, St Catherine’s College Oxford 2002, United Kingdom, pp. 299-311.<br />
Sagheb, M (2010). 'A model of successful factors towards eGovernment implementation' Electronic Government, an<br />
International Journal 2010 - Vol. 7, No.1 pp. 60 - 74.<br />
Sharma, S.K and Gupta, J.N.D. (2002). ‘Transforming To EGovernment: A Framework’, Proceedings of 2 nd <strong>European</strong><br />
<strong>Conference</strong> on EGovernment, St Catherine’s College Oxford 2002, United Kingdom, pp. 383-390.<br />
Sanati, F and Lu, J (2010). 'Life-event modelling framework for eGovernment integration' Electronic Government, an<br />
International Journal 2010 - Vol. 7, No.2 pp. 183 - 202.<br />
Teicher, J. Hughes, O. and Dow, N. (2002). ‘EGovernment: a new route to public sector quality’, Managing Service<br />
Quality, Vol. 12, No. 6, pp. 384 -393.<br />
Warkentin, M; David, G; Pavlou, P A and Rose, G M. (2002) ‘encouraging Citizen Adoption eGovernment by Building<br />
Trust’, Electronic Markets, Vol. 12, No 3, pp. 157-162.<br />
Yu, C and Janssen, M (2010). ' The need for strategic management and business model design in government and<br />
public administration' Electronic Government, an International Journal 2010 - Vol. 7, No.4 pp. 299 - 315.<br />
42
Social Media in <strong>European</strong> Governmental Communication<br />
Isabel Anger and Christian Kittl<br />
evolaris next level GmbH, Graz, Austria<br />
isabel.anger@evolaris.net<br />
christian.kittl@evolaris.net<br />
Abstract: Since 2005 the phenomenon called “Web 2.0” or “Social Media” has been growing rapidly, with services<br />
gaining more and more users every month. Social Media platforms provide room for users to express and present<br />
themselves, create and share content and communicate with each other. As using Social Media has become an<br />
everyday task for a part of the world’s population, organizations both commercial and non-profit are beginning to take<br />
part in the online discussions. They leverage Social Media to reach their stakeholders directly. Many are very<br />
successful at that, learning from their stakeholders, building trust and securing their market position. While the<br />
success of economic organizations in Social Media communication increases, most <strong>European</strong> governments seem to<br />
ignore this new form of communication. Politicians campaigning for elections try to leverage the possibilities of Social<br />
Media which include word-of-mouth marketing, bi-directional communication, a higher level of trust among users,<br />
cost-efficient use of various platforms, and viral distribution of content. After the elections, however, many politicians’<br />
Social Media accounts stay silent. On the other hand, political protests and initiatives are commenced and spread<br />
very successfully with the help of Social Media tools. They form a strong counterpart to governmental content on<br />
Social Media. In order to aid governments in using Social Media as a new communication channel, this paper<br />
provides a conceptual process model for a communication strategy. The objectives of this strategy are building trust,<br />
encouraging dialogue, reaching the online-savvy segment of citizens, and encouraging citizen participation. After a<br />
basic definition of Social Media, the use of Social Media platforms and the implementation of Social Media<br />
functionalities by <strong>European</strong> governments will be analysed to give an overview on the current political Social Media<br />
communication state of the art in Europe. The analysis is based on a conceptional process model which will also be<br />
the basis for recommendations for the optimization of Social Media communication on a governmental level provided<br />
in the final section of this paper.<br />
Keywords: social media, governmental communication, Europe, youth, citizen participation<br />
1. Introduction<br />
Currently, about 500 million people use Facebook. This amounts to 25 % of the total number of people<br />
using the internet. Facebook as the largest and most popular Social Media platform is the best example<br />
for the success of Social Media. Many institutions use Social Media to reach and communicate their<br />
target groups on a more personal level than classic mass media such as television or newspapers ever<br />
could. In the political environment, however, those using Social Media seem to be rather individual<br />
politicians than government institutions, especially in times of elections and in political competition. This<br />
observation made in the authors’ home country led to the question whether other <strong>European</strong> governments<br />
perform better and use Social Media more consequently and, if so, what content they communicate,<br />
which channels they use and how these Social Media profiles are promoted.<br />
1.1 Definitions<br />
The term Social Media is used synonymously to the term Web 2.0. It can be visualized as “a set of<br />
principles and practices that tie together a veritable solar system of sites that demonstrate some or all of<br />
those principles“ (O'Reilly 2005). The main principles are the new view of the web as a platform where<br />
the user controls his or her own data. Further core factors of Web 2.0 or Social Media include<br />
architecture of participation, remixable data sources and data transformations, and harnessing collective<br />
intelligence.<br />
Another more recent definition focuses on the community aspect of Social Media: The web can be seen<br />
as a “city above the city” with Social Media as locations where persons meet to interact socially on public<br />
or semi-public profiles (Boyd and Ellison 2007), metaphorically described as bars, restaurants or parties<br />
where people talk, share multi-media content or get acquainted with other people (Scott 2010).<br />
Behavioural norms known from face-to-face social interaction are transferred to the Social Web which<br />
builds on the basic instincts of human beings to communicate with other humans and to receive a<br />
favourable social status (Thiedeke 2004).<br />
1.2 Methodology<br />
As Social Media is a rather new field in the scientific landscape, most insights today have been gained<br />
from the analysis of case studies. American authors such as Brian Solis, Deirdre Breakenridge and David<br />
43
Isabel Anger and Christian Kittl<br />
Meerman Scott, who are very active citizens of the Social Media environment themselves, have acquired<br />
knowledge from practical both best-case and worst-case examples. The conceptional process model<br />
presented in this paper is based on the analysis of their findings in the context of recent sociological and<br />
technological developments of Social Media. The model contains all steps and factors that need to be<br />
considered when planning to set up a communication strategy for Social Media.<br />
It is also the basis for the analysis of the EU governments’ Social Media communication. The analysis<br />
covered official ministries, departments, agencies, cabinets, offices, and public service platforms. Social<br />
Media profiles of individual politicians or parties who follow personal interests with their Social Media<br />
communication were not included in this evaluation. The analysis was carried out in November 2010; the<br />
data in section 2 reflects the status of November 23 rd , 2010.<br />
The first step in the evaluation was to check websites of governmental institutions for references to Social<br />
Media profiles. The Social Media platforms chosen for a closer investigation are the social network<br />
Facebook, the micro-blogging service Twitter and the video platform YouTube as they are the most<br />
widely used Social Media services. These platforms were also scanned for profiles of governmental<br />
institutions by using each platform’s search field and researching a country’s name in English as well as<br />
in the respective national language.<br />
The second step was to investigate the use of Facebook, Twitter and YouTube, determining target group,<br />
content and performance of the identified governmental Social Media profiles. On Facebook, the<br />
description of the fan page, the number of people who like the page and the content of the Facebook wall<br />
were analysed; on Twitter, the number of followers who subscribe to the status updates and the content<br />
of the latter were investigated; and on YouTube, the number of subscribers and uploaded videos as well<br />
as the video contents were examined.<br />
2. Analysis of Social Media in <strong>European</strong> Government communication<br />
The following countries’ government institutions did not have any Social Media profiles linked on their<br />
website and could not be found on the analysed platforms in the time span considered: Belgium,<br />
Bulgaria, Cyprus, Denmark, Estonia, Finland, Germany, Greece, Hungary, Ireland, Italy, Luxembourg,<br />
Malta, Romania, Slovakia, Slovenia, Spain, and Sweden. They are therefore not included in the detailed<br />
analysis.<br />
2.1 Austria<br />
Two of Austria's federal institutions are present on Social Media:<br />
The Austrian Federal Criminal Agency has a Facebook page (http://www.facebook.com/Bundeskriminalamt)<br />
that provides information on current topics concerning safety and targets all Austrian citizens. 18,756<br />
people like this page and each Facebook update is commented and discussed lively. The Facebook page<br />
links to the Agency's website, a link to the Facebook profile is prominently placed on the Agency's front<br />
page.<br />
The Federal Ministry for Education, Art and Culture is also present on Facebook<br />
(http://www.facebook.com/pages/Bundesministerium-fur-Unterricht-Kunst-und-Kultur-bmukk/144730522227336)<br />
where it posts mainly news topics but also statements from the minister. The site is targeted at Austrian<br />
citizens interested in education, art and culture. 367 people like this page. The individual Facebook<br />
updates are almost never commented by the page's fans. The Facebook page provides a link to the<br />
Ministry's website, but there is no link from the Ministry's website to Facebook.<br />
2.2 Czech Republic<br />
The Czech government presents itself on Facebook and Twitter.<br />
The Facebook page (http://www.facebook.com/uradvlady) of the Office of the Government of the Czech<br />
Republic provides links to news articles as well as pictures with insights on the government's everyday<br />
work. The site targets all Czech citizens and is liked by 2,008 people. Almost every status update is<br />
commented and discussed. The Facebook page provides links to the government's website and to its<br />
Twitter profile. On the Czech government's website, a link to the government's Facebook page is also<br />
provided.<br />
44
Isabel Anger and Christian Kittl<br />
The Czech government's Twitter profile (http://twitter.com/#!/strakovka) provides information on current<br />
activities and news from the government. The profile is followed by 1,852 other Twitter users. The Twitter<br />
profile links to the government's website and a link from the website to the Twitter profile is also provided.<br />
2.3 France<br />
The French government provides Facebook pages as well as several Twitter accounts to inform and<br />
communicate with the French citizens.<br />
The Presidency of the French Republic uses Facebook and Twitter to communicate with French citizens.<br />
The Facebook page (http://www.facebook.com/elysee.fr) provides news and multimedia and is liked by<br />
7,234 people. All status updates are moderately commented and discussed by fans of the page. A link to<br />
the Presidency website is provided, a link from the website to the Facebook page is also available. On<br />
Twitter (http://twitter.com/#!/Elysee), the same information as on the Facebook page can be found. The<br />
Twitter account is followed by 9,007 other Twitter users and provides a link to the website. A link from the<br />
Presidency website to the Twitter profile is also provided.<br />
The French Ministry of Foreign Affairs presents itself on a Facebook page, a YouTube account and a<br />
Twitter account where news and information on the activities of the Ministry are published. The<br />
information is targeted mainly at French citizens. The Facebook page<br />
(http://www.facebook.com/france.diplomatie) is liked by 4,071 people who comment and discuss the<br />
posted status updates. The Twitter account (http://twitter.com/#!/francediplo) is followed by 55,152 other<br />
Twitter users. The YouTube account (http://www.youtube.com/francediplotv) is subscribed by 193 people<br />
and provides 177 videos with interviews and coverage of current foreign affairs. All Social Media profiles<br />
link to the website of the Ministry and the website provides links to all profiles as well.<br />
The official Facebook page (http://www.facebook.com/France) of France.fr, a service platform for visitors<br />
and residents of France, has only been updated once. Nonetheless, 22,988 people like the page and the<br />
only status update is commented by many fans. A link to the France.fr website is provided; France.fr also<br />
links to its Facebook profile.<br />
Service-Public.fr is the official website of the French Administration and provides a Twitter profile<br />
(http://twitter.com/#!/servicepublicfr) where news and helpful information for French citizens are posted.<br />
382 other Twitter users follow Service-public.fr. A link from Twitter to the website is provided, but there is<br />
no link from the website to the Twitter profile.<br />
2.4 Latvia<br />
The Latvian government and ministries provide several Twitter and YouTube accounts. The information<br />
on all Social Media profiles is targeted at all Latvian citizens.<br />
The Latvian Presidency communicates via Twitter and YouTube. The Twitter account<br />
(http://twitter.com/#!/Rigas_pils) is followed by 4,173 people and provides news from the Presidency. The<br />
YouTube account (http://www.youtube.com/user/presidentlv) is subscribed by 160 people and provides<br />
243 videos, mostly interviews with and statements from the Latvian president. Both accounts link to the<br />
Presidency's website and are also linked on the website.<br />
The Latvian Parliament also uses Twitter for communication with the Latvian citizens. The Twitter<br />
account (http://twitter.com/#!/Jekaba11) is followed by 1,970 people and publishes news from the<br />
Parliament. A link from the Twitter profile to the website is provided, as well as a link from the website to<br />
the Twitter account.<br />
The Latvian Cabinet of Ministers provides a Twitter and YouTube account with news and statements from<br />
the Prime Minister. The Twitter account (http://twitter.com/#!/Brivibas36) is followed by 1,693 people. The<br />
YouTube account (http://www.youtube.com/user/valstskanceleja) provides 13 videos and is subscribed<br />
by 38 people. Both accounts are linked on the Cabinet’s website, the Twitter account links back to the<br />
website. The videos published on the YouTube account also contain links to the website.<br />
The Latvian Ministry of Defence uses Twitter for communication. The Twitter account<br />
(http://twitter.com/#!/aizsardzibasmin) provides news from the Ministry and often references the Twitter<br />
45
Isabel Anger and Christian Kittl<br />
updates of the Latvian military Twitter account. The account is followed by 164 other Twitter users. It links<br />
to the Ministry’s website; a link from the website to the Twitter account is also provided.<br />
The Latvian Ministry of Finance also uses Twitter. The Twitter account (http://twitter.com/#!/finmin) is<br />
followed by 806 people. It provides financial news and links to the Ministry's website, where a link to the<br />
Twitter profile is also prominently placed on the front page.<br />
The Latvian Ministry of Foreign Affairs communicates via Twitter and YouTube and provides information<br />
on news concerning foreign affairs as well as statements from the Ministry. The Twitter account<br />
(http://twitter.com/#!/Arlietas) is followed by 287 people. The YouTube account<br />
(http://www.youtube.com/user/LatvianMFA) is subscribed by 9 people and provides 13 videos. Both<br />
accounts are linked on the Ministry's website but only the Twitter account links back to the website.<br />
The Ministry of Health provides a Twitter account. This account (http://twitter.com/#!/veselibasmin) is<br />
followed by 46 people and provides information on events and news about health issues in Latvia. The<br />
account links to the Ministry's website; a link from the website to the Twitter profile is also provided.<br />
The Latvian Ministry of Regional Development and Local Government also communicates via Twitter.<br />
The Twitter account (http://twitter.com/#!/raplms) provides mainly news and is followed by 461 people. It<br />
links to the Ministry's website; a link from the Website to the Twitter profile is also provided.<br />
The Latvian Ministry of Welfare communicates via Twitter and YouTube, providing information on welfare<br />
topics and news from the Ministry. The Twitter account (http://twitter.com/#!/Lab_min) is followed by 219<br />
people. The YouTube account (http://www.youtube.com/user/LabklajibasMinistrij) is subscribed by 3<br />
people and provides 26 videos with footage from public discussions and coverage of welfare issues. Both<br />
accounts are linked on the Ministry's website but only the Twitter account links back to the website.<br />
2.5 Lithuania<br />
The Lithuanian government itself provides a Facebook page, a Twitter account and a YouTube account<br />
which are all targeted at the Lithuanian people.<br />
The Facebook page (http://www.facebook.com/pages/Vyriausybe/96251623407) is liked by 2,235 people<br />
and provides information, news and media. Most status updates are commented by the fans of the page.<br />
The Twitter profile (http://twitter.com/#!/vyriausybe) is followed by 511 people and provides mostly links to<br />
news on the government's website. The YouTube account (http://www.youtube.com/LRvyriausybe) gives<br />
insights on government work and statements of politicians in 49 videos. All Social Media accounts are<br />
linked on the government's website and also link back to the website.<br />
Three other Lithuanian ministries are present on Social Media platforms: The Ministry of Transport and<br />
Communication provides a Facebook page and a YouTube account. The Facebook page<br />
(http://www.facebook.com/susisiekimo.ministerija) is liked by 1,579 people, the status updates are<br />
commented regularly. The YouTube account (http://www.youtube.com/user/LRsusisiekimas) is<br />
subscribed by 16 people and provides 68 videos with short documentaries and TV advertisements. Both<br />
accounts are linked on the Ministry's website and also link back.<br />
The Ministry of Culture communicates via Facebook. On its Facebook page which is liked by 1,235<br />
people (http://www.facebook.com/pages/Lietuvos-Respublikos-Kulturos-Ministerija/200936741930), the<br />
Ministry publishes information, news and media. The status updates are commented rarely. A link to the<br />
Ministry’s website is available, a link from the website to the Facebook page is also provided.<br />
The Ministry of Social Security and Labour is also present on Facebook. The Facebook page<br />
(http://www.facebook.com/socmin) provides mainly news and is liked by 985 people. The status updates<br />
are almost never commented. The Facebook page links to the Ministry's website; a link from the website<br />
to the Facebook page is also provided.<br />
2.6 Netherlands<br />
The Netherlands' government is communicating via Twitter and YouTube with its citizens. The Twitter<br />
account (http://twitter.com/#!/Rijksoverheid) provides information and news and is followed by 1,375<br />
people. The YouTube account (http://www.youtube.com/rijksoverheid) is subscribed by 335 people and<br />
46
Isabel Anger and Christian Kittl<br />
provides 388 videos, mainly news coverage, interviews and statements from Dutch politicians, especially<br />
from the Prime Minister. Both accounts are linked on the government's website. The Twitter and YouTube<br />
account both link to the government's website, but only the YouTube account is linked on the website.<br />
Additionally, the Ministry of Economic Affairs, Agriculture and Innovation is present on Facebook. The<br />
Facebook page (http://www.facebook.com/MinELenI) is liked by 161 people and provides news and<br />
media. There are only a few comments on published status updates. The Facebook page linked from the<br />
Ministry's section on the government’s website and also links back to the website.<br />
2.7 Poland<br />
The Polish government provides a promotional portal which also includes a Facebook page. Apart from<br />
that, the Polish Ministry for Foreign Affairs is present on Twitter and YouTube. The Twitter account<br />
(http://twitter.com/#!/PolandMFA) is followed by 640 people and targets not only Polish citizens but also<br />
foreigners as some updates are in English. The YouTube account<br />
(http://www.youtube.com/user/PolandMFA) is subscribed by 95 people and provides 62 videos with<br />
politicians' statements, short documentaries and news. Both Social Media accounts are linked on the<br />
ministry's website and also link back to the website.<br />
2.8 Portugal<br />
The government of Portugal communicates via Twitter with its citizens. The Twitter account<br />
(http://twitter.com/#!/govpt) is followed by 6,856 people. It provides mainly information about upcoming<br />
events and news. A link to the government's website is provided; the Twitter account is also linked on the<br />
website.<br />
2.9 United Kingdom<br />
The government of the United Kingdom provides a public service platform called Directgov that also uses<br />
a Facebook page, a Twitter account and a YouTube account to communicate with the people in England<br />
and Wales. The Directgov Facebook page (http://www.facebook.com/Directgov) is liked by 692 people<br />
and delivers information and tips for everyday life. It also encourages users to participate. The fans of the<br />
page comment Directgov's status updates regularly. The Twitter account (http://twitter.com/#!/directgov)<br />
is followed by 10,628 people and provides similar information as the Facebook account. The YouTube<br />
account (http://www.youtube.com/directgovuk) has 496 subscribers and provides 96 videos with various<br />
service topics. All three Social Media profiles are linked on the Directgov website; a link from each<br />
account to the website is also provided.<br />
Apart from the public service platform, several British ministries use Social Media accounts for<br />
communication.<br />
The Prime Minister's Office is present on Facebook, Twitter and YouTube where it provides general<br />
information and news about the activities of the government and statements from the Prime Minister. On<br />
Facebook, an application (http://apps.facebook.com/numberten/) is provided. This application is currently<br />
used by 509 people. As the application did not work at the time of the analysis, it could not be tested by<br />
the author. The Twitter account (http://twitter.com/#!/Number10gov) is followed by 1,763,228 people. The<br />
YouTube account (http://www.youtube.com/user/number10gov) is subscribed by 1,021 people and<br />
provides 19 videos containing statements from the Prime Minister and footage from press conferences.<br />
All Social Media platforms are linked from the website; links from the profiles to the website are also<br />
provided.<br />
The United Kingdom's Economics and Finance Ministry (Her Majesty's Treasury) presents itself on<br />
Twitter and YouTube. The Twitter account (http://twitter.com/#!/hmtreasury) is followed by 16,904 people<br />
and publishes mainly links to press notices as well as news about financial issues. The YouTube account<br />
(http://www.youtube.com/hmtreasuryuk) is subscribed by 366 people and provides 4 videos with<br />
statements from politicians and ministers. Both Social Media accounts link to the Ministry's website; the<br />
Ministry's website, however, links only to the Twitter account.<br />
The Department of Energy and Climate Change communicates British environment issues, news and<br />
statements via Twitter and YouTube. The Twitter account (http://twitter.com/#!/deccgovuk) is followed by<br />
7,522 people. The YouTube channel (http://www.youtube.com/deccgovuk) is subscribed by 121 other<br />
47
Isabel Anger and Christian Kittl<br />
YouTube users and provides 22 videos with statements from politicians and short documentaries focused<br />
on environment issues. Both account are linked on the Department's website and also link back to the<br />
website.<br />
The Department for Environment, Food and Rural Affairs is present on Twitter and YouTube. The<br />
communicated topics include environment news, wildlife, food, farming and pets. The Twitter account<br />
(http://twitter.com/#!/defragovuk) is followed by 4,580 people. The YouTube account<br />
(http://www.youtube.com/user/defrauk) is subscribed by 235 people and provides 69 videos with<br />
politicians' statements and short documentaries of relevant events. Both accounts are linked on the<br />
Department's website and also link back to the website.<br />
The Ministry of Justice is present on Twitter and YouTube where it communicates information and service<br />
tips for different justice issues. The Twitter account (http://twitter.com/#!/MoJGovUK) is followed by 5,039<br />
people, the YouTube account (http://www.youtube.com/user/MinistryofJusticeUK) is subscribed by 150<br />
people. On YouTube, the Ministry provides 91 videos in 11 playlists that offer advice in legal issues<br />
related topics as well as statement from politicians and justice. Both accounts are linked on the Ministry's<br />
website and also link back to the website.<br />
The UK Parliament uses Facebook, Twitter and YouTube for communicating government issues. The<br />
Facebook page (http://www.facebook.com/pages/UK-Parliament/16553417732) is liked by 5,618 people<br />
and provides mainly videos and photographs of events. The contents on the Facebook page are often<br />
commented and lively discussed. The Twitter account (http://twitter.com/#!/UKParliament) is followed by<br />
30,217 people. The YouTube account (http://www.youtube.com/UKParliament) is subscribed by 1,677<br />
people and provides 97 videos. All accounts are linked on the Parliament's website and also link back to<br />
the website.<br />
The Home Office is the government department for immigration and passports, drugs policy, crime,<br />
counter-terrorism and police. It is present on Twitter (http://twitter.com/#!/ukhomeoffice) where it is<br />
followed by 6,064 people and provides news and information about immigration and policing. The<br />
account is linked on the Office's website and also links back to the website.<br />
The British Foreign and Commonwealth Office uses Facebook, Twitter and YouTube for communication.<br />
The Facebook account is available in three different languages (English, Arabic and Urdu) and provides<br />
travel advices (English page: http://www.facebook.com/fcotraveladvice). 5,131 people like the English<br />
page, but there are only few comments. The Office offers a wide range of Twitter accounts; the main<br />
account (http://twitter.com/#!/foreignoffice) is followed by 24,265 people and provides information and<br />
news from the Office. The YouTube account (http://www.youtube.com/ukforeignoffice) is subscribed by<br />
1,445 people and provides 545 videos with interviews and short documentaries of foreign issues in<br />
various languages. All accounts are linked on the Office’s website and also link back to the website.<br />
The Cabinet Office is present on Twitter. The Twitter account (http://twitter.com/#!/cabinetofficeuk) is<br />
followed by 5,788 people and aggregates information from the governing offices and departments. The<br />
account is linked on the Cabinet Office's website and also links back.<br />
2.10 Results<br />
The analysis showed that 9 of the 27 EU member states use some form of Social Media for<br />
communicating with their citizens. 6 countries use Facebook, 8 countries use Twitter and 6 countries use<br />
YouTube. As shown in Table 1, 15 Facebook profiles, 27 Twitter accounts and 16 YouTube channels are<br />
used, making Twitter the most popular of all Social Media platforms.<br />
Almost every Social Media account is prominently linked on the front page of the government, a ministry<br />
or department in order to guide visitors to these conversational platforms. The accounts that are not<br />
referenced on a website tend to be less successful as they are not easily found by citizens surfing the<br />
website. Social Media not only facilitates communication from government to citizen but also from citizen<br />
to citizen as Facebook profiles show. Facebook is also used for publishing multimedia content such as<br />
photos or videos. Twitter is used mostly as a dynamic and fast news stream and is not only addressed to<br />
citizens but also to journalists who seek first-hand information. YouTube is used mainly for publishing<br />
statements from leading politicians but also serves as a platform for service and information videos.<br />
48
Isabel Anger and Christian Kittl<br />
Table 1: Number and types of Social Media accounts in EU governments<br />
Facebook Twitter YouTube Sum<br />
Austria 2 - - 2<br />
Czech Republic 1 1 - 2<br />
France 3 3 1 7<br />
Latvia - 9 4 13<br />
Lithuania 4 1 1 6<br />
Netherlands 1 1 1 3<br />
Poland - 1 1 2<br />
Portugal - 1 - 1<br />
United Kingdom 4 10 8 22<br />
Sum 15 27 16 58<br />
The most successful countries on Social Media are the United Kingdom, Latvia and France: They have<br />
the most fans, followers and subscribers, they communicate continuously and in form of dialogues and<br />
post the most content.<br />
3. Recommendations and conceptional process model<br />
The recommendations are aggregated in the conceptional process model that is explained in the<br />
following subsections. This model is made up of six steps which structure communication preparation and<br />
implementation in Social Media. Figure 1 shows a schematic visualisation of the conceptional process<br />
model.<br />
Figure 1: Schematic visualisation of the conceptional process model<br />
3.1 Analysis<br />
The first step to Social Media communication is a thorough analysis of the internal and external<br />
communicative starting point. Two analysing models are recommended:<br />
1. Conversations in Social Media according to the Lasswell model (Lasswell 1948) to evaluate platforms,<br />
topics, sentiment, participants and relevant influencers. The Lasswell model describes the key elements<br />
49
Isabel Anger and Christian Kittl<br />
of communication: Who says what to whom in what channel to what effect. This is a linear approach to<br />
communication, channelling information and thus bringing it from the sender to the recipient. In order to fit<br />
the netted structure of the web, (Solis and Breakenridge 2009) enhanced the original Lasswell model:<br />
Who says what to whom in what channel to what effect then who hears what, who shares what with what<br />
intent to what effect.<br />
2. ACCESS Model<br />
Audience: evaluation of key target groups or segments that are to be reach via Social Media.<br />
Concept: basic ideas on means of communication with the target groups including messages and<br />
channels.<br />
Competition: overview of similar use cases, such as governments already communicating via Social<br />
Media<br />
Execution: overview of all issues around the campaign such as legal concerns, resources available<br />
for the campaign etc.<br />
Social Media: selection of platforms suited for the desired campaign<br />
Sales Viability: business model<br />
3.2 Objectives<br />
The objective must not be to gain a certain amount of followers or fans on Social Media platforms –<br />
although these figures are suitable for controlling the success of Social Media activities – but rather be to<br />
inform citizens, build trust and encourage participation.<br />
3.3 Activities, time, budget<br />
These three elements are strongly interconnected and must therefore be viewed as one step in the<br />
concept. The element “Activities” comprises the selection of Social Media platforms and associated tasks<br />
as well as setting up a plan of topics and a crisis communication plan. The element “Time” refers to a<br />
time plan in which activity, objective and charge is listed according to the respective time of<br />
implementation and duration. A 12-month plan is suggested for the initial implementation of Social Media<br />
communication (Brake and Safko 2009). The element “Budget” encompasses all costs for the<br />
communication strategy, the greatest part of which are generally made up of personnel expenses.<br />
3.4 Implementation<br />
The implementation process is executed according to the concept devised in the previous steps. It is<br />
suggested that one coordinator for all Social Media measures is appointed to oversee the implementation<br />
and constant communication processes. Throughout the implementation, changes in platform<br />
functionality as well as the evolution of novel platforms or services must be supervised in order to<br />
determine whether new services would fit the communication needs of the government and if their use<br />
would be of value to the target groups.<br />
3.5 Performance measurement<br />
At the end of the communications campaign or at milestones of the communication process a set of<br />
operating figures helps to determine the performance of the strategy:<br />
Raw author contribution<br />
Followers, readers, fans, memberships on different Social Media platforms<br />
Interaction frequency<br />
Mentions, links, recommendations from other users<br />
Participation and user-generated content<br />
Sentiment (positive, negative or neutral) of comments<br />
The term raw author contribution refers to the amount of content created by the communicating party<br />
itself. The content is the substance needed to trigger discussion and encourage dialogue. The publication<br />
of a large amount of quality multi-media content demonstrates the government’s will to communicate<br />
transparently and authentically.<br />
50
3.6 Accompanying process: Monitoring<br />
Isabel Anger and Christian Kittl<br />
Monitoring is the process of observes the Social Media landscape throughout the entire campaign. Both<br />
topics and performance can be monitored. Identifying relevant conversations and trending topics enables<br />
the government to interact at the right places and at the right time. This can be done by subscribing to email<br />
alert services but also by manual search. By monitoring performance figures, the effects of<br />
communication measures can be analysed. Reactions to released information, calls to action or<br />
discussions can be used as the decision basis for upcoming communication measures.<br />
Tools for monitoring are available in many forms and styles online. Some of the most popular free<br />
monitoring tools include Google Alerts (http://www.google.com/alerts), Socialmention<br />
(http://socialmention.com/) and newsfeed aggregators such as netvibes (http://www.netvibes.com/).<br />
Facebook and YouTube offer their own free tools called Facebook Insights and YouTube Insight for<br />
monitoring the performance of pages, status updates and videos. Comprehensive multi-platform tools<br />
include Radian6 (http://www.radian6.com/) and TwentyFeet (https://www.twentyfeet.com/): they track the<br />
performance of numerous Social Media services including Facebook, Twitter and YouTube but charge a<br />
monthly fee.<br />
4. Conclusion and discussion<br />
The analysis showed that most governments of EU member states refrain from using Social Media. Only<br />
9 of 27 governments communicate with their people via Facebook, Twitter or YouTube. Those who<br />
consequently communicate with dedication on these novel platforms – best-practice examples are the<br />
government agencies in the United Kingdom and in Latvia – can reach thousands of people, especially<br />
the online-savvy target group and younger citizens and thus transport an image of transparency and<br />
trust. The new communication channel Social Media supports governments in quickly informing, linking to<br />
important news and encouraging participation.<br />
The conceptional process model presented in the final section of this paper serves as a six-step guideline<br />
for setting up a strategy for leveraging Social Media in governmental communication. However, it remains<br />
a concept up to now since it has not yet been validated in a practical test; there are no empirical values<br />
that allow an evaluation of the model.<br />
The model is designed for entities that are not yet deeply engaged with strategic communication<br />
approaches. For governments that already have a comprehensive communication strategy, some steps<br />
in the model, such as the analysis, may be shortened (e.g. in terms of target group analysis or resources)<br />
or might perhaps be redundant. When incorporating Social Media into an existing communication plan, it<br />
is essential to adapt the overall communication goals and not isolating the communication in social<br />
networks.<br />
An explanation of or guide to the use of individual platforms is deliberately omitted in the section<br />
“Activities” of the proposed model as preferred platforms and services change quicker than the basic<br />
features and principles the phenomenon called Social Media. Also, any person seeking to use Social<br />
Media platforms for professional communication must explore functionalities of the respective platforms<br />
on his or her own, as the scientific work can only analyse and describe the structures and functionalities.<br />
Choosing to take up communication in Social Media entails several implications that need to be<br />
observed. Firstly, Social Media as conversational media demand commitment and time from professional<br />
communicators. Additionally, government representatives communicating in Social Media must act and<br />
react quickly to upcoming topics or users’ questions. It is essential to avoid delays in communication<br />
caused by long procedures of releasing content for communication, if possible. To facilitate this, topics<br />
and user inquiries must be structured by different authorisation levels. A further implication is the set-up<br />
of a crisis communication plan. As Social Media enables every user to easily publish information or<br />
comment on existing information, it is possible that users publish unfavourable postings in connection<br />
with the government. Leveraging social Media also means carefully dealing with such negative usergenerated<br />
content instead of ignoring or deleting it.<br />
By using Social Media, governments can display openness and the will to communicate directly with the<br />
people in an environment where there is much to gain at a minimal risk.<br />
51
References<br />
Isabel Anger and Christian Kittl<br />
Boyd, D. and Ellison, N. (2007) “Social Network Sites: Definition, History, and Scholarship”, [online], Journal of<br />
Computer-Mediated Communication, http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html.<br />
Brake, D. and Safko, L. (2009) The Social Media Bible: Tactics, tools & strategies for business success, John Wiley<br />
& Sons, Hoboken.<br />
Lasswell, H. (1948). “The structure and function of communication in society”, in Bryson, L. (ed.) The Communication<br />
of Ideas, Institute for Religious and Social Studies, New York.<br />
Meerman Scott, D. (2010) The New Rules of Marketing and PR, John Wiley & Sons, Hoboken.<br />
O'Reilly, T. (2005) “What is Web 2.0”, [online], O'Reilly Media, http://oreilly.com/web2/archive/what-is-web-20.html.<br />
Solis, B. and Breakenridge, D. (2009) Putting the Public back in Public Relations, FT Press, Upper Saddle River.<br />
Thiedeke, U. (2004) Soziologie des Cyberspace, VS Verlag, Wiesbaden.<br />
52
The Provision of eGovernment Services: The Case of Italy<br />
Davide Arduini 1 , Antonello Zanfei 1 , Mario Denni 2 and Gerolamo Giungato 3<br />
1 University of Urbino Carlo Bo, Urbino, Italy<br />
2 Italian Competition Authority (Agcm), Rome, Italy<br />
3 Italian National Institute of Statistics (Istat), Rome,l Italy<br />
davide.arduini@uniurb.it<br />
antonello.zanfei@uniurb.it<br />
Mario.Denni@agcm.it<br />
giungato@istat.it<br />
Abstract: Using data from 1,176 Italian municipalities in 2005, we identify factors associated with the development of<br />
eGovernment services supplied by local public administrations (PAs). We show that the combination of internal<br />
competencies and context-specific factors is different when explaining decisions to start eGovernment activities vs.<br />
the intensity of such activities. Municipalities involved in eGovernment are larger, carry out more in-house ICT<br />
activities and are more likely to have intra-net infrastructures than PAs that do not offer front office digitized services.<br />
They are also generally located in regions having relatively large shares of firms using or producing ICTs, where<br />
many other municipalities offer digitized services, and where population density is relatively low. The range and<br />
quality of eGovernment services supplied by local PAs tend to increase with their stock of ICT competencies, their<br />
efforts to train workers, and with their ability to organise efficient interfaces with end-users. Moreover, there is a<br />
correlation between the range and quality of eGovernment services offered and the broadband infrastructure<br />
development in the area where local PAs are located.<br />
Keywords: innovation system, dynamic capabilities, technology adoption, electronic government, innovation in<br />
services, two-part model<br />
1. Introduction<br />
In advanced economies the public sector has been under pressure to increase transparency in<br />
administrative procedures and decision making processes as well as increase the efficiency of its<br />
services to citizens and business enterprises. These pressures are the result of a combination of factors,<br />
including increasing competition in political arenas, institutional changes and technical progress. The use<br />
of digital technologies at all levels of Public Administrations (PAs) and the development of “eGovernment”<br />
services are a key aspect of this transformation (Tung, Rieck 2005). Studies on digital technology<br />
adoption and on ICT based services supplied by public organisations, however, reveal the existence of a<br />
considerable heterogeneity across EU countries and regions (Caldas et al. 2005; Torres et al. 2005). In<br />
other words, not all PAs are equally prone to involvement in eGovernment nor are they equally active in<br />
this field. Using data on 1,176 Italian municipalities in year 2005, this paper contributes to our<br />
understanding of this diversity. More precisely we analyse the factors that are associated with PA<br />
decisions on whether and how to become involved in eGovernment activities.<br />
The analysis carried out in this paper can be cast in a general framework that explains innovation as the<br />
result of a process wherein the competencies of innovating entities co-evolve with the technological,<br />
institutional and economic environment in which they are active (Nelson 1995). In this case, we shall<br />
focus on a specific category of innovators, namely local-level public administrative bodies, which we shall<br />
call “municipalities” from now on. We shall use the provision of digitalised front office services to the<br />
citizens, firms and other institutions (eGovernment) as a measure, though partial, of municipality<br />
innovation. Furthermore, we consider the relevant technological, institutional and economic context for<br />
innovation to be largely represented by the “regions” in which municipalities are located. While the choice<br />
of territorial aggregation is always arbitrary, we thought it sensible and feasible in terms of data<br />
availability to utilise the Eurostat NUTS2 level of analysis for Italy, which corresponds to the 21 subnational<br />
regions that were institutionalised in 1970 following a constitutional provision of 1948. In this<br />
general framework, we shall show that different competencies and contextual factors matter when<br />
considering innovation rate between or within municipalities.<br />
The rest of this paper is organised as follows. Section 2 draws together different streams of literature to<br />
single out the key factors that can help explain innovation in public services in general and eGovernment<br />
in particular. Section 3 illustrates our datasets and discusses the empirical strategy we follow. Section 4<br />
examines the results of the econometric exercise carried out on innovative activities of Italian<br />
municipalities. Section 5 concludes.<br />
53
Davide Arduini et al.<br />
2. Background literature on innovation and implications for public services<br />
Innovation in services has attracted increasing, albeit still limited, attention in economic literature (Barras<br />
1986, 1990; Miles 1993; Andersen et al. 2000; Metcalfe, Miles 2000; Tether 2005; Cainelli et al. 2006;<br />
Consoli 2007; Clark et al. 2008). As particularly stressed by the evolutionary approach, our understanding<br />
of innovation can greatly benefit from the analysis of competencies of firms and institutions. This stream<br />
of literature views innovators as depositories of largely tacit knowledge incorporated in such firm-specific<br />
assets as routines, skills, technical and organisational capabilities (Nelson, Winter 1982; Cohen et al.<br />
1996; Dosi, Malerba 1996; Antonelli 2006). Such assets, normally identified with the comprehensive term<br />
“competencies”, are the result of conscious efforts to invest in training of human capital and in<br />
institutionalised R&D. Moreover, competencies originate from learning processes associated with<br />
production, the use of technology and the interaction with external parties (other producers, users, and<br />
institutions) which are themselves depositories of knowledge assets. To explain better the introduction of<br />
innovation in general, and of eGovernment services as a special case of innovation in services, one also<br />
needs to acknowledge the importance of context specific factors. There is a general consensus on the<br />
role played by demand conditions as fundamental drivers for innovation. The hypothesis that extensive<br />
and growing demand stimulates innovation was originally proposed by Schmookler (1962, 1966) and<br />
tested at different levels of analysis with a focus on the manufacturing industry (Scherer 1982; Mowery,<br />
Rosenberg 1979; Brouwer, Kleinknecht 1999). Most contributions on innovation in services emphasise<br />
the importance of demand determinants of innovative activities (Gallouj, Weinstein 1997; Miles 2005)<br />
although there are few empirical studies concerning this issue (Cainelli et al. 2006). In the public sector<br />
case, attention has been given to the role of governmental bodies in public procurement of advanced<br />
technology, hence as actors on the demand side affecting innovation carried out by supplier sectors<br />
(Zanfei 1998; Edquist et al. 2000). Apart from the characteristics of demand, innovation is affected by a<br />
number of other context specific factors and by the complex networks of relationships among the different<br />
actors involved in innovative activities (Lundvall 1992; Nelson 1993; Edquist 1997, 2005; Malerba 2005).<br />
Important interdependencies can be observed between all components in innovation systems, whether<br />
the systems are defined at the national, regional or sectoral level. The interactive and systemic nature of<br />
innovation is mediated by spatial factors, such as geographic proximity and localised knowledge<br />
accumulation. Emulation processes across innovators, user-producer interactions, knowledge exchanges<br />
and involuntary information leakages are favoured by close interaction and day-to-day contact between<br />
actors involved. There is significant evidence of inter-regional variations in the generation and adoption of<br />
new technology, revealing that innovation tends to be geographically bounded (Antonelli 1990, 2000;<br />
Saxenian 1994; Baptista 2000, 2001; Asheim, Gertler 2005).<br />
3. Data sources and empirical strategy<br />
In this section we illustrate the data and methods we utilize to examine the factors affecting the innovative<br />
activities of Italian PAs. As stated in the introduction, our unit of analysis is based on local PAs<br />
(municipalities), and we use their involvement in the provision of digitalized front office services<br />
(eGovernment) as the dependent variable in our econometric exercise. We expect different factors at the<br />
municipality and contextual levels to be associated with the introduction of eGovernment services. These<br />
factors were selected from the existing literature on innovation processes, as in Section 2. Let us first<br />
illustrate our data sources and then discuss how these are utilized for analytical purposes.<br />
3.1 Data<br />
Our empirical tests are based on data at both municipality and contextual (mainly regional) levels. For<br />
one variable only data is collected at the level of the Italian provinces. For municipality level variables,<br />
data are obtained by merging two different surveys. One is the survey conducted by Italy’s National<br />
Bureau of Statistics (Istat) in 2006 on the usage of ICT in 3,323 Italian local public administrations. It<br />
collects information on the diffusion and use of ICT in the local public administrations. The other is the<br />
survey carried out in 2006 by the National Centre for the Information Technology in the Public<br />
Administration (Cnipa) on the official websites of 1,825 Italian municipalities. It includes information on<br />
some 266 on-line services provided by the municipalities. The intersection of the two datasets yields<br />
cross-sectional information referring to 1,176 municipalities in 2005, providing the final sample size used<br />
in the econometric exercise. Data on several regional level variables have then been drawn from different<br />
surveys. One is the 2005 survey on the usage of ICT in Italian firms with 10 employees or more. Data on<br />
employees in ICT sectors come from the 8 th General Industry and Services Census carried out in 2001.<br />
Data on inhabitants at the municipality level are taken from the Istat project “Demography in Figures”.<br />
The MIUR (Italian Ministry of University and Research) survey on the tertiary education provides data on<br />
the number of graduates in ICT disciplines as a measure of human capital endowments in fields relating<br />
54
Davide Arduini et al.<br />
to eGovernment. For all the variables where information is available at regional level, the same value is<br />
assigned to every municipality belonging to the same region. As a result, we have no intra-regional<br />
variance and only in inter-regional variation at this level of analysis. Finally, information on the diffusion of<br />
broadband infrastructure and services are taken from the Broadband Observatory. These are the only<br />
data to which we have access available at the provincial level. Table 1 provides a brief description of all<br />
the explanatory variables considered in the empirical application and their source. In Table 2 summary<br />
statistics are provided.<br />
Table 1: Variables description<br />
Variable Description Year Source of data<br />
Dependent variable<br />
Front-Office Index Municipality's E-gov level composite indicator 2005 EGOV (Cnipa )<br />
2004 ICT-PA (Istat )<br />
Municipality characteristics<br />
Municipality ICT Empl Number of municipality’s employees who have the ability to develop, operate and maintain ICT systems; core<br />
activities of their job are related with ICT<br />
2005 ICT-PA (Istat )<br />
Municipality ICT Training Binary variable taking on the value 1 if municipality has sponsored at least one of the following training<br />
programs: office automation, operation systems, web, data management, and <strong>European</strong> Computer Driving<br />
License<br />
2005 ICT-PA (Istat )<br />
Municipality InHouse ICT Share of ICT-related activities operated with internal staff. ICT-related activities taken into account are: project<br />
management, software development, hardware management, software management, systems management,<br />
network management, database management, ICT-related security, web/internet technologies development and<br />
management, web content management, data entry, PC users assistance, ICT training, and e-commerce systems<br />
55<br />
2005 ICT-PA (Istat )<br />
Municipality BroadBand Binary variable taking on the value 1 if municipality has broadband access to the Internet. We consider<br />
broadband as a transmission capacity that is faster than primary rate ISDN, at 2 Mb/s<br />
Municipality EDP-based Activities Share of internal activities operated through EDP-based systems 2005 ICT-PA (Istat )<br />
Municipality Interface Binary variable taking on the value 1 if municipality has single EDP-based interface to the user (identified in 2005 ICT-PA (Istat )<br />
Italy with the terminology "Sportello Unico delle Attività Produttive", SUAP)<br />
2005 ICT-PA (Istat )<br />
Municipality OpenSource Share of open-source system software used. Software considered is: operative system software for server and<br />
that for PC desktop, office automation, web server, e-mail client, Data Base Management System, and security<br />
software<br />
Municipality Intranet Share of laptop and desktop PC logged in Intranet out of the total number of laptop and desktop PC 2005 ICT-PA (Istat )<br />
Municipality Multichannel Binary variable taking on the value 1 if municipality uses at least a web-alternative channel to provide its 2005 ICT-PA (Istat )<br />
services. Web-alternative channels are: call center, mobile technology such as SMS and WAP/GPRS/UMTS,<br />
and digital television<br />
Municipality Size Municipality’s inhabitants 2004 RESIDENT POPULATION<br />
( Istat<br />
)
Table 1: Variables description (cont’d)<br />
Variable Description Year Source of data<br />
Regional and contextual characteristics<br />
RESIDENT POPULATION<br />
(Istat )<br />
Capital Share Reg Share of inhabitants living in the regional capital city out of the total regional population 2006<br />
Municipal E-gov Suppliers Reg Share of munucipality providing at least an E-gov service out of the total number of municipalities in the region 2005 ICT-FIRMS<br />
(Istat )<br />
2005 ICT-FIRMS<br />
(Istat )<br />
ICT User Share Reg Simple mean of shares of ICT user firms out of the total number of firms in the region. ICT is: using extranet,<br />
internal automated systems for purchases, internal automated systems for payments; using Internet for banking<br />
and financial services, staff training, and acquiring digital information and services; providing products<br />
catalogue on web site; purchasing products/services via Internet<br />
Davide Arduini et al.<br />
2005 ICT-FIRMS<br />
(Istat )<br />
E-gov User Share Reg Simple mean of shares of e-Gov user firms out of the total number of firms in the region. E-gov is using<br />
municipality web site to: obtain information; download formats; submit formats and complete the service<br />
process<br />
2001 CENSUS-FIRMS<br />
(Istat )<br />
ICT Producer Ntnl Share Reg Ratio of the number of employees in ICT sectors in that region to the national mean. To define the ICT sectors<br />
we follow the OECD classification. As for manufacturing, ICT sectors include: manufacture of office,<br />
accounting and computing machinery (sector 3000 based on ISIC Rev. 3.1), manufacture of insulated wire and<br />
cable (sector 3130), manufacture of electronic valves and tubes and other electronic components (sector 3210),<br />
manufacture of television and radio transmitters and apparatus for line telephony and line telegraphy (sector<br />
3220), manufacture of television and radio receivers, sound or video recording or reproducing apparatus, and<br />
associated goods (sector 3230), manufacture of instruments and appliances for measuring, checking, testing,<br />
navigating and other purposes, except industrial process control equipment (sector 3312), and manufacture of<br />
industrial process control equipment (sector 3313). As for services, ICT sectors are wholesale of computers,<br />
computer peripheral equipment and software (sector 5151), wholesale of electronic and telecommunications<br />
parts and equipment (sector 5152), telecommunications (sector 6420), renting of office machinery and<br />
equipment, including computers (sector 7123), and computer and related activities (sector 72)<br />
56<br />
2005 MIUR<br />
ICT Degrees Ntnl Share Reg Ratio of the number of graduates in ICT faculties in that region to the national mean. According to the OECD<br />
definition, ICT faculties include: engineering and engineering trades, manufacturing and processing,<br />
architecture and building, life sciences, physical sciences, mathematics and statistics, and computing<br />
BroadBand Share Share of population out of the total provincial population reached by at least a broadband access provider 2004 BROADBAND<br />
OBSERVATORY (Between )
Table 2: Descriptive statistics<br />
Variable<br />
Davide Arduini et al.<br />
Number of<br />
observations<br />
Mean<br />
Standard<br />
deviation<br />
Min Max<br />
Dependent variable<br />
Front-Office Index 1176 0,087 0,168 0 2,02<br />
Municipality characteristics<br />
Municipality ICT Empl 1176 2,79 11,13 0 208<br />
Municipality ICT Training 1176 0,23 0,42 0 1<br />
Municipality InHouse ICT 1176 0,46 0,35 0 1<br />
Municipality BroadBand 1176 0,36 0,48 0 1<br />
Municipality EDP-based Activities 1176 0,38 0,13 0,02 1<br />
Municipality Interface 1176 0,23 0,42 0 1<br />
Municipality OpenSource 1176 0,19 0,27 0 1<br />
Municipality Intranet 1176 0,44 0,46 0 1<br />
Municipality Multichannel 1176 0,13 0,33 0 1<br />
Municipality Size 1176 24,63 101,30 0,08 2.553,9<br />
Regional and contextual characteristics<br />
Capital Share Reg 21 16,00 11,12 4,73 48,46<br />
Municipal E-gov Suppliers Reg 21 0,12 0,08 0,02 0,35<br />
ICT User Share Reg 21 0,25 0,04 0,20 0,31<br />
E-gov User Share Reg 21 0,92 1,29 0,31 6,12<br />
ICT Producer Ntnl Share Reg 21 0,82 0,31 0,44 1,76<br />
ICT Degrees Ntnl Share Reg 21 0,97 0,32 0,18 1,80<br />
BroadBand Share 103 0,79 0,13 0,41 0,99<br />
3.2 The dependent variable: The Front Office Index (FOI)<br />
The dependent variable in our econometric exercise is a composite indicator measuring the availability<br />
and the level of interactiveness of on-line services for each administration. Information on these two<br />
dimensions come from the Cnipa dataset. Examining the official websites of 1825 municipalities, Cnipa<br />
singles out 266 different on-line services. The same service can be recorded for more than one<br />
municipality. This results in an initial dataset of 21,337 observations. For each of them, using a taxonomy<br />
introduced by Capgemini (2006), by means of four dichotomic variables Di, the dataset indicates whether<br />
or not there are specific characteristics (see footnote 8) that each reflect a different degree of<br />
interactiveness in on-line services:<br />
The possibility of downloading administrative forms necessary to receive the service (indicated as<br />
D1);<br />
The possibility of exchanging interactive information about the service, such as asking specific<br />
questions and obtaining answers (D2);<br />
The presence of an authentication procedure through which the user can be identified and given a<br />
personal account as a means to enhance security (D3);<br />
Finally, the possibility of carrying out the whole transaction process on-line (D4). This represents the<br />
most comprehensive level that can be provided for an on-line service.<br />
Note that each service may show none, some, or all of these features.<br />
For analytical purposes, we followed a two-step procedure. First, we employ Multiple Correspondence<br />
Analysis (MCA) to associate four binary variables to the 21,337 on-line services observed, so as to<br />
compute a weight for each of the four features. At the end of the first step, we have a score for each of<br />
the 21,337 entries in the dataset reflecting the “intensity” of the on-line service in terms of quantity (given<br />
by the 0/1 Di variables) and level (given by the weight associated to each Di variable) of actions it<br />
performs. For a given on-line service, the score is higher the higher the number of characteristics that<br />
service exhibits as well as the higher the degree of interactiveness of these characteristics. Second, we<br />
57
Davide Arduini et al.<br />
compute a final score for each municipality (the base unit of our analysis) by adding the scores received<br />
by all the services provided through its official website. This is our Front Office Index (FOI). It is a positive<br />
function of both the number of on-line services offered by the administration (the higher the number of online<br />
services supplied by the municipality, the greater the number of non-null scores computed and hence<br />
the higher the FOI associated to the same municipality) and of the “quality” of each of these services (the<br />
higher the score of each on-line service provided by the municipality, the higher its final FOI).<br />
3.3 Independent variables and controls<br />
In light of the selective review of the literature carried out in Section 2, we singled out a set of variables<br />
associated with the development of eGovernment services. These variables can be divided into two<br />
broad categories: characteristics of municipalities and contextual (mainly regional) features (see Table 2<br />
for details on variable specification and sources they are drawn from).<br />
Municipality level variables aim primarily at capturing a large variety of technical and organisational<br />
competencies of local administrative bodies. As discussed in sections 2 and 3, internal capabilities are<br />
considered key drivers of innovation - especially in the evolutionary and resource based views of the firm,<br />
which have also been looked at in studies on innovation in service sectors. We distinguish three different<br />
sets of internal competencies:<br />
Competencies embodied in personnel employed in the municipalities<br />
This is Municipality ICT Empl variable, expressed by the number of employees whose core activities are<br />
related to ICT, i.e. software design, computer based operations and maintenance. This variable reflects<br />
the actual stock of human capital qualified for the development and provision of digitalised services.<br />
Municipality ICT Training is a dummy to identify whether in 2005 municipality i has undertaken<br />
specialised training programs in any of 5 technical fields that are relevant for eGovernment activities.<br />
Through this indicator we mean to capture the conscious effort made by the institution to improve the<br />
quality of competencies in these areas. Municipality inHouse ICT is expressed as the percentage of ICT<br />
related activities carried out in the public organisation by means of internal staff. This variable indicates<br />
how capable the organisation is to take care of ICT activities with its own resources, without resorting to<br />
specialised external competencies.<br />
Competencies embodied in ICT based devices and instrumentation<br />
Indicators we used are: Municipality intranet, which measures the percentage of the computers<br />
connected to a Local Area Network (LAN); Municipality Broadband, a dummy variable identifying whether<br />
or not the municipality’s offices have broadband access to the internet; and Municipality OpenSource -<br />
that is, the share of open source systems out of the total number of software packages that are in use at<br />
the municipality’s offices. Since open source software is less established as a technical solution, and its<br />
development is by and large based on the interaction among communities of experienced users, we<br />
consider its rate of adoption as an indicator of both the innovativeness of systems in use and of the skills<br />
of technical personnel employed by the PA.<br />
Competencies embodied in the PAs’ organisation<br />
To capture this aspect of internal competencies we introduced several indicators of how pervasive ICT is<br />
in the overall organisational structure of the municipality. Measures of this type are: Municipality EDPbased<br />
activities, expressed as the share of total activities carried out at the municipality level operated<br />
using EDP-based systems; Municipality Interface, a dummy identifying whether or not the PA has set up<br />
an ICT based system that allows the user to deal with a single on-line administrative interface (the so<br />
called “Sportello Unico” in Italian technical jargon); and Municipality Multichannel, a dummy indicating<br />
whether or not the PA makes use of diversified channels to provide services, other than face-to-face<br />
contacts, that are not based on the web. These alternative channels include inter alia call centers, mobile<br />
messaging or interactive cable TV.<br />
As noted, there are important contextual factors which complement internal capabilities as key drivers for<br />
innovation in general and in public services in particular. Such “external factors” include:<br />
58
Demand size<br />
Davide Arduini et al.<br />
Factors at work on the demand side can be partly captured by our variable Municipality size, which is<br />
expressed in terms of the number of inhabitants resident in the territory of the local PA. While this<br />
indicator is defined at the municipality level, we suggest that it will help identify the extent of potential<br />
demand for eGovernment services. Consistently with the literature on demand-pull innovation, on<br />
demand externalities, and on user-producer interaction which we reviewed in Section 2, we assume<br />
Municipality size to be positively associated with eGovernment development.<br />
Demand quality<br />
To carry out a more detailed analysis of demand factors at a broader level (relative to the municipality<br />
level we have just considered), we first use variables that identify specific categories of users, such as<br />
ICT User Reg and E-gov User Reg. These are respectively expressed in terms of the percentage of total<br />
firms in the region that were reported in 2005 to have adopted ICT-based services in general or<br />
eGovernment services in particular. Unfortunately we do not have lagged data on use of digital services,<br />
which would enable us to test whether epidemic patterns of innovation diffusion, induced by previous<br />
adoption, can affect the development of eGovernment. Nevertheless, consistent with systemic<br />
approaches to innovation, we can expect that higher shares of companies that use digital services will be<br />
positively associated with more extensive and effective user-producer interaction, thus creating greater<br />
opportunities for PAs to offer new or improved ICT based services. As well, we attempt to capture how<br />
polarised demand is by identifying the percentage of inhabitants of the region that are concentrated in the<br />
capital city (Capital Share Reg). According to the literature on spatial diffusion of innovation, technology<br />
adoption tends to be more timely and intensive in locations where larger numbers of potential users are<br />
concentrated, especially in the initial stages of technical change (Glaeser 1999). As eGovernment is in its<br />
initial phase of diffusion, one might expect that the higher the share of population in capital cities and in<br />
metropolitan areas, the more these services will be concentrated there.<br />
Supply factors<br />
eGovernment activities of PAs are affected by the presence of other innovative actors in the same area.<br />
Among these actors are the other municipalities offering digitalised services. We capture this factor by<br />
means of our variable Municipal E-gov Suppliers Reg, expressed as the share of eGovernment service<br />
providers out of the total number of local administrative bodies in the Region. Consistently with systemic<br />
as well as spatial innovation approaches, we expect this variable to be positively related to the innovative<br />
activities of PAs. In fact, when a high number of innovators are located in a given area, knowledge<br />
spillovers will be facilitated and greater incentives are created that push less dynamic institutions to enter<br />
the innovation race.<br />
Interdependencies can also be observed between eGovernment service providers and local ICT<br />
producers. We proxy this factor with a separate variable we named ICT Producer Ntnl Share defined as<br />
the ratio between the percentage of employees in ICT manufacturing and service sectors out of the total<br />
number of employees in the Region, and the same percentage calculated at the national level. This factor<br />
is positively associated with the development of eGovernment services for two main reasons. First,<br />
municipalities located in regions with higher shares of ICT producers are in a better position to gain<br />
access to relevant technology, including both hardware and software. Second, where public and private<br />
markets overlap, as in the case of voice or image transmission over IP, a competitive presence of ICT<br />
service providers stimulates municipalities to expand the range of services offered through their city<br />
networks. Another supply-side, context specific factor we wish to account for is the state of<br />
communication infrastructure. For this purpose we introduce BroadBand Share, defined as the share of<br />
total population of the province in which a municipality is located reached by at least one broadband<br />
service provider. We consider wide availability of broadband connections an important condition for the<br />
provision of advanced eGovernment services because it demonstrates high quality infrastructure and<br />
might also reflect the existence of (actual and/or potential) competition in the provision of network<br />
solutions. Both the technological level and the degree of competition in the provision of network<br />
infrastructure are normally associated with higher rates of generation and diffusion of advanced<br />
communication services (Grubesic, Murray 2004). We further control for the availability of a pool of<br />
qualified human capital, a factor particularly emphasised in studies on the generation and diffusion of<br />
innovation in ICTs (Bresnahan et al. 2002). To capture the role of this factor, we calculate the ratio<br />
between the percentage of graduates in ICT disciplines out of total graduates in the Region and the same<br />
59
Davide Arduini et al.<br />
percentage at the national level (ICT Degrees Ntnl Share Reg). Indeed, this indicator will at the same<br />
time reflect the qualitative level of actual and potential workers in ICT manufacturing and service sectors<br />
and the competencies of potential users. In both cases the impact on eGovernment service provision<br />
should be positive. Finally, we also introduce controls for macro-regions (see Table 2 for aggregation<br />
criteria). This enables us to account for a number of other observable and unobservable sources of<br />
heterogeneity which might affect the provision of eGovernment services, including income levels,<br />
degrees of industrialisation, and sectoral composition of the areas where municipalities are located.<br />
3.4 The econometric model<br />
The choice of the econometric model strongly depends on the distribution of the dependent variable,<br />
namely the FOI index. Almost 30% of the observed municipalities do not provide on-line services, i.e. the<br />
composite indicator is nil for these units. Thus, our dependent variable is continuous over strictly positive<br />
values but takes value zero for a nontrivial fraction of the sample. Given the nature of our dependent<br />
variable we argue that a standard censored model would not be appropriate. In fact, municipalities can be<br />
thought of as solving an optimization problem, wherein the optimal choice might well be the corner<br />
solution, y=0. The case of limited dependent variables often arises in econometric analysis, especially<br />
when the behaviour of economic agents is being modelled. The traditional approach in dealing with such<br />
a problem is the Tobit model. However, this approach requires that the censoring mechanism derives<br />
from the same model that generates the outcome variable while in our case the censoring mechanism<br />
and outcomes may be more flexibly modelled using separate processes (Wooldridge, 2001). A two-part<br />
model allowing the zeros and non-zeros to be generated by different densities enables us to specify a<br />
model for the censoring mechanism and a model for the outcome, conditional on the dependent variable<br />
taking positive values. This allows the separation of the estimation of a standard Probit model (using all<br />
observations available) from that of an OLS model (using only observations with FOI > 0). We use a<br />
Probit in the first part of our model to analyze the municipality’s decision to offer on-line services via its<br />
official website. This allows us to explain innovation differences “between municipalities”, i.e. which PAs<br />
have a propensity to offer eGovernment services. The second part is a linear regression model to<br />
investigate the determinants of the intensity of eGovernment development in terms of both quality and<br />
quantity of on-line services. Using the terminology introduced earlier, this would allow us to explain<br />
innovation differences “within municipalities”.<br />
4. Results<br />
Table 3 illustrates the results of the econometric exercise we carried out using the data and<br />
methodologies discussed in Section 4. The whole set of independent variables illustrated in Section 4.3<br />
and listed in Table 2, was used in both stages of the two part model. The last two columns of Table 3<br />
report the results obtained from the final specification, following the entire selection procedure and<br />
controls for heteroskedasticity.<br />
Results from the final specification are by and large consistent with the view we have developed in this<br />
paper. As we suggested earlier drawing from different streams of literature, the specific kind of innovation<br />
analysed here - namely municipalities’ provision of digitalized services - is the result of a combination of<br />
internal competencies and of context specific factors. The econometric test suggests that different<br />
combinations of such variables are at stake when assessing PA decisions on whether or not to supply<br />
digitalized services and when considering the intensity of eGovernment activities (number and quality of<br />
services provided). In other words, factors associated with variations in innovative activities “between<br />
municipalities” are different from factors associated with differences in innovation “within municipalities”.<br />
Outcomes from the Probit specification in column 5 can be interpreted as “between effects”, while those<br />
obtained from the OLS part of the model and reported in column 6 illustrate “within effects”.<br />
More specifically, our econometric exercise yields the following sets of results.<br />
First, the environment in which municipalities are active, seems to influence the start up of digitalised<br />
services more than their intensity.<br />
Second, among the context specific factors we analysed, demand size and quality stimulate innovative<br />
entry into eGovernment service provision. Demand size at the local level is captured by the number<br />
inhabitants resident in the municipality area (Municipality Size). It has a positive and significant impact on<br />
differences in innovation between municipalities, reflecting demand pull considerations as well as other<br />
bandwagon effects induced by demand externalities and user-producer interactions.<br />
60
Table 3: Estimation results: Probit and OLS<br />
Variable<br />
Municipality characteristics<br />
Davide Arduini et al.<br />
Probit OLS Probit OLS Probit OLS<br />
1 2 3 4 5 6<br />
Municipality ICT Empl 0.062 0.010** 0.010** 0.011**<br />
0,062 0,004 0,004 0,005<br />
Municipality ICT Training -0,077 0.192** 0.196** 0.177**<br />
0,133 0,094 0,094 0,090<br />
Municipality InHouse ICT 0.381** 1.053*** 0.447** 1.058*** 0.560** 1.063***<br />
0,192 0,140 0,178 0,137 0,219 0,136<br />
Municipality BroadBand -0,047 0.255*** 0.220*** 0.251***<br />
0,109 0,084 0,082 0,330<br />
Mun. EDP-based Activities 1.232*** 0.710** 1.220*** 0.641** 1.292*** 0.720**<br />
0,419 0,333 0,413 0,331 0,456 0,331<br />
Municipality Interface 0,056 0.300*** 0.295*** 0.281***<br />
0,131 0,091 0,090 0,084<br />
Municipality OpenSource 0,034 0.303** 0.341** 0.265*<br />
0,239 0,151 0,149 0,152<br />
Municipality Intranet 0.276** 0.175* 0.261** 0.195** 0.556** 0,124<br />
0,123 0,095 0,119 0,092 0,220 0,094<br />
Municipality Multichannel 0,258 0.312*** 0.288** 0.288***<br />
0,200 0,112 0,111 0,106<br />
Municipality Size 0.065*** 0.001** 0.070*** 0.001** 0.094*** 0.001**<br />
0,009 0,000 0,008 0,000 0,015 0,000<br />
Regional and contextual characteristics<br />
Full Models Selected Models<br />
Capital Share Reg -0.019*** -0,001 -0.020*** -0.021***<br />
0,005 0,005 0,005 0,006<br />
Municipal E-gov Suppliers Reg 2.642*** 0,176 2.717*** 3.216***<br />
0,655 0,466 0,629 0,690<br />
ICT User Share Reg 1,696 1,729 2.590* 2.944*<br />
1,729 1,437 1,475 1,758<br />
E-gov User Share Reg 0,058 0,081 0.104** 0.124**<br />
0,077 0,072 0,051 0,052<br />
ICT Producer Ntnl Share Reg 0.392* -0,169 0.483** 0.484*<br />
0,23 0,197 0,210 0,251<br />
ICT Degrees Ntnl Share Reg 0,254 -0,234<br />
0,274 0,268<br />
BroadBand Share 0,163 1.021*** 0.772** 0.897**<br />
0,46 0,387 0,338 0,376<br />
Constant -2.037*** -5.219*** -1.987*** -4.872*** -2.293*** -5.094***<br />
0,480 0,446 0,412 0,303 0,486 0,334<br />
Macro-Regional Controls NO NO NO NO YES YES<br />
Num. Obs. 1176 815 1176 815 1176 815<br />
Pseudo R 2 / R 2 0,322 0,343 0,318 0,338 0,352<br />
LR-test (Wald) / F-test 466,29 24,44 461,62 37,24 (134.88) 33,99<br />
Standard errors in italics.<br />
* Significant at 10% level. ** Significant at 5% level. *** Significant at 1% level.<br />
Heteroskedastic<br />
Robust Estimates<br />
Demand conditions appear to play an even more important role at the regional level. Companies which<br />
have already adopted ICT services appear to have the highest impact on the decision of municipalities to<br />
get involved in eGovernment activities (see coefficient of ICT User Share Reg in column 5 of Table 3),<br />
suggesting that capable business users are of paramount importance for PAs. Even after controlling for<br />
ICT user firms, the impact of E-gov User Share Reg, i.e. the percentage of firms using eGovernment<br />
services, still remains positive and significant in our Probit regression. Although we do not have a data<br />
61
Davide Arduini et al.<br />
panel to evaluate how previous patterns of adoption affect diffusion, this result is largely consistent with<br />
the idea that innovation is favoured by pioneer users.<br />
Third, demand polarisation hampers innovation in public services. This is shown by the negative<br />
coefficient of Capital Share Reg in column 5 of Table 3, indicating that a high weight of the region’s<br />
capital will inhibit innovation elsewhere, especially in the early stages of development of new services.<br />
Fourth, emulation effects, knowledge exchanges, and competitive pressures can be observed on the<br />
supply side. The most important factor positively associated with the decision to supply digitalised<br />
services appears to be the number of eGovernment providers in the region (see coefficient of Municipal<br />
e-gov supplier Reg in column 5 of Table 3). Emulation factors matter here, especially in the presence of<br />
increasing competition in the political arena at the local level.<br />
Fifth, advanced communication infrastructures do not influence the start up of eGovernment but do affect<br />
eGovernment intensity. The only context specific factor that seems to impact significantly on innovation<br />
within, rather than on innovation between, municipalities is the diffusion of broadband in the area in which<br />
they are located (see coefficient of BroadBand Share in column 6 of Table 3). The presence of<br />
broadband infrastructures does not seem to affect significantly the decision to start up the digitalization of<br />
public services. At this stage the objective of municipalities is the presence on the web of relatively simple<br />
applications and services such as information services (e.g. basic tourist information and guidance to the<br />
citizen on administrative procedures) and communication services (e.g. self-managed webspaces to be<br />
used by associations and organizations, links to other public administration sites, discussion fora). On the<br />
other hand, broadband connections become essential when the eGovernment service supply is richer (in<br />
terms of the number of services provided) and more articulated (in terms of interactivity levels and<br />
technologically complex).<br />
Sixth, the decision to enter eGovernment activities is associated with a narrower range of generally less<br />
complex internal capabilities than those needed to increase the intensity of digitalised services.<br />
Differences in innovation between municipalities are not affected by the number of workers with<br />
experience in ICT nor by the efforts made to train existing workers. Increasing the range and quality of<br />
services is associated instead with a much wider set of more complex competencies (see OLS<br />
specification in the last column of Table 3).<br />
Finally, a few more words on the role played by location specific factors not captured by the variables we<br />
have introduced at the regional level. It is worth observing that the introduction of macro-regional<br />
dummies does determine non-trivial variations in the estimates of coefficients. This could per se be<br />
interpreted as a signal of the importance of regional factors which would deserve more careful<br />
observation and discussion. Estimations after macro-regional controls reveal even more striking<br />
differences when considering Municipality intranet - an important indicator of PAs’ internal competencies<br />
(whose coefficient more than doubles in size). This evidence is consistent with the broadly discussed<br />
Italian North-South divide, reflected inter alia in lower per capita income, less advanced industrial<br />
structure, and lower educational levels - i.e. unobserved factors which can be expected to translate into<br />
poorer local budgets devoted to ICT.<br />
5. Conclusions<br />
Using evidence on 1,176 municipalities in Italy, and combining several datasets on the characteristics of<br />
local PAs and of the territory in which they are located, we evaluate different factors associated with the<br />
development of eGovernment services.<br />
In more general terms, the combination of internal competencies and context specific factors is different<br />
when explaining the decision to start eGovernment activities vs. the intensity of such activities. Regional<br />
factors concerning both the demand and the supply of services appear to affect only the decision to enter<br />
eGovernment activities. Competencies needed to expand and improve the quality of services are much<br />
more numerous and complex than the ones associated with the mere decision to start eGovernment<br />
activities.<br />
The examined evidence is consistent with a view of eGovernment development as a process of gradual,<br />
step by step involvement, wherein municipalities initially engage in exploratory activities, favoured by an<br />
external context conducive to innovation and by very limited internal competencies. Once more efforts<br />
are made to expand and improve services supplied, more qualified competencies and more advanced<br />
62
Davide Arduini et al.<br />
environmental conditions need to be created. There is no guarantee that such circumstances occur, so<br />
that further development of currently embryonic eGovernment is at risk. This calls for increasing<br />
investments in training, human capital formation and in hardware and software devices at the individual<br />
municipality level. It also requires greater efforts to improve the technological environment in which PAs<br />
are active, including investments to improve the quality and accessibility of digital communications<br />
networks.<br />
References<br />
Andersen, B., Howells J., Hull R., Miles I., Roberts J.(eds), 2000. Knowledge and Innovation in the New Service<br />
Economy. Cheltenham, Edward Elgar.<br />
Antonelli, C., 1990. Induced adoption and externalities in the regional diffusion of information technology. Regional<br />
Studies 24, pp.31-40.<br />
Antonelli, C., 2000. Collective knowledge communication and innovation: the evidence of technological districts.<br />
Regional studies 34, pp. 535-547.<br />
Antonelli, C., 2006. Diffusion as a process of creative adoption. Journal of Technology Transfer 31, pp. 211-226.<br />
Asheim, B., Gertler M., 2005. The geography of innovation: regional innovation systems. In: Fagerberg J., Mowery<br />
D.C., Nelson R.R. (Eds.), The Oxford Handbook of Innovation. Oxford University Press, Oxford and New York.<br />
Baptista, R., 1999. The diffusion of process innovations: a selective review. International Journal of the Economics of<br />
Business, Taylor and Francis Journals 6(1), pp. 107-129, February.<br />
Baptista, R., 2000. Do innovations diffuse faster within geographical clusters?. International Journal of Industrial<br />
Organization 18, pp. 515-535.<br />
Baptista, R., 2001. Geographical clusters and innovation diffusion. Technological Forecasting and Social Change 66,<br />
pp. 31-46.<br />
Barras, R., 1986. Towards a theory of innovation in services. Research Policy 15, pp. 161-173.<br />
Bresnahan, T.F., Brynjolfsson E., Hitt L.M., 2002. Information technology, workplace organization, and the demand<br />
for skilled labour: firm-level evidence. Quarterly Journal of Economics 117, pp. 339-376.<br />
Brouwer, E., Kleinknecht, A., 1999. Innovative output, and a firm's propensity to patent.: An exploration of CIS micro<br />
data, Research Policy 28(6), pp. 615-624, August.<br />
Cainelli, G., Evangelista R., Savona M., 2006. Innovation and economic performance in services: a firm-level<br />
analysis. Cambridge Journal of Economics 30 (3), pp. 435-458.<br />
Caldas, A., David P., Ormanidhi O., 2005. Digital Information Network Technologies, Organisational Performance<br />
and Productivity. An Exploratory Study of the Public Sector in Europe. The Oxford Internet Institute, Oxford.<br />
Capgemini, 2006. On line Availability of Public Services: How Is Europe Progressing? Web based survey on<br />
electronic public services. Report of the <strong>6th</strong> measurement, Bruxelles.<br />
Capgemini, 2007. The User Challenge. Benchmarking The Supply Of Online Public Services. Report of the 7 th<br />
measurement, Bruxelles.<br />
CNIPA-CRC, 2006. Quarto Rapporto sull’Innovazione nelle regioni d’Italia. Collana Ricerche e Studi, Progetto CNIPA<br />
– CRC, Roma.<br />
Cohen, M., Burkhart R., Dosi G., Egidi M., Marengo L., Warglien M., Winter S., 1996. Routines and other recurring<br />
action patterns of organisations. Industrial and Corporate Change 5(3), pp.653-698.<br />
Comitato Interministeriale per la Banda Larga, 2007. Linee guida per i piani territoriali per la banda larga. Roma.<br />
Consoli, D., 2007. Services and systemic innovation: a cross-sectoral analysis. Journal of Institutional Economics 3,<br />
pp. 71-89.<br />
Danish Technological Institute and Institut für Informations management GmbH, 2004. Reorganisation of government<br />
back-offices for better electronic public services - <strong>European</strong> good practices. University of Bremen, Bremen.<br />
Davidson, R., MacKinnon J.G., 1984. Convenient specification tests for Logit and Probit models. Journal of<br />
Econometrics 25, pp. 241-262.<br />
Edquist, C., 2005. Systems of innovation. Perspectives and challenges: In: Fagerberg J., Mowery D.C., Nelson R.<br />
(Eds.), The Oxford Handbook of Innovation. Oxford University Press, Oxford and New York.<br />
Edquist, C., Hommen L., Tsipouri L., 2000. Public Technology Procurement and Innovation. Dordrecht, Kluwer<br />
<strong>Academic</strong> Publishers.<br />
<strong>European</strong> Commission, 2005. i2010 – A <strong>European</strong> Information Society for growth and employment. COM(2005)229,<br />
Bruxelles.<br />
Gallouj F., Weinstein O., 1997. Innovation in services. Research Policy 26, pp.537-556.<br />
Glaeser, E.L., 1999. Learning in cities. Journal of Urban Economics 46, pp. 254-277.<br />
Grubesic, T.H., Murray A.T., 2004. Waiting for broadband: local competition and the spatial distribution of advanced<br />
telecommunication services in the United States. A Journal of Urban and Regional Policy 35 (2), pp. 139-165.<br />
Lundvall, B.A., 1992. National Systems of Innovation: Towards a Theory of Innovation and Interactive Learning.<br />
Pinter Publishers, London.<br />
Metcalfe, S. and Miles I. (Eds.), 2000. Innovation System in the Service Economy. Measurement and Case Study<br />
Analysis. Boston, Kluwer.<br />
Miles, I., 1993. Services in the new industrial economy. Futures 25(6), pp. 653-672.<br />
Miles, I., 2005. Innovation in services. In: Fagerberg J., Mowery D.C., Nelson R. (Eds.), The Oxford Handbook of<br />
Innovation. Oxford University Press, Oxford and New York.<br />
Ministero per le Riforme e le Innovazioni nella Pubblica Amministrazione, 2007. Verso il Sistema nazionale di<br />
eGovernment – Linee strategiche. Roma.<br />
63
Davide Arduini et al.<br />
Ministero per lo Sviluppo Economico, 2007. Quadro Strategico Nazionale per la politica regionale di sviluppo 2007-<br />
2013. Roma.<br />
Mowery, D.C., Rosenberg N., 1979. The influence of market demand upon innovation: a critical review of some<br />
recent empirical studies. Research Policy 8, pp.102-153.<br />
Nardo, M., Saisana M., Saltelli A., Tarantola S., Hoffman A., Giovannini E., 2005. Handbook on Constructing<br />
Composite Indicators: Methodology and User Guide. OECD Statistics, Working Papers 3, Paris.<br />
Nelson, R.R., 1995. Recent evolutionary theorising about economic change. Journal of Economic Literature XXXIII,<br />
pp.48-90.<br />
OECD, 2003. The eGovernment imperative: main findings. OECD Press, Paris.<br />
Picci, L., 2006. The quantitative evaluation of the economic impact of eGovernment: a structural modelling approach.<br />
Information Economics and Policy 18, pp.107-123.<br />
Saxenian, A., 1994. Regional Advantage: Culture and Competition in Silicon Valley and Route 128. Harvard<br />
University Press, Cambridge, MA.<br />
Scherer, F.M., 1982. Demand-pull and technological innovation: Schmookler revisited. Journal of industrial<br />
economics 30, pp.225-237.<br />
Schmookler, J., 1962. Economic sources of inventive activity. Journal of Economic History, March, pp.1-20.<br />
Schmookler, J., 1966. Invention and Economic Growth. Harvard University Press, Cambridge, MA.<br />
Tether, B.S., 2005. Do services innovate (differently)?: Insights from the <strong>European</strong> innobarometer survey. Industry<br />
and Innovation 12(2), pp. 153-184.<br />
Torres, L., Pina V., Acerete B., 2005. EGovernment developments on delivering public services among EU cities.<br />
Government Information Quarterly 22, pp. 217–238.<br />
Tung, L.L., Rieck O., 2005. Adoption of electronic government services among business organizations in Singapore.<br />
Journal of Strategic Information Systems 14, pp. 417–440.<br />
United Nations/American Society for Public Administration (UN/ASPA), 2002. Benchmarking eGovernment: a global<br />
perspective. UN/ASPA, New York.<br />
Wooldridge, J.M., 2001. Econometric Analysis of Cross Section and Panel Data. The MIT Press, Cambridge,<br />
Massachusetts.<br />
Yatchew, A., Griliches Z., 1985. Specification error in Probit models. The Review of Economics and Statistics 67(1),<br />
pp. 134-139, February, MIT Press.<br />
Zanfei, A., 1998. Domanda pubblica e innovazione nelle telecomunicazioni in una fase di trasformazione tecnologica<br />
e istituzionale. Quaderni di ricerca IEFE-Università Bocconi, Milano.<br />
64
Pan-<strong>European</strong> eGovernment and eHealth Services in<br />
Slovenia<br />
Jaro Berce, Vasja Vehovar, Ana Slavec and Mirko Vintar<br />
University of Ljubljana, Slovenia<br />
Jaro.Berce@fdv.uni-lj.si<br />
Vasja.Vehovar@fdv.uni-lj.si<br />
Ana.Slavec@fdv.uni-lj.si<br />
Mirko.Vintar@fu.uni-lj.si<br />
Abstract: In 2009 we conducted a study on pan-<strong>European</strong> electronic government services that concentrated on<br />
eGovernment and eHealth. First, qualitative interviews were performed to determine key areas of priority and<br />
essential problems in this area; for a small country such as Slovenia, not all topics may be equally relevant. In<br />
addition, a telephone survey was conducted in individuals between the ages of 18 and 75 years. Not surprisingly, the<br />
respondents showed the most interest in pan-<strong>European</strong> eHealth services, remote access to health data, and in<br />
certification of education - the process of obtaining degrees (in that order). The least interest was shown in the<br />
establishment of online enterprises, and for the recognition of Slovenian public administration certificates in<br />
<strong>European</strong> Union member states (and vice versa). However, the interest for e-services in the realm of public<br />
administration is quite high. This interest in public administration services is connected to age (younger respondents<br />
show less interest) and employment status (students and the retired show less interest than do the employed and<br />
unemployed). The interest for public administration e-services is therefore linked to specific life situations.<br />
Accordingly, it is not surprising that interest is higher among those who most frequently travel to other EU countries.<br />
As for the use of public administration services in other EU countries, it is not very frequent – less than a tenth of<br />
respondents used it, more than half of them online. The countries where respondents most frequently use these<br />
services are Germany, Italy, and Austria. Considering the frequency of use, the order is reversed: Austria is in first<br />
place, then Italy and Germany, which shows that Austria has achieved the highest level of development of public<br />
administration e-services. In comparison to similar research undertaken by Capgemini worldwide, our survey showed<br />
a higher level of interest for electronic managing health insurance, recognition of education or other qualifications,<br />
and recognition of marriage and birth certificates. Among the respondents who lived abroad a month or longer, the<br />
interest for e-public administration domains in general is higher than for the respondents in the Capgemini survey. An<br />
exception is in the tax field, in which our respondents are less interested than the Capgemini respondents.<br />
Keywords: pan-<strong>European</strong> services, eGovernment, eHealth.<br />
1. Introduction<br />
With the increasing mobility of <strong>European</strong> citizens it is increasingly important that access to essential<br />
services does not depend on “local knowledge”. Presently, most eGovernment services are provided at<br />
the national or sub-national (regional or local) level. There are several ways to add a cross-border<br />
dimension; these ways range from the relatively simple (such as making a service available in another<br />
language than that of the <strong>European</strong> Union [EU] member state in which the service is being accessed), to<br />
more complex ways (such as information sharing between public administrations of different EU member<br />
states), or even through provision of a service at a “pan-<strong>European</strong>” level in which parts of the public<br />
administrations of all EU member states participate as a “back office” to this service. The term “pan-<br />
<strong>European</strong> eGovernment services” (PEGS) may seem to imply that only the latter example (service<br />
provision at the <strong>European</strong> level) would qualify for the name. However, it would be not useful to<br />
understand PEGS in such a limited way. PEGS are important because they add a <strong>European</strong> dimension to<br />
eGovernment services, and it is this <strong>European</strong> dimension and the progress towards it that matters. PEGS<br />
come in different forms, are developed by different actors, and in different areas, and have different<br />
development trajectories (Weehuizen and van Oranje, 2007).<br />
In the report Innovative and Adaptive PEGS for Citizens in 2010 and Beyond (Glott and Haaland, 2007),<br />
which was a part of the EUReGOV project of the same name that was prepared for the Directorate<br />
general - DG Information Society & Media of the <strong>European</strong> Commission, PEGS were defined as having<br />
the following characteristics:<br />
Pprovided by or on behalf of <strong>European</strong> public sector entities,<br />
At local, regional, national, or supra-national level,<br />
By means of interoperable trans-<strong>European</strong> telematic networks (e.g. the Internet),<br />
In order to perform public administration tasks, including provision and exchange of information and<br />
provision of participation opportunities for citizens,<br />
65
Jaro Berce et al.<br />
That meet a demand of other public entities and particularly demand of other citizens at any<br />
geographic level,<br />
For “material” services as well as for the generation of civic attitudes that address pan-<strong>European</strong><br />
tasks or improve citizens' identification with the EU,<br />
With the potential to be extended towards a majority of EU member states (instead of, for instance,<br />
only in countries with the same language, like UK and Ireland or Germany and Austria),<br />
By either being designed to expand or by containing elements (of, for instance, service integration,<br />
interoperability, or e-Inclusion) that could feed in the design of future eGovernment services on pan-<br />
<strong>European</strong> level.<br />
By IDABC (Interoperable Delivery of <strong>European</strong> eGovernment Services to public Administrations,<br />
Businesses and Citizens; http://ec.europa.eu/idabc/) definition, the horizontal pan-<strong>European</strong><br />
eGovernment services are “measures undertaken to initiate, enable and manage the provision of<br />
horizontal pan-<strong>European</strong> eGovernment services, including organizational and coordination aspects” (De<br />
Vriendt, 2005).<br />
In the study some relevant EU documents and studies were used to frame the research focus, such as:<br />
eGovernment for all (eGovernment Action plan 2011-2015) commits the EU member states to rely on<br />
information and communications technology (ICT) solutions to develop and promote improved ways<br />
for business and citizen participation in public policy consultations, debates, and policy-making<br />
processes. The Action Plan focusses on five main priorities. Foremost among these is the aim of<br />
making eGovernment inclusive, so that “no citizen is left behind”. The Action Plan aims to make highimpact<br />
services for citizens and businesses more widely available, including electronic procurement<br />
services for businesses, services for mobile citizens (including improved ability to search for jobs<br />
across the <strong>European</strong> Union), or social security services (for example, pension records and electronic<br />
benefit applications).<br />
A Digital Agenda for Europe (Digital Agenda for Europe 2010-2020) for maximising the social and<br />
economic potential of ICT, most notably the Internet, a vital medium of economic and societal activity:<br />
for doing business, working, playing, communicating, and expressing ourselves freely. <strong>European</strong><br />
governments are committed to making user-centric, personalised, multiplatform eGovernment<br />
services.<br />
The Vision Study (SMART 2006/0064) stimulated the debate on the key transformations and<br />
challenges ahead for the renewal of the <strong>European</strong> eGovernment agenda beyond 2010.<br />
The Guidelines on Sustainable Business Models for Inclusive Public Service Delivery (SMART<br />
2007/0052) study analyses the state of the art of the multichannel delivery of public services<br />
throughout Europe, and the progress made towards achieving the goal to ensure that “no citizen is<br />
left behind”. It provides useful recommendations and identifies further actions that will be needed<br />
over the next few years.<br />
The Progress Study (SMART 2008/0042) is a qualitative progress evaluation of the i2010<br />
eGovernment Action Plan, 2006-2010. The objectives of the study were to qualitatively analyse the<br />
progress towards achieving the goals of the Action Plan, and to evaluate its stimulus effect across the<br />
member states.<br />
Study on eGovernment scenarios for 2020 and the preparation of the 2015 Action Plan (SMART<br />
2009/0069) provided concrete input to the eGovernment 2015 Action Plan in terms of assessing<br />
objectives and validated priorities, delivering innovative ideas, and proposing a range of policy<br />
actions in support of these priorities.<br />
To better understand the PEGS in Slovenia, a small country where not all of the topics mentioned above<br />
may be equally relevant, two data gathering tools were used. First, qualitative interviews were performed<br />
to frame key priority areas and address essential problems. Second a telephone survey was conducted<br />
among active Internet users. Active Internet user was defined as “anyone who used the Internet in the<br />
last three months”.<br />
2. Analysis of expert interviews<br />
As detailed previously (Vintar et al, 2010), we performed a series of qualitative expert interviews with key<br />
local, regional, national, and <strong>European</strong> PEGS experts in order to effectively analyse the state of affairs,<br />
strategies, and priorities in the domain of PEGS, and to identify key services that should be implemented<br />
66
Jaro Berce et al.<br />
in future. In total, 14 interviews were performed: 10 with experts in e-administration, 3 in eHealth and 1 in<br />
the e-business domain. The main objective was to determine the key PEGS to be implemented in the<br />
future to ensure interoperability and mobility of Slovenia in the wider <strong>European</strong> market.<br />
Experts believe PEGS to be very important in general, but with regard to specific services their views<br />
differ, especially with respect to the order in which PEGS should be introduced. A quite wide range of<br />
domains was studied and examined with an eye toward what would be needed to enact workable pan-<br />
<strong>European</strong> PEGS: interviews/canvassings of companies employing foreign workers in Slovenia,<br />
population databases and their linkage, horizontal linkage, interoperability of services, and from the socalled<br />
“E-procurement” domain (public commissions, pan-<strong>European</strong> health cards, and so forth). The<br />
experts’ opinions focussed on the different elements that would be required to enact services in the pan-<br />
<strong>European</strong> space as well as on services themselves. To provide examples, administration of taxes<br />
demand an obligatory and unified pan-<strong>European</strong> taxation number; the linking of population registers<br />
would be needed for car registration abroad, and for extending the validity of drivers’ licences to include a<br />
greater number of member states. In the research process, some good practices from the EU were<br />
uncovered, for example Smart Cities (for connecting different <strong>European</strong> cities and enterprises within<br />
them). One expert pointed out that connecting on the mezzo level is a more reasonable start than aiming<br />
to connect whole countries. The enterprise viewpoint was exposed frequently, for example with the idea<br />
of pay circulation and the concept of SEPA (Single Euro Payment Area). However, connecting on the<br />
regional level is currently left to local initiatives.<br />
The key actors in the implementation of PEGS are the <strong>European</strong> Commission, in the role of connector,<br />
the Ministry of Public Administration, and the informatics professional in the role of the carrier of changes.<br />
Moreover, the <strong>European</strong> Commission thinks that politicians should be instructed on the importance of<br />
changes related to PEGS, but not until the different schools of thought in the field unify with respect to<br />
what initiatives should be undertaken. According to one of the interviewed experts, informatics could be<br />
withdrawn from the Ministry of Public Administration and made independent again (as it was before); this<br />
might allow for this department to be an independent actor that could step forth from the conflicting<br />
interests of others in the subfields that are collaborating to implement PEGS.<br />
An important pan-<strong>European</strong> service that still lives in practice is, according to one expert, the <strong>European</strong><br />
driving licence. Another expert exposed the historical background of differences in <strong>European</strong> population<br />
registers; specifically, member states in Eastern Europe (which once had different political systems) are<br />
more inclined toward centralisation of that sort of activity, and therefore have better-regulated civil<br />
population databases than do member states in Western Europe. The differences are based on different<br />
philosophies. In Slovenia, registers were introduced with the reforms of Habsburg Maria Theresa<br />
Walburga (1717 – 1780), while the collection of civilian data in Germany (due to the experience of the<br />
Second World War) is strictly unwanted and triggers social protests. Thus, cultural differences matter—in<br />
Slovenia we tend to control a priori, while in Britain control is only imposed when something goes wrong<br />
(to use an illustrative comparison).<br />
One of the experts interviewed noted that technical background is the least problematic aspect of such<br />
pan-<strong>European</strong> projects. Interestingly, experts are not uniform in their opinions concerning legal<br />
regulation. Some experts strongly value legal regulation, but one expert expressed the problematic<br />
nature of legal regulation when it comes to personal data security. In his opinion, despite the adjustment<br />
of legislation in various EU member countries to correspond with legislation for the overall <strong>European</strong><br />
Union, huge differences remain. For example, the RISER project (Registry Information Service on<br />
<strong>European</strong> Residents), in which also the Ministry for Public Administration is included and concerns<br />
searching for debtors abroad. The project is very successful in Germany, and eight countries participate<br />
in it. However, in Slovenia it is not feasible as our administration will not give data on debtors from<br />
Slovenia to foreign enterprises.<br />
One other expert also provided an interesting opinion—using an e-administration system, Slovenians can<br />
manage all procedures from abroad, but e-administration does not assure pan-<strong>European</strong> services. He<br />
defined pan-<strong>European</strong> services as those that enable you to manage things in a foreign country that has<br />
no data about you, but can retrieve it from a common register. In particular, another challenge with PEGS<br />
implementation in Slovenia is our legislation stating that all collected data must at the disposal of other<br />
public administration institutions. This is in tandem with the regulation that data already demanded by one<br />
institution cannot then be asked about a second time by another institution. In fact, according to another<br />
67
Jaro Berce et al.<br />
expert in terms of interoperability the most difficult aspects of PEGS are legislative, political, and<br />
organisational (that is, not related to ICT-related issues).<br />
2.1 eHealth domain<br />
The eHealth domain is less developed and accessible and has been exposed as the most problematic by<br />
several experts. Therefore it deserves more detailed examination.<br />
Slovenia has participated in the NETC@RDS project (http://netcards-project.com/web/frontpage) since<br />
2003. This project aims to introduce an electronic <strong>European</strong> health card that would hold health insurance<br />
data. Currently, the blue EU health card is in force. This health care card is not electronic but rather<br />
includes health insurance data that is physically written down; the card is only valid for one year. It is valid<br />
for urgent medical help abroad.<br />
The first phase of the NETC@RDS project was research; the second, pilot; and the last, at the end of<br />
2010, implementation. Interestingly, procedures have not changed after introduction of the electronic<br />
card; insurance companies continue to send invoices as usual. The pilot phase of the study is showing<br />
that Slovenians who work abroad and have two doctors (one abroad and one at home) are strongly<br />
inclined to use the card. The card has therefore found its widest adoption in border regions. There are 16<br />
countries participating in the NETC@RDS project (see http://netcards-project.com/web/partners). As an<br />
observer, Slovenia participates also in the Calliope project (http://www.calliope-network.eu/), which is a<br />
thematic network aimed at supporting, promoting, and disseminating products of a bigger project,<br />
<strong>European</strong> Patients Smart Open Services (epSOS) (http://www.epsos.eu/).<br />
According to experts, not long ago Slovenia was advanced in the eHealth domain; it now lags behind,<br />
except for one insurance company for obligatory health insurance. The health card substantially<br />
facilitates procedures, as there is no need to uniformly address first at the national level. Germany, for<br />
example, has been trying to introduce the health card for five years, but has been unable to do so<br />
successfully due to the many competing interests in the country’s economy (regarding the content of the<br />
card, the interests of insurance companies, producers, and so forth).<br />
To initiate a higher level of interoperability in the eHealth domain, it is pivotal to introduce the electronic<br />
health record (or a summary in electronic format), which is used in the Slovenian eHealth project. Our<br />
experts had the following to say about it:<br />
The eHealth project runs within the health ministry, therefore our experts could not speak to the<br />
details of it except for the action plan, which is partially funded by <strong>European</strong> funds.<br />
In 2010, the eHealth project set up a model of an electronic health record, an agreement for keeping<br />
data securely stored in an electronic format.<br />
Individual doctors and institutions at home and worldwide are already exchanging data in electronic<br />
format; however, for now everything is still only local. In Slovenia, some hospital and diagnostic<br />
centers are exchanging radiologic images; therefore, having on-duty radiologists is not necessary.<br />
Britain, for example, is sending their images to India, probably due to lower costs. Some doctors have<br />
their electronic health records, but they work only for themselves.<br />
3. eAdministration domain<br />
According to expert interviews there were some remarks about the FIO system (the phonetic index of<br />
persons, Schengen information system), in which foreign workers are authenticated, and it is determined<br />
whether they have any restrictions against being able to work and why, and about the new system (RISK)<br />
which is less clear and more difficult to use for data searches than its predecessor. It was often stated<br />
that Slovenia is well-developed in the eAdministration domain.<br />
On the other hand, it is not known how much these services are used among citizens. Experts stress that<br />
Slovenia collaborates in different pan-<strong>European</strong> projects, including STORK (Secure idenTity acrOss<br />
boRders linKed; designed for assuring general <strong>European</strong> identifications) and IMI (Internal Market<br />
Information System; which should enable verification of educational or other certificates, and could be<br />
useful also for other services), and PCI (Projects of Common Interests), which merges more sector<br />
projects, etc.<br />
68
3.1 eBusiness domain<br />
Jaro Berce et al.<br />
Experts provided some critical opinions on the e-VEM system (the Slovenia One Stop Shop project);<br />
these criticisms mainly centered on the idea that it is too open, and misuse is possible (for example,<br />
multiple enterprises registered at a single address). On the other hand, some experts considered e-VEM<br />
to be a world pearl, as Slovenia received the United Nations Public Service prize for it in 2009.<br />
Tax administration was exposed as especially problematic. Every foreigner in Slovenia for employment<br />
(except for students) has to obtain a tax number. To do this, he or she needs to enter an application in<br />
the register of those liable to taxation, a copy of a personal document, and registration of their certificate<br />
of temporary residence. This can also be done for family members supported by the employment, but is<br />
mandatory only in cases where these family members also live in Slovenia.<br />
Discrepancies between Slovenia and other countries appear also in income tax declarations, particularly<br />
in the ability to receive tax relief by claiming children as dependents. In Slovenia, children can qualify as<br />
dependents until their 18th birthdays; for most foreign countries, the age is 21 (reflecting college<br />
attendance). In Slovenian legislation concerning foreigners, family members are more broadly defined<br />
than they are in the definitions for tax administration.<br />
4. Analysis of households<br />
In December 2009, a telephone survey was conducted on a sample of about 600 persons aged from 18<br />
to 75 years (Vintar et al., 2010). This analysis focuses only on active Internet users in this group (that is,<br />
those who used the Internet in the last 3 months; n=365).<br />
Respondents show most interest in the eHealth domain, specifically in electronic management of health<br />
insurance, electronic linkage of Slovenian eHealth services with similar services in other EU countries (for<br />
example, allowing doctors in other countries to access personal health data, and Slovenian doctors to<br />
access data from healthcare provided abroad). The next most interesting domain is e-business:<br />
electronic management, recognition, editing of school or education, data exchange, and employment<br />
documentation.<br />
The least interest is shown in using PEGS for the establishment of on-line businesses and the recognition<br />
of Slovenian public administration certificates in EU countries, and vice versa. However, the interest for<br />
public administration e-services is quite high. It is connected with age (younger respondents show less<br />
interest) and with employment status (students and the retired show less interest than do the employed<br />
and unemployed). Thus, the interest in public administration e-services is linked to specific life situations,<br />
and not surprisingly is higher among those who frequently travel to other EU countries.<br />
The use of public administration services in other EU countries by Slovenians is not frequent - less than a<br />
tenth of respondents used them, more than half of them online. The countries where the respondents<br />
most often used these services are Germany, Italy, and Austria. Austria has developed the highest level<br />
of public administration e-services as reflected by frequency of use.<br />
In comparison to similar Capgemini worldwide Consulting research, our survey showed a higher level of<br />
interest for electronic editing of health insurance, recognition of education or other qualifications, and<br />
recognition of marriage and birth certificates. Among the respondents who lived abroad for a month or<br />
longer, the interest in e-public administration domains in general is higher than for the respondents in the<br />
Capgemini Consulting survey. An exception occurs in the tax field, where respondents from our<br />
interviews are less interested than the Capgemini Consulting respondents.<br />
Details regarding the specific elements of the survey are provided in the upcoming sections of the article.<br />
4.1 Interest in public administration eServices<br />
The highest interest (expressed on scale from 1 - not interested at all to 5 - very interested) in public<br />
administration e-services was shown for the electronic management of health insurance, as described<br />
previously (4,42), followed by electronic linkage of Slovenian eHealth services with similar services in<br />
other EU countries (4,19); electronic management, recognition, and alternation of school or education<br />
(4,1); data exchange and employment documentation (4,09); electronic management of pension<br />
insurance, official electronic data transfer (4,00); electronic management of change of residence (3,85);<br />
valid electronic transfer of receipts and extracts (3,78); taxation management documentation (3,71); intra-<br />
69
Jaro Berce et al.<br />
validity and recognition of electronic signatures (3,68); electronic editing of car registration and insurance<br />
(3,64); and the least for establishing businesses (3,59) and recognition of public administration<br />
certificates in other EU countries and vice versa (3,58). The breakdown of the participants in the survey<br />
according to each level of the 5-point Likert scale is shown in Table 1 below. (Vintar et al, 2010)<br />
Table 1: Interest in public administration eServices<br />
Valid electronic transfer of certificates and<br />
extracts (e.g. birth, marriage, residence) from<br />
Slovenian public administration to EU country<br />
public administration.<br />
Exchange of data and documentation for<br />
arranging employment.<br />
Electronic management of migrations (e.g.<br />
change of the permanent residence address)<br />
Electronic management, acknowledgement<br />
and change of school or education.<br />
Electronic linking of Slovenian eHealth<br />
services with similar services in other EU<br />
countries (e.g. access to my health data for<br />
doctor in other EU country and vice versa).<br />
Electronic management of health insurance.<br />
Electronic management of insurance for<br />
pension, official electronic data transfer.<br />
Acknowledgement of Slovenian public<br />
administration certificates in other EU<br />
countries and vice versa.<br />
Mutual validity and acknowledgement of<br />
digital signature.<br />
Electronic management of car registration<br />
and insurance.<br />
Establishing enterprises.<br />
Exchange of documentation for managing<br />
taxes.<br />
Source: Vintar et al. (2010).<br />
% (n)<br />
1 2 3 4 5<br />
Not<br />
interested at<br />
all<br />
7<br />
(27)<br />
8<br />
(28)<br />
9<br />
(34)<br />
8<br />
(27)<br />
6<br />
(22)<br />
5<br />
(17)<br />
7<br />
(24)<br />
13<br />
(45)<br />
13<br />
(46)<br />
10<br />
(36)<br />
12<br />
(43)<br />
11<br />
(40)<br />
8<br />
(30)<br />
2<br />
(9)<br />
6<br />
(21)<br />
4<br />
(14)<br />
3<br />
(10)<br />
1<br />
(5)<br />
5<br />
(17)<br />
7<br />
(26)<br />
9<br />
(31)<br />
10<br />
(35)<br />
9<br />
(32)<br />
6<br />
(22)<br />
24<br />
(88)<br />
13<br />
(48)<br />
20<br />
(72)<br />
12<br />
(42)<br />
14<br />
(49)<br />
8<br />
(29)<br />
20<br />
(72)<br />
24<br />
(86)<br />
19<br />
(68)<br />
22<br />
(81)<br />
21<br />
(76)<br />
21<br />
(75)<br />
20<br />
(72)<br />
26<br />
(96)<br />
22<br />
(80)<br />
26<br />
(94)<br />
22<br />
(79)<br />
1<br />
(68)<br />
20<br />
(73)<br />
22<br />
(77)<br />
18<br />
(66)<br />
23<br />
(83)<br />
23<br />
(84)<br />
26<br />
(93)<br />
4.2 Public administration services in EU member countries<br />
Very<br />
interested<br />
41<br />
(148)<br />
51<br />
(184)<br />
44<br />
(159)<br />
51<br />
(187)<br />
56<br />
(203)<br />
67<br />
(244)<br />
49<br />
(179)<br />
34<br />
(122)<br />
42<br />
(152)<br />
35<br />
(128)<br />
34<br />
(123)<br />
37<br />
(134)<br />
Total<br />
(n)<br />
Average<br />
σ ±<br />
Standard<br />
deviation<br />
Confidence<br />
interval<br />
365 3,78 1,03 0,11<br />
365 4,09 1,41 0,15<br />
365 3,85 1,21 0,13<br />
364 4,1 1,31 0,14<br />
363 4,19 1,35 0,14<br />
363 4,42 1,31 0,14<br />
365 4,00 1,36 0,14<br />
356 3,58 1,26 0,13<br />
363 3,68 1,20 0,13<br />
363 3,64 1,29 0,14<br />
358 3,59 1,19 0,13<br />
364 3,71 1,15 0,12<br />
Public administration services in other EU countries have been used by less than a tenth of respondents<br />
(8%). Those who already used them were asked if they did so online; more than half (56%) responded<br />
that they did use e-services in other countries. The share of respondents that also lived in another EU<br />
country is smaller (11%). Those who lived abroad were there usually less than a year; 29% lived there<br />
only one month, 27% more than six months, 14% more than six months but less than a year, and 14%<br />
more than one year.<br />
4.3 Slovenia in the Capgemini research<br />
In its 2009 study, Capgemini (Colclough and Tinholt, 2009) measured the “20 basic public services” since<br />
inception. Specifically, Capgemini assessed the availability of these services and the sophistication of<br />
them as offered through 14,000 public service provider websites across Europe. Europe shows continued<br />
70
Jaro Berce et al.<br />
steady progress in terms of full online availability. The overall EU27+ measure has risen to 71% in 2009<br />
from 59% in 2007. In terms of sophistication, Europe stands at 83%, compared with 76% in 2007.<br />
The report pointed to a coordinated approach of development of a pan-<strong>European</strong> eGovernment service<br />
design and delivery within projects in the areas of: e-Procurement, eHealth, and e-ID (collectively known<br />
as the Services Directive). These projects benefit from common building blocks for solutions, serviceoriented<br />
architectures, and inter-operability across EU.<br />
The Capgemini report demonstrates that the goal of improving eGovernment services extends beyond<br />
mere provision of services. There is no point in delivering eGovernment services if they are not used, or<br />
do not deliver the expected benefits to users. The end results must reflect the outcome they deliver for<br />
citizens, businesses, and government itself. The overall sophistication of service clusters with respect to<br />
features of eGovernment services is shown for the EU27+ in Figure 1. Slovenia is in the top five countries<br />
for which sophistication, availability, and the One Stop Shop approach is considered lagging behind when<br />
accessibility and user experiences and satisfaction are measured. The research report on the other hand<br />
praises Slovenia’s portal site http://e-uprava.gov.si/euprava/ as an all-in-one gateway both to the<br />
Slovenian government and EU initiatives; and Slovenia’s One Stop Shop for companies, e-VEM, which<br />
received the United Nations Public Service Award.<br />
Source: 8th Benchmark Measurement, Capgemini, November 2009.<br />
Figure 1: Sophistication of service clusters in the EU27+<br />
The Capgemini report states that “the Pan-EU eGovernment for most countries is a national affair. No<br />
countries have explicit targets for cross-border service development. Newer [EU member states] would<br />
appear to look more to <strong>European</strong> policy for guidance (i2010), potentially as in some of these countries the<br />
management of eGovernment and structural funds falls within the same organization. A growing and now<br />
considerable number of EU countries have elected however to participate in pan-<strong>European</strong> large scale<br />
pilots. The four major CIP ICT PSP (competitiveness and innovation program) pilots are actively<br />
supported, notably by several of the higher performing countries. Austria for example is active across all<br />
large-scale CIP pilots (pilot A). This affords the opportunity to observe, learn from, and potentially<br />
influence technology developments within Europe”.<br />
Figure 2 shows the e-Procurement process as it has developed in Slovenia. In the Capgemini report it is<br />
described as a country that has one of the best scores for the e-notification sub-phase, but its Pre-Award<br />
Process indicator is under the EU27+ average. Its e-award and e-submission scores are among the<br />
71
Jaro Berce et al.<br />
lowest in Europe; Slovenians and foreigners can access a mandatory national e-procurement platform<br />
free of charge and without prior registration.<br />
Source: 8th Benchmark Measurement, Capgemini, November 2009.<br />
Figure 2: eProcurement process development in Slovenia<br />
5. Conclusions<br />
The development of pan-<strong>European</strong> IT service companies will bring great benefits to EU citizens; it will<br />
facilitate the settlement of their affairs with the government, especially when their affairs occur outside<br />
their home countries. To achieve this goal, we need interoperability, which plays a crucial role in the<br />
development of more efficient, quality, and overall user-friendly services. Interoperability is also critical in<br />
establishing a single <strong>European</strong> market. It is therefore not surprising that at the <strong>European</strong> Ministerial<br />
<strong>Conference</strong> in Lisbon (2007) interoperability was at the top of the four strategic objectives of<br />
eGovernment. They also point out that the <strong>European</strong> Union through the ICT Policy Support Programme<br />
(PCP) project will specifically promote the development of e-procurement and the mutual recognition of<br />
electronic identification. In addition, the EU will promote the establishment of interoperability in<br />
conjunction with the requirements of the Services Directive. We expect that the Member States will set<br />
new priority areas of development of pan-<strong>European</strong> services. In line with this orientation, the cross-border<br />
interoperability as the key to the development of pan-<strong>European</strong> services was also one of the key strategic<br />
directives of the Slovenian EU Council Presidency in the first half of 2008.<br />
Interoperability of services and products in the field of ICT is one of the most important conditions for<br />
successful development of an information society. The ICT market is constantly evolving, spurred by a<br />
globalised approach, competition, liberalisation of telecommunications services, convergence of ICT, and<br />
increasingly also by media technologies and services. Therefore, we can summarise the results from the<br />
telephone survey in two ways:<br />
Interviewers opinion was that eGovernment services are very complex and use a lot of resources<br />
during their introduction but are still needed even in cases where they are not well accepted or used<br />
by users; and<br />
Users’ perspective should be more accurately used in designing and in prioritising which services to<br />
be introduced.<br />
References<br />
CIP_ICT_PSP (2009) ICT for sustainable and interoperable health services, October 2009, Available:<br />
http://ec.europa.eu/information_society/activities/health/cip_ict_psp/index_en.htm [24 Jan 2011].<br />
Colclough, G., and Tinholt, D. (2009) 8th Benchmark Measurement, Capgemini worldwide, Available:<br />
http://www.capgemini.com/insights-and-resources/by-publication/2009-eGovernment-benchmark/ [14 Mar<br />
2011].<br />
COM2004 (2009) eHealth - making healthcare better for <strong>European</strong> citizens: an action plan for a <strong>European</strong> eHealth<br />
area, October 2009, Available: http://eurex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52004DC0356:EN:NOT<br />
[24 Jan 2011].<br />
COM(2006)45final (2009) Communication from the Commission to the Council and the <strong>European</strong> Parliament,<br />
Interoperability for Pan-<strong>European</strong> eGovernment Services, October 2009, Available:<br />
http://ec.europa.eu/idabc/servlets/Doc?id=24117 [24 Jan 2011].<br />
72
Jaro Berce et al.<br />
COM2008 (2008) A community framework on the application of patients' rights in cross-border healthcare, October<br />
2009, Available: http://ec.europa.eu/health-eu/doc/com2008415_en.pdf [24 Jan 2011].<br />
COM(2008)3282final (2008) Commission recommendation on cross-border<br />
interoperability of electronic health record<br />
systems, October 2008, Available:<br />
http://ec.europa.eu/information_society/newsroom/cf/document.cfm?action=display&doc _id=510 [24 Jan 2011].<br />
CPSC (2008) Connecting public communities, <strong>European</strong> review of political technologies, Volume 7, October 2008,<br />
Brussels: Politech Institute.<br />
De Vriendt,<br />
K. (2005) Pan-<strong>European</strong> eGovernment services (IDABC). Enterprise and Industry Directorate General,<br />
June 16, 2005, Available: http://www.is.lt/ida/files/2005_ivadas.pdf [24 Jan2011].<br />
Digital Agenda for Europe 2010-2010,<br />
http://ec.europa.eu/information_society/digital-agenda/index_en.htm [24 Jan<br />
2011].<br />
eEpoch2 (2003) e-ID and the information society in Europe, white paper, sept. 2003, Available:<br />
http://www.eepoch.net/documents/public/WhitePapers/eepoch_white_paper.pdf [24 Jan 2011].<br />
eGovernment Action plan 2011-2015: Harnessing ICT to promote smart, sustainable & innovative Government.<br />
http://ec.europa.eu/information_society/activities/eGovernment/action_plan_2011_2015/docs/action_plan_en_a<br />
ct_part1_v2.pdf [24 Dec 2010].<br />
eProcurement (2008) The eProcurement Map, A map of activities having an impact on the development of <strong>European</strong><br />
interoperable eProcurement solutions. <strong>European</strong> Commission, Directorate-General for Informatics. December<br />
2008, Available: http://ec.europa .eu/idabc/servlets/Doc?id=31968 [24 Jan 2011].<br />
<strong>European</strong> Commission (2008): <strong>European</strong> Interoperability Framework Version 2, EIF 2.0 – draft document. <strong>European</strong><br />
Commission, November 2008.<br />
Europe’s Information Society Thematic Portal, Pan-<strong>European</strong> members and services, Available:<br />
http://ec.europa.eu/information_society/policy/ecomm/current/pan_european/index_en.htm [24 Jan 2011].<br />
Glott, R., and Haaland, K. (2007) Innovative<br />
and adaptive pan-<strong>European</strong> services for citizens in 2010 and beyond—<br />
Pan-<strong>European</strong> eGovernment services: An assessment of their potential based on the GPF and<br />
IDABC good<br />
practice framework, Available: http://www.euregov.eu/deliverables/reports/WP2%20D1_final.pdf [24 Jan 2011].<br />
IDABC2004 (2004) <strong>European</strong> interoperability framework for pan-european eGovernment services, oktober 2009,<br />
Available: http://ec.europa.eu/idabc/servlets/Doc?id=19529 [24 Jan 2011].<br />
IDABCeID<br />
(2009) Preliminary study on mutual recognition of eSignatures for eGovernment applications, december<br />
2009, Available: http://ec.europa.eu/idabc/en/document/6485 [24 Jan 2011].<br />
Järv, M., Vali, I. (2009) Estonian company registration portal accepts digital, signatures<br />
given in other countries, RIK<br />
Center of Registers and Information Systems. CrossBorderDS, Available:<br />
http://www.epractice.eu/files/Company_registrationl_eng1.pdf [24 Jan 2011].<br />
PEPPOL-ISP(2009): Opening doors to cross-border business. Pan <strong>European</strong> public procurement Online, Available:<br />
http://ec.europa.eu/information_society/apps/projects/factsheet/index.cfm? project_ref=224974 [24 Jan 2011].<br />
RIS ( 2009) Alternativne plačilne metode pri e-nakupovanju, February 2009, Available:<br />
http://www.ris.org/2009/02/Novice/_Alternativne_placilne_metode_pri_enakupovanju/?&p2=285&p3=1354&p4=<br />
1356&id=1356 [24 Jan 2011].<br />
SMART 2006/0064. Impact of information society options on the development of pan-<strong>European</strong><br />
public e-services,<br />
Available: http://ec.europa.eu/information_society/activities/eGovernment/studies/docs/final_report_web.pdf [24<br />
Dec 2010].<br />
SMART 2007/0052. Guidelines on sustainable business models for inclusive public service delivery, Lot 1 and Lot 2,<br />
Available:<br />
http://ec.europa.eu/information_society/activities/eGovernment/policy/inclusion/docs/mc_egov_final_report.pdf<br />
[24 Dec 2010].<br />
SMART 2008/0042.<br />
i2010 eGovernment action plan progress study, Available:<br />
http://www.dti.dk/_root/media/37436_i2010%20eGovernment%20Action%20Plan%20-<br />
%20Progress%20Study.pdf<br />
[20 Dec 2010].<br />
SMART 2009/0069. Study on Multi-channel delivery strategies and sustainable business models for public services<br />
and addressing socially disadvantage groups, Available:<br />
http://ec.europa.eu/information_society/activities/eGovernment/policy/inclusion/docs/mc_egov_final_report.pdf<br />
[20 Dec 2010].<br />
STORK - PP (2008) Frank LEYMAN: STORK - Project Presentation.<br />
Available:<br />
http://www.riserid.eu/fileadmin/user_upload/Datei/konferenz/Session4_Leyman_RISER_4th_<strong>Conference</strong>_1010<br />
2008.pdf [24.1.2011].<br />
Strategija e-uprave RS za obdobje od leta 2006 do leta 2010 - SEP-2010, Available:<br />
http://e-uprava.gov.si/e-<br />
uprava/edemokracijaStran.euprava?pageid=516 [24.1.2011].<br />
Vintar, M., Kunstelj, M., Keržič, D. (2010): Razvoj pan-evropskih storitev informacijske družbe v Sloveniji, Available:<br />
http://www.ris.org/uploadi/editor/1290434751ZAKLJUCNO_POROCILO_FINAL.pdf [15 December 2010].<br />
Weehuizen, R., and van Oranje, C. (2007) Innovative and adaptive pan-<strong>European</strong> services for citizens in 2010 and<br />
beyond Pan-<strong>European</strong> eGovernment Services (PEGS) in perspective: function, forms, actors, areas, pathways<br />
and indicators. Deliverable WP3.D1; June 1, 2007, DRAFT version 0.8; Prepared for DG Information Society<br />
&<br />
Media of the <strong>European</strong> Commission, http://www.euregov.eu/deliverables/reports/WP3_Indicators.pdf<br />
[24.1.2011].<br />
73
Enhancement of Public Service Effectiveness by Partially<br />
Automating Service Request Paper Forms Using Citizen ID<br />
Smartcard<br />
Choompol Boonmee 1 , Rattapol Chatchumsai 1 , Tawa Khampachoa 2 and Chakri<br />
Chuenurah 3<br />
1<br />
Thammasat University Rangsit Campus, Pathumthani, Thailand<br />
2<br />
King Mongkut’s University of Technology North Bangkok, Bangkok, Thailand<br />
3<br />
Department of provincial administration, Bangkok, Thailand<br />
choompol@tu.ac.th<br />
rattapol@thaiidcard.net<br />
twk@kmutnb.ac.th<br />
chakri@dopa.go.th<br />
Abstract: Since the year 2004 Thai citizens older than 15 years old are required to have citizen identification card by<br />
law to certify his/her citizenship. Thai citizen ID card has a microchip as a secured personal information storage<br />
called smartcard. The information can be retrieved electronically by using standard ISO 7816 compliant smartcard<br />
reader. Traditionally in order to access public service, citizens need to fill out service request paper forms. The form<br />
details include personal information which is stored in the card. The idea is to enhance the effectiveness of existing<br />
public service without or with less change of practice by utilizing the information in the card. A number of local<br />
governments involved in the project to providing more effective service to their people. The results indicate that using<br />
citizen ID smartcard enhance public service efficiency in local government. It reduced time used in filling out service<br />
request form and reduced time consumed by service record.<br />
Keywords: smartcard, citizen ID card, eGovernment, public service effectiveness<br />
1. Introduction<br />
A number of countries are issuing electronic ID cards to their citizens (Robert 2002) (Georg 2009) (Pan<br />
2010). Using those cards public agencies can provide better services to their citizens easier. Most main<br />
objectives are to improve security in online services and unify authentication (Herbert 2002)<br />
(Ramaswamy 2008) (Chen 2010) (Yen-Cheng 2005). However not only for securely authentication<br />
mechanism that the smartcard can function it can also be used as small information storage.<br />
In Thailand since the year 2004 Thai citizens older than 15 years old are required to have citizen<br />
identification (ID) card by law to certify his/her citizenship.<br />
Figure 1 shows Thai citizen ID card. A set of citizen registration information is printed on the card surface.<br />
It includes the 13 digits of citizen identification (ID) number, the person name in Thai, the person name in<br />
English, the registered address in Thai, the card issued date, the expire date and the person photo<br />
image.<br />
Figure 1: Thai citizen ID card<br />
74
Choompol Boonmee et al.<br />
Thai citizen ID card is an electronic ID card which can also be used as secured personal information<br />
storage. The stored personal information can be retrieved electronically by using standard ISO 7816<br />
compliant smartcard reader. Basically the information which can be retrieved electronically is the set that<br />
is printed on the card surface.<br />
Since Thai citizen ID card is contact type smartcard, not contactless type, it is impossible to retrieve the<br />
information without inserting the card into the card reader. If the citizen does not want to provide their<br />
personal information in the card, he/she can keep their card information by not inserting it in the reader.<br />
The electronic citizen information in the ID card includes the same as printed on the card surface. It<br />
consumed less than a second to retrieve text data. It takes around 8 second to retrieve the person image.<br />
More than 30 million citizen ID cards have been issued to Thai citizens. Presently most of Thai people do<br />
have the smartcard as national ID card.<br />
There are a lot of public services provided by government agencies, for examples birth certificate service<br />
when a baby was born. In order to access such public services typically we need to fill out various kinds<br />
of request paper forms.<br />
Figure 2 shows a sample of public service request form. The citizen needs to find the request paper form<br />
which normally distributed for free at the government office. After fill out the form then the requester<br />
submits it to the officer in charge at the office. There are a lot of blanks in the form which need to be filled<br />
out, for examples, service requester name, address, age, request date and etc. After get the request form<br />
and filling it out, the requester needs to submit the completed form to the officer.<br />
Figure 2: The sample of public service request paper form used to access public service<br />
Figure 3 shows the typical process of public service access performed in Thai government agencies<br />
presently. Thai citizen who wants to access the public service have to get the request paper form, fill the<br />
form out and then submits the completed form to the officer at the government office. The officers then<br />
process the service which may be different from one to others. After finishing the process they may need<br />
to record the process in paper based style or may be in electronic based style or both. Most of public<br />
services are provided basically in paper based. Public services have been provided for a very long time.<br />
Various kinds of officers involved in the process. A large change to the process may introduce troubles<br />
and resistances.<br />
In Thailand there are many government agencies which provide public services to their citizens. They are<br />
ministerial departments, provinces, cities, municipalities, other local administration offices and so on.<br />
There are more than seven thousand offices of government agencies that provide such public services to<br />
their citizens. To reorganize the overall and details of the service process is very difficult and very timeconsuming.<br />
However it is required to take advantage of the information and communication technology<br />
(ICT) to improve public services. In this paper we focused on utilizing the already existing ICT<br />
75
Choompol Boonmee et al.<br />
infrastructure with less process change to maximize the effectiveness of public services and to minimize<br />
the time consumed.<br />
Figure 3: The typical process of public service access<br />
2. Form filling time consumed and the ID card<br />
In order to access the public service of the government agencies, citizens need to get the request paper<br />
form, to fill out the form, to submit the form, and to interact with the officers during the process until the<br />
service is finished. After finishing the service, the officers may need to record or conclude the service<br />
providing. We studied the time consumed by those processes.<br />
Figure 4 shows the result of studying the time consumed in some public service processes. It takes up to<br />
1 minute in ‘get the request form’ process. It takes 2 to 10 minutes in ‘fill out the form’ process which is<br />
hand-writing process. In this filling the form process, the information needed to be filled out includes<br />
various things. It includes the personal information of the requester which is the same set of the<br />
information that can be retrieved from the ID card. It takes 3 minutes as an average value to fill out this<br />
in-card information. It includes the identification number, title, given name, family name, address, street,<br />
city sub-division, city, country sub-division, birth date, card issue date and expire date. It also includes the<br />
information which can be computed automatically such as current age of the citizen, current date and so<br />
on. After finishing filling out the request form, the citizen can submit the form to the officer for the service<br />
requested. Then after the service process has done, the officer need to record or conclue the service<br />
provided which takes about 5 to 30 minutes.<br />
Figure 4: The study of time consumed in public service process<br />
We proposed the methodology to improve the public service process by using the national ID card to<br />
minimize the time consumed in some process especially hand-writing process and recording process. We<br />
focused on using the information which can be retrieved electronically automatically from the card with<br />
less change of the existing process. Figure 5 shows the processes that need to be added or modified;<br />
‘insert ID card’, ‘choose and print the form partially filled out’ and ‘record the service’ to get the advantage<br />
from using the ID card. Since the hand-writing process can be partially automated by retrieving the<br />
information from the ID card and the recording process can be automated electronically by the computer<br />
software, the significant improvement of service process time consumed and accuracy of service data<br />
can be expected.<br />
76
Choompol Boonmee et al.<br />
Figure 5: Study of public service process in which the ID card can be utilized to improve time consumed<br />
and effectiveness<br />
3. Service effectiveness enhancement<br />
We proposed to develop software that can perform the automation mentioned above. The software is<br />
supposed to retrieve personal information from the ID card, generate the public service request form and<br />
fill it out based on the card information and the extra input data from keyboard. The software should<br />
automatically produce the public service request form with partially filled. Therefore less blank space left<br />
on the printed form, less hand writing effort is required. This makes the time consumed in ‘get the form’<br />
and ‘filling the form’ process shorter. This also makes the information filled in the form more accurate.<br />
This makes the service recording process get done electronically without further work. The officers can<br />
use the electronically recorded information to make their reports.<br />
Figure 6 shows the concept of form generation software proposed in this paper. When citizens want to<br />
access the public service, instead of getting the blank form from the officer, they insert the ID card into<br />
the software, then they can choose the service request form from the templates. After printing the request<br />
form the citizen may need to write/sign some additional information to the form but much less than before<br />
using the software. This resulted less time consumed in ‘get the form’ and ‘filling the form’ process.<br />
Figure 6: This shows the form generation software which retrieves personal information from ID card to<br />
partially fill out and input extra information to the public service request form<br />
When choosing from the form templates and input additional information into the form, the software also<br />
records the transaction in the storage of the computer in the open standard format such as text, comma<br />
separated value (CSV) and XML. If the officers need to record the service providing at the end of the day,<br />
they can collect the records automatically stored by the software to edit or to reorganize the data as they<br />
want by using their familiar software without special skills.<br />
4. Software development<br />
We designed and developed computer software to automatically generate request form filled out with the<br />
information retrieved from the card and input from keyboard. The form generation software retrieves the<br />
from which the user chose from the templates, fill out the information from the ID card and keyboard<br />
input, then print out for the service requester. We prepared a hundred of forms widely used in Thai public<br />
services and store them in the form templates. This assisted the officers in government agencies that<br />
involved in our project to enhance the effectiveness of the public service process. It has been developed<br />
77
Choompol Boonmee et al.<br />
using java technology. It can be executed on various operating system widely used presently without any<br />
software modification. The existing computer, printer and operating system software can be used. All the<br />
users have to do is to get ISO-7816 compliant smartcard reader that works well with the existing<br />
computer which can be obtained easily and cheap.<br />
Figure 7 shows the main screen shot of the form generation software. It works with standard smart card<br />
reader. When we insert the Thai nation ID card into the reader, the information is retrieved automatically.<br />
The retrieved information is displayed on the software main screen as shown in the figure. It includes<br />
personal information, name, address, birth date, issue date, expire date and etc. After waiting for about 8<br />
seconds the person photo image is also displayed on the screen. Additionally the software also retrieves<br />
the current image from web camera attached to the computer and display on the screen. The user who<br />
may be the officer or the citizen himself may choose the public request form from the form templates<br />
prepared.<br />
Figure 7: This is the main screen shot of public service request form generation software<br />
Figure 8 shows the example of selected public service request form filled with requester information from<br />
the ID card with some extra input date. This example shows the personal photo image retrieved from the<br />
ID card printed on form.<br />
Figure 8: The selected public service request form filled with requester information from the ID card and<br />
some extra input data<br />
78
5. Experiments<br />
Choompol Boonmee et al.<br />
In Thailand there are many government agencies which provide public services to their citizens. They are<br />
ministerial departments, provinces, cities, municipalities, other local government administration offices<br />
and so on. Department of provincial administration started a pilot project to promote and to exercise the<br />
use of national ID card in public services. A number of local government administration offices involved in<br />
the pilot project. We have performed some experiments by adopting the form generation software<br />
developed in this research in some real public service process.<br />
Pibun Mangsahon is a municipality located in north east of Thailand. Its population is around 15 thousand<br />
people. The mayor agreed to involve in the pilot project by adopting the form generation software in some<br />
service process. One of the earlier adopted services is the request form to utilize the municipality facility.<br />
The request paper form includes one page request form and four pages contract forms. We measured<br />
the time consumed to filling out the form before and after using the software. Before using the software it<br />
consumed 9 minutes as average value to access the service. After using the software in service process<br />
it consumed only 3 minutes. The time consumed by the public access process decreased significantly.<br />
6. Conclusions<br />
Since the year 2004 Thai citizens older than 15 years old are required to have citizen identification card<br />
by law to certify his/her citizenship. Thai citizen ID card has a microchip as a secured personal<br />
information storage called smartcard. Traditionally in order to access public service, citizens need to fill<br />
out service request paper forms. The forms details include personal information which is stored in the<br />
card. The idea is to enhance the effectiveness of existing public service without or with less change of<br />
practice by utilizing the information in the card. A number of local governments involved in the project to<br />
providing more effective service to their people. The results indicate that using citizen ID smartcard<br />
enhance public service efficiency in local government. It reduced time used in filling out service request<br />
form and reduced time consumed by service record.<br />
Acknowledgements<br />
We thank to the department of provincial administration and electronic data interchange promotion<br />
association (http://www.edipa.org/) to provide support of the project. We also thank to all government<br />
agencies for the great contributions especially Phibun Mangsahan municipality.<br />
References<br />
Chen Yang, Zhengtao Jiang, Jianjun Yang, (2010) “Novel Access Control Scheme with User Authentication Using<br />
Smart Cards”, cso, vol.2, 2010 Third International Joint <strong>Conference</strong> on Computational Science and<br />
Optimization, pp.387-389.<br />
Georg Aichholzer , Stefan Strauss (2009) “The Citizen's Role in National Electronic Identity Management - A Casestudy<br />
on Austria”,<br />
2009 Second International <strong>Conference</strong> on Advances in Human-Oriented and Personalized Mechanisms,<br />
Technologies, and Services, pp. 45-50<br />
Herbert Leitold, Arno Hollosi, Reinhard Posch, (2002), “Security Architecture of the Austrian Citizen Card Concept”,<br />
acsac, 18 th Annual Computer Security Applications <strong>Conference</strong> (ACSCC ’02), pp 391<br />
Pan Tiejun, Xiong Chunlei, Zheng Leina, Han Yufeng, Bai Lingbin, (2010) “ONE-CARD System based on the second<br />
generation ID card in China”, ice, 2010 International <strong>Conference</strong> on E-Business and EGovernment, pp 108-111.<br />
Ramaswamy Chandramouli, (2008) “Policy Specification and Enforcement for Smart ID cards deployment”, 2008<br />
IEEE Workshop on Policies for Distributed System and Networks, pp 127-134.<br />
Robert Nitschke, (2002) "National ID card, electronic ID card becomes reality in Europe", [online] NOVOSEC<br />
Aktiengesellschaft,http://www.novosec.com/documents/eCommerce_ElectronicIDcard.pdf<br />
Yen-Cheng Chen, Lo-Yao Yeh (2005) “An Efficient Authentication and Access Control Scheme Using Smart Cards”,<br />
11 th International <strong>Conference</strong> on Parallel and Distributed Systems –Workshops (ICPADS’05), icpads, vol.2,<br />
pp.78-82.<br />
79
Development of User Authentication for web Application<br />
Sign-on Mechanism Using Oasis SAML Standard With Thai<br />
Citizen ID Card<br />
Choompol Boonmee 1 , Peera Tharaphant 1 and Pipop Damtongsuk 2<br />
1<br />
Thammasat University Rangsit Campus, Pathumthani, Thailand<br />
2<br />
Department of provincial administration, Bangkok, Thailand<br />
choompol@tu.ac.th<br />
peera@thaiidcard.net<br />
pipop@dopa.go.th<br />
Abstract: This paper presents a personal authentication sign-on mechanism using oasis SAML standard with citizen<br />
ID smart card. In Thailand a number of web application style online public service have been developed to serve a<br />
better service for citizens. The most frequently used user authentication mechanism is password. The users need to<br />
remember their unique password. And for security reason they may need to change their password periodically. If<br />
single sign-on solution is not deployed they may need to remember a number of different passwords for different<br />
system. It is not effective for the real situation user authentication methodology. However single sign-on solution<br />
need to be open-standard, product neutral and developer independent to allow widely deployment. The Organization<br />
for the Advancement of Structured Information Standards (OASIS) has developed SAML standard which can be<br />
used as an open-standard for sign on mechanism. In addition since the year 2004 Thai citizens older than 15 years<br />
old are required to have citizen ID card by law to certify his/her citizenship. Thai citizen ID card has a microchip as a<br />
secured personal information storage and personal authentication device called smartcard. In this paper we<br />
proposed the user authentication sign-on mechanism using oasis SAML standard with Thai citizen ID card. We<br />
developed software system based on this proposed mechanism. This prototype development software has been<br />
used in a number of government agencies in order to enhance the effectiveness of public service.<br />
Keywords: online service, single sign on, user authentication, citizen ID card<br />
1. Introduction<br />
Authentication is the process of identifying an individual who interacts with a computer system.<br />
Authentication ensures that the individual is who he or she claims to be. Generally there are three types<br />
of authentication mechanisms; by something you know (nobody else knows), by something you have<br />
(nobody else has) and by something identifies who you are (nobody else is you). In computer networks<br />
including the Internet, authentication is commonly done through the use of login passwords which is ‘by<br />
something you know’ mechanism. In Thailand a number of web application style online public service<br />
have been developed to serve a better service for citizens. Examples include social security service,<br />
business registration service, and etc. To enable a service to an individual citizen, authentication<br />
mechanism is required. Most of online service applications have their own account management and<br />
their own user authentication mechanism as shown in figure 1. Mostly used authentication mechanism is<br />
user name and password. Since there are many software systems provided, a citizen has to remember<br />
many combinations of user names and passwords. This is one of the hurdles that electronic public<br />
services have not been successful.<br />
Figure 1: Multiple service providers exist with their own account database management<br />
80
Choompol Boonmee et al.<br />
If a citizen wants to access several electronic services at the same time, he/she typically needs to browse<br />
multiple web page addresses or URLs and needs to sign on several times. This makes the services<br />
access not efficient and not effective. Moreover he/she needs to sign out from those services several<br />
times for security.<br />
For the first use, most of the systems let each citizen to register to make his/her account by input<br />
personal information through registration web site, citizen identification number (ID), name in Thai, name<br />
in English, registered address and so on, despite of those information have stored in citizen registration<br />
database. After registration the system may send the password through e-mail or SMS. This process<br />
typically takes time, depending on applications and conditions, typically about 5 to 10 minutes.<br />
Additionally since the personal information is input through keyboard, due to the low accuracy of<br />
information, for examples, wrong address, wrong spelling and etc. In the legal transaction this becomes<br />
even more important.<br />
A number of countries are issuing electronic ID cards to their citizens (Robert 2002) (Georg 2009) (Pan<br />
2010). Using those cards public agencies can provide better services to their citizens easier. Most main<br />
objectives are to improve security in online services and unify authentication (Herbert 2002)<br />
(Ramaswamy 2008) (Ramaswamy 2007) (Chen 2010) (Yen-Cheng 2005) (Bae-Ling 2009)<br />
(Abdulrahman 2009)(Minwei 2009)(Adam 2009)(Raja 2010)(Starr 2003)( Hamed 2003). However not<br />
only for securely authentication mechanism that the smartcard can function it can also be used as small<br />
information storage. In this paper we introduced the use.<br />
Since the year 2004 Thai citizens older than 15 years old are required to have citizen ID card by law to<br />
certify his/her citizenship. Thai citizen ID card has a microchip as a secured personal information storage<br />
and personal authentication device called smartcard.<br />
Figure 2 shows Thai citizen ID card. A set of citizen registration information is printed on the card surface.<br />
It includes the 13 digits of citizen identification (ID) number, the person name in Thai, the person name in<br />
English, the registered address in Thai, the card issued date, the expire date and the person photo<br />
image. More than 30 million citizen ID cards have been issued to Thai citizens by department of<br />
provincial administration (DOPA). Thai citizen information is stored in citizen database at DOPA.<br />
Presently most of Thai people do have the smartcard as national ID card.<br />
Figure 2: Thai citizen ID card, issuance process and citizen database<br />
Thai citizen ID card is an electronic ID card which can also be used as secured personal information<br />
storage. The stored personal information can be retrieved electronically by using standard ISO 7816<br />
compliant smartcard reader. Basically the information which can be retrieved electronically is the<br />
information set that is printed on the card surface.<br />
Figure 3 shows that personal information stored in the card can be retrieved into the computer via<br />
smartcard reader. Since Thai citizen ID card is contact type smartcard, not contactless type, it is<br />
impossible to retrieve the information without inserting the card into the card reader. If the citizen does<br />
not want to provide their personal information in the card, he/she can keep their card information by not<br />
inserting it in the reader. The electronic citizen information in the ID card includes the 13 digits of citizen<br />
81
Choompol Boonmee et al.<br />
identification number, the person name in Thai, the person name in English, the registered address in<br />
Thai, the card issued date, the card expire date and the person photo image, the same as printed on the<br />
card surface. It consumed less than one second to retrieve text data. It takes around 8 second to retrieve<br />
the person image.<br />
Figure 3: The citizen information stored in the ID card can be retrieved via smartcard reader<br />
If single sign-on solution is not deployed they may need to remember a number of different passwords for<br />
different system. It is not effective for the real situation user authentication methodology. However single<br />
sign-on solution need to be open-standard, product neutral and developer independent to allow widely<br />
deployment. This paper presents a personal authentication sign-on mechanism using oasis SAML<br />
standard with citizen ID smart card.<br />
2. Single sign-on using SAML and citizen ID card<br />
The Organization for the Advancement of Structured Information Standards (OASIS) has developed<br />
SAML standard which can be used as an open-standard for sign on mechanism. The main idea of this<br />
paper is to adapt the standard with the citizen ID card to improve the effectiveness. The targeted<br />
improvement includes<br />
Improve sign on method; easier with ID card<br />
Improve the security and reliability; with verifying the ID card and camera.<br />
Single sign on (SSO) for multiple applications<br />
Using open standard for interoperability<br />
Improve the access to the service applications easier and faster.<br />
Improve new account registration; faster and more accurate<br />
In order to make sign on process easier we introduced ‘insert card to log in’ style method. The user may<br />
not have to input URL to the Internet browser nor input the password. This makes sign on process much<br />
easier and faster. Since every Thai citizen has the citizen ID card by law, thus it can make sign-on more<br />
comfortable.<br />
In order to improve the security and reliability, the ID card will be verified with the card registration<br />
authority at online real-time. In addition, the user real time photo is recorded when signing on by using<br />
webcam. With the card verification the security and the reliability are improved. With the recorded camera<br />
image more visible evidences are provided when required in crime investigation.<br />
Additionally Security Assertion Markup Language (SAML) is an XML-based open standard for<br />
exchanging authentication and authorization data between security domains, that is, between an identity<br />
provider and a service provider. SAML is a product of the OASIS Security Services Technical Committee.<br />
The single most important problem that SAML is trying to solve is the Web Browser Single Sign-On<br />
(SSO) problem (Kaixing 2009) (Patrick 2009) (Takaaki 2009) (Greg 2008) (Christian 2008) (Weizhong<br />
2010).<br />
SAML assumes the principal has enrolled with at least one identity provider. This identity provider is<br />
expected to provide local authentication services to the principal. However, SAML does not specify the<br />
implementation of these local services; indeed, SAML does not care how local authentication services<br />
82
Choompol Boonmee et al.<br />
are implemented. In this paper since the citizen registration authority works likely as the identity provider,<br />
the user information can be verified by using the citizen registration database. Since SAML is the open<br />
standards, this can be widely deployed with high interoperability.<br />
In order to easier access to the web page, bookmark or favorite functions in the browser software is often<br />
helpful. However it helps only quickly access the web page. The user needs to authenticate by using<br />
account name and password in order to login without any browser assistant. We proposed to develop a<br />
software system to improve the Internet browsing and sign-on process. The access should be enabled<br />
automatically when citizen ID card is inserted without double-click. This improves the authentication<br />
process.<br />
As mentioned above presently a lot of online public services have been already provided via the Internet.<br />
For the first use of each service typically a citizen needs to register for new account. He/she has to take<br />
several steps from ‘create an account’ process to provide personal information and to verify the<br />
information, interacting with the systems for a while to obtain the account name and password. Not only<br />
inconvenient these processes do not guarantee the correctness and the accuracy of the information.<br />
However it takes a long time for each service. This makes the online public services not successful. We<br />
proposed the use of citizen ID card in the ‘create an account’ process. This makes the new account<br />
registration process faster, easier and more accurate.<br />
3. Software developments<br />
In this paper we proposed the user authentication sign-on mechanism using oasis SAML standard with<br />
Thai citizen ID card. We designed and develop a software system to implement the mechanism. The<br />
conceptual architecture of the software system is shown in figure 4.<br />
Figure 4: The conceptual architecture of SSO system with combination of SAML standards and Thai<br />
citizen ID card<br />
In Thailand the department of provincial administration (DOPA) is the citizen registration authority who<br />
issues the citizen ID card to Thai citizen. It manages the Thai citizen database. The database stores the<br />
citizen ID card issuance information. We introduced the Identity Provider defined under the SAML<br />
standard. The identity provider have access to the citizen database in order to verify the correctness of<br />
personal information retrieved from the ID card. As existing all service providers manage their own<br />
account database however at the client side or user side the citizen has access to the ID card via<br />
smartcard reader.<br />
83
Choompol Boonmee et al.<br />
Figure 5: The software architecture of the SSO software developed<br />
The authentication result has been recorded together with the user photo from the webcam attached to<br />
the client computer. This can be used as an evidence for later crime investigation if required.<br />
This SSO links with the Internet browser. Thus the authentication can be used by the browser in order to<br />
sign on the multiple applications without more account name and password input. Since this mechanism<br />
is developed based on the SAML open standard, it can be deployed widely with more and more<br />
applications.<br />
The newly developed SSO software has graphical user interface which interact with the users when card<br />
inserted as shown in figure 6. It is hidden when the ID card is not inserted. It becomes visible<br />
automatically immediately when the ID card is inserted. It communicates the SAML server, it retrieves the<br />
list of applications which the citizen often use through the attributes of SAML records. It helps the citizen<br />
by providing some shot-cuts to the applications to the citizen for more convenience. It helps the citizen to<br />
access the service with less clicks.<br />
Figure 6: The screen shot of the SSO software<br />
The SSO software can interact with the service provider applications during the ‘create a new account’<br />
phase in order to improve the new account registration process. The service provider applications that<br />
required this functionality need to modify their software by adding a pieces java scripts (about less than<br />
20 lines of code) in to their pages.<br />
4. Experiments<br />
Since more than 30 million citizen ID cards have been issued to Thai citizens, presently most of Thai<br />
people do have the smartcard as national ID card. It could be effective to provide a better service using<br />
the proposed mechanism in the real situation. This prototype development software has been used in a<br />
number of government agencies and public service applications in order to enhance the effectiveness of<br />
public service. Those applications includes health care services in hospitals and sanitariums,<br />
transportation services (buying tickets), banks and insurance services, education services (students<br />
enrollments), other public services and so on. Based our experiments and observation, we found that<br />
84
Choompol Boonmee et al.<br />
about 40% of Thai citizens carrying the ID card in their wallets, be able to obtain the benefit from the<br />
citizen card in services. However the real effectiveness need to be studied and measured more in the<br />
future.<br />
5. Conclusions<br />
In Thailand a number of web application style online public service have been developed to serve a<br />
better service for citizens. A new personal authentication sign-on mechanism using OASIS SAML open<br />
standard with citizen ID smart card have been introduced. We developed software system based on this<br />
proposed methodology. This makes sign on process easier with ID card. This improves the security and<br />
reliability by verifying the ID card and the camera. This helps multiple services access with a single sign<br />
on. This improves a new account registering process faster and more accurate. This prototype<br />
development software has been used in a number of government agencies in order to enhance the<br />
effectiveness of public service. However the real effectiveness need to be studied and measured more in<br />
the future.<br />
Acknowledgements<br />
We thank to the department of provincial administration and electronic data interchange promotion<br />
association (http://www.edipa.org/) to provide support of the project. We also thank to all government<br />
agencies for the great contributions.<br />
References<br />
Abdulrahman A.Mirza, Khaled Alghathbar (2009) “Acceptance and Applications of Smart Cards Technology in<br />
University Settings”, 2009 Eighth IEEE International <strong>Conference</strong> on Dependable, Autonomic and Secure<br />
Computing, dasc, pp.746-748.<br />
Adam N.Joinson, (2009) “Privacy Concerns, Trust in Government and Attritudes to Identity Cards in the United<br />
Kingkom”, 42 nd Hawaii International <strong>Conference</strong> on System Sciences, hicss, pp.1-10.<br />
Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu (2009) “A Robust Remote User Authentication Scheme Using<br />
Smart Card”, 2009 Second International Symposium on Electronic Commerce and Security, pp.7-11.<br />
Chen Yang, Zhengtao Jiang, Jianjun Yang, (2010) “Novel Access Control Scheme with User Authentication Using<br />
Smart Cards”, cso, vol.2, 2010 Third International Joint <strong>Conference</strong> on Computational Science and<br />
Optimization, pp.387-389.<br />
Christian Mauro, Ali Sunyaev, Jan Marco Leimeister, Andreas Schweiger, and Helmut Krcmar (2008) "A Proposed<br />
Solution for Managing Doctor's Smart Cards in Hospitals Using a Single Sign-On Central Arthitecture",<br />
Proceedings of the 41st Annual Hawaii International <strong>Conference</strong> on System Sciences (HICSS 2008), hicss,<br />
pp.256.<br />
Georg Aichholzer , Stefan Strauss (2009) “The Citizen's Role in National Electronic Identity Management - A Casestudy<br />
on Austria”,<br />
2009 Second International <strong>Conference</strong> on Advances in Human-Oriented and Personalized Mechanisms,<br />
Technologies, and Services, pp. 45-50<br />
Greg Goth (2008) "Single Sign-on and Social Networks", IEEE Distributed Systems Online, vol.9, no.12, pp.1<br />
Hamed Taherdoost, Mazdak Zamani, Meysam Namayandeh, (2009) “Study of smart card technology and probe user<br />
awareness about it: A case study of Middle Eastern students”, 2009 2 nd IEEE International <strong>Conference</strong> on<br />
Computer Science and Information Technology, iccsit, pp.334-338.<br />
Herbert Leitold, Arno Hollosi, Reinhard Posch, (2002), “Security Architecture of the Austrian Citizen Card Concept”,<br />
acsac, 18 th Annual Computer Security Applications <strong>Conference</strong> (ACSCC ’02), pp 391<br />
Kaixing Wu, Xiaolin Yu (2009) "A Model of Unite-Authentication Single Sign-On Based on SAML Underlying Web",<br />
2009 Second International <strong>Conference</strong> on Information and Computing Science, ISBN: 978-0-7695-3634-7,<br />
http://doi.ieeecomputersociety.org/10.1109/ICIC.2009.162<br />
Minwei He (2009) “The Research of Security Technology on E-commerce based on the second generation identity ID<br />
card and fingerprint”, 2009 Second International Symposium on Electronic Commerce and Security, isecs,<br />
vol.1, pp.394-397.<br />
Pan Tiejun, Xiong Chunlei, Zheng Leina, Han Yufeng, Bai Lingbin, (2010) “ONE-CARD System based on the second<br />
generation ID card in China”, ice, 2010 International <strong>Conference</strong> on E-Business and E-Government, pp 108-<br />
111.<br />
Patrick Harding, Leif Johansson, Nate Klingenstein (2008) "Dynamic Security Assertion Markup Language:<br />
Simplifying Single Sign-On", http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2008.31<br />
Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes (2010) “Simulator Problem in User Centric Smart<br />
Card Ownership Model”, 2010 IEEE/IFIP International <strong>Conference</strong> on Embedded and Ubiquitious Computing,<br />
euc, pp.679-686.<br />
Ramaswamy Chandramouli, (2008) “Policy Specification and Enforcement for Smart ID cards deployment”, 2008<br />
IEEE Workshop on Policies for Distributed System and Networks, pp 127-134.<br />
Ramaswamy Chandramouli, Philip Lee (2007), “Infrastructure Standards for Smart ID Card Deployment”, IEEE<br />
Security and Privacy, vol.5, no.2, pp 99-96.<br />
85
Choompol Boonmee et al.<br />
Robert Nitschke, (2002) "National ID card, electronic ID card becomes reality in Europe", [online] NOVOSEC<br />
Aktiengesellschaft,http://www.novosec.com/documents/eCommerce_ElectronicIDcard.pdf<br />
Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Briller (2003) “Public Attitudes towards a National Identity “Smart Card”<br />
Privacy and Security Concerns”, 36 th Annual Hawaii International <strong>Conference</strong> on System Sciences (HICSS’03)<br />
– Track 5, hicss, vol.5, pp.139a.<br />
Takaaki Komura, Yasuhiro Nagai, Shoichi Hashimoto, Makiko Aoyagi, Kenji Takahashi (2009) "Proposal of<br />
Delegation Using Electronic Certificates on Single Sign-On System with SAML-Protocol", 2009 Ninth Annual<br />
International Symposium on Applications and the Internet, saint, pp.235-238.<br />
Weizhong Qiang, Aleksandr Konstantinov (2010) "The Design and Implementation of Standards-Based Grid Single<br />
Sign-On Using Federated Identity", 2010 IEEE 12th International <strong>Conference</strong> on High Performance Computing<br />
and Communications, hpcc, pp.458-464.<br />
Yen-Cheng Chen, Lo-Yao Yeh (2005) “An Efficient Authentication and Access Control Scheme Using Smart Cards”,<br />
11 th International <strong>Conference</strong> on Parallel and Distributed Systems –Workshops (ICPADS’05), icpads, vol.2,<br />
pp.78-82.<br />
86
A Pilot Development of PKI Digital Signature on Electronic<br />
Correspondence Using Citizen ID Smartcards<br />
Choompol Boonmee 1 , Peera Tharaphant 1 and Pipop Damtongsuk 2<br />
1<br />
Thammasat University, Klong Luang, Pathumthani, Thailand<br />
2<br />
Department of provincial administration, Bangkok, Thailand<br />
choompol@tu.ac.th<br />
peera@thaiidcard.net<br />
pipop@dopa.go.th<br />
Abstract: Since 2006 among Thai government agencies, official correspondence letters electronic interconnections<br />
have been developed under national electronic government interoperability framework or e-GIF. The project involved<br />
more than 40 ministerial departments and more than 15 electronic document software developers. The official letter<br />
was signed on the paper using pen. Then it was digitalized using scanner, and then is sent to destination agency<br />
electronically by using national standard XML schema. In 2001 electronic transaction act was announced allowing<br />
digital signature can be legally used in electronic documents. Since the year 2004 Thai citizens older than 15 years<br />
old are required to have citizen ID by law to certify his/her citizenship. Thai citizen ID card has a microchip as a<br />
secured personal information storage called smartcard. It also has PKI signature function that can be activated to<br />
create digital signature on electronic documents. The idea is that to adapt PKI digital signature on electronic official<br />
correspondence letter by using PKI function on Thai citizen ID card. Four ministries involved in this pilot development<br />
projects using smartcard in digitally signing of official electronic letters. The findings show that change management<br />
of existing business process and culture becomes significant even though the project seemed to be technically<br />
successful.<br />
Keywords: citizen ID card, digital signature, smart card, government document<br />
1. Readiness and expectation for electronic correspondence letter<br />
In Thai government there are more than two hundred ministerial departments and more than 7000 local<br />
government administration offices. They communicate to each other by using official correspondence<br />
letters based on specified regulations. The official correspondence letters can also be applied as<br />
command systems between government agencies.<br />
In order to send/receive an official letter from/to an agency typically the following process sequence is<br />
executed. For sending agency the process starts with writing the draft letter, followed by signing the letter<br />
by the top governor, creating the unique letter identifier (ID) number, after recording the ID in the<br />
registration book then make a copy and store it in the archive, folding and putting into an envelope and<br />
then sending the letter to the receiver. For the receiving party the process starts with receiving the letter,<br />
checking the receiver of the letter written on the envelope, recording the received letter in the registration<br />
book, issuing the receive notification, sending the receive notification to the sender, make a copy then<br />
deliver the letter to the receiver.<br />
A lot of such paper based correspondence letters have been produced daily. However since the whole<br />
process have been performed based on paper, the process takes much time. This becomes obstacles to<br />
improve public service efficiency and quality. Since 2004, Thai government had been developing the<br />
methodology and procedure for the electronic official correspondence letters. The procedure of<br />
correspondence letters had been performed based on paper at the first stage. Then the electronic<br />
procedure of correspondence letters was then allowed legally in the second stage. The third stage is to<br />
establish the data standard to enable the interoperability (Thailand 2006) (Sunet 2008) (Apitep 2008)<br />
(Choompol 2009). However the document signing process stills base on written signature style which<br />
becomes much time-taken and ineffective in document management. The objective of this paper is to<br />
study what facilitation is required to enable and to encourage the use of digital signature.<br />
As mentioned above at the first stage the whole process had been performed based on paper. In the<br />
second stage there had been a number of attempts trying to adapt the information and communication<br />
technology (ICT) in the correspondence letter management process. Some agencies tried to adopt<br />
electronic mail as a letter sending methodology. Others developed particular software systems in order to<br />
manage the whole process electronically. Those developed software systems are called electronic<br />
correspondence letter management system (e-CMS). As a result a lot of different e-CMS software had<br />
been developed. However they could not communicate to each other because there was no standard<br />
87
Choompol Boonmee et al.<br />
data format in common. In November 2006 Thailand Electronic Government Interoperability Framework<br />
(TH e-GIF) was first announced in order to enable the electronic collaboration among e-Government<br />
software systems (Thailand 2006) (Sunet 2008). Then in the third stage of the e-CMS evolution, the<br />
common data format for the official letter is created and announced as the first Thai electronic data<br />
standard. By using the common data format more than 40 government agencies can send/receive letter<br />
to/from each other by using more than 15 different e-CMS software systems (Apitep 2008). From the<br />
stage 1 through stage 3 the correspondence letter had been signed on papers using pen. It is digitalized<br />
using scanner, and then is sent to destination electronically by using the national standard data format<br />
based XML schema (Choompol 2009). Thai government had planned to enter the next stage of official<br />
letter communications. In this paper we introduced methodology and procedure to adopt digital signature<br />
in government document. Therefore the fourth stage is to sign the official letter digitally using digital<br />
signature standard.<br />
Figure 1 shows the evolutions of electronic correspondence letter management system (e-CMS) in<br />
Thailand. There have been three stages of evolutions and the next stage of development as mentioned<br />
above. In the 1 st stage both letter sending and archive management have been performed based on<br />
papers. In the 2 nd stage there had been various kinds of management software which could not be<br />
interoperated electronically. The letter sending was performed based on paper but the letter archive could<br />
be managed electronically. In the 3 rd stage both letter sending and archiving could be performed<br />
electronically (Apitep 2008) but the letter is signed on paper using pen. In the 4 th stage the signature will<br />
be performed digitally using digital signature standard which the methodology and procedure need to be<br />
designed.<br />
Figure 1: Electronic correspondence letter management system (e-CMS) evolutions in Thai government<br />
In 2001 electronic transaction act was announced allowing digital signature to be legally used in<br />
electronic documents. Digital signature is a digital code that can be attached to an electronic data that<br />
uniquely identifies the signer. Like a written signature, the purpose of a digital signature is to guarantee<br />
that the individual signing the message really is who he or she claims to be.<br />
A number of countries are issuing electronic ID cards to their citizens (Robert 2002) (Georg 2009) (Pan<br />
2010). Using those cards public agencies can provide better services to their citizens easier. Most main<br />
88
Choompol Boonmee et al.<br />
objectives are to improve security in online services and unify authentication (Herbert 2002)<br />
(Ramaswamy 2008) (Ramaswamy 2007) (Chen 2010) (Yen-Cheng 2005). Since the year 2004 Thai<br />
citizens older than 15 years old are required to have citizen ID by law to certify his/her citizenship. Thai<br />
citizen ID card has a microchip as a secured personal information storage called smartcard. The ID card<br />
also has PKI signature function that can be activated to create digital signature on electronic documents<br />
(Xin 2009) (Luon-Chang 2008) (Starr 2003) (Hamed 2009). In this paper we introduce the methodology<br />
and procedure to use the ID card as a signing tool to create digital signature for government document. In<br />
2009 the ministry of information and communication technology (MICT) started the pilot project to<br />
develop the PKI digital signature on electronic correspondence letter by using the citizen ID smartcard.<br />
In the series of developments mentioned above, Thai government has developed their readiness for<br />
electronic correspondence letters. Presently more than 60 government units can manage their<br />
documents electronically. They can send/receive correspondence letter electronically. The required law<br />
for electronic document has been established. However for higher effectiveness in document system,<br />
further research and development on digital signature adoption is required.<br />
This paper consists of six sections. After the evolution background of electronic government document is<br />
mention in this first section, then we clarify the objective of this study in the next section. In the third<br />
section the proposed methodology and procedure of digital signature are explained. The software<br />
development is in the fourth. The observations and discussions are in the fifth section. The last is<br />
conclusions.<br />
2. The requirements toward digital signature<br />
Digital signature is a digital code that can be attached to an electronic data that uniquely identifies the<br />
signer. Like a written signature, the purpose of a digital signature is to guarantee that the individual<br />
signing the message really is who he or she claims to be. A Public Key Infrastructure (PKI) supports the<br />
application of digital signature technology. PKI is defined as "a set of policies, processes, server<br />
platforms, software and workstations used for the purpose of administering certificates and public-private<br />
key pairs, including the ability to issue, maintain, and revoke public key certificates."<br />
PKI involves the use of two cryptographic keys, one private and one public. Information encrypted with<br />
one key in the pair can only be decrypted with the other key. Private keys are generally stored securely<br />
on the user's equipment that may be called signing equipment which can be thought to be an electronic<br />
pen in written signature. The publicly available key is embedded in a certificate with personal details<br />
about the user. The key is easily distributed through the Internet. Figure 2 shows the concept of digital<br />
signature process. Digital signatures use PKI technology to create legally binding proof of signature for<br />
online transactions or contracts. A digital signature is based on a mathematical transformation that<br />
combines the private key with the data to be signed in such a way that: Only someone possessing the<br />
private key can create the digital signature, providing authentication of the signing party. Anyone with<br />
access to the corresponding public key can verify the digital signature, enabling a non-repudiate<br />
transaction. Any modification of the signed data invalidates the digital signature, providing integrity proof<br />
for the parties involved.<br />
Figure 2: Digital signature: signing process and verifying process<br />
89
Choompol Boonmee et al.<br />
Generally smartcard with PKI signing function stores the private key securely and should not be allowed<br />
to be out of the card. The document signing process will be performed only inside the smartcard.<br />
Therefore the result signature value could not be computed elsewhere except the card.<br />
Figure 3 shows Thai citizen ID card. Thai citizen registration information is printed on the card surface.<br />
Presently more than 30 million cards have already been issued to Thai citizens by department of<br />
provincial administration (DOPA). The ID card is able to embed PKI signature functionality to create<br />
digital signature of electronic document. By using the function, the ID card can be used as digital signing<br />
equipment. However until now DOPA have been issuing the ID cards without digital signature function.<br />
Figure 3: Thai citizen ID card is a smartcard issued by department of provincial administration. More than<br />
30 million cards have already been issued to Thai citizens<br />
Since the communication between government agencies correspondence letter occurs every day,<br />
implementing digital signature in the real situation affects daily operation. In paper based signing<br />
procedure the signer uses pen to make his/her signature on the paper. The existing correspondence<br />
letter paper based signing procedure needs to be studied carefully in order to design a new procedure for<br />
digital signature.<br />
Figure 4 shows the signing procedure in stage 3 which is paper based signing or written signature. In this<br />
case the signer can physically see and touch the paper. He or she can use a pen to create a written<br />
signature on the paper. The procedure starts with creating the letter, signing the letter, through digitalizing<br />
the letter into electronic format then send to the receiver electronically. Since the sent letters need to be<br />
received and to be understood by various kinds of e-CMS software systems, the common standard<br />
electronic format had to be openly specified. Electronic correspondence letter documents have to be<br />
formatted compliant with the common standard format. Thai government established and openly<br />
announced the electronic standard format for correspondence letter (Apitep 2008). However the standard<br />
format did not support digital signature.<br />
Figure 4: Correspondence letter signing procedure in stage 3: paper based written signature<br />
90
Choompol Boonmee et al.<br />
Figure 5 shows the common standard electronic format of Thai correspondence letter. The left picture<br />
shows the paper based letter format which has been used for a very long time compliant with Thai<br />
regulations. The eXtensible Mark-up Language (XML) had been used as a basic international standard<br />
for the electronic format. The format includes several parts; letter ID, subject, secret, speed, sender,<br />
receiver, main letter and etc. In this stage it did not include digital signature. This common format has<br />
been used to send/receive the correspondence letter among Thai government agencies in stage 3 as<br />
mentioned above.<br />
Figure 5: Standard electronic correspondence letter format has no digital signature support in stage 3<br />
The requirement, for adopting digital signature in electronic correspondence letter, includes the signing<br />
methodology, private key holding methodology, the new electronic standard format which support digital<br />
signature, a newly modified signing procedure and a pilot project to encourage the real use in daily<br />
operations. The idea proposed in this paper is to adapt PKI digital signature on electronic official<br />
correspondence letter by enabling PKI function on Thai citizen ID card, to design and modify the<br />
document format of government document to support digital signature, to design and/or modify the<br />
procedure for digitally document signing and to promote and to encourage the use by running a pilot<br />
project.<br />
3. Methodology and procedure to use ID card as a signing tool<br />
In this research we embedded PKI function into the ID cards. The digital certificates have been issued to<br />
document signers by certificate authorities (CA) which the signer preferred and is compliant with the<br />
electronic transaction act. We used the ID card as a secure private key storage. This allowed Thai citizen<br />
ID card to become a document signing tool.<br />
By connecting smartcard reader to a computer the software can send an electronic document to the card<br />
and request for signing to the device. Figure 6 shows the concept how it works. The computer creates an<br />
electronic document then request to the card for signing. To maintain the interoperability we specified the<br />
methodology to interface with the card to be compliant with the Hardware Security Modules Public-Key<br />
Cryptography Standards (PKCS#11), published by RSA Laboratories, according to TH e-GIF. After<br />
signing process the card return the computed digital signature value back to the computer. Then the<br />
digital signature is attached to the original document using a new proposed specific format stated later.<br />
In order to make use of digital signature some procedure changes have to be made. We introduced the<br />
procedure of correspondence letter signing and management as shown in figure 7. Unlike paper based<br />
document in figure 4-5 there is no need to print the document on papers. The drafted unsigned document<br />
is delivered to the signer electronically. The signer verifies the document using a computer then inserts<br />
the ID card into the card reader in order to make a digital signature on the document. And again not like<br />
91
Choompol Boonmee et al.<br />
paper based document since it is already in the electronic form, there is no need to digitalize the<br />
document. When the signer decides to sign, he/she inserts the ID card and authenticates by using<br />
password and may additionally authenticate by finger print. In this procedure there is no need to print out<br />
the letter to sign by the signer. For the receiver side, there is also no need to print out to the reader.<br />
These would shorten document management process time and result higher effectiveness.<br />
Figure 6: The use of the citizen ID card as digital signing equipment<br />
Figure 7: The proposed letter signing procedure using citizen ID card: digital signature<br />
However the signed document needs to be shared with other parties. Typically correspondence letter will<br />
be delivered electronically from sending party to receiving party. It may be referred to and/or be reused<br />
by other parties as well. It should be based on open standard, independent and self contained. Therefore<br />
the signed correspondence letter needs to be formatted in a specific format. Standard format of the<br />
electronically signed correspondence letter had been designed as shown in figure 8. It had been<br />
announced by the ministry of information and communication technology in 2010. It is designed based on<br />
Thailand electronic government interoperability framework (TH e-GIF) which is a collection of open<br />
standard specifications, for examples, UN/CEFACT Modeling Methodology (UMM) (UN/CEFACT 2006),<br />
UN/CEFACT Core Component Technical Specification (UN/CEFACT 2003), UN/CEFACT XML Naming<br />
and Design Ruls (UN/CEFACT 2006), XML Signature and etc.<br />
In order to implement the digital signature with citizen ID card in Thai government official correspondence<br />
letter three issues have be considered; 1.enabling PKI function of the ID card, 2.developing the signing<br />
software and 3.changing the letter signing procedure. Since the first two issues depend on specific<br />
vendors who are experts in the fields, thus there is not much problem in managing the issues. However<br />
the last issue ‘changing the signing procedure’ likely becomes the most significant. With the newly<br />
designed procedure we proposed a pilot project to encourage and to promote the real use in government<br />
agencies. A number of agencies involved in the pilot project.<br />
92
Choompol Boonmee et al.<br />
Figure 8: The standard electronic format of singed document was designed to be delivered interoperable<br />
4. Software developments and experiments<br />
The ministry of information and communication technology started the pilot project adopting the citizen ID<br />
card in digital signature on the correspondence letters. More than ten ministerial departments involved in<br />
this pilot development projects using smartcard in digitally signing official electronic letters. They include<br />
the prime minister office (PMO), the ministry of finance (MOF), the ministry of transportation (MOT) and<br />
the ministry of information and communication technology (MICT). Under MICT there are eight ministerial<br />
departments which also involved in the project. In the project three types of signing equipments were<br />
allowed; USB token type, generic PKI smartcard type, and PKI enabled citizen ID card. All of the signing<br />
equipments are compliant with program interface open standard PKCS#11. This allows a developed<br />
software system to interface with the various kinds of signing devices without code modification. In this<br />
pilot project forty PKI enabled citizen ID cards had been issued to document singers in the project.<br />
Document signing software is developed for document signing in this project.<br />
Figure 9 shows the architecture of the document signing software developed in this pilot project. Since<br />
the software is developed using java technology, it can be executed on various operation system<br />
including Microsoft windows, linux and etc. It works with PKCS#11 compliance signing devices. In this<br />
case we used the PKI enabled citizen ID card as a signing device.<br />
Figure 9: The developed software architecture for digital signature<br />
Figure 10 shows some screen shot of the developed digital signature creation software. When the<br />
program is executed the top bar background color is ‘yellow’ which indicates that not ready for signing.<br />
When the signer is ready he/she presses the button on the screen then the bar color becomes ‘green’<br />
which indicates that it is ready to receive a letter to sign. When the draft letter is created it will be sent<br />
from the central server to the signing software via the Internet using open standard specifications, for<br />
examples, https, reverse SOAP, ws-addressing, ws-security, etc. When the signing software received the<br />
document for signing the bar color becomes ‘orange’ which indicates that there is an unsigned document<br />
waited to be signed. Then after the signer verify the content of the letter properly, the signer then inserts<br />
the ID card into the card reader and input the password to create the digital signature. The software<br />
sends the document to the card to compute the signature value. The software retrieves the returned<br />
93
Choompol Boonmee et al.<br />
signature value put them together with the original document in the standard format specified. Then this<br />
signed document will be sent to the receiver by using standard communication protocols.<br />
Figure 10: Screen shots of digital signature software are shown; 1.wait for new unsigned letter, 2.the<br />
letter is ready to be signed and 3.It is prompted to alert the signer to insert the ID card and<br />
put the password to sign the letter<br />
5. Observations and discussions<br />
A number of ministerial departments involved in the pilot project of using digital signature. There were<br />
222 signers from those agencies involved in the project. The digital certificates have been issued for<br />
them. Among these signers forty of them chose Thai citizen ID cards as a signing tool or a private key<br />
holder. The newly designed procedure had been used for the correspondence letter signing procedure.<br />
The newly designed standard electronic format had been used to store the signed document for<br />
interoperability. The newly developed software has been used to sign the correspondence letter digitally.<br />
The observations of the experiments in the pilot project have been performed for more than three<br />
months. A number of correspondence letters have been created and digitally signed. In the project a<br />
number of people with different roles get involved; draft writers, signers, senders, receivers, document<br />
management staffs, and so on. All of them have been familiar with the legacy paper based signature for a<br />
long time. All agencies in the project developed and deploy their signing software. They started signing<br />
document following the procedure proposed, send/receive the correspondence letter following the<br />
standard formats, and some of them use citizen ID cards as signing tool.<br />
However since they have not been familiar with digital signature, they may have no confidence with pure<br />
digital signature without pen-based/paper-based signature. Most organizations in the project decided to<br />
use both signature methods to ensure the formality of the documents. Based on our observations, they<br />
first create the correspondence letter and print out on the paper. Then they let the signer firstly sign the<br />
document on the paper, then digitize it into electronic format using the standard. For the letter receivers,<br />
instead of reading the received letter via compute, they preferred to print out on the paper first then<br />
deliver to the reader.<br />
Figure 11 shows the procedure exactly used in the project. Instead of just writing the draft and send to<br />
the signer electronically as the proposed procedure, they firstly print out on papers, let the signer sign on<br />
the paper, then digitalize it into electronic format using scanner then digitally sign. Basically this is not<br />
against the procedure proposed since finally the letter is delivered to the signer electronically then is<br />
signed digitally using the ID card. For the receiver party, they preferred to print out on the paper for<br />
94
Choompol Boonmee et al.<br />
reading. However this additional extra process of paper base signing does neither shorten the time<br />
consumed nor enhance the effectiveness as expected.<br />
Figure 11: Base on the observation of using digital signature to replace legacy procedure in the pilot<br />
project, we found; a) the officer is not confident enough to purely sign digitally, he/she signs<br />
on the paper before digitalization and then digitally sign and b) he/she still need the<br />
touchable paper, he/she prints it out<br />
This may be because various people involved get used to the paper base documents for a long time.<br />
Based on our interviews, they need more practice regulation and/or guideline manuals to ensure the<br />
formality of the digital signature of the correspondence letter.<br />
6. Conclusions<br />
A number of signers in the project have been using the system to signing and sending the electronic<br />
correspondence letter for a period of time. Based on our observations and interviews we found that the<br />
significant obstacle is the change of the signing procedure. Various kinds of personnel involved in the<br />
procedure, from writing the draft letter, verifying the letter, signing methodology, registering the document<br />
and sending/receiving the letter. Especially the draft writer and the signer interact to each other most<br />
often until the letter is signed and sent. Based on our observations and interviews, it seems that they still<br />
need the touchable paper based signed documents, despite that the law approved the equality of<br />
electronic document and paper-base document. The findings showed that change management of<br />
existing business process and culture becomes significant even though the project seem to be technically<br />
successful. They need more specific regulations and practice guideline for more confidence. Future study<br />
on the change management and support was planned to be performed.<br />
Acknowledgements<br />
We thank to department of provincial administration and ministry of information and communication<br />
technology to provide support of the project. We also thank to all government agencies for the great<br />
contributions.<br />
References<br />
Apitep Saekow, Ajin Jirachiefpattana, Choompol Boonmee (2008) "Electronic Government Interoperability in<br />
Thailand: A Pilot Project on Official Electronic Correspondence Letters Exchange between Heterogeneous<br />
Software Products", 8th <strong>European</strong> <strong>Conference</strong> on E-Government.<br />
Chen Yang, Zhengtao Jiang, Jianjun Yang, (2010) “Novel Access Control Scheme with User Authentication Using<br />
Smart Cards”, cso, vol.2, 2010 Third International Joint <strong>Conference</strong> on Computational Science and<br />
Optimization, pp.387-389.<br />
Choompol Boonmee, Apitep Saekow (2009) "Data Set Standardization and Its Reusability in e-government under an<br />
interoperability framework --- A pilot project to enhance the reusability of the agreed data sets in seven<br />
government domains ---", 9th <strong>European</strong> <strong>Conference</strong> on E-Government.<br />
95
Choompol Boonmee et al.<br />
Georg Aichholzer , Stefan Strauss (2009) “The Citizen's Role in National Electronic Identity Management - A Casestudy<br />
on Austria”,<br />
2009 Second International <strong>Conference</strong> on Advances in Human-Oriented and Personalized Mechanisms,<br />
Technologies, and Services, pp. 45-50<br />
Hamed Taherdoost, Mazdak Zamani, Meysam Namayandeh, (2009) “Study of smart card technology and probe user<br />
awareness about it: A case study of Middle Eastern students”, 2009 2 nd IEEE International <strong>Conference</strong> on<br />
Computer Science and Information Technology, iccsit, pp.334-338.<br />
Herbert Leitold, Arno Hollosi, Reinhard Posch, (2002), “Security Architecture of the Austrian Citizen Card Concept”,<br />
acsac, 18 th Annual Computer Security Applications <strong>Conference</strong> (ACSCC ’02), pp 391<br />
Iuon-Chang Lin, Chin-Chen Chang (2008) “A Novel Digital Signature Scheme for Application of Document Review in<br />
a Linearly Hierarchical Organization”, 2008 International <strong>Conference</strong> on Intelligent Information Hiding and<br />
Multimedia Signal Processing, iih-msp, pp.1367-1370.<br />
Pan Tiejun, Xiong Chunlei, Zheng Leina, Han Yufeng, Bai Lingbin, (2010) “ONE-CARD System based on the second<br />
generation ID card in China”, ice, 2010 International <strong>Conference</strong> on E-Business and E-Government, pp 108-<br />
111.<br />
Ramaswamy Chandramouli, (2008) “Policy Specification and Enforcement for Smart ID cards deployment”, 2008<br />
IEEE Workshop on Policies for Distributed System and Networks, pp 127-134.<br />
Ramaswamy Chandramouli, Philip Lee, “Infrastructure Standards for Smart ID Card Deployment”, IEEE Security and<br />
Privacy, vol.5, no.2, pp 99-96.<br />
Robert Nitschke, (2002) "National ID card, electronic ID card becomes reality in Europe", [online] NOVOSEC<br />
Aktiengesellschaft,http://www.novosec.com/documents/eCommerce_ElectronicIDcard.pdf<br />
Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Briller (2003) “Public Attitudes towards a National Identity “Smart Card”<br />
Privacy and Security Concerns”, 36 th Annual Hawaii International <strong>Conference</strong> on System Sciences (HICSS’03)<br />
– Track 5, hicss, vol.5, pp.139a.<br />
Sunet Boonmee, Mr.Apitep Saekow, Choompol Boonmee (2008) "A Group Collaboration Support System to Assist<br />
Building and Managing National Core Component Dictionary and XMLSchema Standards", 8th <strong>European</strong><br />
<strong>Conference</strong> on E-Government.<br />
Thailand, Ministry of Information and Communication Technology (2006) “Thailand e-Government Interoperability<br />
Framework Version 1.0”<br />
UN/CEFACT (2006), Techniques and Methodologies Group, United Nations Centre for Trade Facilitation and<br />
Electronic Business. (UN/CEFACT), “UN/CEFACT Modeling Methodology Version 1.0 Technical specification<br />
(UMM).”<br />
UN/CEFACT (2003), Techniques and Methodologies Group, United Nations Centre for Trade Facilitation and<br />
Electronic Business. (UN/CEFACT), “Core Components Technical Specification (CCTS) – Part 8 of the ebXML<br />
Framework.”<br />
UN/CEFACT (2006), Techniques and Methodologies Group, United Nations Centre for Trade Facilitation and<br />
Electronic Business. (UN/CEFACT), “XML Naming and Design Rules Version 2.0 (NDR).”<br />
Xin Yu, Lishuan Hu (2009) “Digital Signature Based on User Role Token and Its Application to E-Government”, 2009<br />
International <strong>Conference</strong> on E-Learning, E-Business, Enterprise Information Systems, and E-Governemtn.<br />
Yen-Cheng Chen, Lo-Yao Yeh (2005) “An Efficient Authentication and Access Control Scheme Using Smart Cards”,<br />
11 th International <strong>Conference</strong> on Parallel and Distributed Systems –Workshops (ICPADS’05), icpads, vol.2,<br />
pp.78-82.<br />
96
Development of Electronic Correspondence Letter Time-<br />
Stamping Service Using Oasis Digital Signature Services<br />
Choompol Boonmee 1 , Rattapol Chatchumsai 1 and Sunet Boonmee 2<br />
1<br />
Thammasat University Rangsit Campus, Pathumthani, Thailand<br />
2<br />
IT Dabos Co. Ltd., Bangkok, Thailand<br />
choompol@tu.ac.th<br />
rattapol@thaiidcard.net<br />
sunet@itdabos.co.th<br />
Abstract: Since 2006 among Thai government agencies, official correspondence letters electronic interconnections<br />
have been developed under national electronic government interoperability framework or e-GIF. The project involved<br />
more than 40 ministerial departments and more than 15 software developers. In the correspondence sending and<br />
receiving process, time-stamping and its reliability become significant. In 2001 electronic transaction act was<br />
announced promoting digital signature can be legally used in electronic documents. The computer crime act B.E.<br />
2550 requires that servers synchronize with a public time server and maintain precision. The Organization for the<br />
Advancement of Structured Information Standards (OASIS) has developed the Digital Signature Services (DSS)<br />
standard to let administrators control centralized digital signature systems. In this paper we proposed the<br />
development of electronic correspondence letter time-stamping service using the DSS standard.<br />
Keywords: citizen ID card, digital signature, timestamp, government document<br />
1. Introduction<br />
In electronic government where there is not complete trust between documents’ sender and receiver<br />
operation time, something more than authentication is needed. The most attractive solution to this<br />
problem is the digital signature with current time of the third reliable party which is analogous to the<br />
handwritten signature. The signature is formed by taking the hash of the message and encrypting the<br />
message and the time with the creator’s private key. It guarantees the source and integrity of the<br />
operation time. A number of signature algorithms have been developed and deployed (Zhu 2008)( Xiaomi<br />
2009). Trusted timestamp authority has been established by national standard time service in some<br />
countries (Hong-Jiao 2008). In Japan the official gazette needs the timestamp service to enhance the<br />
document reliability (Japan 2011). In Malaysia there have been attempts to utilize digital timestamp (Kok-<br />
Wah). In Thai government there are more than two hundred ministerial departments and more than 7000<br />
local government administration offices. They communicate to each other by using official<br />
correspondence letters based on specified regulations. When the letter is sent and/or received<br />
electronically the reliable operation time becomes important. However most of the timestamp service<br />
patterns previously developed does not suit the correspondence letter timestamp requirements.<br />
In order to send/receive a paper based official correspondence letter from/to government agencies<br />
typically the following process sequence is performed. For sending agency the process starts with writing<br />
the draft letter, followed by signing the letter by the governor, creating the unique letter identifier (ID)<br />
number, after recording the ID in the registration book then make a copy and store it in the archive,<br />
folding the letter and putting into an envelope and then sending the letter to the receiver and recording<br />
the sending time. For the receiving party the process starts with receiving the letter, checking the receiver<br />
of the letter written on the envelope, recording the received letter and time-stamp in the registration book,<br />
after checking the validity of the received letter then issuing the acceptance notification, sending the<br />
accepting notification and time-stamp to the sender, make a copy then deliver the letter to the receiver.<br />
The whole process had been performed based on paper for a long time. The time-stamping has been<br />
performed for two points of time; the sending time, and the accepting time.<br />
In November 2006 Thailand Electronic Government Interoperability Framework (TH e-GIF) was first<br />
announced in order to enable the electronic collaboration among eGovernment software systems<br />
(Thailand 2006) (Sunet 2008). The common electronic data format for the official letter is created and<br />
announced as the first Thai electronic data format standard. By using the common data format more than<br />
40 government agencies could send/receive letter to/from each other by using more than 15 different<br />
electronic correspondence management systems (e-CMS) (Apitep 2008).<br />
As occurred in paper based correspondence letter communication, time-stamping becomes important in<br />
electronic communication. Since delivering letter electronically can be performed very fast and there may<br />
97
Choompol Boonmee et al.<br />
be trouble during the communication, three significant points of time have been taken into account; letter<br />
sending time, letter received time and accepted time. Figure 1 shows three significant points of time in<br />
electronic correspondence letter communication. The issue focuses on the reliability, the openness and<br />
the acceptability of the timestamp methodology and procedure.<br />
Figure 1: Electronic correspondence letter communication and the operation time concerned<br />
When the document is created, signed and sent, the sending time is stamped on the document to prove<br />
that the document was sent at or before the point of time. When the letter was received by the e-CMS of<br />
the receiver party, the receiving time was stamped on the document to prove that the document was<br />
received at or before the point of time. Similarly after the receiver checked the validity of the document<br />
then accept the letter, the accepting time was stamped on the document to guarantee that the document<br />
was accepted by the receiver party at or before the point of time.<br />
Figure 2: The time concerned includes 1.letter sending time, 2.letter received time and 3. letter accepted<br />
time<br />
Figure 3 shows a correspondence letter with timestamps. This set of information is often required in<br />
various situations in order to prove the integrity of the document and its operation time. The problems<br />
include;<br />
No national standard timestamp mechanism, which guarantees that the correspondence letter has<br />
not been changed since a specific point time, is specified.<br />
No timestamp protocol of digital signature service, which is open and technology neutral to allow fair<br />
competition in the e-CMS market, is specified.<br />
No standard encryption for timestamp service protocol is specified since the confidentiality of<br />
correspondence letter is needed.<br />
No national timestamp service with reliable standard clock is available<br />
No nationwide accepted data standard format for storing and managing correspondence letters with<br />
timestamps. This becomes significant since the information has to be shared and visible among Thai<br />
government.<br />
98
Choompol Boonmee et al.<br />
Centralized styled timestamp service introduces network congestion at the center. This issue can be<br />
a bottle neck problem.<br />
Figure 3: The correspondence letter with timestamps ensures the time it was sent, the time it was<br />
received by the receiver party and the time it was accepted<br />
2. Standard time and time-stamping<br />
Electronic clocks in most servers, workstations and networking devices keep inaccurate time. Most of<br />
these clocks are set by hand to within a minute or two of actual time and are rarely checked after that.<br />
Many of these clocks are maintained by a battery-backed, clock-calendar device that may drift as much<br />
as a second per day. Having any sort of meaningful time synchronization is almost impossible if such<br />
clocks are allowed to run on their own. In document time-stamping time synchronization is critical. The<br />
Network Time Protocol (NTP) has long been the widely used time-setting software. In NTP, stratum<br />
levels define the distance from the reference clock. A reference clock is a stratum-0 device that is<br />
assumed to be accurate and has little or no delay associated with it. The reference clock typically<br />
synchronizes to the correct time (UTC). Stratum-0 servers cannot be used on the network, instead, they<br />
are directly connected to computers which then operate as stratum-1 servers.<br />
A stratum-2 server is connected to the stratum-1 server over the network. Thus, a stratum-2 server gets<br />
its time via NTP packet requests from a stratum-1 server. A stratum-3 server gets its time via NTP packet<br />
requests from a stratum-2 server, and so on. Thailand’s Computer Crime Act B.E. 2550 (A.D. 2007) took<br />
effect on July 19, 2007. The Act requires that servers synchronize with a public time server and maintain<br />
precision. This can be used as a reliable correct time for timestamp.<br />
Trusted time-stamping is the process of securely keeping track of the creation and modification time of a<br />
document. Security here means that no one, not even the owner of the document, should be able to<br />
change it once it has been recorded provided that the timestamper's integrity is never compromised<br />
(Karel 2002) (Pei-yih 2008) (Arne 2003).<br />
A trusted timestamp is a timestamp issued by a trusted third party (TTP) acting as a time-stamping<br />
authority (TSA). It is used to prove the existence of certain data before a certain point, in the e-CMS<br />
communication, for examples sending time, receiving time and accepting time, without the possibility that<br />
the owner can backdate the timestamps as shown in figure 4. Multiple TSAs can be used to increase<br />
reliability and reduce vulnerability.<br />
Anyone trusting the time-stamper can then verify that the document was not created after the date that<br />
the time-stamper vouches (Xin 2009) (Luon-Chang 2008) (Karel 2002) (Pei-yih 2008). It can also no<br />
longer be repudiated that the requester of the timestamp was in possession of the original data at the<br />
time given by the timestamp. As shown in figure 5 to prove this the hash of the original data is calculated,<br />
the timestamp given by the TSA is appended to it and the hash of the result of this concatenation is<br />
calculated, call this hash X. Then the digital signature of the TSA needs to be validated. This can be done<br />
by checking that the signed hash provided by the TSA was indeed signed with their private key by digital<br />
signature verification. The hash X is compared with the hash B inside the signed TSA message to<br />
confirm they are equal, proving that the timestamp and message is unaltered and was issued by the TSA.<br />
If not, then either the timestamp was altered or the timestamp was not issued by the TSA. In 2001<br />
electronic transaction act was announced allowing digital signature can be legally used in electronic<br />
documents. Therefore the time-stamping on the document can be legally referenced by the law.<br />
The requirements around correspondence letter management system (e-CMS) timestamp include;<br />
99
Choompol Boonmee et al.<br />
A timestamp standard methodology and storing format to guarantee that the correspondence letter<br />
has not been changed since a specific point time is required.<br />
A request/response styled standard protocol, which is technology neutral and easy to implement, is<br />
required.<br />
A national timestamp service for correspondence letter needs to be developed and made available<br />
using the reliable standard time.<br />
Centralized network congestion and data confidentiality need to be considered.<br />
A national data standard of correspondence letter with time timestamps needs to be developed.<br />
Figure 4: The trusted time-stamping process shows that the time-stamping is computed using private key<br />
in PKI<br />
Figure 5: Verifying the validity of the time-stamping afterward<br />
3. Main idea<br />
The main idea is to use the trusted time-stamping model in correspondence letter communication. One<br />
time-stamp server (TSS) is established in order to perform the centralized time-stamping process. The<br />
TSS clock is synchronized with Thailand public standard time maintained by National Institute of<br />
Metrology as specified by law, stratum 2.<br />
The correspondence letter communication time-stamping model is introduced as shown in figure 6.<br />
Logically one time-stamp server (TSS) is established as one document stamper with one standard time<br />
clock. The TSS is authorized as a trusted party to stamp time together with the document at a certain<br />
point of time.<br />
There is one centralized document stamper called Time-stamp server (TSS) as shown in figure 7. The<br />
TSS works like a centralized document stamper. It receives the time-stamp requests, computes the timestamp<br />
with the requested document then returns the digital signature to the requester. When a<br />
correspondence letter is sent, is received or is accepted, a request for time-stamp is sent to TSS in order<br />
to compute the document time-stamping properly. The TSS processes the request by computing the PKI<br />
digital signature with the document and current time then returns the digital signature called time-stamp<br />
100
Choompol Boonmee et al.<br />
vouches. The digital signature service protocol is selected to be used as the open standard timestamp<br />
protocol.<br />
Figure 6: The proposed model for correspondence letter time-stamping set one document stamper as<br />
time-stamp server (TSS) with one clock synchronized to the Thailand public standard time<br />
Figure 7: Time-stamp server (TSS) works as a centralized document stamper, it receives the time-stamp<br />
requests, computes the time-stamp with the requested document then returns the digital<br />
signature to the requester as its response<br />
Figure 8 shows the concept of the correspondence letter with three time-stamps; sending, receiving and<br />
accepting time-stamps of the letter. The timestamps are digitally signed using PKI. They can also no<br />
longer be repudiated that the requester of the timestamp was in possession of the original data at the<br />
time given by the timestamp. Since this information need to be shared among government agencies and<br />
becomes significant in various situations, the national accepted open data format need to be specified.<br />
Since the correspondence letters need to be sent, received and shared by various kinds of e-CMS<br />
software systems, the common standard electronic format had to be specified and announced based on<br />
world wide web consortium (W3C) ‘s XML signature standard. All electronic correspondence letter<br />
documents have to be formatted compliant with the common format. Figure 9 shows the sample standard<br />
format of the correspondence letter without time-stamp vouches. In the figure left picture is the paper<br />
based correspondence letter while the right picture shows the corresponding electronic format.<br />
101
Choompol Boonmee et al.<br />
Figure 8: The correspondence letter with time-stamp vouches; sending, receiving and accepting of the<br />
letter<br />
Figure 9: Sample standard format of the electronic correspondence letter without time-stamp vouches<br />
Respectively since the time-stamp vouches need to be shared by various parties, the common standard<br />
electronic format had to be specified. All electronic correspondence letter with time-stamp vouches have<br />
to be formatted compliant with the common format. Figure 10 shows the sample standard format of the<br />
correspondence letter with time-stamp vouches. In the figure the left picture is the paper based<br />
correspondence letter while the right picture shows the corresponding electronic format with time-stamp<br />
vouches. This standard format has been then formally accepted to store and manage the<br />
correspondence letter among Thai government agencies.<br />
In the model proposed the time-stamp server (TSS) need to be developed using some specific protocols<br />
and standards. The communication between time-stamp requester and TSS can be designed as simply<br />
as request-response style web services.<br />
Figure 11 shows the request-response style communication between time-stamp requester and TSS. The<br />
time-stamp requester sends a time-stamp request with document to the TSS. The TSS then computes<br />
digital signature of the document with current time and returns the time-stamp vouch with signature value<br />
back to the requester. According to TH e-GIF mentioned earlier the open standards and/or protocols<br />
have to specified and announce openly for the higher interoperability. The OASIS Digital Signature<br />
service specification had been chosen for the communication (Nick 2006) (Stefan 2007) (Trevor 2007).<br />
The specification describes two XML-based request/response protocols – a signing protocol and a<br />
verifying protocol. Through these protocols a client can send documents (or document hashes) to a<br />
server and receive back a signature on the documents; or send documents (or document hashes) with a<br />
signature to a server, and receive back an answer on whether the signature verifies the documents.<br />
102
Choompol Boonmee et al.<br />
Figure 10: Sample standard format of the electronic correspondence letter with three time-stamp<br />
vouches; sending time, receiving time and accepting time<br />
Figure 11: Request-response style communications between time-stamp requester and TSS<br />
These operations could be useful in various contexts – for example, they could allow clients to access a<br />
single corporate key for signing press releases, with centralized access control, auditing, and archiving of<br />
signature requests. They could also allow clients to create and verify signatures without needing complex<br />
client software and configuration.<br />
Figure 12 and 13 show samples of time-stamp request/response which are send/receive to/from<br />
requester and TSS based on OASIS DSS standard. This customized timestamp service protocol<br />
becomes a national accepted standard for correspondence letter timestamp.<br />
Figure 12: Sample time-stamp request which is sent from the requester to the TSS.<br />
103
Choompol Boonmee et al.<br />
Figure 13: Sample time-stamp response which is sent from the TSS back to the requester to<br />
The proposed idea mentioned above can be summarized as followed;<br />
XML signature standard published by W3C has been chosen for timestamp open standard to<br />
guarantee that the correspondence letter has not been changed since a specific point time.<br />
OASIS digital signature service (DSS) with timestamps has been chosen as an open standard<br />
request/response styled protocol which is technology neutral, easy to implement, to allow fair<br />
competition in the e-CMS market.<br />
National standard timestamp service for correspondence has been developed and made available in<br />
the government network using the clock synchronized with national standard time.<br />
The timestamp service request has been specified so that the correspondent letter itself is not sent<br />
with the timestamp request, but only the computed hash number is sent to the timestamp service to<br />
solve the central network congestion.<br />
XML encryption standard published by W3C has been chosen to encrypt the data to keep the<br />
confidentiality during the timestamp communication.<br />
A national data standard of correspondence letter with timestamps has been developed using XML<br />
schema under TH e-GIF. It is independent and self-contained it can be viewed by using any software<br />
not a specific software.<br />
4. Experiments and analysis<br />
In 2009 the proposed time-stamp model had been introduced. The ministry of information and<br />
communication technology (MICT) started the pilot project to implement the concept in the real systems.<br />
More than 40 ministerial departments had involved in the project. Those parties have their own different<br />
e-CMS software in use. The software systems had been modified to support the new concept of timestamping.<br />
There had been more than 15 software vendors involved in the software modification. One<br />
newly introduced time-stamp server was developed to support the time-stamping concept proposed in<br />
this paper.<br />
The development and implementation of the new concept finished successfully. After a real use of the<br />
system for a period of time, we found that some problems arise. One important problem, due the stability<br />
and bandwidth of the overall network connection, is the bottle-neck of the only one time-stamp server<br />
(TSS). On every sending/receiving of document the request/response type connection to TSS have to be<br />
established, cause the large traffic from all nodes toward TSS. This problem may need to be studied<br />
more in the future.<br />
104
Choompol Boonmee et al.<br />
The result of the experiments can be summarized as the following;<br />
The international standard, XML signature published by W3C has been used to store timestamp<br />
required to guarantee the integrality of the correspondence letter at or before a point time.<br />
The open standard protocol for OASIS digital signature service (DSS) has been selected to use with<br />
timestamp which is technology neutral, easy to implement, to allow fair competition in the e-CMS<br />
market. However some supports and services may be needed to promote the development, for<br />
example, software compliant test services.<br />
The national data standard for managing correspondence letter with timestamp has been established<br />
and openly available.<br />
Without sending the clear text correspondence letter with timestamp request, the required bandwidth<br />
for centralized timestamp services become smaller. The congestion problem is then resolved.<br />
However for security reason the redundant design of the services may be required.<br />
Since the XML encryption standard is chosen as a methodology to encrypt the confidentiality of data<br />
is resolved while keeping fair play in the market place. However this process consume much<br />
computing resource, further study on this may be required.<br />
The procedures, protocols and formats of storing and managing correspondence letters with timestamp<br />
have been established. They can be retrieved and reused later in various situations as legal evidences<br />
with high interoperability.<br />
5. Conclusions<br />
By using the common data format more than 40 government agencies can send/receive letter to/from<br />
each other by using more than 15 different electronic correspondence management systems (e-CMS).<br />
The document time-stamping becomes as important in electronic communication. The trusted timestamping<br />
is the required process of securely keeping track of the creation and modification time of a<br />
document. The main idea is to use the trusted time-stamping model mentioned above. One time-stamp<br />
server (TSS) is established in order to perform the centralized time-stamping process. When a<br />
correspondence letter is sent, is received or is accepted, a request for time-stamp is sent to TSS in order<br />
to compute the document time-stamping. The TSS processes the request by computing the PKI digital<br />
signature with the document and current time then returns the digital signature called time-stamp vouch.<br />
The time-stamp requester sends a time-stamp request with document to the TSS.<br />
The TSS computes digital signature of the document with current time and returns the time-stamp<br />
vouches with signature value back to the requester. The open standards and/or protocols have to<br />
specified and announce openly for the higher interoperability. The OASIS Digital Signature service<br />
specification, XML-based request/response protocols, was chosen for the communication. More than 40<br />
ministerial departments and more 15 vendors had involved in the time-stamp implementation project. The<br />
centralized network congestion problem needs to be studied more in the future.<br />
Acknowledgements<br />
We thank to the ministry of information and communication technology and electronic data interchange<br />
promotion association (http://www.edipa.org/) to provide support to the project. We also thank to all<br />
government agencies for the great contributions.<br />
References<br />
Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson (2003) “Scalable and Efficient PKI for Inter-<br />
Organizational Communication”, 19 th Annual Computer Security Applications <strong>Conference</strong> (ACSAC ’03), acsac,<br />
pp.308.<br />
Apitep Saekow, Ajin Jirachiefpattana, Choompol Boonmee (2008) "Electronic Government Interoperability in<br />
Thailand: A Pilot Project on Official Electronic Correspondence Letters Exchange between Heterogeneous<br />
Software Products", 8th <strong>European</strong> <strong>Conference</strong> on EGovernment.<br />
Hong-Jiao Ma, Yu Hua, Wei Guo (2008) "Electronic Time Stamping Safety and Efficiency Optimize Technique<br />
Research," isecs, pp.1033-1036, 2008 International Symposium on Electronic Commerce and Security, 2008<br />
Japan Nation Printing Bureau (2011) "Official Gazette - Digital Signature and Time Stamp", [online],<br />
http://www.npb.go.jp/en/books/index.html<br />
Kok-Wah Lee, Gita Radhakrishna, and Lake-Tee Khaw, (2007) “The Proof of Copyright Ownership Using Digital<br />
Timestamp in Malaysia”, Proceedings of the MMU International Symposium on Information and<br />
Communications Technologies 2007 (MMU-M2USIC 2007), TS3A-1.pdf, pp. 20 & 37.<br />
105
Choompol Boonmee et al.<br />
Nick Pope, Juan Carlos Cruellas (2006) “Oasis Digital Signature Services: Digital Signing without the Headaches”,<br />
IEEE Internet Computing, vol.10, no.5, pp.88-84.<br />
Karel Wouters, Bart Preneel, Ana Isabel, Arturo Ribagorda (2002) “Towards an XML format for time-stamps”,<br />
Proceeding XMLSEC’02 Proceedings of the 2002 ACM workshop on XML security, ISBN:1-58113-632-3.<br />
Luon-Chang Lin, Chin-Chen Chang (2008) “A Novel Digital Signature Scheme for Application of Document Review in<br />
a Linearly Hierarchical Organization”, 2008 International <strong>Conference</strong> on Intelligent Information Hiding and<br />
Multimedia Signal Processing, iih-msp, pp.1367-1370.<br />
Pei-yih Ting, Fang-dar Chu (2008) “Enhancing the Security Promise of a Digital Time-Stamp”, 22 nd International<br />
<strong>Conference</strong> on Advanced Information Networking and Applications, aina, pp.342-347.<br />
Stefan Drees (2007) "Digital Signature Service Core Protocols, Elements, and Bindings Version 1.0<br />
OASIS Standard", Organization for the Advancement of Structured Information Standards, http://docs.oasisopen.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.pdf<br />
Sunet Boonmee, Mr.Apitep Saekow, Choompol Boonmee (2008) "A Group Collaboration Support System to Assist<br />
Building and Managing National Core Component Dictionary and XMLSchema Standards", 8th <strong>European</strong><br />
<strong>Conference</strong> on EGovernment.<br />
Thailand, Ministry of Information and Communication Technology (2006) “Thailand eGovernment Interoperability<br />
Framework Version 1.0”<br />
Trevor Perrin (2007) "XML Timestamping Profile of the OASIS Digital Signature Services Version 1.0 OASIS<br />
Standard", Organization for the Advancement of Structured Information Standards, http://docs.oasisopen.org/dss/v1.0/oasis-dss-profiles-timestamping-spec-cs-v1.0-os.pdf<br />
Xiaomi An, (2009) "The Electronic Records Management in EGovernment Strategy: Case Studies and the<br />
Implications," 2009 International <strong>Conference</strong> on Networking and Digital Society, icnds, vol. 1, pp.17-20<br />
Xin Yu, Lishuan Hu (2009) “Digital Signature Based on User Role Token and Its Application to EGovernment”, 2009<br />
International <strong>Conference</strong> on E-Learning, E-Business, Enterprise Information Systems, and E-Governemtn.<br />
Zhu Na, Xiao Guo Xi (2008) "The Application of a Scheme of Digital Signature in Electronic Government," csse, 2008<br />
International <strong>Conference</strong> on Computer Science and Software Engineering , vol. 3, pp.618-621<br />
106
Framework Guidelines to Measure the Impact of Business<br />
Intelligence and Decision Support Methodologies in the<br />
Public Sector<br />
Roberto Boselli, Mirko Cesarini and Mario Mezzanzanica<br />
University of Milan Bicocca, Milan, Italy<br />
roberto.boselli@unimib.it<br />
mirko.cesarini@unimib.it<br />
mario.mezzanzanica@unimib.it<br />
Abstract: Public Administrations started exploiting decision support systems (DSS) only in (very) recent times with<br />
respect to the private sector where such systems have been used for long time to improve decision making activities<br />
(e.g. the DSS and Business Intelligence realm). Service efficiency and effectiveness improvement are the expected<br />
results of DSS exploitation, together with increased value for stakeholders. The adoption of DSS in the public sector<br />
raises some questions: how to identify the areas where DSS introduction could greatly improve service quality and<br />
how to measure the resulting added value? The paper will provide a literature review supporting the authors in<br />
identifying the key factors influencing DSS value generation in the public sector. An evaluation model will be<br />
sketched including a detailed set of dimensions. This paper aims at providing the ground for building an evaluation<br />
methodology for assessing DSS adoption and exploitation in the context of public sector and public service provision.<br />
Keywords: business intelligence, decision support systems, public administrations, public sector services, added<br />
value measurement<br />
1. Introduction<br />
Service delivery is among the most important functions of Governments and Public Administrations.<br />
Service delivery can be viewed as a value producing process for several stakeholders (Sanderson et al.<br />
2000). Service design and improvement issues have gained attention from the research community (e.g.<br />
Chesbrough and Spohrer 2006). Focusing on the public sector and services, several Public<br />
Administrations are adopting ICT to support and improve decision-making activities and active policies<br />
enactment. This is done on the basis that methodologies, paradigms, and approaches developed in the<br />
frame of the Business Intelligence (BI) and Decision Support Systems (DSS) areas could greatly improve<br />
the decision-making activities. Furthermore, the adoption of BI and DSS in Public Administrations (PAs)<br />
is expected to start an enhancement process where information integration, data quality, and<br />
development of analytical and reporting models activities can be improved.<br />
Some questions arise by focusing on the decision-making activities supported by ICT: which is the real<br />
added value provided by these systems in the public sector? Can existing methodologies be used for<br />
measuring the value generated by ICT in the public sector? Some literature works present models and<br />
methodologies to calculate the ICT value in the private sector, for example they address issues such as<br />
how to calculate the ICT impact on the organization's processes. Can these approaches be smoothly<br />
applied to Public Administrations? Can the ICT impact on public organization processes be evaluated in<br />
a similar way as in the private sector?<br />
These research questions stimulated the authors to define some framework guidelines trying to address<br />
these questions. The research presented in this paper focuses on BI and DSS adoption in PAs, and<br />
whether it is possible to identify and measure the BI and DSS impact on PA processes, especially on<br />
knowledge production and sharing. Different levels of PAs can be identified, e.g. local regional or state<br />
(i.e. National), this paper focus on common considerations valid for both levels, although each level has<br />
some peculiarities (e.g. extension of datasets, capabilities of funding DSS projects, involved processes,<br />
economy of scales) which have to be considered when applying the framework sketched in this paper.<br />
ICT impact measurement is strictly related to the evaluation of public service performance, and both are<br />
challenging research topics. BI and DSS impact measurement is also challenging, and still poorly studied<br />
especially in relation to the public sector. This paper will make a contribution in this direction.<br />
The novelty of our approach is in combining public sector services evaluation with BI and DSS systems<br />
adoption to improve public services performance. Issues such as the evaluation of service performances<br />
or the BI use in services are widely discussed in the literature, but the two issues have not been jointly<br />
addressed to the best of our knowledge. The public sector service performance is discussed in (Djellal<br />
107
Roberto Boselli et al.<br />
and Gallouj, 2008; Di Meglio et al. 2010; McAdam et al., 2005) with focus on measuring tangible<br />
performance indicators. The evaluation of public sector Information Systems is discussed in (Newcomer<br />
and Caudle, 1991) where the authors focus on specific success indicators. DSS adoption to improve<br />
service quality is addressed by (Pyon et al. 2009) but differences between the private and the public<br />
sectors are not considered; while (Ramamurthy et al. 2007; Khan et al. 2010) consider only the private<br />
sector when investigating the barriers and factors involved in DSS adoption. Another issue discussed in<br />
this paper is the measurement of ICT impact on services. Works such as (Brynjolfsson, 1993; Bielowski<br />
and Walczuch, 2002) consider the relation between service efficiency and ICT impact measuring outputs<br />
on the basis of statistical and economic models, still with focus on private sector.<br />
Furthermore, the paper introduces a framework to measure value, impact and adoption levels of BI in the<br />
public sector, on the basis of measurable indicators such as knowledge intensity, decision-making<br />
intensity and automation degree. The paper investigates the relationships among the aforementioned<br />
measures and indicators in the context of public services, and such relationships have been poorly<br />
discussed in literature.<br />
The paper is structured as follows: Sec. 2 will provide an overview of the differences between services in<br />
the private and public sectors, Sec. 3 will provide some definitions of BI and DSS, and will analyze some<br />
BI measurement methods, Sec. 4 will focus on the adoption of BI in the PAs, Sec. 5 will introduce the<br />
framework to evaluate and classify public services, and finally Sec. 6 will draw the conclusions and will<br />
illustrate directions for future work.<br />
2. The public sector services<br />
The public sector provides several types of services, from health services, education, to social and<br />
cultural services, infrastructure, defence. A shared classification of public sector services (NACE)<br />
includes: public administration, defence and compulsory social security, education, health and social<br />
work, other community, social and personal services. Service research and literature provide several<br />
definitions of the public sector, in this paper the authors consider the public sector to include all<br />
organizations providing the aforementioned services.<br />
2.1 Differences between private and public sectors<br />
It is worth to understand the PAs characteristics and to focus on the differences between the public and<br />
the private sectors in terms of objectives, information and knowledge utilization, and decision-making<br />
processes. One obvious difference between the public and private sectors is that the public sector is not<br />
profit driven and its primary goal is not to maximize profits (Røste and Miles 2005; Euske, 2003).<br />
Nevertheless, this should not lead to believe that public sector employees and managers are not<br />
concerned about financial matters. Similarly to private companies, PAs fight for funding and power, and<br />
mainly for costs saving, but operate in a political environment and basically work to reach political goals<br />
(Murray, 1975). The PAs implement policies to provide benefits to the society as a whole, by delivering<br />
basic services to citizens that other organizations are not able to efficiently or equitably provide. To do<br />
this, PAs have to meet objectives regarding productivity, efficiency and quality of services.<br />
The way political goals are reached is influenced by the PA decision-making processes which are mainly<br />
conditioned by the available information and the knowledge quality. Knowledge is essential to support<br />
decision-making activities (McAdam and Reid, 2001). Decision making and process activities are strongly<br />
based on knowledge sharing and production processes that involve different actors, the service users<br />
being the most important.<br />
According to (Halvorson et al. 2005) PA services depend on revenues that are allocated according to<br />
political decisions rather than market performances. The central government funds public sector activities<br />
to cover the costs. The national budget makes public sector activities possible, and its allocation defines<br />
the boundaries for public sector activities. Often public sector activities contents and scopes are far from<br />
being fully understood by citizens. Typically PAs do not specify in details how the funds are allocated and<br />
used. The next section will provide some answers on how PAs may improve their services.<br />
2.2 Evaluation and improvement of public services<br />
Citizens demand for better services while supporting PAs services with their taxes (Langergaard and<br />
Scheuer 2009). Therefore, two requirements deserve special attention among PAs: cost reduction and<br />
service improvement, the latter involving concepts like service quality, effectiveness, and efficiency.<br />
108
Roberto Boselli et al.<br />
Service improvement may require several actions: to modify the service processes, to improve the<br />
information quality, and eventually to carry out strategic knowledge management activities. Knowledge is<br />
a key factor in affecting PA service quality: knowledge is required to design, produce and deliver better<br />
services, furthermore knowledge may also represent the main output of some services.<br />
Service quality improvement relies on evaluation, process and service evaluation requires useful and<br />
measurable indicators. As widely reported in the management literature, processes or services cannot be<br />
appropriately managed without measurements (Pyon 2009).<br />
In the private sector efficiency and effectiveness measures are ultimately related to profit maximization<br />
and to profitability for stakeholders. Therefore, in the private sector a classic performance metric is the<br />
return on investment (ROI) and the set of related indicators. However the public sector does not have<br />
profit maximization as main objective, but rather focuses on policy and service outcomes improvement.<br />
Unfortunately outcomes indicators are hard to identify since they are strictly domain dependent, and they<br />
are affected by the complex set of factors influencing the customer perception and service satisfaction,<br />
both in short and long terms (Djellal and Gallouj, 2009).<br />
Public services performance evaluation activities have been carried out only in recent times (Afonso,<br />
2006; Di Meglio et al. 2010). Two main approaches can be found in literature: the technical approach<br />
evaluates performances on the basis of productivity gains (Wölfl 2005; Kox and Rubalcaba 2007; Timmer<br />
et al. 2007); on the other hand, performances are evaluated according to management viewpoints<br />
(Osbourne and Gaebler 1992; Boland and Fowler 2000; Propper and Wilson 2003; de Brujin 2002).<br />
Service productivity measurement is a challenging issue in the service research. Measuring public<br />
service performances only on the basis of productive efficiency is undoubtedly a partial indicator of<br />
overall performance, on the other hand it is restrictive to consider only the economic indicators. Some<br />
scholars started adopting a more holistic perspective outlining innovation as a lever for improvement<br />
(Andersen and Corley, 2009). Therefore, the use of performance indicators in PAs has generated<br />
innovation demands and expectations in public service delivery processes.<br />
PAs should introduce innovation at different levels to improve services: organizational and administrative<br />
innovations, conceptual and policy innovations, innovations in service design processes, in the delivery<br />
processes, and in the systems of interaction (Halvorson et al. 2005; Langergaard and Scheuer 2009).<br />
Innovation in the public sector is mainly driven by the need to improve governance and service<br />
performance, including improved efficiency, in order to increase public value (Hartley 2005). ICT is being<br />
promoted within government and PAs as a means of improving the efficiency and effectiveness of service<br />
delivery to produce value for internal and external stakeholders (Sanderson et al. 2000; Beynon-Davies<br />
2007).<br />
Several methodologies and paradigms are available in the literature to evaluate the added value provided<br />
by ICT in the service sector. Few of them focus on calculating the ICT value in the public sector and<br />
fewer on BI and DSS. In the next sections the authors will show how BI and DSS can be used for PAs<br />
services, and how the output of these systems can be evaluated for improving services.<br />
3. BI and DSS<br />
According to (Golfarelli et al. 2004) “BI can be defined as the process of turning data into information and<br />
then into knowledge […] BI was born within the industrial world in the early 90’s, to satisfy the managers’<br />
request for efficiently and effectively analyzing the enterprise data in order to better understand the<br />
situation of their business and improving the decision process”.<br />
According to (Lonnqvist and Pirttimäki 2006) BI has the purpose to aid in controlling the stocks and the<br />
flows of business information around and within the organizations by identifying and processing the<br />
information into condensed and useful managerial knowledge and intelligence. BI presents business<br />
information in a timely and easily consumed way and provides the ability to reason and understand the<br />
meaning behind business information through, for example, discovery, analysis, and ad hoc querying<br />
(Azoff and Charlesworth 2004). A BI system can be viewed as a DSS system focusing on data. The<br />
terms will be alternatively used in this paper.<br />
Different PAs have started projects for integrating the content of several administrative archives into<br />
comprehensive repositories for statistical and analytical purposes, however the “BI portion” of the task<br />
109
Roberto Boselli et al.<br />
often lags behind. The delay of BI and DSS exploitation is only one of the differences between the public<br />
and the private sector.<br />
3.1 BI measurement methods<br />
In the BI literature several authors have identified BI measurement as an important task (Solomon 2006;<br />
Viva 2000) but scholars agree that it is a difficult task to carry out (Gartz 2004; Hannula and Pirttimäki<br />
2003; Simon 1998). According to a recent survey only few organizations have any metrics in place for BI<br />
value measurement (Marin and Poulter 2004).<br />
According to some works in literature (Popovic et al. 2010; Williams and Williams 2004; Lonnqvist and<br />
Pirttimäki 2006) BI is an activity or a process like any other business process. Therefore, it is possible to<br />
apply business performance measurement methods to BI.<br />
BI measurement serves two main purposes: first, to prove that it is worth the investment, and second to<br />
help managing the BI process, i.e. to ensure that the BI products satisfy the users' needs and that the<br />
process is efficient. Before describing methods for measuring BI value, it is necessary to clarify the<br />
concept of value in this context. From the point of view of a company using BI, the value is related to<br />
profit improvement; while from the BI (end) user point of view, the value is somewhat related to perceived<br />
usefulness. Any BI value assessment needs to answer the following questions:<br />
1) How much does BI cost?<br />
2) Which are the expected benefits of applying BI?<br />
Calculating BI costs requires calculating labour costs, software and hardware expenditure, external<br />
information purchases, and other related expenses. BI benefits measurement is not as simple as<br />
measuring the costs. Indeed, BI provides mainly non-financial, intangible benefits such as improved<br />
quality and timeliness information (Hannula and Pirttimäki 2003). ROI calculation is the typical method to<br />
measure an investment value, however the “BI outputs” (e.g. information and knowledge) are very<br />
difficult to assess and quantify (Popovic et al. 2010). In literature (Davison 2001) proposed the CI<br />
Measurement Model (CIMM) to calculate the ROI of a BI project. This model identifies various nonfinancial<br />
measures of strategic outputs useful to quantify the success of a BI project, for example whether<br />
the targets set at the beginning of the project have been met, as well as the decision makers’ satisfaction.<br />
The limit of this model is that it is based mainly on qualitative assessments.<br />
Shifting from the private to the public sector, measuring the value of BI gets even more difficult for<br />
several reasons, firstly the lower importance given to profit and other financial indicators. Furthermore,<br />
the public sector is characterized by complex systems and multiple intangible variables which are difficult<br />
to measure.<br />
Effectiveness and efficiency are considered among the main measures to assess the public sector. The<br />
effectiveness of BI in public sector could be evaluated by exploiting the measures defined by (Herring<br />
1996) and (Sawka 2000) for the private sector. These measures could help investigating the decision<br />
outcomes while taking into consideration the public sector specificities. Namely, the BI contribution could<br />
be evaluated by focusing on the specific decisions or actions (supported by the BI) and then looking at<br />
the benefit or detriment this decision brought to the related policy. This method identifies four paradigms:<br />
1) BI can help in avoiding unnecessary costs, 2) decisions based on BI processes may lead to enhanced<br />
revenues (e.g., from taxes), 3) BI information may help in improving resource allocation, and 4)<br />
identification of the direct link between a BI decision and service performance. The BI professional is the<br />
principal user of the information, therefore some of the most important BI measures focus on the<br />
efficiency of the personnel using BI, the resource allocation, the quality of the BI products and the user<br />
satisfaction. The CIMM model is useful for this scope. Other methods to measure BI performance, mainly<br />
in the private sector are the Balanced Scorecard and the Performance Prism (Lonnqvist and Pirttimäki<br />
2006). Nevertheless they should be tailored to meet the public sector peculiarities.<br />
4. BI adoption in PA<br />
BI and DSS exploitation in the public sector is far behind the private one. Several reasons can be added<br />
to explain this. (Nutt 2006) has investigated the differences between public and private decision-making<br />
practices. Some of the differences found can also be used to explain the aforementioned lag.<br />
110
Roberto Boselli et al.<br />
Private sector managers are more apt to support budget decisions made with analysis and less likely<br />
to rely on bargaining. Public sector managers are less likely to support budget decisions backed by<br />
analysis and more likely to support those that are derived from bargaining with agency people.<br />
Legislative mandates constrain budgets, in the past public sector leaders were limited or even<br />
prohibited from spending money to collect information for decision-making. Many PAs were<br />
prohibited from diverting funds from service delivery to collect data on emerging trends in service<br />
delivery. Even when information collection is now possible, professionals are reluctant to divert<br />
resources from service provision to collect such data.<br />
PAs have multiple goals, which can be vague, controversial, or both (Baker 1969; Bozeman 1984).<br />
Goal ambiguity makes vital performance outcomes unclear for public sector organizations.<br />
Although many of the reasons just introduced still hold in the PA, the pressure for obtaining knowledge<br />
about the population (and in real time), the need to offer better services with constrained resources have<br />
reduced the barriers for BI exploitation. Furthermore the cost of the technologies necessary to implement<br />
a BI/DSS project has diminished significantly in the past years, making the development of such projects<br />
affordable by all levels of the PA.<br />
Therefore, BI is playing more and more a key role in successful performance management initiatives<br />
because it allows managers to easily access up-to-date information and provide a comprehensive view of<br />
what is happening in their area of responsibility. The information that BI provides aids decision-making<br />
and helps civil servants monitoring and managing performances. Increasingly, public sector managers<br />
are using BI dashboards – visual displays that provide up-to-date indicators – and scorecards to track<br />
performance and budgets. In this way specific strategies can be defined and enacted by using a series of<br />
metrics and by setting thresholds that trigger alerts when they are exceeded.<br />
In private organizations often the introduction of BI has acted as a catalyst to improve the data quality<br />
and to restructure the management processes, leading to big improvements in information accuracy and<br />
availability. The same goal is pursued in public sector organizations where data quality is felt as a big<br />
issue. Moreover, BI strategies, technologies, and solution exploitations within the public sector lead to<br />
better business outcomes. For the past few years, BI has consistently ranked as a top priority for<br />
government CIOs (Khan et al. 2010). Through collecting and analyzing data, BI creates detailed reports<br />
that provide inestimable insights. The benefits of these analyses are manifold; they can help better<br />
managing an organization, improve performance and lower the cost of service delivery and so on. In<br />
summary, BI can be useful in the public sector for several activities, including:<br />
Measure, manage and report on performances<br />
Policy formulation<br />
Planning and budgeting<br />
Explore data hidden relationships<br />
Disease surveillance and public health<br />
Identify tax fraud and money laundering<br />
Homeland security<br />
Crime prevention<br />
Moreover, BI technology has proved a useful application in many different areas of the public sector,<br />
including:<br />
Financial Systems<br />
Acquisition, Logistics and Supply Chain<br />
Health & Human Services<br />
Citizen Relationship Management<br />
Knowledge / Case Management<br />
Intelligence Assessment<br />
Education & Campus Management<br />
PAs can apply BI to improve their constituency’s knowledge, their ability to provide services and to obtain<br />
accurate measurements of actions and policies effects. Moreover, PAs need to improve decision-making<br />
111
Roberto Boselli et al.<br />
processes, and BI tools and methodologies can enhance efficiency and performance, helping policy-level<br />
decision-making.<br />
5. Framework guidelines<br />
The framework this paper proposes is based on the public service key features highlighted and on the<br />
considerations made in the past sections. Moreover, some specific models and frameworks in the service<br />
literature influenced this work. One of them is the framework about knowledge and technology<br />
dimensions in the service sector (Kang 2006). Kang studied the different roles of technology and<br />
knowledge in services, and proposed a framework where services are classified in two categories:<br />
Knowledge-embedded services, where the majority of knowledge is embedded in the service<br />
production system (i.e. the technology);<br />
Knowledge-based services, where the majority of knowledge is held by the actors providing the<br />
service (e.g. knowledge intensive business services - KIBS).<br />
The Kang framework is mainly aimed at classifying private sector services, but its logic can be applied to<br />
the public sector.<br />
The authors propose to integrate the Kang classifications with some other dimensions in order to build a<br />
framework useful for classifying public services. The resulting framework allows to evaluate (and to lay<br />
the ground for improvement of) ICT-based services focusing on the following aspects: cost savings,<br />
knowledge as value, improved policy and decision-making processes, data and information integration.<br />
The identified dimensions are: expenditure, knowledge intensity, decision-making intensity and<br />
automation degree. The knowledge-intensity and the automation degree dimensions are drawn upon the<br />
Kang framework logic. The knowledge-intensity evaluates the importance of knowledge within the service<br />
while the automation degree evaluates how much ICT automates the information management<br />
processes and conversely how much human intervention is required.<br />
Services will be evaluated using a variable for each of the aforementioned dimensions. Some public<br />
sector areas have been chosen to test the framework: administration, health, education and employment<br />
services. These areas provide knowledge intensive services and have different expenditure levels.<br />
Furthermore, the services of the same area may have different degrees of ICT-based automation and<br />
different degrees of decision-making intensity.<br />
The public sector services considered for the present framework (and showed later in the quadrants) are:<br />
Administrative services, e.g. registry certifications;<br />
Healthcare services;<br />
Vocational training services;<br />
Public employment services (PES).<br />
The services are showed in the quadrants of Figure 1 and Figure 2. The Health services are<br />
characterized by high expenditure and high knowledge intensity; administrative services are less<br />
knowledge intensive but still have a high level of expenditure, while the other services have low<br />
expenditure and a middle degree of knowledge intensity. Figure 1 classifies the services according to the<br />
Expenditure and Knowledge intensity dimension.<br />
In the second quadrant (Figure 2) the same services are classified with the other two dimensions, namely<br />
degree of (ICT-based) automation and degree of decision-making intensity. According to these<br />
dimensions health services, PES and vocational training services have low level of automation, while<br />
health services have higher decision intensity than the others. Only the administrative services show a<br />
high degree of automation and low decision intensity.<br />
The development of a BI or a DSS system is a very resource consuming task, DSS and BI projects are<br />
on/off investments: they return positive results (i.e. they provide value to the decision-making activities)<br />
only if the decision maker’s needs are correctly identified, useful indicators and measures are computed,<br />
data quality issues are resolved, the technological support is correctly deployed, the data provision<br />
system is user-friendly and affects the decision-making process and the overall service provisioning<br />
process. Should only one of this aspects not being properly managed, the resulting decision support<br />
system will fail to provide an added value to its users.<br />
112
Figure 1: Knowledge and expenditure dimensions<br />
Roberto Boselli et al.<br />
Figure 2: Decision and automation dimensions<br />
The costs and the probability of failure are lower when prior knowledge about the domain and the project<br />
are available among the users and the ICT personnel involved in the project (e.g. because people<br />
already worked on similar contexts). However, fewer successful projects are available in the public sector<br />
compared to the private, because of the aforementioned lack of DSS diffusion among the public sector.<br />
For these reasons, it can be suggested to start DSS projects in the public domain where the probability of<br />
failure is low and where the expected benefits could be very high. The dimensions and the quadrants<br />
introduced in this section help identifying the PA sectors where DSS projects could provide tangible<br />
results lowering at the same time the probability to fail (and consequently to waste public funds). Namely<br />
PA sectors (or services) having high knowledge intensity could benefit from the introduction of DSS<br />
systems, furthermore the decision-making activities would benefit from the introduction of BI systems (i.e.<br />
DSS systems focusing on data). The introduction of DSS systems could lead to huge savings in sectors<br />
having high expenditures, or could lead to a service level improvement without cost changes. Services or<br />
sector having a high degree of decision will have a relief from the introduction of DSS systems, while a<br />
high level of automation is an indicator of the availability of electronic data upon which the DSS can be<br />
built. Where a lot of electronic data is available, a lot of useful information can be identified and extracted<br />
with low effort. Thus a high level of automation may contribute to lower the costs (and the risk of failure)<br />
of a DSS project.<br />
6. Conclusions<br />
The research presented in this paper focuses on BI and DSS adoption in PAs, and whether it is possible<br />
to evaluate the BI and DSS impact on knowledge production and sharing processes within PAs. A<br />
113
Roberto Boselli et al.<br />
literature survey on public sector services helped to identify available service measurement and<br />
evaluation methodologies. With the analysis of BI and DSS adoption in PAs it was possible to identify<br />
some drivers and motivations to use BI in public services, and also to identify some dimensions which<br />
are useful to classify public services. These dimensions shape an initial framework to classify public<br />
services.<br />
Moreover, the framework should also help to identify dimensions of analysis to assess the BI impact in<br />
public services. The quadrants proposed in the paper will allow to create a map of all public sector<br />
services, and to identify areas where BI adoption could be effective in improving the service efficiency<br />
and effectiveness. BI and DSS are especially useful in areas having complex service production<br />
processes (e.g. Healthcare sector). These areas are characterized by high expenditures and by high<br />
knowledge intensity and decision intensity degrees. In future works the framework will be tested with<br />
empirical data collected in the frame of public service case studies. The proposed framework dimensions<br />
have to be enriched with indicators about, for example, user satisfaction, policies outcome and other<br />
related topics.<br />
References<br />
Afonso, A., Schuknecht, L. and Tanzi, V. (2006) "Public Sector<br />
Efficiency: Evidence for New EU Member States and<br />
Emerging Markets", Working Paper Series, No. 581.<br />
Andersen B. and M.Corley<br />
(2009), Productivity and the Service Sector: Theories, Concepts and Measurements,<br />
Edward Elgar.<br />
Azoff, M. and Charlesworth, I. (2004) The New Business Intelligence. A <strong>European</strong> Perspective, Butler Group, White<br />
Paper.<br />
Baker, R. (1969) "Organizational theory in the public sector", Journal of Management Studies, Vol. 6, No.1.<br />
Beynon-Davies, P. (2007) "Models for eGovernment", Transforming Government: people, process and policy, Vol. 1,<br />
No. 1.<br />
Bielowski, A.G. and Walczuch, R. (2002) "ICT-Impact on Services",<br />
Proceedings of the 35th Hawaii International<br />
<strong>Conference</strong> on System Sciences, vol. 8, pp.259-268.<br />
Boland,<br />
T. and Fowler, A. (2000) "A systems perspective of performance management in public sector<br />
organisations", The International Journal of Public Sector Management, Vol. 13, No. 5, pp 417-446.<br />
Boze man, B. (1984) "Dimensions of "publicness": An approach to public organization theory", New directions in<br />
public administration, Vol. 46.<br />
Bryn jolfsson, E. (1993). "The productivity paradox of information technology", Communication of the ACM, Vol. 36,<br />
No.12. pp. 67-77.<br />
Chesbrough, H. and Spohrer,<br />
J. (2006). "A research manifesto for services science", Communication of the ACM,<br />
Vol. 49, Num. 7.<br />
Davison, L. (2001) "Measuring Competitive Intelligence Effectiveness: Insights<br />
from the Advertising Industry",<br />
Competitive Intelligence Review, Vol. 12, No. 4.<br />
De Brujin H. (2002) "Performance measurement in the public sector: strategies to cope with the risks of performance<br />
measurement", The International Journal of Public Sector Management, Vol. 15, No. 7, pp 578-594.<br />
Di Meglio G., Stare M., Maroto A. and Rubalcaba L. (2010) "Public services in the enlarged<br />
EU: An assessment of<br />
performance and efficiency", Proceedings of RESER2010, Goteborg, Sweden.<br />
Djellal, F. and Gallouj, F. (2008)<br />
Measuring and improving productivity in services: Issues, strategies and challenges,<br />
Edward Elgar, London.<br />
Djellal, F. and Gallouj, F. (2009) "Public services and the productivity challenge", Deliverable 2.1-A2.1, ServPPIN<br />
Project.<br />
Euske, K.J. (2003), "Public, private, not-for-profit: everybody is unique?", Measuring Business Excellence, Vol. 7 No.<br />
4, pp. 5-11.<br />
Gartz, U. (2004) "Enterprise Information Management", in Raisinghani, M. (Ed.) Business Intelligence<br />
in the Digital<br />
Economy: Opportunities, Limitations and Risks, Idea Group Publishing, Hershey, PA.<br />
Golfarelli, M., Rizzi, S. and Cella, I. (2004) "Beyond data warehousing: what’s next in business intelligence?",<br />
Proceedings of the 7th ACM international workshop on Data warehousing and OLAP, ACM.<br />
Halvorson, T., Hauknes, J., Miles I. and Røste, R. (2005)<br />
On the Differences Between public and private sector<br />
innovation, Public Report No. 9, NIFU STEP.<br />
Hannula, M. and Pirttimäki, V. (2003) "Business Intelligence - Empirical Study<br />
on the Top 50 Finnish Companies",<br />
Journal of American Academy of Business, Vol. 2, No. 2, pp 593-599.<br />
Hartl ey, J. (2005) "Innovation in Governance and Public Services: Past and Present", Public Money and<br />
Management, pp. 27-34.<br />
Herring, J. (1996) "Measuring the Value of Competitive Intelligence: Accessing and Communicating CI's Value to<br />
Your Organization", SCIP Monograph Series, Alexandria, VA.<br />
Khan,<br />
A.M.A., Amin, N. and Lambrou, N. (2010) "Drivers and Barriers to Business Intelligence Adoption: A Case of<br />
Pakistan", Proceedings<br />
of the <strong>European</strong> and Mediterranean <strong>Conference</strong> on Information Systems (EMCIS2010),<br />
Abu Dhabi, UAE.<br />
Kang, H. (2006) "Technology management in services:<br />
knowledge-based vs. knowledge-embedded services",<br />
Strategic Change, Vol. 15, No.2, pp 67-74.<br />
114
Roberto Boselli et al.<br />
Kox, H. and Rubalcaba, L. (2007) "The Contribution of Business Services to <strong>European</strong> Economic Growth", in<br />
Rubalcaba and Kox (ed.) Business Services in <strong>European</strong> Economic Growth, Palgrave/Macmillan, pp 74-94.<br />
Langergaard, L.L. and Scheuer, J.D. (2009) Specificities of public sector service innovation, ServPPIN Deliverable<br />
2.1.<br />
Lonnqvist, A. and Pirttimäki, V. (2006) "The measurement of business intelligence", Information Systems<br />
Management, Vol. 23, No. 1.<br />
Marin, J. and Poulter, A. (2004) "Dissemination of Competitive Intelligence", Journal of Information Science, Vol. 30,<br />
No. 2, pp 165-180.<br />
McAdam, R. and Reid, R. (2001), "A comparison of public and private sector perceptions and use of knowledge<br />
management", Journal of <strong>European</strong> Industrial Training, Vol. 24, No. 6, p. 317.<br />
McAdam, R., Hazlett, S.A. and Casey, C. (2005) "Performance management in the UK public sector", International<br />
Journal of Public Sector Management, Vol. 18, No. 3, pp. 256-273.<br />
Murray, M.A. (1975) "Comparing Public and Private Management: An Exploratory Essay", Public Administration<br />
Review, Vol. 35, No. 4 pp. 364-371.<br />
NACE, Statistical Classification of Economic Activities in the <strong>European</strong> Community, [online]<br />
http://ec.europa.eu/competition/mergers/cases/index/nace_all.html.<br />
Newcomer, K. E. and Caudle, S. L. (1991) "Evaluating Public Sector Information Systems: More Than Meets the<br />
Eye", Public Administration Review, Vol. 51, No. 5, pp. 377-384.<br />
Nutt, P. (2006) "Comparing public and private sector decision-making practices", Journal of Public Administration<br />
Research and Theory, Vol. 16, No. 2.<br />
Osbourne, D. and Gaebler, T. (1992) Reinventing Government, Addison-Wesley.<br />
Popovic, A., Turk, T. and Jaklic, J. (2010) "Conceptual Model of Business Value of Business Intelligence Systems",<br />
Journal of Contemporary Management Issues, Vol.15, No.1.<br />
Propper, C. and Wilson, D. (2003) "The use and usefulness of performance measures in the public sector", CMPO<br />
Working Paper Series Vol. 03, No. 73.<br />
Pyon, C.U., Lee, M.J. and Park, S.C. (2009) "Decision support system for service quality management using<br />
customer knowledge in public service organization", Expert Systems with Applications, 36, pp. 8227-8238.<br />
Ramamurthy, K.R. (2007) "An empirical investigation of the key determinants of data warehouse adoption", Decision<br />
Support Systems, Vol. 44, No. 4, pp 817-841.<br />
Røste, R. and Miles, I. (2005) "Difference between public and private sector innovation", Publin Report.<br />
Sanderson, I., Bovaird, T., Davies, P., Martin, S. and Foreman, A. (2000) "Made to Measure: Evaluation in Practice<br />
in Local Government", Local Government Management Board, London.<br />
Sawka, K. (2000) "Are We Valuable?", Competitive Intelligence Magazine, Vol. 3, No. 2.<br />
Simon, N.J., (1998) "Determining Measures of Success", Competitive Intelligence Magazine, Vol. 1, No. 2, pp 45-48.<br />
Solomon, M. (1996) "The Intelligence Asset-Building Process", Competitive Intelligence Review, Vol. 7, N. 4, pp 69-<br />
76.<br />
Timmer, P.M., O'Mahony M. and van Ark, B. (2007) "EUKLEMS Growth and Productivity Accounts: Overview",<br />
[online] www.euklems.net.<br />
Viva Business Intelligence Inc. (2000) "Measuring the Benefits of Business Intelligence", Pro-How Paper, Vol. 2.<br />
Williams, S. and Williams, N. (2004) "Capturing ROI through Business-Centric BI Development Methods", DM<br />
Review, August.<br />
Wölfl, A. (2005) "The service economy in OECD countries", STI Working Paper, Vol. 3.<br />
115
Avoiding Disasters – Ensuring PKI-Service Availability<br />
Harald Bratko, Peter Lipp, and Christof Rath<br />
Graz University of Technology, Austria<br />
harald.bratko@iaik.tugraz.at<br />
peter.lipp@iaik.tugraz.at<br />
christof.rath@iaik.tugraz.at<br />
Abstract: Public-Key Infrastructures have become critical infrastructures. A breakdown of such a critical<br />
infrastructure would have disastrous consequences. This paper describes our research work that focuses on<br />
enabling transferability of such services, designing a framework and creating a prototype implementation for the<br />
design.<br />
Keywords: public-key infrastructures, critical infrastructures, emergency CA services<br />
1. Introduction<br />
As a result of implementing the <strong>European</strong> Digital Signature Directive (<strong>European</strong> Commission, 1999) in<br />
Austria as well as in other <strong>European</strong> countries, Public-Key Infrastructure technology based on X.509<br />
(ISO, 2005) has become a critical infrastructure. The state depends on the operativeness of that<br />
technology. Austria is especially exposed, since electronic signatures are deeply interweaved into<br />
administrative and legislative processes. A breakdown of this critical infrastructure would have disastrous<br />
consequences. In this paper we present a project we are working on, aiming at securing the<br />
operativeness and availability of the Austrian PK Infrastructure to ensure smooth and uninterrupted<br />
functionality of applications relying on these technologies. Core goal of research is the definition of the<br />
required properties for a service to be transferable. In an emergency, the service will have to be taken<br />
over from an existing service provider, whose infrastructure typically will not be ready for transfer.<br />
We will discuss the prerequisites and required properties of a “change management enabled PKI”<br />
framework, a full design of such a framework and a prototype implementation. Based on a<br />
comprehensive survey and definition of emergency scenarios, a concrete framework with the required<br />
properties will be designed. This framework must safeguard the PKI and keep downtime to the absolute<br />
minimum. This design will be implemented as a prototype and tested with a simulated emergency<br />
scenario. Experiences with this test will be fed back into the prototype. After the end of the project a<br />
concrete implementation for an emergency service provider will be realized based on further<br />
development of the components. This implementation will be made available to be ready for any real<br />
emergency that may occur. This research is accompanied by studies on privacy issues and loss of trust,<br />
resulting from the involved takeover of critical data from one service provider to another service provider.<br />
It will provide suggestions to minimize such loss of trust. Since <strong>European</strong> standardization and<br />
interoperability issues are influencing the details of the emergency service design, a survey, gap analysis<br />
and concrete suggestions for improvements of standards, interoperability guidelines and conformance<br />
checking are also an important part of the project.<br />
For the following, we assume a single service provider to operate a critical PKI, who decides to close<br />
down its operation, for example, because of bankruptcy. §12 of the Austrian Signature Act requires the<br />
service provider to announce the end of operation at least three weaks before closing. If no other service<br />
provider can take over the tasks of providing revocation- and directory-services, and if the federal<br />
government doesn’t declare providing such services of public interest, all certificates will be revoked. If<br />
instead the certificates are declared being of public interest, the federal government has to ensure<br />
continued provision of these services. In this case, the former service provider is legally forced to provide<br />
all necessary means and information to allow for such provisioning. This paper focuses on the scenario<br />
where the federal government needs to ensure such provisioning and thus needs the means to take over<br />
the services itself or have them taken over by some third party. While the law requires the service<br />
provider to cooperate, we can’t take full cooperation for granted and will discuss different options.<br />
2. The initial situation assumption<br />
In the case of cessation of operation of a service provider, taking over directory- and revocation services<br />
for CA-services that have been declared to be of public interest is the first and most important step for an<br />
emergency service provider. Thus, all essential services have to be identified first.<br />
116
Harald Bratko et al.<br />
For this project, we assume having a single certification service provider, A-Trust, issuing qualified<br />
certificates to the public. This provider currently is the only Austrian provider of qualified certificates and<br />
also essential for all eGovernment services. This is the only reason for assuming an emergency take over<br />
for A-Trusts services. We in no way want to imply such a scenario would at all be likely to occur. A-Trust<br />
offers several services:<br />
Certification services: services issuing X.509 certificates. These may be qualified certificates or non<br />
qualified certificates (<strong>European</strong> Commission, 1999) for persons or certificates for other purposes, like<br />
SSL-certificates for webservers. Such certificates certify that a certain entity (person, web server) is<br />
in control of a key.<br />
Revocation services: services for revoking certificates issued by one of the CA services. Revocation<br />
information is published using certificate revocation lists (CRLs) (Cooper et al., 2008) and OCSP<br />
(Sermersheim, 2006) .<br />
Directory services: A-Trust supports LDAP (Myers et al., 1999) as an access protocol to their<br />
directory services. LDAP can be used to retrieve certificates as well as certificate revocation lists .<br />
A-Trust currently runs the following CA-services:<br />
Service for qualified certificates a-sign-Premium-Sig-01, a-sign-Premium-Sig-02, a-sign-Premium-<br />
Sig-03 and a-sign-premium-mobile-03, which themselves are placed under the top-level root CAs A-<br />
Trust-Qual-01, A-Trust-Qual-02 and A-Trust-Qual-03 (see fig:Qualified-CA-Services-in). CA-service<br />
a-sign-Premium-Sig-01 seems not to issue any certificates any more while a-sign-Premium-Sig-03<br />
seems not to have issued any certificates so far (no certificate has been published to their LDAPserver).<br />
a-sign-Premium-mobile-03 issues certificates for mobile signature services.<br />
Service for non-qualified SSL/TLS-certificates for webservers Generally taking over non-qualified<br />
services like this one is not required. Such certificates can be easily replaced by conventional<br />
certificates from other commercial service providers. However, a certain class of servers are critical<br />
within Austrian EGovernment and hence must be supported in any case. These servers belong to a<br />
specific domain (.gv.at) and the corresponding certificates can therefore be identified by their names.<br />
Service for non-qualified certificates used for specific purposes, e.g. the identity link signer<br />
certificates or public authority certificates. The Person Identity Link is an integral part of the Citizen<br />
Card concept. It is a data structure signed by the issuing public authority that assigns a unique<br />
identification feature of a person (for example a registration number) to one or more certificates<br />
belonging to this person. As such, the person identity link can be used for the unique, automated<br />
identification of a person when that person approaches the public authority during the course of a<br />
procedure. (Bundeskanzleramt Oesterreich, 2005) These certificates can be identified by extensions<br />
including specific OIDs and must be supported by the emergency CA, since they are used in<br />
eGovernment applications.<br />
Service for other non-qualified certificates These certificates are not of interest and must not be<br />
supported.<br />
Figure 1: A-trust's qualified CA-services in Austria<br />
117
3. Taking over revocation services<br />
Harald Bratko et al.<br />
A functional revocation service is the foundation for all Austrian eGovernment processes based on the<br />
Austrian citizen card. Taking over revocation services therefore is the most critical element of an<br />
emergency certification service and has to be made available as soon as possible. A-Trust offers two<br />
types of revocation status information services for their certificates. They are based on<br />
Certificate revocation lists (CRLs) and<br />
The on-line certificate status protocol (OCSP)<br />
Both services will have to be provided by an emergency service. We have developed two scenarios for<br />
providing such a service:<br />
In the first scenario the takeover will be a planned action where it will be possible to get access to the<br />
keys used at the time of takeover. Keys are stored and handled by a hardware security module<br />
(HSM), so we assume to be able to get that HSM, that it can be transported to a new location without<br />
a loss of keys or that it can continue to work in the original environment using the emergency CA<br />
software.<br />
The other scenario assumes this not to be possible, for whatever reason. Either the service provider<br />
is not cooperative or the HSMs cease to work or any other reason that may exist for not getting<br />
access to the keys.<br />
The following sections describes our model for each case.<br />
3.1 Certificate revocation lists<br />
All certificate revocation lists in the hierarchy of qualified CA services of A-Trust are direct CRLs. This<br />
means that the CRL has to be signed with the same key that is used for signing the certificates. This<br />
structure is shown in fig:Certificate-Revocation-Lists. In these diagrams, boxes are entities like CAs, CRL<br />
or OCSP issuers (represented by their certificates). Solid lines show that an entity issues something,<br />
dashed lines point from a certificate to an entity that makes statements on the validity of a certificate.<br />
Figure 2: Certificate revocation lists<br />
3.1.1 Keys taken over from A-Trust<br />
In case the emergency CA service can continue using the keys from the original service provider, the<br />
revocation service structure of the emergency CA service can be identical to the original service.<br />
3.1.2 No keys taken over from A-Trust<br />
In case the original keys cannot be used by the emergency service, two different scenarios exist:<br />
118
Takeover of all names including domain name<br />
Harald Bratko et al.<br />
If it is not possible to continue using the key material, or if the key material has been destroyed or lost,<br />
but it is possible to continue using the original domain name and all names used in the certification<br />
services, the structure of the revocation service can mirror the one from the original CSP. The emergency<br />
CA service however has to reissue all CA-certificates. The identical names make it possible to build valid<br />
chains from unchanged end entity certificates to the old root certificates and to use the new CA<br />
certificates for validating the corresponding new crls. Care has to be taken to use names that are fully<br />
identical to those from the corresponding certificate from the taken over services. Fully identical means<br />
that even the encoding must be identical.<br />
Figure 3: Takeover of all names<br />
All this allows a signature verification application to accept the revocation list, even if it was in fact issued<br />
by a CA different from the one used to sign the certificate. This is similar to the renewal of an old CAcertificate<br />
together with a key rollover (replacement of the old keypair with a new keypair), but without<br />
doing an explicit key rollover procedure. This type of renewal of CA-certificates is common and also used<br />
by A-Trust and does not conflict with the requirements defined in (Cooper et al., 2008) regarding the use<br />
of direct CRLs. However, the new CA certificates must be distributed to all certificate verification clients.<br />
Care has to be taken of course that the serial numbers used do not conflict with the serial numbers of<br />
already issued certificates.<br />
No takeover of names or domain name possible<br />
If neither the domain nor the names within the certificates can be kept, the structure in fig:Certificate-<br />
Revocation-Lists cannot be taken over. An indirect method has to be used then, where the key and<br />
certificate used for signing a CRL is different to the one used for signing the certificate to be checked.<br />
Several options to do so exist:<br />
A single CRL issuer issuing a single CRL for all A-Trust certificates In this model a single key pair<br />
and certificate is used to issue a single CRL for all qualified certificates taken over from A-Trust,<br />
irrespective of the CA that had issued a certificate. This is possible, since according to the certificate<br />
policy (A-Trust, 2009) used by A-Trust, all certificates issued by them (whatever hierarchy they are<br />
placed in) get a unique serial number.<br />
A single CRL issuer per A-Trust hierarchy issuing one CRL for each hierarchy Similar to the first<br />
case, but separate CRLs are kept for each hierarchy. Here we create separate keys and certificates<br />
for CA services issuing a single CRL per hierarchy. In addition, each CA could also issue new<br />
certificates. This version again has two options:<br />
All new issuers are directly placed under the NCA-root This makes the new issuers independent from<br />
each other. However, this does not allow to use them to issue certificates under the direct model of<br />
the NCA since this would mix qualified and non qualified certificates under one root..<br />
Each CRL is responsible for old certificates, that have been taken over, and newly issued certificates<br />
Here each CRL has direct entries for certificates newly issued by the emergency CA and indirect<br />
entries for the certificates taken over from A-Trust. For performance reasons this option is not<br />
recommended, since certain A-Trust CRLs are already large in size (approx. 873kb for the a-sign-<br />
Premium-Sig-02-CRL) and will grow when revoking certificates issued by the emergency CA. Hence<br />
119
Harald Bratko et al.<br />
separating CRLs for certificates taken over and newly issued certificates into two entirely<br />
independent hierarchies is the preferred way.<br />
The CAPSO-Model CAPSO is the CA-Software the presented implementation will be based on.<br />
CAPSO uses the same model as A-Trust : direct CRLs. This model has to be extended for indirect<br />
CRLs, as discussed. The result is depicted in fig:CAPSO-Model. There is one CA only used for<br />
signing CRLs for certificates having been taken over. This results in a clear separation from newly<br />
issued certificates and keeps the CRLs as small as possible. It also allows keeping certificates that<br />
have been taken over in a separate CAPSO instance than the newly issued ones.<br />
Figure 4: CAPSO-model<br />
Thus we believe the structure depicted in Figure 5 on page 7 will be best suited for the purpose:<br />
3.2 Checking revocation<br />
By changing from the direct to the indirect model, the following problems occur when checking certificate<br />
revocation:<br />
According to PKIX, support for indirect revocation in client applications is optional. Thus we cannot<br />
expect every client to support indirect CRLs.<br />
The CRLDistributionPoints-extension of the certificates doesn’t fulfill the requirements set in section<br />
4.1.2.13 of (Cooper et al., 2008).There a certificate is required to contain the CRLIssuer field in the<br />
DistributionPoint. This is not given for A-Trust certificates since their use of direct CRLs. Hence a<br />
PKIX-conformant client must reject a CRL issued by the emergency CA.<br />
For Austrian eGovernment, MOA-SP (Modules for On-line Applications - Signaturprüfung) is responsible<br />
to check signatures (and thus revocation). MOA-SP can be configured with alternative CRL-distribution<br />
points, allowing MOA-SP to accept these CRLs.<br />
3.3 OCSP<br />
As an alternative to CRLs A-Trust offers an OCSP service. However, OCSP is supported for enduser<br />
certificates only, but not for CA certificates. fig:Revocation-structure-for shows that structure. A-Trust<br />
uses a structure for OCSP that is totally different from the one used for CRLs. A systemwide pseudodelegated<br />
OCSP-responder answers OCSP-requests for all parts of the hierarchy. We call this pseudodelegated,<br />
since it is not a real delegated responder but a responder using a certificate issued by a CA<br />
fully independent of any other CA in the hierarchy. Strictly speaking a validation client should not accept<br />
an OCSP response from such a responder, since it is neither direct nor delegated. However, in practice<br />
all clients accept such a behavior. A-Trust follows here the Common PKI-Model (T7 and Teletrust, 2009).<br />
Validating certificates this way requires more effort than using direct CRLs, since the certificate chain for<br />
the OCSP-responder has to be validated as well. In the context of qualified certificates it might be seen<br />
as problematic too, because it requires a validator to either explicitly trust the OCSP-responder<br />
certificate, or one of the CA certificates above. As a result the trust store for validating qualified<br />
certificates has to contain a non-qualified (CA) certificate, which is problematic since the CA certificate<br />
issuing the OCSP responder certificate is used by A-Trust to issue other non-qualified certificates, too.<br />
One has to avoid the trap of accepting non-qualified certificates; the trust store is no longer a sufficient<br />
configuration method for that purpose.<br />
120
Figure 5: The final model<br />
Harald Bratko et al.<br />
121
Harald Bratko et al.<br />
Figure 6: Revocation structure for a-sign-Premium-Sig-02<br />
3.3.1 Keys taken over from A-Trust<br />
Even if all keys can be taken over, using the A-Trust hierarchy for OCSP doesn’t make sense, since it<br />
would also require providing revocation services for the A-Trust-OCSP-responder certificate. Thus, the<br />
single OCSP-responder certificate will not be taken over in any case.<br />
In principle it would be possible to replace the single responder by a responder per CA. Each CA then<br />
would sign it’s own OCSP-responses. However, all certificates contain the AuthorityInfoAccess-extension<br />
pointing to the single responder. A single pointer cannot be used for multiple services easily. In case<br />
MOA-SP is the only validation client in use, this problem could be circumvented with multiple alternative<br />
distribution points as describe above. For the general case, an OCSP proxy could be installed parsing the<br />
OCSP-requests and forwarding it to the correct OCSP-responder based on the CertID contained in the<br />
request.<br />
The AuthorityInfoAccess-extension in CA-certificates however does not contain an accessMethod-field<br />
for OCSP. Using OCSP for CA certificates would therefore only be possible if the validation client could<br />
be manually configured to do so. Otherwise, CRLs have to be used.<br />
3.3.2 No keys taken over from A-Trust<br />
If naming and domain names cannot be taken over, or it is decided against doing so, take over of the A-<br />
Trust OCSP certificate does not make any sense at all. Basically, all strategies discussed in the CRLsection<br />
can also be applied for OCSP. Generally, revocation checking using OCSP is much less<br />
problematic, since most validation implementations support the single-responder model. fig:OCSP-<br />
Model-for-the shows a possible structure. It is similar to that of A-Trust, with the exception that under<br />
certain conditions (configuring alternative distribution points) OCSP for CA certificates would be possible<br />
too. The single responder is responsible for dealing with all requests relating to certificates taken over<br />
from A-Trust. However, since the domain is not being taken over, validation clients need to be<br />
reconfigureable to be able to access the new service.<br />
If the domain is taken over, the new OCSP-responder will listen at the original address or requests to this<br />
address will be redirected to the new address.<br />
Since the new OCSP-responder certificate will be issued by a new root, the new root has to be added to<br />
the clients trust stores to be able to accept the new responders certificate. Note, that this root will issue<br />
no other certificate than the OCSP responder certificate and hence it can be added to the trust store used<br />
for validating qualified certificates without trapping the side effects discussed above regarding A-Trust’s<br />
original OCSP responder certificate.<br />
4. Directory services<br />
When taking over directory services, the emergency service has to provide ways to search and download<br />
certificates and CRLs taken over from the previous provider. A-Trust uses an LDAP-server for providing<br />
directory services, which contains all certificates and CRLs from all parts of the hierarchy. Certificates<br />
only refer to CRLs (CRLDistributionPoints) using the LDAP-method. AuthorityInfoAccess-extensions use<br />
HTTP as the protocol to point to CA-certificates and OCSP-responders.<br />
122
Harald Bratko et al.<br />
Replicating the A-Trust structure exactly would be advantageous, as this can be done by an LDIF ex- and<br />
import.<br />
Figure 7: OCSP-model for the emergency CA<br />
5. Conclusions<br />
We have presented several options for taking over revocation and directory services from an existing PKI<br />
in case of an emergency and discussed their advantages and disadvantages. Which one will be chosen<br />
in case of an emergency will depend on the conditions for the takeover. For our prototype implementation<br />
we assume being able to continue using domain names and the names of the CAs, and possibly the keys<br />
as well. We have finished implementing parts of the emergency CA software and will now try to simulate<br />
a real emergency case including the takeover of services. Results of these tests will be fed back into the<br />
design and implementation of the prototype. We also plan to adapt this emergency software to make it<br />
useful for other scenarios, not restricted to the Austrian boundary conditions.<br />
References<br />
A-Trust (2009), ‘Anwendungsvorgaben (certificate policy) für qualifizierte zertifikate a.sign premium für qualifizierte<br />
signaturen, version 1.3.2, 27.02.2009’.<br />
Bundeskanzleramt Oesterreich (2005), ‘Xml definition of the person identity link’. URL: http://www.buergerkarte.at/<br />
Cooper, D., Santesson, S., Farrel, S., Boyen, S., Housley, R. W., P. (2008), ‘Rfc 5280: Internet x.509 public key<br />
infrastructure certificate and certificate revocation list (crl) profile’. URL: http://www.ietf.org/rfc/rfc5280.txt<br />
<strong>European</strong> Commission (1999), ‘Directive 1999/93/ec of the european parliament and of the council of 13 december<br />
1999 on a community framework for electronic signatures’.<br />
ISO (2005), ‘Itu-t recommendation x.509 (2005) — iso/iec 9594-8:2005, information technology - open systems<br />
interconnection - the directory: Public-key and attribute certificate frameworks.’.<br />
Jonsson, J. and Kaliski, B. (2003), ‘Public-key cryptography standards (pkcs) 1, rsa cryptography specifications<br />
version 2.1’. URL: http://www.ietf.org/rfc/rfc3447.txt<br />
Myers, Ankney, Malpani, Galperin and Adams (1999), ‘X.509 internet public key infrastructure online certificate status<br />
protocol - ocsp’. URL: http://tools.ietf.org/html/rfc2560<br />
Polk, W., Housley, R. and Bassham, L. (n.d.), ‘Rfc 3279: Algorithms and identifiers for the internet x.509 public key<br />
infrastructure certificate and certificate revocation list (crl) profile’. URL: http://www.ietf.org/rfc/rfc3279.txt<br />
Sermersheim, J. (2006), ‘Lightweight directory access protocol (ldap): The protocol’. URL:<br />
http://tools.ietf.org/html/rfc4511<br />
T7 and Teletrust (2009), ‘Common pki specifications for interoperable applications’. URL: http://www.t7ev.org<br />
123
Achieving Optimum Balance in the Simplification of tax<br />
Compliance Obligations for Business Customers and<br />
Management of Compliance and Collection Risks by<br />
Revenue<br />
Leonard Burke 1 and Kieran Gallery 2<br />
1<br />
The Revenue Commissioners, Limerick, Ireland<br />
2<br />
University of Limerick, Ireland<br />
lenburke@revenue.ie<br />
kieran.gallery@ul.ie<br />
Abstract: Governments and Revenue administrations worldwide strive to simplify tax administration. This paper<br />
examines whether the Irish Revenue authorities have achieved the optimum balance in relation to business<br />
customers between easing their filing and payment obligations relating to fiduciary taxes on the one hand and<br />
managing risks to compliance and collection by Revenue in respect of these taxes on the other. It focuses on<br />
advances made in the past decade to progress the wider simplification agenda, focusing in detail on the<br />
advancement of administrative arrangements in respect of three business taxes – Employers’ payroll taxes, VAT and<br />
Relevant Contracts Tax - and also considers what further possibilities exist and merit consideration both for these<br />
specific taxes and the wider simplification agenda. Advancement of the wider agenda in tax systems in developed<br />
countries is a continuous process. It necessarily requires having a balanced approach between simplification on the<br />
one hand and management of compliance and collection risk on the other. What is arguably the most challenging is<br />
simplifying the tax code or tax design. Taxes that are sensibly constructed are cheap and easy to operate tend to be<br />
easier for taxpayers to understand and pay. Continued examination and reshaping of existing tax administration is<br />
required to make it as easy as possible for taxpayers to meet their obligations in terms of information provision and<br />
compliance. In many countries such simplification has been achieved in an ad-hoc rather than a strategic way.<br />
Additionally there is limited evidence of it being championed amongst administrations and an argument can be made<br />
that such an approach ought to be taken. Measuring the real cost to business of tax administration in meeting<br />
compliance obligations is something that needs to be examined as part of determining what needs to be done to<br />
attain optimal balance. Consultation with taxpayers and their representatives, continued use of analytics, risk<br />
management tools, and the electronic medium are all key in furthering the simplification agenda in Revenue<br />
administrations.<br />
Keywords: simplification, collection, administration, risk<br />
1. Introduction<br />
Simplification of tax administration is a continuing goal of revenue administrations worldwide. It is widely<br />
recognised that well designed tax systems facilitate ease of compliance, which in turn contributes to<br />
successful tax regimes. The Irish revenue authorities (The Revenue Commissioners, hereinafter referred<br />
to as “Revenue”) have achieved some success in this regard, being ranked as the easiest country for<br />
businesses to pay taxes within the EU (Forum on Tax Administration 2010a).<br />
Achieving simplified tax administration requires revenue authorities to continually focus on how they can<br />
ease the compliance burden on taxpayers, while at the same time ensuring that risks to compliance in<br />
filing tax returns and making timely payments are not compromised.<br />
When dealing with its business customers, Revenue’s strategic direction and priorities so far this century<br />
have been driven by the need to identify and manage risk, while making it easier to comply on a voluntary<br />
basis. Combining risk management and simplification agendas brings about a natural tension in<br />
delivering on Revenue’s commitment to ensuring that everyone complies with their tax and customs<br />
responsibilities while providing quality and innovative services that support all its customers (Revenue<br />
Commissioners 2008). A balanced approach to both these agendas therefore is necessary.<br />
Taking the above into account, this paper will examine whether the Irish Revenue authorities have<br />
achieved the optimum balance in relation to business customers between easing their filing and payment<br />
obligations on the one hand and managing risks to compliance and collection on the other. Efforts that<br />
have been made to date by Revenue in advancing simplified administrative arrangements in respect of<br />
the three business taxes, (with due regard to compliance and collection risk) are reviewed, while further<br />
possibilities that may exist and merit consideration at this juncture are also explored.<br />
124
Leonard Burke and Kieran Gallery<br />
The remainder of this paper is divided into four parts. Part 2 examines some of the literature from<br />
academic, government and economic organisations published to date concerning tax simplification. Part<br />
3 provides information on Revenue’s activity in progressing the simplification agenda from 2006 onwards<br />
in relation to three of the most burdensome taxes encountered by businesses in Ireland, namely<br />
Employer’s PAYE/PRSI (Payroll Taxes), Value-Added Tax (VAT) and Relevant Contracts Tax (Relevant<br />
Contracts Tax (RCT) applies to payments made by a principal contractor to a subcontractor in respect of<br />
goods and services provided in the construction, forestry or meat processing industries. Part 4 outlines<br />
the methodology and analyses the results of interviews with top-ranking Revenue officials. Finally,<br />
Chapter 5 details the authors’ conclusions arising from the research (while also acknowledging its<br />
limitations), together with proposed recommendations.<br />
2. Literature review<br />
Tax simplification can easily be seen as a contradiction in terms. Due to the multi-faceted nature of most<br />
modern tax systems, simplifying tax is far from being a simple issue (Tran-Nam 1999, James 2007).<br />
Cooper (1993, cited by James and Wallschutzky 1997) suggested that when commentators referred to<br />
the simplicity or complexity of a tax system, they may be referring one or more of at least seven different<br />
issues, namely: predictability, proportionality, consistency, compliance, administration, co-ordination and<br />
expression. In addition, Cooper posited that tax simplification could be approached from four different<br />
levels:<br />
The tax base;<br />
The design of rules to be applied to the tax base;<br />
The expression of those rules, and<br />
The administrative requirements imposed on those taxpayers.<br />
It follows that tax simplification measures can focus on one aspect of the compliance regime (such as<br />
changes to tax legislation) or can equally deal with process re-engineering designed to improve the<br />
taxation system as a whole (Forum on Tax Administration 2010a). James highlights that simplifying one<br />
level cannot be undertaken without due consideration do the potential repercussions to the other levels.<br />
Tran-Nam (1999) describes the required level of complexity (or conversely, simplicity) in any tax system<br />
as “a two-way, interactive process” (p.514), believing that complexity can in part be attributable to<br />
taxpayers seeking ways to minimise their tax liabilities.<br />
Tax simplification does not come without potential conflicts that need to be considered. While it may be a<br />
desired trait of the tax system, many leading commentators stress that it should not be achieved at the<br />
expense of other potentially more important characteristics (as set down by Adam Smith(1776)), such as<br />
certainty (James 2008) and fairness (James and Ewards 2007).<br />
Numerous examples exist of previous attempts at tax simplification from around the world. The OECD<br />
(2010a) lists various measures being used to achieve simplification in OECD countries, such as:<br />
Regulatory management reform to improve the framework of the administrative system;<br />
Organisational re-engineering including process redesign, use of information and communication<br />
technologies (or “ICT”),<br />
Better information on the delivery of services, administrative requirements, and<br />
Co-ordination of multiple requirements stemming from public administration.<br />
Another trend has been to organise operations principally around taxpayer segments, a model adopted<br />
by the US Internal Revenue service as part of the 1998 Restructuring Act. This rationale is based on<br />
different characteristics and tax compliance behaviour that presents different risks. Grouping key<br />
functional activities in this way increases the likelihood of improving overall compliance (Owens 2006).<br />
Studies into the effectiveness of such measures have also evolved. For example, investigations have<br />
been undertaken to determine the impact of improving the comprehensibility of tax legislation (Tan and<br />
Tower 1992, Richardson and Sawyer 1998, Richardson and Smith 2002), providing taxpayers with prefilled<br />
tax returns (Klun 2009) and improvements to on-line administration (Forum on Tax Administration<br />
2010b).<br />
125
Leonard Burke and Kieran Gallery<br />
3. Recent revenue simplification initiatives<br />
McKerchar (2007) identifies those parties that are directly affected by tax complexities (or lack of<br />
simplification) as taxpayers, practitioners and the tax administrators.<br />
“In a self-assessment tax system ... these three parties by necessity have a close and dynamic working<br />
relationship. They may not always be working together, but they are working side by side, observing what<br />
they can of each other, and adjusting and readjusting their behaviours and strategies according to their<br />
assessment of the risks they face”(p.185).<br />
Reducing the compliance burden for business continues to be a priority for Revenue (High Level Group<br />
on Business Regulation 2009). As part of the High Level Group on Business Regulation, it has committed<br />
to continuing with the simplification agenda in accordance with the Government’s target of reducing the<br />
administrative burden on business by 25% by 2012. Revenue has carried out a number of wider<br />
developments that impact on the business taxes in the areas of electronic filing and payment, and VAT<br />
reverse charging. However, the focus of this paper relates to the reduction in payment and filing<br />
obligations.<br />
3.1 Payment and filing obligations<br />
In Ireland, Payroll Taxes, VAT and RCT each have significant administration requirements. Payroll Taxes<br />
are normally paid and filed on a monthly basis, with any potential balancing payment to be made in<br />
conjunction with an annual return. Similarly, VAT is collected by VAT registered traders on their supplies<br />
of goods and services supplied within the State and is usually paid and filed on a bi-monthly basis. VAT<br />
registered traders are also required by law to submit a detailed annual information return of trading<br />
details. For RCT, where tax clearance has not been authorised (i.e. where Revenue is satisfied with the<br />
tax compliance record of the subcontractor), a principal contractor deducts RCT at 35% from payments to<br />
subcontractors and returns this to Revenue on a monthly basis. Principals are also required to submit an<br />
annual informational return. The principal must also provide the subcontractor in question with an RCT<br />
deduction certificate, setting out the amount of RCT that has been deducted from each payment (When<br />
the subcontractor submits this to Revenue, Revenue will credit the subcontractor’s account with an<br />
equivalent amount, generally by offsetting an equivalent figure against outstanding taxes, or make a<br />
repayment to the subcontractor).<br />
In Ireland Irish businesses classed as small to medium face a proportionately greater administrative<br />
burden in terms of compliance obligations (Forum on Tax Administration 2010a). It is logical therefore<br />
that efforts to ease this burden have formed part of Revenue’s agenda in recent times.<br />
Revenue has made significant efforts to reduce payment and filing frequency. From 2006 Employers’ with<br />
an annual Payroll Taxes liability of less than €28,800 are now only obliged to submit returns and<br />
payments on quarterly basis. This was followed in 2007 by similar measures for VAT, with payment/filing<br />
requirements reduced from once every two months to once every four months (for annual liabilities of<br />
less than €14,400) or once every six months (for annual liabilities of less than €3,000).<br />
Historically, an annual payment and filing option for Payroll Taxes and VAT was available to small<br />
businesses. Revenue considered extending this to all business customers but the annual liability was<br />
viewed as being potentially too high for many to pay at once. When the four and six monthly frequencies<br />
were introduced for VAT in 2007, the annual filing option was withdrawn for new customers. For<br />
consistency the arrangements were also withdrawn for new Payroll Taxes customers. In January 2011<br />
quarterly payment and filing for RCT for small businesses was introduced to 40,000 taxpayers whose<br />
annual RCT liability was less than €28,800.<br />
3.1.1 Risks versus benefits<br />
It is important to acknowledge that simplification measures bring with them the risk of increased noncompliance.<br />
The identified risks for Revenue centred on the potential for an increase in the level tax<br />
debts that would more readily accumulate without Revenue intervention. Management of these business<br />
taxes is vital to Revenue in terms of cash flow, with Payroll Taxes and VAT accounting for over 57% of<br />
Revenue’s total receipts in 2009 (Revenue Commissioners 2010). There is also a significant risk to the<br />
Collector General should taxes go unpaid. The scale of this risk is a function of the size of the business,<br />
126
Leonard Burke and Kieran Gallery<br />
its associated tax liability and the length of time between returns being required – the smaller the<br />
business/liability, the lower the risk in less frequent payments.<br />
Historically, data available to Revenue showed that 85% of Payroll Taxes, VAT and RCT were paid by<br />
15%-16% of business taxpayers. The data for 2010 shows that the proportion of business taxes<br />
accounted for by this group increased to approximately 90% (Table 1 refers). Consequently while the risk<br />
attached to this group is significant, reduced payment and filing frequency for smaller businesses is seen<br />
as a positive approach to easing the burden on compliance while having due regard to compliance and<br />
collection risks.<br />
Table1: % of tax paid by business type – payroll taxes, VAT and RCT<br />
Tax Type % of businesses % value of tax payments<br />
Large Other Large Other<br />
Payroll Taxes 16.5% 83.5% 93.8% 6.2%<br />
VAT 15.4% 84.6% 89% 11%<br />
RCT 15.8% 84.2% 91.3% 8.7%<br />
Source: Collector General’s Management Information Services September 2010<br />
In addition to the expected benefits to small businesses in terms reducing all aspects of compliance costs<br />
(i.e. time, financial and psychological costs (Bennett et al. 2009)) and cash flow gains (Revenue<br />
Commissioners 2007),there are administrative benefits to Revenue, with reduced time, printing, postage<br />
and administration costs resulting from the number of returns and payments that have to be handled.<br />
4. Revenue interviews<br />
In order to establish Revenue’s understanding of the simplification agenda, and how it managed<br />
associated compliance and collections risks involved, a series of in-depth interviews with senior<br />
management within Revenue was undertaken.<br />
Qualitative research was seen as the most appropriate method for the purposes of this study. The focus<br />
was on gleaning what McKerchar (2008 p.15) describes as ‘thick’ data, i.e. “the rich information that the<br />
researcher is looking for that doesn’t fit into Likert scales, the data that will help the researcher explore<br />
the complexity of the research problem and build an understanding or an interpretation”.<br />
The interviewees were selected using purposive sampling, i.e. based on their intimate knowledge of, and<br />
exposure to, the subject matter. According to Patton (1990 p.169):<br />
“The logic and power of purposeful sampling lies in selecting information-rich cases for study in depth.<br />
Information-rich cases are those from which one can learn a great deal about issues of central<br />
importance to the purpose of the research, thus the term purposeful sampling.”<br />
In advance of the interviews a detailed set of questions was forwarded to each interviewee for<br />
consideration, examining tax simplification and the management of associated compliance risks.<br />
In addition, as part of the overall tax simplification agenda, the interviewees were asked for their views on<br />
aspects of compliance automation, primarily dealing with Revenue’s Online Service (ROS).<br />
4.1 Simplification and the management of compliance risks<br />
Views varied as to what was understood by simplification. Characteristics identified by the interviewees<br />
tended to conform with the various aspects of tax simplification identified by Cooper (1993, cited by<br />
James and Wallschutzky 1997). Tax simplification was seen as including:<br />
Tax codes that were simple to administer, easily understood and not alone benefited business, but<br />
also Revenue.<br />
Minimal administration costs.<br />
127
Easy payment of tax and filing of returns.<br />
Refunds should be provided automatically.<br />
Leonard Burke and Kieran Gallery<br />
Less time should be spent on filling in returns and making payments.<br />
One interviewee suggested that simplification was best viewed as a subset of the compliance agenda,<br />
making it easier for businesses to comply but not impacting adversely on tax take and flow to the<br />
exchequer. It included a range of measures including reduced filing frequency, working with<br />
intermediaries, communicating with taxpayers and business representatives and responding to their<br />
concerns.<br />
4.1.1 Payroll taxes, VAT and RCT<br />
Regarding the payment and filing simplification measures introduced to Payroll Taxes, VAT and RCT, it<br />
was acknowledged that progress had been made, with minimal cost to the exchequer in the year of<br />
introduction. Despite the possibilities of other agendas taking precedence, simplification and<br />
management of compliance risk we viewed as being at the core of the new measures. However, the<br />
economic downturn was seen as negatively impacting the opportunity for further simplification, due to the<br />
possible loss of cash flow to the exchequer.<br />
Views on the impact of simplification measures on compliance risk varied. Interviewees agreed that<br />
Revenue has managed the administrative arrangements around payment and filing frequencies well,<br />
focusing on those who are low risk from a compliance perspective. The underlying sense was that it<br />
worked well for taxpayers and Revenue alike, with cash flow wins for business and productivity benefits<br />
for Revenue. It was disclosed that feedback from representative bodies on the changes to the<br />
payment/filing arrangements has also been positive. However, one potential downside from the<br />
measures which had not been anticipated related to smaller tax practitioners, who heretofore were reliant<br />
on income they received from taxpayers for making returns frequently for customers. It was suggested<br />
that this may have militated against some taxpayers availing of the reduced frequency.<br />
Interviewees were asked if a taxpayer’s compliance record should determine frequency of payment and<br />
filing regardless of case size. Practical difficulties such as cash flow to the exchequer, cash flow<br />
management by taxpayers, resulting in a risk to Revenue were identified. One interviewee suggested that<br />
reduced frequency arrangements could have the impact of reducing compliance, as some taxpayers<br />
would take the opportunity to opt out of the arrangements altogether.<br />
Management of compliance risk was not seen as necessarily being about a good enforcement regime,<br />
but rather an efficient organisation that does not want to place unnecessary administrative burdens on<br />
taxpayers. For example, if Revenue could increase compliance levels through simplification or other<br />
similar measures, then audit levels could be reduced. It was contended that this would be the ultimate tax<br />
simplification, as the expense to both the taxpayer and Revenue of audits would be reduced.<br />
The overall direction of the simplification agenda was seen as a potential issue. While different Revenue<br />
divisions are involved in managing simplification, overall ownership of the simplification agenda within<br />
Revenue was described as ‘woolly’. As one interviewee described it ‘if everybody owns something and<br />
nobody has responsibility for it, it probably isn’t going to get done particularly well’. It was posited that if<br />
Revenue was to drive the simplification agenda both internally and externally it needed to properly assign<br />
ownership. It was also pointed out that ‘when Revenue wants to achieve significant things, an Assistant<br />
Secretary is given responsibility for a project board or programme’. Examples cited included the E<br />
Stamping initiative (for Stamp Duty) and the redesign of Capital Acquisitions Tax. It was suggested that a<br />
similar approach should be taken regarding simplification. While not on the same scale as the UK<br />
Government’s introduction of an Office of Simplification, this approach would demonstrate simplification is<br />
a major agenda item for Revenue.<br />
4.1.2 Automation<br />
ROS was described by interviewees as a good cheap system for obtaining payments and returns. It was<br />
not seen as a risk in terms of seeking less information from taxpayers. In addition its introduction allowed<br />
for far earlier availability, collation and transfer of data to other Government Departments.<br />
Caution was signalled against ROS being the only business channel, with the need to acknowledge that<br />
taxpayers might not or could not use it. The operation of ROS was not seen as being simple, with<br />
128
Leonard Burke and Kieran Gallery<br />
interviewees concerned that its use might be beyond some taxpayers. Other inhibitors to ROS take up<br />
posited were the complex registration process and a fear of being audited. In addition, it was<br />
acknowledged that the simple requirements in completing some paper-based returns militated against<br />
them being completed electronically because a taxpayer could manually enter figures quickly, attach a<br />
cheque and submit the form and payment via post.<br />
4.1.3 The future of simplification<br />
While accepting that payment and filing in some instances had been made easier, interviewees<br />
acknowledged that work remains on the filing of annual returns around payroll taxes and return of trading<br />
details for business. It was observed that some information requested on forms might be already<br />
available to Revenue. A commitment was suggested to review information received from businesses to<br />
establish if all information sought is still required. In addition, it was suggested that seeking information<br />
less frequently could allow for targeted compliance campaigns. An inventory of the data obtained by<br />
Revenue could be undertaken, attributing a value score to each piece of data.<br />
Further initiatives were also highlighted, such as upfront soliciting of input from business prior to<br />
developing future strategy statements.<br />
Technology can assist further simplification by using third party web technologies to allow taxpayers meet<br />
tax obligations. The E agenda overall is important in this respect, with the suggestion made that the use<br />
of web portals would allow greater interaction between business and Revenue.<br />
The potential for further use and refinement of ROS as an aid to simplification and compliance was<br />
identified and included:<br />
An outward channel where Revenue would advise taxpayers of things known through third party<br />
information supplied (caution would need to be exercised to ensure that taxpayers did not conclude<br />
that this was all that Revenue knew about them!).<br />
Developing internet applications to make it easier for taxpayers to pay and file returns should be<br />
considered.<br />
Linking of company accounting/reporting systems into ROS would enhance the information available<br />
to Revenue.<br />
Reviewing rules around the self-service channel for employees that inter alia allows updating credits<br />
and allowances.<br />
While Revenue has introduced reduced payment and filing frequencies it has not surveyed those who<br />
were directly affected by these arrangements. Interviewees were asked whether this should now take<br />
place to determine satisfaction levels. Views on this were mixed. Some suggested that the need to<br />
engage meaningfully with intermediaries, practitioners and business was vital, as it allowed the parties to<br />
identify blockages that could be removed - provided there was no compliance risk. In addition, an<br />
opportunity to develop an agenda recognising the cost associated with having to provide information,<br />
while advancing an agenda for streamlining requirements, was now seen as possible. Measuring the<br />
compliance cost for business through an academic study was suggested, where cost of normal bookkeeping/accounting<br />
compliance would be disaggregated from the compliance cost associated with tax<br />
payment and filing of returns.<br />
In contrast, a number of interviewees remained unconvinced of the need to undertake such surveys. A<br />
more appropriate approach suggested was to engage in a structured format (through consultative fora or<br />
by issuing consultation documents) in conjunction with adopting a simplification programme as part of<br />
Revenue’s overall strategy.<br />
Customer segmentation, personalisation and pre-filling of forms were also advanced as means of<br />
simplification. It was felt there was scope for Revenue to do more here.<br />
While it was acknowledged that Revenue has made it easier to comply through reduced payment and<br />
filing frequencies, the overarching view was that simplification must go beyond this and address tax<br />
design. Design was seen as the most critical element of simplification, with one interviewee concluding<br />
that ‘if we don’t get design simplified – administration is always playing catch up.’ A value for money<br />
129
Leonard Burke and Kieran Gallery<br />
review of the design of the tax codes was suggested to re-clarify what are the objectives of the different<br />
taxes. It was accepted that this would be a major undertaking.<br />
5. Conclusions and recommendations<br />
The overall impression gleaned from the interviews is that Revenue perceives that the simplification<br />
measures around the three Taxes have been positively received by business. There have been benefits<br />
for Revenue administratively with amongst other things the opportunity to grow its strategy of dealing with<br />
compliance from a risk standpoint by using various data analysis tool at its disposal. Structured feedback<br />
from business falls short, however, and more should be sought.<br />
The interviewees agreed that consideration of the three business taxes specifically examined could not<br />
be isolated from a wider examination of what Revenue and other tax administrations are seeking to<br />
achieve through the simplification process, and how the associated compliance risk is managed.<br />
5.1 Recommendations<br />
Both in the literature reviewed and the primary research undertaken the need for balance in advancing<br />
simplification of tax compliance obligations for business customers and management of compliance risks<br />
by Revenue authorities frequently is raised. There is a marked reluctance to suggest that optimal balance<br />
has been attained in this area. Indeed the evidence suggests that this might not be possible but rather<br />
opportunities exist with changes to tax codes and economic conditions that prevail to continually look at<br />
advancing the simplification and compliance agenda with risk at the heart of such advancements.<br />
Revenue is engaged in worthwhile simplification initiatives, but similar to other developed countries, is on<br />
a continuous learning curve. The view of those interviewed (and that of the authors) is that there is some<br />
scope to introduce further simplification measures in respect of the three business taxes, such as:<br />
Reduced payment and filing frequency should be extended to regular ‘nil’ filers.<br />
Annual filing and payment arrangements for taxpayers with very small liabilities should be<br />
reconsidered.<br />
A review should be carried out aimed at eliminating or reducing the need for annual information<br />
returns.<br />
Taxpayers and representative bodies should be surveyed to inform as to possibilities for further<br />
simplification.<br />
The recent introduction of a universal social charge offers the opportunity to look at the construction<br />
of payroll taxes and levies to establish what design changes may be merited.<br />
It is also suggested that a wider simplification agenda needs to be embraced by Revenue at a strategic<br />
level. Suggested measures would include the following:<br />
Make tax simplification a primary Revenue objective.<br />
Assign overall responsibility to one of the management team to champion simplification.<br />
Further develop a simplification programme that would include an expenditure review of tax codes to<br />
re-clarify their objectives.<br />
Continue structured consultation with representative bodies.<br />
Benchmark with other tax administrations as a norm.<br />
Conduct an academic study to measure the real cost to business of tax administration in meeting<br />
compliance obligations.<br />
Explore further the use of analytics and avail of the REAP system to assist both the simplification and<br />
compliance agenda.<br />
Re-assess the need for the range information currently being sought from taxpayers.<br />
While there is a degree of satisfaction and acceptance that simplification measures in relation to the three<br />
business taxes has been well advanced these are only a few of the measures undertaken by Revenue,<br />
and are presented as an indication of the much wider simplification agenda that exists within Revenue.<br />
130
Leonard Burke and Kieran Gallery<br />
It should be noted that, while the experience and status of the interviewees should give a good indication<br />
of the Revenue perspective on the simplification/compliance issue, the interviewees’ views do not<br />
represent the views of the Revenue Commissioners as a whole.<br />
Moreover, the authors acknowledge that the study only sought Revenue’s perspective on whether an<br />
optimal balance has been achieved between tax simplification and compliance risk. However it is<br />
suggested that establishing a business perspective on this issue merits a study to give the external view<br />
on the topic. Research on tax simplification, and indeed, the implementation of the tax simplification<br />
agenda itself can be summed up in a slogan borrowed from Irish Rail: ‘We’re not there yet, but we’re<br />
getting there.’<br />
References:<br />
Bennett, F., Brewer, M. and Shaw, J. (2009) Understanding the Compliance Costs of Benefits and Tax Credits, The<br />
Institute for Fiscal Studies.<br />
Cooper, G. S. (1993) 'Themes and issues in tax simplification', Australian Tax Forum, 10.<br />
Forum on Tax Administration (2010a) Information Note: Programs to Reduce the Administrative Burden of Tax<br />
Regulations (follow-up report), OECD [online], available: http://www.oecd.org/dataoecd/58/27/44972185.pdf<br />
[accessed 04/05/2010].<br />
Forum on Tax Administration (2010b) Survey of Trends and Developments in the Use of Electronic Services for<br />
Taxpayer Service Delivery, OECD [online], available: http://www.oecd.org/dataoecd/20/49/45035933.pdf<br />
[accessed 01/03/2011].<br />
High Level Group on Business Regulation (2009) Second Report of the High Level Group on Business Regulation,<br />
Dublin: Department of Enterprise, Trade and Innovation.<br />
James, M. (2008) 'Tax Simplification: The Impossible Dream?', British Tax Review, (4).<br />
James, S. (2007) Tax Simplification is not a Simple Issue: The Reasons for Difficulty and a Possible Strategy,<br />
Discussion Papers in Management, University of Exeter, unpublished.<br />
James, S. and Ewards, A. (2007) How Far Should Tax research Take Account of the Wider Context? The Cases of<br />
Tax Compliance and Tax Simplification, Discussion Papers in Management, University of Exeter, unpublished.<br />
James, S. and Wallschutzky, I. (1997) 'Tax Law Improvement in Australia and the UK: The Need for a Strategy for<br />
Simplification', Fiscal Studies, 18(4).<br />
Klun, M. (2009) 'Pre-Filled Income Tax Returns: Reducing Compliance Costs for Personal Income Taxpayers in<br />
Slovenia', Financial Theory and Practice, 33(2).<br />
McKerchar, M. (2007) 'Tax Complexity and its Impact on Tax Compliance and Tax Administration in Australia', in<br />
2007 IRS Research <strong>Conference</strong>, Washington D.C.,<br />
McKerchar, M. (2008) 'Philosophical Paradigms, Inquiry Strategies and Knowledge Claims: Applying the Principles of<br />
Research Design and Conduct to Taxation', eJournal of Tax Research, 6(1).<br />
Owens, J. (2006) 'Fundamental Tax Reform: an International Perspective', National Tax Journal, 59.<br />
Patton, M. Q. (1990) Qualitative Evaluation and Research Methods, Newbury Park, CA: Sage.<br />
Revenue Commissioners (2007) Unpublished Minutes of Collector General Management Executive Meetings,<br />
Revenue Commissioners (2008) Revenue Statement of Strategy 2008-2010, Dublin: Revenue Commissioners.<br />
Revenue Commissioners (2010) Annual Report 2009, [online], available:<br />
http://www.revenue.ie/en/about/publications/annual-reports/2009/strategy1-1.html#table1 [accessed<br />
01/03/2011].<br />
Richardson, G. and Smith, D. (2002) 'The Readability of Australia's Goods and Services Tax Legislation: An<br />
Empirical Investigation', Federal Law Review, 30(3).<br />
Richardson, M. and Sawyer, A. J. (1998) 'Complexity in the Expression of New Zealand's Tax Laws: An Empirical<br />
Analysis', Australian Tax Forum, 14.<br />
Smith, A. (1776) An Inquiry into the Nature and Causes of the Wealth of Nations, Methuen & Co., Ltd [online],<br />
available: http://www.econlib.org/library/Smith/smWN.html [accessed 01/03/2011].<br />
Tan, L. M. and Tower, G. (1992) 'The Readability of Tax Laws: An Empirical Study in New Zealand', Australian Tax<br />
Forum, 9(4).<br />
Tran-Nam, B. (1999) 'Tax Reform and Tax Simplification: Some Conceptual Issues and a Preliminary Assessment',<br />
Sydney Law Review, 21.<br />
131
Risk Management in a Cooperation Context<br />
Walter Castelnovo<br />
University of Insubria, Italy<br />
walter.castelnovo@uninsubria.it<br />
Abstract: One-Stop Shop for Production Activities (SUAP) is the solution Italian Government has chosen to adopt,<br />
since 1998, in order to make it easier doing business. However, despite more than ten years of efforts, the ranking of<br />
Italy among the countries that have facilitated going into business have not improved over the past years. Thus, in<br />
2010 the Italian Government decided to further simplify the procedures by turning the current legislation from the<br />
traditional ex ante authorization regime into an ex-post controls regime. Under this new regime, all the required<br />
controls have to be operated within a fixed time interval defined by the law. Most often these controls have to be<br />
operated by different public agencies, thus determining two main problems: (a) the agencies involved should<br />
cooperate in order to make the controls efficient and effective; (b) since these agencies usually suffer from a chronic<br />
lack of resources, the only way to safeguard the public interest is by identifying, through a careful analysis of the<br />
potential risks involved, what controls really need to be made. In the paper I will consider how the public agencies<br />
involved in the functioning of the SUAP can satisfy the requirements determined by the new Italian legislation, by<br />
resorting to a form of inter-organizational risk management. In the first section of the paper, I will first provide a full<br />
explanation of the Italian model of SUAP and the recent changes in the Italian legislation concerning its functioning,<br />
and then I will show why the current regime of ex-post controls requires the SUAP to implement an adequate risk<br />
management system. In section 2 I will consider the Team Risk Management (TRM) model that has been originally<br />
developed to manage risks in software-dependent development programs involving different organizations. In section<br />
3, I will show how a slight revision of the TRM model can be integrated within the SUAP’s workflows to help all the<br />
public agencies involved to cope with the requirements stated by the new Italian legislation concerning starting,<br />
transforming or closing a business. Finally, I will discuss what conditions different public agencies should satisfy in<br />
order to implement an effective and efficient inter-organizational risk management system.<br />
Keywords: risk management, One Stop Shop, inter-organizational cooperation, interoperability<br />
1. One-Stop Shop for Production Activities<br />
Italy is one of the major economies in the world; notwithstanding this, Italy suffers from a serious problem<br />
of competitiveness. This mainly depends on the difficulty of doing business in Italy: in the 2010 World<br />
Bank’s ranking Italy occupies the 80 th position among the countries in which doing business is easier<br />
((World Bank 2010)). The Word Bank’s index is based on some general economic indicators, some of<br />
which directly concern the administrative burdens affecting businesses. For this reason the policies<br />
implemented in Italy to improve competitiveness have been mainly based on the simplification of the<br />
administrative procedures needed for starting, transforming or closing a business.<br />
Due to the legislation in force, most of the administrative procedures concerning business involve<br />
different public agencies. Thus, as a first step for reducing the administrative burdens on business, Italian<br />
municipalities have been required to implement One-Stop Shops for Production Activities (Sportello<br />
Unico per le Attività Produttive – SUAP), as a single point of access to services and information for<br />
business offered by different public authorities. The first legislation concerning the SUAP dates back to<br />
the late ‘90s and contains two fundamental principles: (i) municipalities are put in charge of the<br />
functioning of the SUAP, that could also be shared by different municipalities; (ii) the SUAP must give or<br />
deny a final authorization within a fixed term defined by the law, having previously acquired all the<br />
required authorizations from the competent agencies.<br />
Over the years the model of the SUAP has been under ongoing improvement, mainly by making it more<br />
and more ICT-based. The evolution of the SUAP toward virtualization can be described by the reference<br />
framework for One-Stop EGovernment of figure 1 (the dotted lines represent the evolution path of the<br />
SUAP):<br />
At the very beginning the main problem for the SUAP was how to bundle the services offered by different<br />
agencies (the step 1 in the figure above); this problem has been solved mainly in terms of inter-agencies<br />
agreements, often without considering how inter-agencies communications and workflows could be<br />
virtualized. A fundamental step toward the virtualization of the SUAP has been made with the innovation<br />
projects funded under the Italian National Action Plan for EGovernment between 2003 and 2008.<br />
Actually, 79 out of the 134 funded projects directly concerned the implementation of online services for<br />
enterprises. Moreover, despite their not being directly geared toward enterprises, most of the other<br />
infrastructural projects funded under the Action Plan aimed at creating the technological conditions for the<br />
132
Walter Castelnovo<br />
virtualization of inter-agencies communications and workflows, thus enabling the complete virtualization<br />
of the SUAP (the step 2 of figure 1). However, the ease of doing business in Italy has not improved<br />
during the past years, notwithstanding the simplification induced by the virtualization of the SUAP.<br />
Figure 1: Reference framework for one-stop eGovernment ((Hogrebe and Kruse 2008))<br />
To change this situation, in 2010 the Italian Government took new initiatives to make it easier starting,<br />
transforming or closing a business. Not only were new measures defined, in order to favour the complete<br />
digitalisation of inter-municipal communications and workflows, but even the procedures for starting,<br />
transforming or closing a business have been further simplified by turning the current legislation from the<br />
traditional ex ante authorization regime into an ex-post controls regime. Under this new regime, a new<br />
business can be started up simply through a communication (Segnalazione Certificata di Inizio Attività –<br />
SCIA, Certified Communication of the start of the activity) submitted online to the SUAP through the<br />
national portal www.impresainungiorno.it.<br />
The online procedure is such that it guarantees that the SCIA contains all the required information and<br />
that all the required documents have been attached (if the communication is incomplete it is rejected). A<br />
SCIA that has been checked for completeness gets registered to the system that automatically sends a<br />
receipt to the applicant. Upon receiving this receipt, an entrepreneur can start a new business without<br />
necessarily having to wait for the SUAP to complete the required controls. This is the main reason why<br />
the new ex-post controls regime is expected to make it easier to start a business in Italy.<br />
Upon registering the SCIA the SUAP has to operate all the required controls within an interval of time<br />
defined by the law (60 days). If any of the controls detects some inadequacy, then the business can be<br />
stopped (either temporally until the inadequacy will be removed or definitively, if the inadequacy can not<br />
be removed), otherwise it can operate without requiring any further authorizations.<br />
The new legislation is in force since 2010; hence it is not possible to evaluate yet, not even tentatively,<br />
the effects it can have on the ease of doing business in Italy. However, it is possible to evaluate the<br />
impact the new legislative regime has on the functioning of the SUAP, considering that it maintains the<br />
responsibility of the municipality on the SUAP and it does not reduce the number of public agencies and<br />
authorities having competences concerning starting, transforming or closing a business. This determines<br />
two relevant consequences; on the one hand, it is a responsibility of the municipality to implement,<br />
through the SUAP, an effective and efficient system for the management of all the ex-post controls<br />
133
Walter Castelnovo<br />
required by the new legislation. On the other hand, such a system must be based on the cooperation<br />
among the different public bodies involved. Both consequences can be problematic, given the chronic<br />
lack of resources characterizing the Italian municipalities, as well as many of the other public agencies<br />
having competences on starting, transforming or closing a business. Actually, even if they can be made<br />
more efficient by the use of ICTs, especially in coordinating the activities of the different agencies<br />
involved, the ex-post controls cannot be completely automated. They most often have to be manually<br />
performed by people that are likely to be also allocated to other activities within their organizations and<br />
that, for this reason, could have difficulties to promptly operate the controls.<br />
In such a situation the risk that the SUAP can not guarantee that all the ex-post controls will be operated<br />
within the required terms is concrete. It is a risk that can affect seriously the capacity of the municipalities,<br />
and other public agencies as well, to pursue public value through a careful management of the territory.<br />
Actually, given the lack of resources affecting the public bodies involved, the only way to safeguard the<br />
public interest is by identifying what controls really need to be operated, based on a careful analysis of<br />
the potential risks the SCIAs that have been submitted to the SUAP could entail.<br />
2. Risk management<br />
The word risk can assume different meanings according to the context in which it is used. (Alberts and<br />
Dorofee 2005) suggests that in order for a risk to exist the following three conditions must occur:<br />
There must be a loss associated with a situation<br />
There must be some uncertainty with respect to the eventual outcome<br />
Some choice or decision is required<br />
In the case we are considering (that is the processing of a SCIA under the new Italian legislation), all the<br />
three conditions occur.<br />
In 2009, 385.512 procedures for the starting of new enterprises and 406.751 procedures for the closing of<br />
enterprises have been registered in Italy. Even without considering the procedures for the transformation<br />
of already existent enterprises, it is apparent that in order to carry out all these procedures an intense<br />
activity is required to all the public bodies involved. Because of the lack of resources mentioned above, in<br />
order to guarantee that they will be operated at least on the more critical cases, the SUAP could be<br />
forced to decide whether or not a SCIA deserves all the ex-post controls normally required. Thus, in the<br />
case we are considering the condition (3) above holds.<br />
For the same reason, the condition (2) holds as well; actually, when the SUAP decides not to make the<br />
controls on a given SCIA, no one knows for sure what the consequences of that decision will be. Hence,<br />
the decision involves a certain degree of uncertainty with respect to its eventual outcome.<br />
For condition (1) above to hold there must be a possible loss related to the decision that is being taken. If<br />
the business whose starting has been communicated through a SCIA completely conforms to the<br />
regulation in force and does not involve any peculiarity that could recommend not establishing it there,<br />
not performing the ex-post controls has no problematic consequences. However, if the starting of that<br />
business involves some problems that would need attention, not performing the ex-post controls could<br />
have problematic consequences. In this case, by identifying the potential problems involved, the ex-post<br />
controls could avoid the occurrence of problematic situations (for instance in terms of non conformance to<br />
the building regulation, potential environmental risks or health risks for the employees and/or for the<br />
surrounding population, etc.). From this point of view, performing the ex-post controls is a way of<br />
preserving the public interest and pursuing public value.<br />
Similarly, disregarding the case in which in starting a new business something not conforming to the<br />
regulation in force has been consciously done, the ex-post controls allow an entrepreneur to know timely<br />
that something wrong has been done that could lead to some form of sanctioning or even to the closing<br />
of his business. In this sense, the ex-post controls can help an entrepreneur to avoid the occurrence of<br />
problematic situations, thus helping him doing business. This is a way to contribute increasing a country’s<br />
economic wellness and, consequently a way to indirectly pursuing public value.<br />
In both the cases considered, the decision of not performing the ex-post controls could cause a loss that<br />
ultimately concerns the pursuing of public value, that is the fundamental mission of a public<br />
134
Walter Castelnovo<br />
administration body. Hence, the SUAP’s decision whether or not to perform certain ex-post controls<br />
satisfies also the condition (1) above characterizing the existence of a risk.<br />
It can thus be concluded that, under the new Italian legislation concerning starting, transforming or<br />
closing a business, the activity of the SUAP could indeed involve some risk that needs to be managed to<br />
preserve public value. From this point of view, risk management should be considered as an essential<br />
part of the functioning of the SUAP.<br />
In the case we are considering, all the public agencies involved in the processing of a SCIA may have to<br />
decide whether or not to perform the ex-post controls normally required. However, the individual decision<br />
of each agency involved has consequences on the final result of the processing of that SCIA, thus<br />
affecting the other authorities' capability of pursuing their strategic mission. In order to avoid this<br />
possibility, it is necessary for all the actors involved in the processing of a SCIA to share both their<br />
evaluation of the potential risks it could entail and their decisions whether or not to perform some controls<br />
on it. This rises the problem of implementing an interoperable risk management system, that is a system<br />
whose goal is “to more effectively allow organizations to share information and perform necessary<br />
activities with regard to risk management that may affect their collective behaviour” ((Meyers 2006, 6)).<br />
The fundamental function of risk management is to help an organization to handle the risks it could<br />
encounter in its activities. As defined, for instance, in (Strategic Partnering Taskforce 2004) risk<br />
management includes identifying risks, assessing risk areas, developing risk-handling options, monitoring<br />
risks to determine how risks have changed, and documenting the overall risk management programme.<br />
In an inter-organizational risk management system all these activities must be shared by the partners.<br />
Although it has been devised specifically for managing risks in software-dependent development<br />
programs, the Team Risk Management (TRM) approach described in (Higuera et al. 1994) defines<br />
methods and tools that can help organizations to manage risks also in the cooperation scenario we are<br />
considering.<br />
Figure 2: The team risk management approach ((Higuera et al. 1994))<br />
In the original TRM approach three types of risk management processes are considered: (i) an intraorganizational<br />
process executed independently by each partner organization (the Baseline Risk<br />
Assessment); (ii) a set of continuous processes implemented as both intra and inter-organizational; (iii)<br />
an inter-organizational process conducted jointly by the partners (the Team Review Process).<br />
The risk management process begins with the baseline risk assessment that allows all the partners to<br />
identify the risks that are associated with their respective organizations. These risks are shared and<br />
jointly evaluated through the team review that combines the most important risks identified by the<br />
partners into a list of the most important risks faced by the program. The continuous processes comprise<br />
a cyclic set of activities, that roughly correspond to the risk management activities mentioned above;<br />
135
Walter Castelnovo<br />
these activities allow each partner to manage risks both at the intra-organizational level and at the interorganizational<br />
level, through a repeated execution of the team review process.<br />
Strictly speaking, the case we are considering does not involve the execution of a single mid to long term<br />
program, that is what the TRM approach has been specifically devised for. This means that, to be applied<br />
here, the model has to be modified in some ways. On the one hand, the original model only considers a<br />
dyadic relation between the partners, whereas in the processing of a SCIA many agencies could be<br />
involved. On the other hand, since there could be many different SCIAs that have to be simultaneously<br />
processed by the SUAP, it could happen that the partners are involved in the concurrent execution of<br />
different instances of the global risk management process described in figure 2 above. Finally, since the<br />
processing of a SCIA has to be completed within 60 days from its submission to the SUAP, the reiteration<br />
cycles of both the team review and the continuous processes must be much more shorter than those<br />
described in the original model. All these elements obviously affect the way in which the TRM model<br />
could be implemented as part of the SUAP’s activity.<br />
In the next section I will consider how, a slight revision of the TRM model can be integrated within the<br />
SUAP’s workflows to help all the public agencies involved to cope with the requirements stated by the<br />
new Italian legislation concerning starting, transforming or closing a business.<br />
3. Inter-organizational risk management<br />
As argued above, the need for the SUAP to implement a risk management system derives from the<br />
necessity to rest upon a careful analysis of the potential risks involved the decision whether a SCIA really<br />
deserves the ex-post controls normally required. Such controls most often concern matters on which<br />
different public agencies have competences besides the municipality that is responsible for the<br />
functioning of the SUAP. This determines two relevant consequences:<br />
The decisions should be shared among all the agencies involved;<br />
All these agencies should coordinate their control activities, since a possible delay in one agency’s<br />
activity could have consequences on the final result of the processing of a SCIA.<br />
A way to satisfy both these requirements is by integrating the TRM model within the SUAP’s workflows as<br />
defined by the new Italian legislation concerning starting, transforming or closing a business. The<br />
workflow of figure 3 below describes such an integration.<br />
Figure 3: Integration of TRM within the SUAP’s workflow<br />
The whole process is activated by an applicant submitting online a SCIA (and all the required documents)<br />
through the portal www.impresainungiorno.it. The SCIA and all the documents attached to it are<br />
forwarded to the competent SUAP that, after verifying the completeness of the documentation, releases a<br />
receipt to the applicant. From this moment onward, the activity that has been object of the SCIA can be<br />
started.<br />
136
Walter Castelnovo<br />
After registering the SCIA, the SUAP sends the relevant documentation to all the agencies having<br />
competences on it. Upon receiving the documents, the agencies can individually perform the baseline<br />
risk assessment process, with the aim of identifying all the potential risks that SCIA could entail. By using<br />
standard tools for risks analysis and evaluation (for instance those considered in (IMA 2007) and in<br />
(AIRMIC, ALARM, IRM 2002)), through this step each partner is thus able to associate to the SCIA under<br />
processing a level of risk, with respect to the matters on which he has competence. For each partner, this<br />
level corresponds to how much attention he thinks that SCIA deserves, based also on previous<br />
experiences in similar cases.<br />
Besides evaluating the potential risks involved, during this phase each partner can also plan the<br />
execution of the control activities on that SCIA. The timing of these activities depends both on the level of<br />
risk detected and on the other activities in which that agency is possibly already occupied. Actually, as<br />
observed above, the agencies involved in the processing of a SCIA are most often characterized by a<br />
limited availability of resources that usually have to be allocated also on different activities, besides those<br />
concerning starting, transforming or closing a business.<br />
The team review allows the partners to jointly evaluate the SCIA on the basis of the potential risks each<br />
one of them identified individually, thus arriving at a shared risk evaluation. Such an evaluation forms the<br />
basis for determining what is the more adequate risk treatment strategy to assume among accepting,<br />
rejecting or handling the risks. Accepting the risk means that the team evaluation is such that the level of<br />
risk of the SCIA is not ranked high; thus, also considering the other constraints that could possibly limit<br />
the partners’ activities, there is no particular problem in delaying, and even possibly avoiding, the ex-post<br />
controls. Rejecting the risk amounts to recognizing that the SCIA does not involve any particular risk and<br />
could thus be treated in terms of a silent-assent procedure. Finally, handling the risk means adopting<br />
mitigation plans with the aim of reducing the risks involved in the SCIA by implementing appropriate risk<br />
mitigation actions. Such actions will amount to the competent authorities planning and performing all the<br />
required ex-post controls with a timing that will allow the processing of the SCIA to be completed within<br />
the terms provided by law.<br />
In defining the risk handling actions through the team review, the partners are in position not only to<br />
identify what controls really need to be made, and by who, but also to consider what controls could be<br />
delayed or, possibly, even be dispensed with. Due to the scarcity of the resources each partner can<br />
devote to the controls, this is a way to optimize their use through a collaborative distribution of tasks.<br />
This point can be illustrated with an example. Suppose that a SCIA S has been submitted to the SUAP<br />
such that three public agencies (AG1, AG2, AG3) are involved in its processing. Suppose, moreover, that<br />
the baseline risk assessment is such that AG1 rates S as high risk, whereas AG2 and AG3 rate it as low to<br />
medium risk. All the three agencies involved should make the required controls, which forces all of them<br />
to allocate resources on this task. However, it could happen that despite the controls performed by AG2<br />
and AG3 didn’t detect any inadequacy, the SCIA has nevertheless to be rejected because of a serious<br />
problem detected by AG1. In this case, AG2 and AG3 have been forced to spend their scarce resources on<br />
activities that they could have avoided if they already knew the result of the controls operated by AG1.<br />
Given the scarcity of the available resources, the occurrence of such a situation should be avoided.<br />
In the example above this result could be achieved by scheduling the controls activities to be performed<br />
by AG2 and AG3 after those pertaining to AG1. The general strategy could then be scheduling the control<br />
activities the different agencies have to perform so as to execute first those with the highest level of risk<br />
detected, compatibly with the timing the agencies involved assign to the SCIA under processing. With<br />
respect to the example this means that, in case the timing for S defined by AG1 is not compatible with the<br />
general strategy, the partners could ask AG1 to revise its scheduling and to re-allocate its resources so<br />
that S could be processed earlier than originally planned. Of course, this requires AG1 to agree redefining<br />
its priorities in order to cope with those shared within the team review. However, this can be done only if<br />
there is a strong commitment of the partners toward the collaboration.<br />
Once defined and agreed on by all the participants to the team review, each partner has to implement its<br />
own risk handling actions, by entering in the continuous processes phases. These phases include action<br />
planning, tracking, control and routine risk identification and analysis.<br />
Action planning essentially amounts to each partner redefining its priority to align them to those defined<br />
by the team review. This step also presupposes a strong internal commitment, especially in the case the<br />
137
Walter Castelnovo<br />
agencies involved are small organizations. Actually, team risk management requires a strong internal<br />
commitment both to support the baseline risk assessment and to implement the risk handling actions<br />
defined within the team review.<br />
Consider, for instance, the case of a small municipality in which the presence of an organizational unit<br />
specifically devoted to the processes concerning starting, transforming or closing a business is extremely<br />
unlikely. Risk analysis and risk handling processes in small municipalities would most often be managed<br />
by resorting to resources available within different organizational units, that is people who already have a<br />
full-time job in the organization and are now tasked with something else. Of course, this rises a serious<br />
coordination problem within the organization, whose solution requires the commitment of both policy<br />
makers and senior managers that are asked to fix the priorities. Actually, a strong intra-organizational<br />
commitment is one of the fundamental conditions for the effectiveness of all risk management processes<br />
((ISO 2009), (AIRMIC, ALARM, IRM 2002, 2010)).<br />
By means of the tracking and control processes each partner can monitor the results of the risk handling<br />
actions implemented, at the same time providing a documentation of the whole risk management<br />
process. Once shared with the partners, these monitoring information constitute a common knowledge<br />
base that can be referred to, both at the intra-organizational level and the inter-organizational level, in the<br />
treatment of similar situations that could arise in the future. Of course, this can be done only if the<br />
partners share the risk monitoring system and the monitoring information are gathered and<br />
communicated by means of standardized reporting structures.<br />
Finally, the routine risk identification and analysis process amounts to a continuous activity through which<br />
all the partners can identify new threats arising during their day to day activities. These threats can<br />
depend on the occurrence of unforeseen situations that could affect the partners’ capacity to execute the<br />
risk handling actions within the terms agreed on. Such risks should be identified and treated timely since<br />
a delay in one partner’s activity could affect the final result of the processing of a SCIA. Moreover,<br />
because of the potential consequences they could have on the other partners’ activities, the emergence<br />
of these risks should be promptly communicated to the partners, in order to let them assume timely all the<br />
measures apt to cope with the new situation.<br />
In the TRM model, the sharing of the risk identification and the joint definition of the risk handling actions<br />
are part of the team review process. However, due to the strict temporal constraints the processing of a<br />
SCIA must satisfy, in the situation we are considering the team review process cannot be implemented<br />
simply as a periodic meeting among the partners. Rather, also team review should be implemented as a<br />
continuous communication process through which the partners interact on a day to day basis.<br />
4. Conclusions<br />
Joint risk management is a form of inter-organizational cooperation for the management of the risks<br />
related to activities involving the joint effort of different organizations. Such organizations could be highly<br />
heterogeneous, not only as regards their dimensions, organizational culture, competences in the use of<br />
ICT, but also as regards their legal status. However, the efficiency and effectiveness of an interorganizational<br />
cooperation strictly depends on how the partners will be able to ‘mesh’ their efforts, aiming<br />
at some degree of homogeneity with respect to some aspects of their activities, while maintaining<br />
heterogeneity in others. This raises the problem of what conditions can make it possible for<br />
heterogeneous partners to share an inter-organizational risk management system.<br />
The effectiveness of the inter-organizational risk management system described above, strictly depends<br />
on some conditions the partners must satisfy. Such conditions include:<br />
The sharing of the strategic vision among the partners, as the condition that allows them to assume a<br />
common view of what counts as a risk<br />
A strong commitment of the partners toward the cooperation, such that they consider themselves as<br />
part of an inter-organizational system (conceived as a system of systems)<br />
Considering the interaction with the partners as a standard modality in the day to day operations<br />
A continuous communication and sharing of information among the partners<br />
The integration of the inter-organizational risk management processes within each partner’s internal<br />
processes<br />
138
Walter Castelnovo<br />
A high operational flexibility of the partners, to cope with unforeseen situations and exceptions that<br />
can derive also from the activities of the other partners<br />
The sharing of standardized tools and methodologies for the identification, analysis, evaluation and<br />
description of risks<br />
Satisfying these conditions makes the partners interoperable with respect to risk management.<br />
Considered as interoperability requirements, these conditions are quite different from the usual<br />
requirements for systems interoperability. In risk handling the rapidity of the answer to threats is a key for<br />
success. In situations in which, like in the case considered in this paper, different organizations are<br />
involved, the rapidity of the answer strictly depends on the partners’ capability of working together. Of<br />
course, this entails the sharing of information, the efficiency of inter-organizational communication and<br />
the compatibility of the organizational processes; but it also presupposes a common organizational<br />
culture and a shared system of values. Risk management is a central part of any organisation’s strategic<br />
management; it is not possible for different organizations to share risk management without also sharing<br />
(some or all of) their strategic objectives. This means that, in order to share an inter-organizational risk<br />
management system like the one described in section 3, the partners have to achieve a high level of<br />
interoperability, not only in the technological domain but in the organizational and strategic domains as<br />
well.<br />
References<br />
AIRMIC, ALARM, IRM (2002), A risk management standard, The Association of Insurance and Risk Managers<br />
(AIRMIC), Association of Local Authority Risk Managers (ALARM) and The Institute of Risk Management<br />
(IRM).<br />
AIRMIC, ALARM, IRM (2010), A structured approach to Enterprise Risk Management (ERM) and the requirements of<br />
ISO 31000, Association of Local Authority Risk Managers (ALARM) and The Institute of Risk Management<br />
(IRM).<br />
Alberts, C.J. and Dorofee, A.J. (2005), Mission Assurance Analysis Protocol (MAAP): Assessing Risk in Complex<br />
Environments,TECHNICAL NOTE, CMU/SEI-2005-TN-032, Carnegie Mellon University.<br />
Higuera, R. P., Gluch, D. P., Dorofee, A. J., Murphy, R.L., Walker, J.A. and Williams, R. C. (1994), An Introduction to<br />
Team Risk Management. (Version 1.0), Special Report CMU/SEI-94-SR-1, Carnegie Mellon University<br />
Hogrebe, F. and Kruse, W. (2008), “One Stop eGovernment for Small and Medium-Sized Enterprises (SME): A<br />
Strategic Approach and Case Study to Implement the EU Services Directive”, eCollaboration: Overcoming<br />
Boundaries through Multi-Channel Interaction, Proceedings of the 21st Bled e<strong>Conference</strong>, Bled, Slovenia, June.<br />
IMA (2007), Enterprise Risk Management: Tools and Techniques for Effective Implementation, Institute of<br />
Management Accountants.<br />
ISO (2009), ISO 31000:2009, International Organization for Standardization.<br />
Meyers, B.C. (2006), Risk Management Considerations for Interoperable Acquisition, TECHNICAL NOTE, CMU/SEI-<br />
2006-TN-032, Carnegie Mellon University.<br />
Strategic Partnering Taskforce (2004), Risk Management - Technical Notes, Office of the Deputy Prime Minister, UK.<br />
World Bank (2010), Doing Business 2011 – Making a Difference for Entrepreneurs, The International Bank for<br />
Reconstruction and Development/The World Bank.<br />
139
The Effect of User's Satisfaction of web Security on Trust in<br />
eGovernment<br />
Lichun Chiang 1 , Ching-Yuan Huang 2 and Wu-Chuan Yang 3<br />
1<br />
National Cheng Kung University, Tainan, Taiwan<br />
2<br />
Shu-Te University, Kaoshiung, Taiwan<br />
3<br />
I-Shou University, Kaoshiung, Taiwan<br />
gardfieldc@gmail.com<br />
Abstract: The way that Web security has been managed by the government will influence user’s satisfaction and<br />
intention toward using web and trust in the government. The purpose of this research is to link user's satisfaction with<br />
web security in eGovernment and trust in government; that is, it aims to study the relationships among user’s<br />
satisfaction, trust and government. The main question is “does user’s satisfaction of web security in eGovernment<br />
influence user’s trust in the government?” The research explores the status quo of web security in government, and<br />
studies user’s satisfaction of web security which influences user’s trust in the government. The research focuses on<br />
the investigation of users’ satisfaction and trust of web security via the method of questionnaires applied the<br />
structural equation modeling (SEM) to analyze users’ trust in the use of web security. The statistic method is applied<br />
LISREL 8.54 to analyze questionnaires’ data. This research shows that the precursors of user intent to trust web<br />
security are multidimensional (i.e., ease of use, perceived usefulness, attitude and satisfaction) and identifies their<br />
critical influences on realizing government web security. These two dimensions are interwoven, and one must not<br />
focus exclusively on any single factor in assessing overall intention toward trust eGovernment.<br />
Keywords: eGovernment, satisfaction, service quality, trust, the structural equation modeling<br />
1. Introduction<br />
Since the government applied information technology (IT) to improve public services, government web<br />
application has become a convenient tool for users to search official documents and participate in public<br />
activities. Users using government Web sites are not only critical consumers but also demanding citizens<br />
(Welch et al 2005). Therefore, what citizen demand are on government web sites is concerned by<br />
eGovernment when developing digitalized public services via the Internet; that is, the way making citizens<br />
satisfaction with public services has to be considered by eGovernment. Welch, Hinnant and Moon (2005)<br />
pointed out that appropriate IT utilization, especially the Internet, by government has the potential to<br />
increase citizen satisfaction with government at the reason that more convenient services, more<br />
accessible and complete information can improve citizen trust in government. As Chadwick and Basden,<br />
(2001) said, trust built from experience, personal knowledge, and bias, and also based on the action that<br />
the trustee is about to take. Thus, user’s experiences with eGovernment, satisfaction with eGovernment<br />
and government Web sites are interrelated to trust in government and they affect each other.<br />
The way that Web security has been managed by the government will influence user satisfaction and<br />
intention toward using web and trust in the government (Welch et al. 2005; Liu, Guo & Hsieh 2010). As<br />
Hisamitsu and Takeda (2007) stated, the security of e-voting systems and their operational procedures<br />
are important factors to assess the attitude of trustworthiness of e-voting practices in Japan. The key<br />
factor affected user satisfaction of government web sites is considered as Web application security<br />
because of the nature of online activities: information exchange, payments and individual privacy. In<br />
addition, the quality of the public e-services users perceived is necessary consideration when discussing<br />
user satisfaction with government websites (Magoutas & Mentzas 2010). User behavioral intention<br />
towards e-service continuance is influenced by customer satisfaction, perceived usefulness and<br />
subjective norm according to the theory of Planned Behavior (TPB) and the Technology Acceptance<br />
model (TAM) (Bhattacherjee 2001; Liao et al. 2007). Thus, government web application security is<br />
interrelated to user satisfaction and trust.<br />
The purpose of this research is to link user's satisfaction with web security in eGovernment and trust in<br />
government; that is, it aims to study the influential factors which possibly affect the relationships between<br />
user’s satisfaction of government web security and trust in government. The main question is “does<br />
user’s satisfaction of government web application security influence user’s trust in the government?” In<br />
order to answer this question, the authors examine users perceptions of government web application<br />
security based on the Technology Acceptance model and other influential factors, such as perceived<br />
ease of use (PEU), perceived usefulness (PU), attitude of web security (AWS), service quality (SEQ),<br />
satisfaction of web security (SWS), confidence in web security (CWS), intention toward trust in<br />
140
Lichun Chiang et al.<br />
eGovernment (ITG), to assess user trust in government. TAM is seemed as the most widely used models<br />
in Information Systems, in part because of its understandability and simplicity (King & He 2006).The<br />
research method uses questionnaires with application of the structural equation modeling (SEM) to<br />
analyze user trust in the use of web security. The statistic method is applied LISREL 8.54 to analyze<br />
questionnaires’ data.<br />
In addition to Introduction, this paper is divided into four main parts: First, a review of the theoretical<br />
literature on the relationship among web application security, user satisfaction and trust in eGovernment,<br />
and discussion on some of the experimental evidence in support of the theory. The second part describes<br />
the research method used in this paper, including the methodological approach, the variables used in the<br />
analysis, the sampling of cases and the questionnaire design. In the third part, data analysis and results<br />
are presented. Finally, a discussion of these results is provided along with description of some of the<br />
implications and future work to be done in this research area.<br />
2. Literature review<br />
Since customers feel satisfied with e-services provided by the private companies, they know the<br />
efficiency and convenience to do business over the Internet; therefore, users demand the same level of<br />
digitalized services from government that they have come to expect from the private companies<br />
(Stamoulis et al. 2001). The concept of satisfaction implies the fulfillment of expectations as well as a<br />
positive and affective state based on previous results obtained in the relationship with the web site<br />
(Martin & Camarero 2009, p.4). The digitalization of the service functions has given a new idea about<br />
user satisfaction with the government. Service quality has been considered to be one of the primary<br />
drivers of customer satisfaction (Kristensen, Martensen, & Gronholdt 2000; Martensen et al. 2000; Hsu<br />
2008). In using e-services, customer interface quality and perceived security also positively affected<br />
customer satisfaction (Chang & Chen 2009; Magoutas & Mentzas 2010). Satisfaction with previous<br />
purchases, the Web site security and privacy policies, and service quality are the main determinants of<br />
trust (Hsu 2008; Martin & Camarero 2008). Mármol et al. (2010) applies a trust and reputation model for<br />
identity management systems to guarantee an acceptable level of security. Users built their institutional<br />
trust (or confidence) inductively through their experiences and reputation of e-services (Smith 2010).<br />
Therefore, user satisfactions are determined by their experiences of e-services, web security, and<br />
confidence in eGovernment.<br />
In addition to the above mentions, user attitude in accepting information technology has been an<br />
important issue in discussing security and trust regarding use of information technology. Since Davis<br />
(1989) provided the Technology Acceptance Model (TAM) and showed that the theoretical basis for<br />
actual use depends on behavioral intention, TAM has been primarily used to explain the usage of<br />
information technology (Ma & Liu 2004). This model focuses on the attitudinal explanations of individual<br />
intentions to use a specific technology. TAM involves two primary predictors: perceived ease of use and<br />
perceived usefulness. TAM uses the dependent variable of behavioral intention to predict attitude<br />
towards use of a technology. McKnight et al. (1998) and McKnight and Chervany (2001) are categories of<br />
research on trust: one is topology (conceptual types), such as, attitudes, beliefs, behaviors and<br />
dispositions, and the other is object of trust (different referents), which includes trust in something or in<br />
someone (e.g. the system). The former refers to the typology of trust construct, and the latter refers to the<br />
object of trust. According to conceptual trust, two important beliefs – perceived ease of use and perceived<br />
usefulness–are instrumental in explaining the variance in intention (Agarwal & Prasad 1999; Kramer 1999;<br />
Li et al. 2004). ‘Perceived ease of use’ encapsulates the degree to which a potential adopter views usage<br />
of the target technology to be relatively free of effort; ‘perceived usefulness’ captures the extent to which<br />
a potential adopter views the innovation as offering value over alternative ways of performing the same<br />
task (Davis et al. 1989; Karahanna et al. 1999; Gefen et al. 2005). In brief, ease of use refers to the<br />
property of a product or thing that a user can operate without having to overcome a steep learning curve.<br />
It expresses the relationship between experience and efficiency. In contrast, perceived usefulness means<br />
that a user believes in the existence of a positive use-performance relationship (Davis 1989). Johnson<br />
(2005) stated that perceived usefulness influenced a manager’s attitude to invest in information security.<br />
The importance of perceived ease of use and perceived usefulness as determinants of user intention is<br />
indicated by their joint effects on attitude towards using the system, such as e-commerce, information<br />
technology and the voting system (Al-Gahtani & King 1999; Xenakis & Macintosh 2005).<br />
Using new technology may involve both benefits and risks to the end-user, and before deciding to adopt<br />
the technology the individual may want to weigh risks and benefits (Horst, Kuttschreuter & Gutteling<br />
2007). For instance, if voters lacked trust in the electoral process that was used to select those who filled<br />
141
Lichun Chiang et al.<br />
the offices of those institutions of government, it seems unlikely they will then have trust in the<br />
performance of those institutions themselves (Parent, Vandebeek & Gemino, 2005; Alvarez, Hall &<br />
Llewellan 2006:4). In considering e-voting, voters are concerned with the process of electronic voting<br />
which must be confidential. At the same time, the process must be capable of satisfying the needs of<br />
participants and their security expectations. Security refers mainly to the technically guaranteed respect<br />
of confidentiality (secrecy), integrity and availability, but it also refers to a whole range of functions such<br />
as registration, eligibility and authentication (Gritzalis 2002; Dini 2003). Therefore, trust is not taking risk<br />
per se, but rather it is a willingness to take risk (Johnson-George & Swap 1982; Mayer, Davis &<br />
Schoorman 1995). Trust has a personal element to it. Trust is built from experience, personal knowledge,<br />
and bias (Chadwick & Basden 2001). The definition of trust is the willingness to believe in the reliability,<br />
honesty, worthiness and capability of another entity (Chadwick & Basden 2001; Lekkas 2003). Cho<br />
(2006) pointed out that perceived risk and trust were less important at present most likely because online<br />
legal services are still somewhat immature and focus mainly on less risky areas, such as information<br />
dissemination and marketing. Therefore, a safe and legal infrastructure in cyberspace would be important<br />
for regulating and protecting user privacy and rights. Trust is the main influential element on user attitude<br />
to apply information technology, technology acceptance and adoption (Bahmanziari 2003; Suh & Han<br />
2003). Perceived usefulness, ease of use, compatibility, risk perception and security control are<br />
significant antecedents of initial trust in predicting user intention to use information technology, such as<br />
eGovernment services and websites (Koufaris & Hampton-Sosa 2004; Carter & Belanger 2005; Horst<br />
2007).<br />
According to the above mentioned, user satisfactions of web security are determined by user perceived<br />
ease of use, perceived usefulness, attitude, e-service quality and trust. User intentions to apply eservices<br />
provided by government web application are affected by their confidence and satisfaction in<br />
government.<br />
3. Research method<br />
3.1 Research hypotheses and research model<br />
The research model shown in Figure 1 is based on prior research about TAM based on Davis (1989),<br />
Gefen et al. (2003), Koufaris & Hampton-Sosa (2004), Carter & Belanger (2005), Horst (2007). Note that<br />
the model discusses user perceptions of satisfaction in relation to trust eGovernment which led to the<br />
hypotheses. The research model, utilizing structural equation modeling, posits that user perceptions of<br />
ease of use, usefulness, service quality, satisfaction and confidence are research variables that are<br />
important to user attitude and intention toward trust in eGovernment.<br />
Figure 1: Research structure and hypotheses<br />
142
Lichun Chiang et al.<br />
In this research based on TAM model, perceived ease of use and perceived usefulness are to explore<br />
user acceptance of web application security when operating government web interface, as Davis et al.<br />
(1989) and Agarwal & Prasad (1999), Kramer (1999) and Li et al. (2004) stated. Furthermore, perceived<br />
ease of use and perceived usefulness influence attitudes toward using Web application security.<br />
According to Davis et al. (1989 & 1993) researches, perceived ease of use is an antecedent to perceived<br />
usefulness. Hsu (2008) and Martin & Camarero (2008) postulated that service quality was closely related<br />
to user attitude and that attitude in using government Web application security would influence user<br />
satisfaction. These hypotheses are replicated in H1, H2 and H3.<br />
H1: Perceived Ease of use (PEU) will have positive influence on Perceived Usefulness (PU) in using<br />
government Web application security.<br />
H2: Perceived usefulness (PU) will have positive influence on Attitudes (AT) toward using government<br />
Web application security.<br />
H3: Service Quality (SEQ) will have positive influence on Attitude (AT) toward using government Web<br />
application security.<br />
As Mármol et al. (2010) and Smith (2010) showed in their attitudinal research, using attitude can be used<br />
to predict user satisfaction. Therefore, the security of the Web system may influence user attitude and<br />
satisfaction to use government Web application security, as H4 postulates.<br />
H4: Attitudes (AT) towards using government application security will have positive influence on user<br />
satisfaction in using government Web application security.<br />
Chadwick & Basden (2001), Bahmanziari (2003) and Suh & Han (2003) argue that people have<br />
confidence in whatever they have had government web application security, such as information system<br />
or interface, to make them satisfy government web security. The decision to engage in user satisfaction<br />
requires citizen confidence in the government agency providing the service and security (Koufaris &<br />
Hampton-Sosa 2004; Carter & Belanger 2005; Horst 2007). Therefore, it is hypothesized that confidence<br />
directly affects user satisfaction to use Web while mediating satisfaction toward the intention to trust<br />
eGovernment, as shown in H5 and H6.<br />
H5: Confidence in web application security (CWS) will influence on user Satisfaction (SWS) in using<br />
government web application security.<br />
H6: User Satisfaction (SWS) in using government web application security will positively influence on<br />
intention (IN) toward trust in eGovernment.<br />
3.2 Research questionnaire design<br />
For testing the structural model, a draft questionnaire, based on relevant research literature identified<br />
above, was developed and given to doctoral students studying in the Department of Electronic<br />
Engineering (EE) in National Cheng Kung University (NCKU) in Tainan, Taiwan. After revising the<br />
questionnaire based on their feedback, a test trial was given in December 2010. The trial of the structural<br />
model was first conducted using 48 undergraduate students in EE of NCKU, each of whom completed a<br />
questionnaire. In analysis of these samples, Cronbach’s α for each item in this pretest questionnaire is<br />
greater than .70 (Cronbach’s α ≥ .70). In addition to asking about service quality, satisfaction and<br />
confidence, the questionnaire also elicited information regarding the respondent’s demographic data,<br />
such as gender, age and computer experience.<br />
Five-point Likert scales were used to measure the model variables in this study. Information regarding the<br />
relationships among the variables in the Structural Equation model (SEM) included model fitness and<br />
model explanation, selected χ 2 , the ration between χ 2 and degrees of freedom (df), goodness of fit index<br />
(GFI), adjusted goodness-of-fit index (AGFI), root mean square error of approximation (RMSEA) and<br />
Comparative Fit Index (CFI) to evaluate the suitability of the whole model (Bagozzi & Yi 1988; Bentler<br />
1990; Jöreskog & Sörbom 1992; Hair et al. 1998; Hu & Bentler 1995). Empirical data was supporting the<br />
theoretical relationship specified at the conceptualization stage was assessed. LISREL 8.54 was used for<br />
exploratory purposes with sequential steps of path analysis and factor analysis. Path analysis was used<br />
to provide visual representations of hypotheses.<br />
143
3.3 Research samples<br />
Lichun Chiang et al.<br />
In testing the structural model, a questionnaire based on the relevant research literatures, identified<br />
above, was developed and given to a sample of students in Kaoshiung City, Kaoshiung county and<br />
Tainan City in Taiwan. The decision to survey students at this location was based on both geographic<br />
and demographic rationales. First, the research was done at I-Shou University, Shu-Te University,<br />
National Sun Yat-sen University and National Cheng Kung University (NCKU), because the percentage<br />
of undergraduate students used the Internet is higher than that of other groups. Secondly, the study<br />
targeted university students because these individuals should have relatively high skills in learning how to<br />
use information technology and their interest in such a system should also be higher. Students at these<br />
campuses were randomly sampled to obtain 320 respondents, who participated in the study at the first<br />
week of January 2010. A total of 30 questionnaires were not analyzed because they were incomplete;<br />
thus, there were 290 valid respondents (99.91% of all respondents). Further, 269 of participants (75.40%)<br />
in valid questionnaires have used government websites, 21 participants (24.60%) do not have<br />
experienced to use them, therefore, these participants were excluded from the research sample.<br />
4. Research results<br />
The sample size for this analysis was Ν=269. As shown in Table 2, the sample of 269 participants<br />
included 139 (51.70%) males and 130 (48.30%) females. 97.40% of participants age are less than 25<br />
years old. About 61 percent of the respondents consider themselves having about average knowledge of<br />
Web security, and 22% of participants think themselves having knowledgeable or very knowledgeable of<br />
Web security. Table 1 shows the demographic data of the samples.<br />
Table 1: Demographic data<br />
Terms<br />
Sex<br />
Frequencies Percentage (%) N=269<br />
Male 139 51.70<br />
Female 130 48.30<br />
Total<br />
Age (Years Old)<br />
269 100<br />
Under 20 119 44.20<br />
22-25 143 53.20<br />
26-30 4 1.20<br />
31-35 0 0<br />
36-40 1 0.40<br />
41-45 1 0.40<br />
46-50 1 0.40<br />
Total<br />
Understanding Web Security<br />
269 100<br />
Barely 7 2.60<br />
Some 38 14.10<br />
About Average 165 61.30<br />
Knowledgeable 47 17.50<br />
Very Knowledgeable 12 4.50<br />
Total 269 100<br />
The items for each dimension were measured through a 5-item scale from 1 (strongly disagree) to 5<br />
(strongly agree). In discussing the threshold reliability of the measures, .60 is a recommended value for a<br />
reliable construct (Hu & Bentler 1995). As Table 1 shows, the composite reliability values range from .75<br />
to .85 (Cronbach’s α ≥ .60). Confirmatory Factor Analysis (CFA) was applied to assess the construct<br />
validity of the 7 scales (perceived ease of use, perceived usefulness, attitude, service quality, satisfaction<br />
of web security, confidence in web security and intention to trust eGovernment) with LISREL. Each item<br />
was modeled as a reflective indicator of its latent construct in the CFA model. Table 2 presents the<br />
results of the CFA analysis. For the average variance extracted by a measure, a score of .50 indicates<br />
acceptability (Jöreskog & Sörbom 1989). Table 3 shows that the average variances extracted by these<br />
measures range from .51 to .67, which fall within the acceptable range.<br />
144
Table 2: Results of confirmatory factor analysis<br />
Lichun Chiang et al.<br />
Variables Terms Reliability AVE<br />
Perceived Ease of Use (PEU) 3 0.79 0.51<br />
Perceived Usefulness (PU) 3 0.84 0.67<br />
Attitude (AT) 3 0.85 0.63<br />
Service Quality (SEQ) 4 0.81 0.61<br />
Satisfaction of Web Security (SWS) 3 0.75 0.65<br />
Confidence in Web Security (CWS) 3 0.85 0.59<br />
Intention (IN) 3 0.84 0.63<br />
Note: N = 269, Cronbach’s α should exceed .60, the composite reliability values range from .76 to .87 (Hu<br />
& Bentler 1995), AVE (Average Variance Extracted) should be near .50 (Jöreskog & Sörbom 1989).<br />
As shown in Figure 2, the structural model reflecting the assumed linear and causal relationships among<br />
the constructs is tested with the data collected from the validated measures (Bagozzi & Yi 1988; Bentler<br />
1990; Jöreskog & Sörbom 1992; Hu & Bentler 1995; Hair, et al. 1998). The model fit indices are within<br />
accepted thresholds: χ 2 to degrees of freedom ratio of 2.93 (χ 2 = 586.11; df = 200), AGFI = .82, GFI = .86,<br />
CFI = .94 and RMSEA = .08, suggesting adequate model fit, as Table 3 shows.<br />
Table 3: Model fit indices for the structural model<br />
Fit indices Results Recommended value<br />
χ 2 (p-value) 586.11 (.05) P ≥ .05<br />
χ 2 /df 2.93 (df=200) P ≤ 3~5<br />
AGFI 0.82 P ≥ .80~.90<br />
GFI 0.86 P ≥ .90<br />
CFI 0.94 P ≥ .80<br />
NFI 0.92 P ≥ .80<br />
RMSEA 0.08 P ≤ .10<br />
Note: GFI: Adjusted Goodness-of-Fit index, GFI: Goodness of Fit Index, CFI: Comparative Fit Index,<br />
NFI=Normed Fit Index, RMSEA: Root Mean Square Error of Approximation.<br />
Figure 2: SEM analysis of research model<br />
145
Note: χ 2 =586.11; df=200; p≦0.05; RMSEA=0.08<br />
Lichun Chiang et al.<br />
The results of the analysis are shown in Figure 2. The six paths exhibit a P-value less than .05. In the<br />
usefulness factors shown in Figure 2, perceived ease of use (PEU) presents a strong positive effect on<br />
perceived usefulness (t = 8.88, p ≤ .05). The results also showed that students perceived ease of use as<br />
influenced by several perspectives, such as ease of learning, simple and clear understanding and skillful<br />
users to use government web application security. Coinciding with Davis (1989, 1993), perceived ease of<br />
use may actually be a causal antecedent to perceived usefulness for user acceptance of information<br />
technology. This implication is helpful for research on user acceptance of government web application<br />
security.<br />
Figure 2 also shows perceived usefulness has significant influence in user attitude to use government<br />
web application security (t = 3.87, p ≤ .05). In addition, perceived ease of use required perceived<br />
usefulness as the intermediate factor to affect user attitude to use web application security in<br />
eGovernment. That is, perceived ease of use positively associated with perceived usefulness influenced<br />
user attitude to use web application security in eGovernment. Thus, hypothesis 1 and hypothesis 2 are<br />
supported, as many previous studies applied perceived ease of use to explain perceived usefulness,<br />
such as Agarwal & Prasad (1999), Kramer (1999) and Li et al. (2004) postulated. The respondents<br />
perceive the usefulness of government web application security because web application security can<br />
provide secure services, easily maintain data, and protect access to information.<br />
The perceived usefulness and service quality in government web application security both show<br />
significantly positive influences on Attitude toward using web application security (t = 3.87 and t = 5.02,<br />
respectively, p ≤ .05). This result also shows that service quality exhibits a significant influence stronger<br />
than perceived usefulness in user attitude for using government web security. The participants care about<br />
service quality for these reasons: government web application security can maintain the data<br />
confidentially, and most importantly, has a good secure system. Thus, hypothesis 3 is supported (See<br />
Table 5), as Hsu (2008), Martin & Camarero (2008) postulated.<br />
As shown in Fig. 2, the attitude toward using government web application security positively influences<br />
user satisfaction of web security (t = 3.76, P ≤ .05). Thus, hypothesis 4 is supported, as Lekkas (2003),<br />
Mármol et al. (2010) and Smith (2010) postulated. In fact, the participants pay attention to web security<br />
because of several important characteristics, such as good management, and confidentiality. As a result,<br />
when users have confidence in web application security, they have satisfaction to use web security.<br />
Therefore, confidence is an influential factor for user satisfaction of web security to influence user<br />
intention toward trust eGovernment. From perceiving usefulness and confidence in web application<br />
security, the respondents express strong willingness to use web application security for the protection of<br />
personal data and for work.<br />
Attitude and confidence in government web application security both show significantly positive<br />
influences on satisfaction toward using web application security (t = 3.76 and t = 8.15, respectively, p ≤<br />
.05). This result also shows that user confidence in web security demonstrates a significant influence<br />
stronger than user attitude for using government web security. The participants have confidence in web<br />
security for these reasons: government web application security is a worthwhile system to trust, maintains<br />
the data confidentially, and most importantly, accords with ethic norms. Thus, hypothesis 5 is supported,<br />
as Chadwick & Basden (2001), Bahmanziari (2003) and Suh & Han (2003) postulated. Figure 2 also<br />
shows user satisfaction to use web application security has significant influence in user intention to trust<br />
eGovernment (t = 2.54, p ≤ .05). Users are willing to trust eGovernment in the future because of good<br />
web application security management. Thus, hypothesis 6 and is supported, as many previous studies<br />
applied in the similar study, such as Koufaris & Hampton-Sosa (2004), Carter & Belanger (2005) and<br />
Horst (2007) postulated.<br />
5. Conclusions and limitations<br />
This study utilized the Technology Acceptance Model and accompanied it with the Structural Equation<br />
model to analyze the relationships among ease of use, perceived usefulness, attitude, service quality and<br />
investigated the effects of confidence on user satisfaction and intention toward trust eGovernment. The<br />
importance of this study lies in the attempt to model user satisfaction of web security and trust<br />
eGovernment in a single design. Structural equation modeling with Liseral revealed that intention to trust<br />
eGovernment is mainly predicted by perceived usefulness of web security in general. The results of this<br />
146
Lichun Chiang et al.<br />
analysis help us understand the complex process in which perceived ease of use and perceived<br />
usefulness influence intention towards trust eGovernment, and how confidence in web application<br />
security affects user satisfaction to use web application security. The research findings indicate that<br />
perceived usefulness is an important determinant indicator between perceived ease of use and attitude<br />
toward using web application security in Taiwan. Perceived ease of use presents a significant and<br />
positive influence on perceived usefulness. Government web application security is a secure and trusted<br />
electronic system to maintain the validity of information, keep original data and uphold a solid reputation<br />
in the information system and eGovernment infrastructure. In this research, the confidence in web<br />
security has a strong and positive effect on user satisfaction toward using it. If government web security<br />
can maintain these reliably along with privacy, then it can possibly gain user satisfaction.<br />
The second influential finding is that service quality is more influential than perceived usefulness in<br />
influencing user attitude toward using web security. In our findings, the indicator of service quality plays a<br />
determinant role to influence user attitude to use or accept web security. Therefore, when the<br />
government emphasizes the management of web application security, it has to primarily improve service<br />
quality for web security. Otherwise, without service quality of web security, users may not have positive<br />
attitude to accept web security. In addition, it is important for users to operate web application security<br />
easily. When they do not have difficulties using web security, they perceive the usefulness of web<br />
security, and then they will likely use it when they use government web sites. Therefore, perceived<br />
usefulness and service quality on web security show strong influence on user attitude toward using web<br />
application security.<br />
Finally, the results also indicate satisfaction of using web security is related to attitude and confidence in<br />
web security. Without confidence in web security, users do not have satisfaction regarding web security.<br />
This may lead to a drastic overhaul of existing ways of realizing government web security. If the<br />
government plans to spread adoption of web security, then it has to train user awareness of government<br />
web security, and show them web security to earn their confidence. Importantly, the government has to<br />
create an easy channel for users to apply and use web application security, then users have confidence<br />
in web sites which influence their satisfaction toward using government web security. The government<br />
must seriously rethink how to build user confidence and trust on web security while encouraging users to<br />
apply it. Therefore, security and confidence undoubtedly plays essential roles when users decide to use<br />
web security.<br />
In summary, the contribution of this study is threefold: First, this research analysis provides a better<br />
understanding of how user satisfaction of government web application security will impact user intent<br />
toward trusting eGovernments. Second, this research shows that the precursors of user intent to trust<br />
web security are multidimensional (i.e., ease of use, perceived usefulness, attitude and satisfaction) and<br />
identifies their critical influences on realizing government web security. These two dimensions are<br />
interwoven, and one must not focus exclusively on any single factor in assessing overall intention toward<br />
trust eGovernment. Finally, this research further explores user satisfaction of web security based on<br />
confidence for implementing web security. That is, without confidence, user satisfaction cannot influence<br />
user intent toward trust eGovernment. It is helpful to understand what factors interfere when trusting<br />
eGovernment. This study further provides several inductive results to enhance our understanding and<br />
management of government web security. Finally, regarding the research limitation, future studies should<br />
seek larger sample sizes to perform more complex model testing. This study selected only 4 departments<br />
in the 4 universities, but attempted in our selection to include four very different major subjects in different<br />
universities. Future studies should include a broader set of universities to validate these results.<br />
Acknowledgements<br />
This research was supported by grants from the National Science Council in Taiwan (NSC- 99-2410-H-<br />
006 -060).<br />
References<br />
Bahmanziari T., Pearson J.M. & Crosby L. (2003) “Is trust important in technology adoption? A policy capturing<br />
approach”, Journal of Computer Information Systems, Vol.43, No.4, pp.46-54.<br />
Bentler, P. M. (1990) “Comparative fit indexes in structural models”, Psychological Bulletin, Vol. 107, pp.238-246.<br />
Bhattacherjee, A. (2001) “Understanding information system continuance: an expectation-confirmation model”, MIS<br />
Quarterly, Vol.25, No.3, pp.351-370.<br />
Chadwick, D.W. & Basden, A. (2001) “Evaluating trust in a public key certification authority”, Computers & Security,<br />
Vol.20, No.7, pp.592-611.<br />
147
Lichun Chiang et al.<br />
Chang, H.H. & Chen, S.W. (2009) “Consumer perception of interface quality, security, and loyalty in electronic<br />
commerce”, Information & Management, Vol.46, No.7, pp.411-417.<br />
Carter L. & Belanger F. (2005) “The utilization of EGovernment services: Citizen trust, innovation and acceptance<br />
factors”, Information Systems Journal, Vol.15, No.1, pp.5-25.<br />
Cho, V. (2006) “A study of the roles of trusts and risks in information-oriented online legal services using an<br />
integrated model”, Information & Management, Vol.43, pp.502–520.<br />
Corritorea, C.L., Krachera, B. & Wiedenbeckb, S. (2003) “On-line trust: concepts, evolving themes, a model”,<br />
International Journal of Human-Computer Studies, Vol.58, pp.737–758.<br />
Davis, F.D. (1989) “Perceived usefulness, perceived ease of use, and user acceptance of information technology”,<br />
MIS Quarterly, Vol.13, No.3, pp.319-340.<br />
Davis, F.D., (1993) “User acceptance of information technology: system characteristics, user perceptions and<br />
behavioral impacts”, International Journal of Man-Machine Studies, Vol.38, pp. 475-487.<br />
Dini, G. (2003) “A secure and available electronic voting service for a large-scale distributed system”, Future<br />
Generation Computer Systems, Vol.19, pp.69–85.<br />
Gefen, D., Rose, G.M., Warkentin, M. & Pavlou, P.A. (2005) “Cultural diversity and trust in IT adoption: a comparison<br />
of potential e-vote in the USA and South Africa”, Journal of Global Information Management, Vol.13, No.1,<br />
pp.54-78.<br />
Gritzalis, D.A. (2002) “Principles and requirements for a secure e-voting system”, Computers & Security, Vol.21, No.6,<br />
pp.539–556.<br />
Hisamitsu, H. & Takeda, K. (2007) “The security analysis of e-voting in Japan”, pp.99-110. Alkassar, A. & Volkamer,<br />
M. (Eds), E-Voting and Identity, Springer-Verlag Berlin Heidelberg, New York.<br />
Horst M., Kuttschreuter M. & Gutteling J.M. (2007) “Perceived usefulness, personal experiences, risk perception and<br />
trust as determinants of adoption of EGovernment services in The Netherlands”, Computers in Human<br />
Behavior, Vol.3, No.4, pp.1838-1852.<br />
Hsu, S.H. (2008) “Developing an index for online customer satisfaction: Adaptation of American customer satisfaction<br />
index,” Expert Systems with Applications, Vol.34, pp.3033-3042.<br />
Hu, L. & Bentler, P.M. (1995) “Evaluating model fit” (pp.76-99), In Hoyle, R. H. (Ed.), Structural Equation Modeling:<br />
Concepts, Issues, and Applications. SAGE Thousand Oaks: CA.<br />
Johson-George, C. & Swap, W. (1982) “Measurement of specific interpersonal trust: construction and validation of a<br />
scale to assess trust in a specific other”, Journal of Personality and Social Psychology, Vol. 43, pp.1306–1317.<br />
Jöreskog, K. G. & Sörbom, D. (1992) LISREL: A Guide to the Program and Applications. (3 rd ) Scientific Software<br />
International, Inc: Lincolnwood, IL.<br />
King, W.R. & He, J. (2006) “A meta-analysis of the technology acceptance model”, Information & Management,<br />
Vol.43, pp.740-755.<br />
Koufaris M. & Hampton-Sosa W. (2004) “The development of initial trust in an online company by new customers”,<br />
Information & Management, Vol.41, No.3, pp.377-397.<br />
Kristensen, K., Martensen, A. & Gronholdt, L. (2000). “Customer satisfaction measurement at Post Demark: Results<br />
of application of the <strong>European</strong> customer satisfaction index methodology”, Total Quality Management, Vol.11,<br />
No.7, pp.1007-1015.<br />
Lekkas, D. (2003) “Establishing and managing trust within the public key infrastructure”, Computer Communications,<br />
Vol.26, pp.1815–1825.<br />
Liao, C., Chen, J.L. & Yen, D.C. (2007) “Theory of planning behavior (TPB) and customer satisfaction in the<br />
continued use of e-service: An integrated model”, Computers in Human Behavior, Vol.23, pp.2804-2822.<br />
Liu, C.T., Guo, Y.M. & Hsieh, T.Y. (2010) “Measuring user perceived service quality of online auction”, Service<br />
Industries Journal, Vol.30, No.7, pp.1177-1197.<br />
Ma, Q. & Liu, L. (2004) “The technology acceptance model: a meta-analysis of empirical findings”, Journal of<br />
Organizational and End User Computing, Vol.16, No.1, pp.59-74.<br />
Mármol, F.G., Girao, J. & Pérez, G.M. (2010) “TRIMS, a privacy-aware trust and reputation model for identity<br />
management systems”, Computer Networks, Vol.54, pp. 2899-2912.<br />
Magoutas, B. & Mentzas, G. (2010) “SALT: A semantic adaptive framework for monitoring citizen satisfaction from<br />
eGovernment services”, Expert Systems with Applications, Vol.37, pp.4292-4300.<br />
Martensen, A., Gronholdt, L. & Kristensen, K. (2000) “The drivers of customer satisfaction and loyalty: Cross-industry<br />
findings from Denmark”, Total Quality Management, Vol.11, pp.544-553.<br />
Martin, S.S. & Camarero, C. (2008) “Consumer trust to a web site: Moderating effect of attitudes toward online<br />
shopping”, Cyberpsychology & Behavior, Vol.11, No.5, pp.549-554.<br />
Martin, S.S. & Camarero, C. (2009) “How perceived risk affects, online buying”, Online Information Review, Vol.33,<br />
No.4, pp.629-654.<br />
Oostveen, Anne-Marie & Besselaar, P.V.D. (2005) “Trust, identity, and the effects of voting technologies on voting<br />
behavior”, Social Science Computer Review, Vol.23, No.3, pp.304–311.<br />
Smith, M.L. (2010) “Building institutional trust through eGovernment trustworthiness cues”, Information Technology &<br />
People, Vol.23, No.3, pp.222-246.<br />
Stamoulis, D., Gouscos, D., Georgiadis, P. & Martakos (2001) “Revisiting public information management for<br />
effective eGovernment services”, Information Management & Computer Security, Vol.9, No.4, pp.146-153.<br />
Suh, B. & Han, I. (2003) “The impact of customer trust and perception of security control on the acceptance of<br />
electronic commerce”, International Journal of Electronic Commerce, Vol.7, No.3, pp.135-161.<br />
Welch, E.W., Hinnant, C.C. & Moon, M.J. (2005). “Linking citizen satisfaction with eGovernment and trust in<br />
government”, Journal of Public Administration Research and Theory, Vol.15, No.3, pp.371-391.<br />
148
A Common Process Model to Improve eService Solutions -<br />
the Municipality Case<br />
Marie-Therese Christiansson<br />
Karlstad University, Sweden<br />
marie-therese.christiansson@kau.se<br />
Abstract: This paper describe a model for working on business processes as a result of a co-production between<br />
Karlstad University and Karlstad municipality, in the Smart Cities project focusing on eGovernment and eServices in<br />
the North Sea Region Programme of the <strong>European</strong> Union. The co-production began in February 2009 with an action<br />
research approach to develop a Common Process Model (a light-weight process methodology) to support the<br />
municipality in thinking, describing and improving business processes in a uniform, focused and reflective way. The<br />
co-production process was based on a close relationship, openness and willingness to learn and share in a large<br />
number of informal meetings, workshops, structured and unstructured interviews, as well as working together with<br />
analysis and outcomes of the project. The contribution of this paper is to present the building blocks in a Common<br />
Process Model and their implications in eService development. At the core of the process methodology is a set of<br />
values, concepts, a modelling structure, roles, directives, guidelines and templates to be able to identify, measure<br />
and improve business processes and eService solutions.<br />
Keywords: co-production, lightweight process methodology, eGovernment, eServices<br />
1. Introduction<br />
The <strong>European</strong> Commission initiatives strive towards a new generation of open, flexible and collaborative<br />
eGovernment services. Wider deployment and more effective use of digital technologies will provide<br />
<strong>European</strong>s with a better quality of life through better health care, safer and more efficient transport<br />
solutions, a cleaner environment, new media opportunities and easier access to public services and<br />
cultural content. To support and complements the Digital Agenda for Europe (<strong>European</strong> Commission,<br />
2010a), an Action Plan for 2011-2015 (<strong>European</strong> Commission, 2010b) identifies four key objectives to<br />
achieve (based on the Malmö Ministerial Declaration, 2009); to empower citizens and businesses in their<br />
needs for services; enable efficiency and effectiveness by reducing administration; facilitate mobility for<br />
setting up a business, studying, working, residing and retiring in Europe and to create the necessary key<br />
enablers and preconditions to make these things happen. By 2015, 50% of citizens and 80% of<br />
businesses should communicate in terms of eGovernment (<strong>European</strong> Commission, 2010b).<br />
EGovernment can be described as an instance of e-Commerce (Schneider, 2003), where governments<br />
provide administrative processes as eServices for their customers (citizens, visitors, companies and other<br />
government agencies) through web sites. This paper takes a holistic view on eServices beyond the frontend<br />
web site to the back-office and business processes supported or performed by IT (information<br />
technology), improving daily life for citizens and businesses. Well-structured and effective business<br />
processes are prerequisites for business performance in providing and performing eServices. Working<br />
with business process improvements is challenging. Major issues that organisations face in their efforts<br />
include e.g. lack of management or employee buy-in, lack of a common process mind frame, lack of<br />
standards, weaknesses in process specification, low modeling and process education and lack of<br />
methodology (Bandara et. al, 2007, zur Muehlen, 2008). This complexity requires a methodical approach<br />
to the implementation of process oriented EGovernment projects (Becker et. al 2003). This paper<br />
presents building blocks in a Common Process Model (a process methodology not the result of a process<br />
modelling) in a municipality case to support employees with guidance to think, describe and improve<br />
business processes in a uniform, focused and reflective way.<br />
2. Research design in the co-production<br />
The co-production between Karlstad University and Karlstad municipality can be described as a joint<br />
research-/development process based on a close relationship and an open mind to learn and share.<br />
Participating parties take part in formulating research questions and are investing in knowledge<br />
development and value creation. This means formulating the point of departure, contributing by producing<br />
and delivering results (e.g. a Common Process Model) as well as evaluating the co-production process.<br />
(Orr and Bennett, 2009; Christiansson, 2010). Karlstad University is part of the Smart Cities Regional<br />
<strong>Academic</strong> Network (SCRAN, 2011) with the principal role “to offer hands-on support to the government<br />
partners, to qualify good practices and to accurately translate pilots into transferable good practice, white<br />
papers and methodologies” (Smart Cities, 2011). <strong>Academic</strong> partners are working closely with local<br />
municipal partners to develop better eServices. In the municipality case, the close relationship can be<br />
149
Marie-Therese Christiansson<br />
described in terms of a mutual interest in the research question; - How do we get process modelling to<br />
happen in practice? This is a question that is placed high on the BPM (Business Process Management)<br />
agenda in conferences this year.<br />
The municipality case is an organisation with around 7000 employees performing services and<br />
operations to attract both people and companies to work and live in the city. Technical services and<br />
property management administration, with around 500 employees, works according to a management<br />
directive with mapping, measuring, benchmarking and improving their business processes. One driver (of<br />
many) to the process mapping is the possibility to identify needs and possibilities for eService solutions.<br />
The action research approach involves solving organisational problems through intervention and at the<br />
same time contributing to research (Benbasat et al. 1987; Davison et al. 2004). Strengths in this research<br />
method are the insider’s view as a participant to obtain in-depth and first hand understanding. The first<br />
version of the municipality Common Process Model was developed during five workshops (April –<br />
December 2009) and many meetings in between. The university and participants from five different<br />
administrations, with more or less experiences in process modelling and its use in business and systems<br />
development, defined ‘the process of mapping processes’ and identified experiences to share in terms of<br />
directives, guidelines and templates.<br />
To gather knowledge and experience in eService development, the municipality created a virtual<br />
organisation called the e-Office. The task of the e-Office is to coordinate and support the development of<br />
eServices in the municipality in order to offer more and better services to citizens and companies.<br />
Methodologies, tools, skills, common eService solutions and implementations are handled as well as the<br />
cooperation with the university. With a knowledge management approach with increasing collaboration,<br />
learning and sharing by the e-Office, administrations may work at the pace they prefer. The university has<br />
direct contact to the e-Office (mail, telephone, local web-based project management tool and a<br />
transnational wiki) and several meetings (informal and with a common interest to solve a problem) with<br />
employees from different areas and in different roles from management, business development and<br />
eService development. The municipality is continuously describing business needs and their BPM<br />
agenda at hand. Employees in key process roles (mainly from the e-Office and the Technical services<br />
and property management administration) study at the university (the flexible campus and/or distance<br />
course, Process Orientation in Practice). In the course participants have the opportunity to work with<br />
course assignments in their own business context learning from theory, using process methodologies and<br />
by experiences suggesting further improvements and development of the Common Process Model.<br />
In case study research, the objective is research and theory at their early, formative stages and practicebased<br />
problems where the experiences of the actors are important and the context of action is critical<br />
(Benbasat et al. 1987). Researchers with prior discourse (to stand objective of research, see e.g.<br />
Alvesson and Sköldberg, 2000) and practitioners with business context and prior experiences (Orr and<br />
Bennett, 2009) are characteristic features of co-production projects. A research relationship is based on<br />
each participant having their own interests and their own communities (which have a political impact on<br />
the research process) together with mutual interests in an issue and the mutual context of the coproduction<br />
(Christiansson, 2010). Employees in the municipality are anxious to bridge the gap between<br />
different kinds of process modelling techniques for business and IT solutions to be able to provide better<br />
services. For the municipality, the university’s presence is valuable in terms of access to research results<br />
as well as practical experiences from courses and research projects, and an independent partner in<br />
discussions and the assessment of BPM activities. The university will develop new knowledge in terms of<br />
supportive content, implementation and maintaining in practice in order to achieve usable and used<br />
process description as a basis for e.g. eService development. Knowledge increases the quality in<br />
university courses and the collection of empirical data further develops the generic process methodology<br />
to be suitable for different organisations and business contexts. The university gains access to real world<br />
data and the possibility to apply research results in practice, as well as new insights. Producing<br />
consumable research demands both rigour and relevance (Robey and Markus, 1998). In the municipality<br />
case, the researcher has acted in a more mentoring and supervising mode. Writing research papers<br />
together, attending conferences as well as transnational benchmarking is addressed in the co-production.<br />
A transnational workshop in Processes (September 2010) has evaluated the Common Process Model<br />
and generated new input to the generic and transnational model as a deliverable of the Smart Cities<br />
project (Christiansson, 2011).<br />
150
3. A common process model<br />
Marie-Therese Christiansson<br />
The concept of eService is two-fold, as service is something being produced and consumed in business<br />
processes and a result experienced by the consumer at the same time as the service is provided. The<br />
customers’ engagements include receiving information and requesting services (Warkentin et. al 2002)<br />
but also performing, receiving and experiencing business performance. The customer is a co-producer in<br />
the service and the ‘e’ states that the service is conducted, more or less, by IT solutions. Alsaghier (et. al<br />
2009) stress that most definitions of eGovernment revolve around the concepts of a government’s<br />
employment of technology, in particular web-based applications to improve the access and delivery of<br />
government services. EGovernment can be described in terms of the execution of administrative<br />
processes to enable governments to provide services for their customers (citizens, visitors, business and<br />
other governments) through web sites. Customer interact with the government through the Internet,<br />
asking questions and receiving answers, obtaining updated government regulations and government<br />
official documents, filing applications etc. (Alsaghier et. al 2009). EServices are one part of municipality<br />
business performance and provide access to government information and services. Services accessible<br />
across the EU strengthen and complement existing legislation in domains like e-Identification, e-<br />
Procurement, e-Justice, e-Health, mobility and social security (<strong>European</strong> Commission, 2010 b).<br />
Organisations focusing more on the ‘e’ than on the ‘business’ may forget that value-added idea, the<br />
understanding of the organisational environment and IT as enabler in the business and customer context,<br />
as well as the changing requirements (Hammer, 1993; Davenport, 1993) are essential prerequisites for<br />
an organisation’s return on its investments into modern information and communication technology (Alpar<br />
and Olbrich, 2005). With a view to realising an effective business development, a Common Process<br />
Model is developed as a general approach to support different applications, with eServices as one of<br />
many in the organisation. The model is designed to support applicable hands-on knowledge in a<br />
lightweight manner to be used for employees with various process modelling skills and use of tools, from<br />
drawing tools to more advanced modelling language and process tools. One success factor for usable<br />
process descriptions is that employees and management understand the ‘process thinking’. The goal is<br />
to bring about usable process descriptions that can be used by different roles and levels in the<br />
municipality case – political, management, operational and systems – so that development decisions are<br />
based on knowledge acquired by those who are performing the business operations and will be a part in<br />
or be affected by the solution. An understanding of the basic ideas in process orientation will explain what<br />
to describe and why in process modelling.<br />
A process oriented approach in services means (based on concepts in e.g. Davenport, 1993; Hammer,<br />
1993, Grönroos, 2000):<br />
Ensuring that the purpose and objectives of a business process are linked to the goal of the<br />
organisation.<br />
Basing the mapping on the knowledge of people who know the operation in question and on those<br />
who have expectations on it and are affected by its result; that is, a focus on how citizen and<br />
business service is created and delivers value.<br />
A holistic view on end-to-end processes adding significant value for an external customer’s<br />
experiences and results.<br />
Considering and describing operations horizontally from the point at which an external<br />
customer/client makes some kind of request which leads to a number of tasks being performed in a<br />
logic flow (in and between organisations) in order to meet the request.<br />
Proceeding from the user view of the result identifying value-creating tasks (what) and work<br />
procedures (how) that will satisfy the user and ensure a tangible value (e.g. an effective and useful<br />
eService).<br />
Identifying and describing available resources (e.g. IT) for optimal use and requirements/ requests for<br />
them.<br />
Ensuring that employees can identify their roles in the process flow and serve as the basis for their<br />
understanding and ability to change/improve operations.<br />
A Common Process Model will support employees to get useful process descriptions in an effective<br />
business development. Explicit preconditions, concepts, directives, guidelines, templates and roles will be<br />
used to create a platform for how to think, describe and work towards process improvements. See Figure<br />
1.<br />
151
Marie-Therese Christiansson<br />
Figure 1: A common process model<br />
Communicating knowledge of business operations is important in all organisations and development<br />
work. To achieve this, it is necessary that those who partake in development and those who need to<br />
explain, understand, and make decisions speak the same language. Across organisational boundaries,<br />
there is a shared obligation to meet the needs of citizens and companies in the municipality. Concepts<br />
and process descriptions must be understandable in and between organisations as this can become a<br />
national and international need as well when developing eServices across municipal and national<br />
boundaries. Working uniformly in a development project in and between organisations makes the work<br />
more effective and increases the chances to communicate and spread information. The opposite<br />
scenario, where process mapping is done differently, means that a great deal of reworking by the same<br />
people using different tools might be necessary, and this requires resources and consumes energy. A<br />
Common Process Model will work as a ‘living model’, maintained and continually updated by the e-Office<br />
and a model owner. The model is designed to be employed in all types of business development projects,<br />
major as well as minor efforts, and be operative without a modelling tool and/or modelling language as a<br />
driving force.<br />
A ‘process staircase’ may illustrate the intended degree of process orientation or process maturity in an<br />
organisation. See Figure 2. Working according to the Common Process Model will increase the<br />
possibilities for generating process descriptions in a way that ensures progression up the steps with a<br />
useful process description of all steps.<br />
Mapping processes entails identifying and describing processes. It is not until business operations are<br />
described in the form of processes that can we see and become aware of them as processes. A process<br />
modeller needs guidance at different points in the process modelling process, in different roles and with<br />
different levels of competence in modelling. A useful process description will be a result of a process<br />
mapping describing a business process with its elements, customer focus and a horizontally view<br />
according to the motives.<br />
Establishing processes can mean labelling the identified processes, saving and storing process<br />
descriptions to make them available to the appropriate people. It can also mean allocating responsibility<br />
for administering process descriptions. The idea in the municipality case is to store one core process<br />
description, which can then serve as a basis for different users, roles and target groups. A core process<br />
description will allow for measuring and improving business processes. It can also be copied and<br />
152
Marie-Therese Christiansson<br />
modified across administrations to be useful for e.g. different target groups, roles and multiple<br />
perspectives, as well as for people who don’t ‘think in boxes and arrows’. An established process will<br />
have a suitable name close to its purpose in business according to a convention easy to store, find and<br />
access. A useful process description can be used in communications and be published across<br />
administrations and organisations.<br />
Figure 2: Degree of process orientation (Christiansson, 2001)<br />
Evaluating processes can be based on measuring points and quality indicators identified in the<br />
descriptions of the current situation in order to clarify what is needed to move in the direction of a goal<br />
objective. Analysis of processes can take place from internal or external demands on performance and<br />
quality. An evaluated process will have suitable and defined indicators to support e.g. business process<br />
comparisons and improvements. A useful process description describes a business process with<br />
elements to measure (what) and relevant measurements (how) based on the use of process descriptions<br />
and motives for the evaluation (why).<br />
Monitoring processes means that employees and systems know how the operations work and are related<br />
to the whole. This step presupposes a horizontal view of management and control, which allows<br />
employees to be able, and have authority, to make decisions on how and which tasks contribute to value.<br />
A useful process description in this step is most likely automated and supported by a tool to prioritise and<br />
signal which task to act on.<br />
3.1 Preconditions<br />
Preparation is essential for business development and process modelling. To ensure that the municipality<br />
achieves applicable process descriptions the following preconditions must be met:<br />
The Common Process Model constitutes a knowledge base that all employees can access via the<br />
webpage (intranet) and via the tools to be used in the process mapping.<br />
Employees who map processes can understand and master the model.<br />
Employees who map processes use the model.<br />
Employees who map processes always store a core process description based on the directives in<br />
the model to be able to communicate across organisational boundaries.<br />
Employees with experience of process mapping can document and collect these experiences in a<br />
process report as feedback to the model owner to further development of the model.<br />
Continuous development of the model is based on internal experiences together with research results<br />
and experiences gained in other municipalities/organisations nationally and internationally.<br />
Current and future processes are mapped as a basis for defining the end objective, and should be<br />
described in process description according to the process model guidelines.<br />
153
Marie-Therese Christiansson<br />
The process descriptions are labelled, stored, published, disseminated and updated so that business<br />
developers can find and use current descriptions; that is, someone is responsible for them.<br />
A strategy (in terms of why, what and how) for performing business development as well as process<br />
modelling facilitates an effective business development (Christiansson, 2001; Becker et. al 2003). Becker<br />
(et. al 2003:148) states that, “When considering the aim of the process modelling (‘why’ modelling should<br />
be done, e.g. certification, selection of software, organisation design), it is necessary to determine both<br />
the object of modelling (‘what’ should be modelled, for example, a total model of the business vs. a partial<br />
model), and the modelling methods and tools (‘how’ modelling should be done)”. Relevant problem areas<br />
or target services for process improvements should be identified and prioritised with respect to financial<br />
and personnel resource constraints (ibid.). Drivers for eService development may also arise from<br />
demands from EU and national directives (to local action plans, see e.g. Magnusson and Christiansson,<br />
2011) as well as explicit service catalogues and customer demands for web-based communication<br />
(Christiansson, 2011).<br />
The main objectives of process modelling in eService development are business operations and system<br />
design. Becker (et. al 2003) mention that services can be classified by level of interaction (information,<br />
communication and transaction) and degree of integration (media break, no media break, and<br />
automated) to support decisions on business improvements and processes to analyse. A process<br />
modelling may focus on the current processes (as-is) to analyse and evaluate the service level. The<br />
process description communicates an administrative transparency to identify and explain weak points<br />
and arguments for potential improvements. The final decision to make, not the first, is the selection of<br />
suitable modelling methods and tools. Moving towards a process-oriented and eService supported<br />
administration needs process descriptions with a high level of clarity to be able to identify (e.g. problems,<br />
strengths, possibilities) in analysis. Moreover, the final target (to-be) processes must be understandable<br />
for a range of employees with heterogeneous backgrounds and different roles as well as customer and IT<br />
suppliers.<br />
3.2 Concepts<br />
The process model and its application have been explained with a number of central concepts. As an<br />
example, directive is defined as a steering instrument and directive should clearly stipulate prerequisites<br />
and basic ideas/rules to make it ‘happen’. The ambition to develop a common language makes it<br />
imperative that the concepts are made familiar, defined and disseminated in and between<br />
organisations/administrations. This effort also demands that the concepts are updated with changes in<br />
the language of the organisation. Concepts familiar in the business context to employees and customer<br />
may be part of the eService solution, digital forms and GUI (Graphical User Interface) to make sense and<br />
be usable for customer and employees.<br />
3.3 Guideline – motive, use, scope<br />
Business process improvement is key to providing, performing and delivering eServices, contact centres<br />
etc. in a municipality service portfolio. A range of different improvement activities is restructu-ring existing<br />
business process to provide new eServices and to implement new ways of working in municipalities. In<br />
customer services strategies and development of ever more complex eServices, understanding local<br />
business processes is a precondition (Christiansson, 2011).<br />
Establishing motives for business development at the same time define expected impacts.<br />
With a business driven eService development, business process improvements can be<br />
measured in business performance and customer value. Benefits in business performance<br />
can be mapped in process descriptions of e.g. case handling, explaining in detail what<br />
should be done, why, how and in what order. It will be traceable and possible to get reports<br />
of time spent in comparison with deliverance guarantees; indicators of quality can be<br />
determined and published. One of the main benefits is the empowering possibility for the<br />
employees to form their own job by giving knowledge of operational work in the design of<br />
how the work actually should be done. Other benefits in eService solutions are the use of<br />
digital forms for applications to ease the access ability for customers and reduce the<br />
workload for the employees. Further more, personnel changes and new employment will be<br />
eased by identified, defined, standardised and in some cases automated business<br />
processes. Employees may also find it a benefit to see the results of their work monitored<br />
continuously, and even published on a service level on the web. (Christiansson, 2011)<br />
According to Grönroos (2000), creating value is about a relationship with the customer in<br />
154
Marie-Therese Christiansson<br />
interactions and over time. Customer value includes benefits in service performance and<br />
service experience, e.g. in the possibility to do all communication by digital forms and emails<br />
and the customers ability to use the services (Christiansson, 2011).<br />
The purpose for developing and using process descriptions can pertain to operations and/or systems<br />
designed to e.g. identify, describe/illustrate/explain, analyse, communicate/disseminate/publish (internally<br />
and externally), understand/develop/learn from and learn new things, specify, evaluate, test, assess<br />
effects, construct/design solutions, purchase existing solutions, administer/maintain and introduce/train.<br />
Clarifying the use of process descriptions is important in regard to e.g. clarifying the motives to the<br />
participation in the mapping, to give incentive and make people committed.<br />
Defining the scope of a process involves identifying relevant stakeholders that need to be included in the<br />
mapping (e.g. affected actors/organisations) in order to obtain the knowledge required.<br />
The scope of the process mapping can be relevant to:<br />
Internal processes<br />
Externally oriented processes towards an external client<br />
Processes across organisational borders<br />
Interface (interaction/exchange) between stakeholders<br />
3.4 Mapping structure<br />
A process mapping can vary in size and complexity. In each step in the process mapping process, see<br />
Figure 3, there are different ‘lines’ to follow in directives, guidelines and templates. The green line, which<br />
refers to simple processes, must be followed by all employees and can be seen as mandatory in order to<br />
achieve a process description that can be used in the ‘process staircase’. The yellow line represents<br />
uncertain processes and the red line refers to complex processes across organisational boundaries. The<br />
colours reflect a view of the mapping assignment and the business development at hand; where green<br />
and yellow are sufficient to explain the business and the red line is needed to reach an understanding of<br />
it. Experience gained internally (via process reports) may determine the directives, guidelines and<br />
templates that will be recommended for use in each of the situations.<br />
Figure 3: The process of process mapping<br />
The modelling structure is clickable (white arrows in Figure 3) and is accessible via the municipal Intranet<br />
and a process tool (using the BPMN notation, see e.g. White, 2004). Activities in the detailed view of the<br />
modelling structure are connected with applicable directives, guidelines and templates. Given that the<br />
quality of process descriptions affects the outcome and impacts the benefits in business process<br />
improvements, it is important to reflect on the process by which the process descriptions are actually<br />
constructed. With a uniform way of describing processes, process descriptions may work as a basis for<br />
discussions and development between various administrations. For the municipality to appear as a single<br />
and integrated municipality to citizens, companies or visitors, eService solutions across administrations<br />
and other government agencies must be performed and experienced as one service provider. Identified<br />
and described daily operational business processes are particularly important to the specification of<br />
requirements for technology-based products/services, where a clear business understanding is needed. It<br />
is essential to understand not only how the municipality is delivering services, but also how people are<br />
accessing these services. Understanding business performance in delivery, customers and usage<br />
provides you with a context you can use to plan how to revise services.<br />
155
Marie-Therese Christiansson<br />
3.5 Directives – process modelling, to model, measure and re-design business<br />
processes<br />
Based on the motives for the mapping process and the use of process description, it may be relevant to<br />
document (to explain) or to model (to understand and change) processes. EService solutions are always<br />
changing. With a description of the current business process and the ability to measure flow, activities,<br />
information, experiences in results and so on, ‘a close to business’ requirement specification<br />
(Christiansson and Christiansson, 2006) can be used in the design of the eService solution. It is<br />
important to clarify what is relevant in each process mapping to get the right staffing and work<br />
procedures. The main message in modelling a process is to describe all mandatory elements required to<br />
describe a business process together with employees who know the daily business as well as customers<br />
and/or suppliers. If each process elements is mapped with a separate symbol, they can be translated<br />
between different kinds of modelling techniques if necessary. What you see in your process description is<br />
what you are able to communicate, measure and improve.<br />
4. Conclusions<br />
Process oriented analysis and improvements of administrative procedures are key for re-structuring<br />
municipal administration to eService solutions based on value-added business operations with digital<br />
support/enablers. The full potential of eServices can be achieved through structured processes to identify<br />
the needs and uses of information and communications technology. The building blocks in the Common<br />
Process Model entails agreement on the basic idea of and values in a process oriented approach –<br />
meaning and impacts to be achieved; central concepts – relevant definitions to use in offering, providing<br />
and delivering services; degree of process orientation – relevant motives and actions in the ‘process<br />
staircase’; roles and tools – necessary roles in organising and performing and possible support by<br />
functionality in tools; and modelling structure – modelling actions supported by directives, guidelines and<br />
templates to be able to identify, measure and improve business processes and eService solutions.<br />
References<br />
Alsaghier, H. Ford, M. Nguyen, A. and Hexel, R. (2009) Conceptualising Citizen’s Trust in e-Govern-ment:<br />
Application of Q Methodology, Electronic Journal of eGovernment, Vol 7, No. 4, pp 295-310.<br />
Alvesson, M. and Sköldberg, K. (2000) Reflexive methodology: New vistas for qualitative research, Sage, London.<br />
Alpar, P. and Olbrich, S. (2005) Legal Requirements and Modelling of Processes in eGovernment, The Electronic<br />
Journal of eGovernment, Volume 3 Issue 3, pp 107-116.<br />
Bandara, W. Indulska, M. Chong, S. Sadiq, S. (2007) Major Issues in Business Process Management: An Expert<br />
Perspective, In: Proceedings of ECIS, pp 1240-1251.<br />
Becker, J. Algermissen, L. Niehaves, B. (2003) Processes in EGovernment Focus: A Procedure Model for Process<br />
Oriented Reorganisation in Public Administrations on the Local Level, In: Traunmüller, R. (Ed.) Proceedings of<br />
EGOV 2003, LNCS 2739, pp 147-150.<br />
Benbasat, I. Goldstein, D. K. and Mead, M. (1987) The case research strategy in studies of information systems, MIS<br />
Quarterly, September, pp 369-386.<br />
Christiansson, M-T. (2001) Process orientation in inter-organisational co-operation – by which strategy? In: Nilsson,<br />
A. G. and Pettersson, J. S. (Eds.) On Methods for Systems Development in Professional Organisations – The<br />
Karlstad University Approach to Information Systems and its Role in Society, Studentlitteratur, Lund.<br />
Christiansson, M-T. and Christiansson, B. (2006) The Encounter between Processes and Components – Towards a<br />
Framework for a Close-to-Business Requirements Specification for Acquisition of Component-Based<br />
Information Systems, PhD thesis No. 14, Linköping University.<br />
Christiansson, M-T. (2010) Towards a Framework for <strong>Academic</strong>-Practitioner Collaborative Research in Coproduction,<br />
In: Proceedings of the International <strong>Conference</strong> on Information Systems, pp 199-207.<br />
Christiansson, M-T. (2011) Improving Business Processes and Delivering Better eServices - a Guide for<br />
Municipalities from Smart Cities (forthcoming at http://www.smartcities.info/)<br />
Davenport, T. H. (1993) Process Innovation – Reengineering Work through Information Technology, Harvard<br />
Business School Press, Boston.<br />
Davison, R.M. Martinsons, M.G. and Kock, N. (2004) Principles of canonical action research, Information Systems<br />
Journal, Vol. 14, No. 1, pp 65-86.<br />
<strong>European</strong> Commission (2010 a) A Digital Agenda for Europe, http://ec.europa.eu/information_society/digitalagenda/index_en.htm<br />
<strong>European</strong> Commission (2010 b) The <strong>European</strong> eGovernment Action Plan 2011-2015,<br />
http://ec.europa.eu/information_society/activities/egovernment/action_plan_2011_2015/index_en.htm<br />
Grönroos, C. (2000) Service Management and Marketing – A Customer Relationship Management Approach, 2 nd<br />
edition, Chichester, Wiley.<br />
Hammer, M. (1993) Reengineering The Corporation: A Manifesto for Business Revolution, N. Brealey Publishing,<br />
London.<br />
Magnusson, M. and Christiansson, M-T. (2011) Using Goal Modelling to Evaluate High-Level Goals with EService<br />
Alignment in Government (submitted paper).<br />
156
Marie-Therese Christiansson<br />
Malmö Ministerial Declaration on eGovernment (2009) http://www.epractice.eu/en/library/299149<br />
Orr, K., Bennett, M. (2009) Reflexivity in the co-production of academic-practitioner research, Qualitative Research in<br />
Organizations and Management: An International Journal, Vol. 4, Issue 1, pp 85-102.<br />
Robey, D. and Markus, M.L. (1998) Beyond rigor and relevance: Producing consumable research about information<br />
systems, Information Resources Management Journal, Vol. 11, No 1, pp 7-15.<br />
Schneider, G. P. (2003) Electronic Commerce (4 ed.), Boston, MA: Thomson Learning Inc.<br />
SCRAN (2011) Smart Cities Regional <strong>Academic</strong> Network, http://www.smartcities.info/academic-work<br />
Smart Cities (2011) Project Website, http://www.smartcities.info/<br />
zur Muehlen, M. (2008) Class Notes: BPM Research and Education – A Little Knowledge is a<br />
Dangerous Thing, BPTrends.<br />
Warkentin, M., Gefen, D., Pavlou, P. A. and Rose, G. M. (2002) Encouraging Citizen Adoption of eGovernment by<br />
Building Trust. Electronic Markets, 12(3), pp 157-162.<br />
White, S. A. (2004) Introduction to BPMN, BPTrends.<br />
157
Measuring Performance of eGovernment to the Disabled:<br />
Theory and Practice in Taiwan<br />
Pin-yu Chu, Tong-yi Huang and Ning-wan Huang<br />
National Chengchi University, Taipei, Taiwan<br />
vchu@nccu.edu.tw<br />
tyhuang@nccu.edu.tw<br />
96256011@nccu.edu.tw<br />
Abstract: Taiwan’s eGovernment programs have been formulated to improve the quality of government services. The<br />
success of eGovernment programs depends on a robust performance assessment that provides a valuable<br />
understanding of the impacts of individual projects on stakeholders, including citizens, government employees,<br />
businesses, and minorities. In this paper, we emphasize the importance of a citizen-centric approach and propose key<br />
indicators for measuring eGovernment programs. We examine the antecedents of the impact assessment of<br />
eGovernment in the context of an integrated model. The model incorporates a wide variety of important factors from<br />
previous research into a theoretical framework. In 2010 with the assistance of the Research, Development and<br />
Evaluation Commission, Executive Yu, we conduct an online survey and made detailed impact assessments of a<br />
Government to the Disabled (G2D) program in Taiwan. 5,895 members of three major non-profit organizations for the<br />
blind were invited to complete the online questionnaire. The main foci of the questionnaire are project impacts<br />
(including cost savings, benefits, and satisfaction), program quality (including program scope, marketing strategy, and<br />
social inclusion), web quality (including system quality, information quality, and service quality), user satisfaction, and<br />
public trust. This paper presents the results of the survey and summarizes the key findings from the impact<br />
assessment of the web accessibility program. The lessons from this study will help us identify the key factors affecting<br />
the success of eGovernment and pave the path for future eGovernment initiatives.<br />
Keywords: eGovernment, performance evaluation, impact assessment, web accessibility, disabilities<br />
1. Introduction<br />
The success of eGovernment programs hinges on a robust performance assessment that not only provides<br />
a valuable understanding of the impacts of individual programs on stakeholders including citizens,<br />
government employees, business, and minorities, but also provides an effective feedback mechanism for<br />
mid-course corrections. Thus, the performance evaluation of eGovernance has become an important issue<br />
for governments around the world. Among various approaches to eGovernment performance evaluation, a<br />
demand-side evaluation, which is the assessment in terms of citizen’ demands or needs, is highly<br />
desirable, because the promise of eGovernment is to engage citizenry in government in a citizen-centered<br />
manner.<br />
Among various e-services provided by eGovernment, Government to the Disabled (G2D) has gained much<br />
attention in recent years. Since 2003, Research, Development and Evaluation Commission (RDEC),<br />
Executive Yu, based on the international Web Content Accessibility Guidelines 2.0 (WCAG 2.0), has<br />
launched a Web Accessibility Initiative Program to improve the accessibility of the World Wide Web for<br />
people with disabilities in Taiwan. In section two, we, as researchers of the Taiwan EGovernance Research<br />
Center (http://www.teg.org.tw), review the development of web accessibility, and several essential<br />
theoretical models, such as the eGovernment value chain model (Heeks, 2006), the information system<br />
success model (DeLone and McLean, 2003) and e-SERVQUAL (Zeithaml, Parasuraman, and Malhotra,<br />
2002). Based on the eGovernment value chain model and the information system success model, we<br />
introduce our theoretical framework, which covers three aspects of eGovernment (quality, usage, and<br />
impact) in section three. In section four, we use survey methodology to examine the framework and make<br />
detailed assessments of performance of the G2D program. The concluding section discusses the key<br />
contributions of our research to the eGovernance impact assessment literature.<br />
2. Literature review<br />
2.1 Web accessibility<br />
Web accessibility means that individuals with disabilities can perceive, understand, navigate, and interact<br />
with the Web. It not only allows individuals with disabilities, regardless of the types of disabilities they have,<br />
to use the Web in a manner that is equal to the use enjoyed by others, but also benefits others, including<br />
older people with changing abilities due to aging (Jaeger, 2008). Indeed, web accessibility is of the utmost<br />
importance in current network society.<br />
158
Pin-yu Chu et al.<br />
In 1995, the Web Accessibility Initiative (WAI) of the World Wide Web Consortium first published WCAG 1.0<br />
based on needs of individuals with disabilities for accessing the Internet. In 2008, WAI further published<br />
WCAG 2.0 to correspond with changing information applications and provided strategies, guidelines, and<br />
resources to make the Web more accessible to people with disabilities (WAI, 2008). Lately, many countries<br />
all over the world are also concerned about the issue of web accessibility. For example, the United States<br />
passed the Section 508 of the Rehabilitation Act to ensure Federal employees and members of the public<br />
with disabilities have access to the Federal government's electronic and information technology. Similarly,<br />
the United Kingdom passed the Disability Discrimination Act to ensure web accessibility for blind and<br />
disabled users in 1995. In 2002, The Cabinet Office further established guidelines to ensure that UK<br />
government websites are developed to serve the largest possible audience using the broadest range of<br />
systems and that the needs of users with disabilities are considered (Cabinet Office, 2007). Australia<br />
passed Disability Discrimination Act in 1992 to ensure the rights of people with disabilities in provision of<br />
goods and services through websites (Australian Human Rights Commission, 2009).<br />
With all the mentioned efforts, users with disabilities still often face many barriers to accessing the Internet.<br />
Recently, researchers have addressed the complexities of accessibility and the reasons for continued<br />
inaccessibility on eGovernment sites, such as a fundamental lack of understanding of the true meaning of<br />
accessibility, requirements of law, web managers’ attitude, rapid improvement of technology, and lack of a<br />
standardized approach (Jaeger, 2006a, 2006b; Curran, Walters, and Robinson, 2007). Jaeger (2006a)<br />
argues that many researches did not sufficiently evaluate the depth and content of accessibility and<br />
proposes a multi-method approach to studying the accessibility of eGovernment sites in a user-centric<br />
context. The methods include a law and policy analysis of the standards of Section 508, user testing<br />
involving persons with disabilities interacting with eGovernment websites, expert testing of eGovernment<br />
websites, testing of eGovernment websites with automated testing software, and a survey of federal web<br />
developers regarding their perceptions about accessibility. Jaeger and Matteson (2009) further employ<br />
Technology Acceptance Model (Davis, 1989) to examine the policy-adoption behavior of government<br />
agencies.<br />
2.2 eGovernment value chain<br />
Heeks (2006) advocates the significance of developing a comprehensive eGovernment assessment<br />
framework and proposes the model of eGovernment value chain (EVC) to illustrate how an eGovernment<br />
initiative turns inputs into impacts and outcomes (see Figure 1). The EVC model suggests that the process<br />
of creating eGovernment value starts from the precursors such as telecommunications infrastructure and<br />
legal environment, and inputs such as the required financial and political support for eGovernment<br />
development. As a result, these precursors and government inputs, the so-called “readiness”, produce<br />
quality governmental web channels or systems and enable eGovernment adoption by both external and<br />
internal customers. Finally, these adoptions result in the desired outputs and outcomes (Heeks, 2006).<br />
Precursors<br />
Data systems<br />
Legal<br />
Institutional<br />
Human<br />
Technological<br />
Leadership<br />
Drivers/Demand<br />
Inputs<br />
Money<br />
Labor<br />
Technology<br />
Political<br />
support<br />
Strategy Targets Development<br />
READINESS<br />
Intermediates<br />
Web channels<br />
Other e-channels<br />
Back office<br />
systems<br />
AVAILABILITY<br />
Adoption<br />
UPTAKE<br />
Outputs<br />
Information &<br />
Decisions<br />
Actions &<br />
Service<br />
Transactions<br />
Exogenous Factors<br />
Figure 1: eGovernment value chain (source: Heeks, 2006 (p.14))<br />
Early studies (Wassenaar, 2000; Jassen, Rotthier, and Snijkers, 2004; Heintzman and Marson, 2005;<br />
Holden and Fletcher 2005; Wauters, 2006; Millard, 2008) apply EVC to understand factors affecting<br />
159<br />
Use<br />
Impacts<br />
Financial<br />
benefits<br />
Non-financia<br />
l benefits<br />
IMPACT<br />
Outcomes<br />
Public goals<br />
(e.g.MDGs)
Pin-yu Chu et al.<br />
eGovernment adoption. Some eGovernment benchmarking studies, such as the eGovernment website<br />
evaluation conducted by the United Nations (UN, 2001, 2003, 2008), mainly focused on system evaluation.<br />
These eGovernment studies, unfortunately, ignore the EVC downstream elements, e.g. impacts and<br />
outcomes (Huang and Lee, 2010). This limited focus is not only problematic but also makes it difficult to<br />
address the questions of whether eGovernment produces the desired value and how it does so. Until<br />
recently, researchers in various fields such as economics, information management, and public<br />
administration have addressed the importance of impact assessment of eGovernment (Chu and Huang,<br />
2010; Hsiao, Lee, and Chu, 2011; Verdegem and Verleye, 2009).<br />
2.3 Information system success model<br />
Based on thorough literature review and significant empirical efforts, DeLone and McLean (1992, 2003)<br />
develop a widely accepted information system success model, the so-called D & M Information Success<br />
Model (see Figure 2). In the model, information quality, systems quality, and service quality are the main<br />
factors affecting a user’s willingness to use a system, their satisfaction with its use, and its level of impact.<br />
More than 300 articles have referred to or made use of the D & M model. Wang and Liao (2008) provide the<br />
first empirical test of the D & M model in the context of eGovernment. They find that most hypothesized<br />
relationships in the D & M model are significantly supported except the link from system quality to use.<br />
Information<br />
Quality<br />
System Quality<br />
Service Quality<br />
Figure 2: DeLone and McLean’s updated IS success model (source: DeLone and McLean (2003))<br />
Besides the EVC model and the D & M model, various theoretical models and instruments, such as<br />
e-SERVQUAL (Zeithaml et al., 2002), WEBQUAL/eQual (Lociacono, Watson, and Goodhue, 2002), and<br />
eTailQ (Wolfinbarger and Gilly, 2003) that originated from the service sector, have been employed to<br />
examine service quality in eGovernment services. For example, Barnes and Vidgen (2003) use WebQual,<br />
with dimensions including usability, information quality and service interaction, to assess the quality of a<br />
specific cross-national website provided via the OECD. Connolly, Bannister and Kearney (2010) apply<br />
e-SERVQUAL to analyze user perceptions of the quality of the Irish revenue online service.<br />
3. eGovernment impact assessment framework<br />
We examine the impact assessment of G2D programs in the context of an integrated model. The model<br />
incorporates a wide variety of important factors from previous research into a single theoretical framework<br />
provided by the EVC model and the D & M Model. The framework proposes to divide the eGovernment<br />
impact assessment into three related causal parts: quality, adoption, and impact (see Figure 3). Since the<br />
aim of the Web Accessibility Initiative program is to improve the accessibility of the World Wide Web for<br />
people with disabilities in Taiwan, the impact assessment includes not only program quality, program<br />
adoption, and program impact but also web quality and web adoption. We define each of these constructs<br />
and develop the theoretical rationale for the causal relationship in this framework as follows (see Figure 3)<br />
3.1 Quality dimension – program and web<br />
Intention to<br />
use Use<br />
User Satisfaction<br />
Net Benefits<br />
Quality covers two parts: quality of the G2D program and quality of government websites. For the program<br />
quality, we evaluate scope, marketing strategy, social acceptance, and goals of the G2D program<br />
perceived by individuals with disabilities. For the web quality, we evaluate system quality, information<br />
160
Pin-yu Chu et al.<br />
quality, and service quality of government websites visited by individuals with disabilities. System quality<br />
refers to usability (Holzer and Kim, 2007) and linkage between websites; information quality refers to<br />
reliability, completeness, and accuracy features of the web information; and service quality refers to<br />
problem-solving and privacy protection level of the websites.<br />
Program quality<br />
1. Program scope<br />
2. Social acceptance<br />
3. Program goals<br />
Program adoption<br />
1. Awareness<br />
2. Support for the program<br />
Web quality Web adoption<br />
(D & M Model)<br />
1. System quality<br />
2. Information quality<br />
3. Service quality<br />
Usage experience of<br />
government websites<br />
Program impact<br />
1. Costs<br />
2. Benefits<br />
3. Attitudes<br />
Figure 3: Conceptualization of the eGovernance impact framework (source: this study)<br />
3.2 Adoption dimension – program and web<br />
Similarly, adoption covers two parts: adoption of the G2D program and adoption of government websites.<br />
For the program adoption, we evaluate awareness and support for the G2D program from individuals with<br />
disabilities. Web adoption refers usage experience of government websites.<br />
3.3 Impact dimension<br />
The impact construct encompasses costs, benefits, and attitudes of the users. For individuals with<br />
disabilities, the first impact of the G2D program can be in the form of time and money saved by finding<br />
information online and using accessible public web services (OECD, 2005). The second type of impact<br />
relates to attitude, which includes user satisfaction and trust in government (Hsiao et al., 2011; Welch et<br />
al., 2005).<br />
4. Method<br />
4.1 Data collection<br />
In 2010 with the assistance of the RDEC, we conduct an online survey and made detailed impact<br />
assessments of the particular G2D program. Based on the preceding theoretical framework, this section<br />
details the subsequent constructs and questionnaire items and the survey settings to collect the empirical<br />
data from individuals with disabilities.<br />
The main foci of the questionnaire are project impacts (including cost savings, benefits, and satisfaction),<br />
program quality (including scope, marketing strategy, and social inclusion), web accessibility quality<br />
(including system quality, information quality, and service quality), user satisfaction, and public trust. As the<br />
nature of web accessibility for blind people is quite different from that for regular people, quality<br />
measurement scales in eGovernment literature have been modified significantly. We also collect<br />
demographics and characteristics (information technology literacy, government website experience,<br />
willingness to reuse government websites, etc.) of the users with disabilities through the questionnaire.<br />
161
Pin-yu Chu et al.<br />
The questionnaire was reviewed by a committee (a team of government officials and experts from various<br />
domains like public administration, public management, and information management) and pretest on<br />
several people with disabilities to ensure its content validity and verify the clarity of the questions.<br />
According to their comments, the terminology in various sections was improved, and greater clarification of<br />
why individuals with disabilities are surveyed is made. Finally, the online questionnaire was designed to<br />
comply with WCAG 2.0.<br />
5,895 members of three major non-profit organizations for the blind, i.e., Tamkang Resource Center for<br />
Blind Students, Taiwan Foundation for the Blind, and Taiwan Digital Talking Books Association, were<br />
invited to complete the online questionnaire between August 2nd and August 31st; 563 of them finished<br />
the questionnaire, with 504 providing valid responses. The average reliability measure in terms of<br />
Cronbach’s alpha is 0.67.<br />
4.2 The results for the program quality and adoption<br />
Of the respondents, 53% are male. 60.3 % are fully blind, and 20.2% are mild low vision. The survey<br />
findings show that 74.8% of the respondents have used computers for over 6 years, and 64.1% of them<br />
have used the Internet for over 6 years. Almost half of them spend 1 to 5 hours surfing the Internet, and<br />
82% of them spend over 4 days a week on the Internet (see Table 1). The results imply that our<br />
respondents are experienced in using computers and surf the Internet frequently in their daily lives.<br />
Table 1: Characteristics and demographics of the respondents (n = 504)<br />
Gender<br />
Degree of visual<br />
impairment<br />
Experience of using<br />
computers<br />
Experience of surfing<br />
internets<br />
Days spent on the Internet<br />
per week<br />
Hours spent on the<br />
Internet per day<br />
Male Female<br />
267<br />
(53%)<br />
Mild low<br />
vision<br />
102<br />
(20.2%)<br />
237<br />
(47%)<br />
Moderate low<br />
vision<br />
88<br />
(17.5%)<br />
Severe vision<br />
impairments<br />
314<br />
(60.3%)<br />
1-5 years 6-10 years 11-15 years<br />
127<br />
(25.2%)<br />
204<br />
(40.5%)<br />
125<br />
(24.8%)<br />
1-5 years 6-10 years 11-15 years<br />
181<br />
(35.9%)<br />
Less than 1<br />
day<br />
21<br />
(4.2%)<br />
222<br />
(44%)<br />
81<br />
(16.1%)<br />
16-20<br />
years<br />
48<br />
(9.5%)<br />
16-20<br />
years<br />
20<br />
(4%)<br />
2-3 days 4-5 days 6-7 days<br />
70<br />
(13.9%)<br />
92<br />
(18.3%)<br />
321<br />
(63.7%)<br />
1-5 hours 6-10 hours 11-15 hours 16-20<br />
hours<br />
253<br />
(50.2%)<br />
156<br />
(31%)<br />
162<br />
56<br />
(11.1%)<br />
16<br />
(3.2%)<br />
More than 20<br />
hours<br />
14<br />
(2.8%)
Pin-yu Chu et al.<br />
4.3 The results for the program quality and adoption<br />
Table 2 summarizes the program quality and adoption perceived by our respondents. With all the efforts<br />
made by the RDEC, only 58.1% respondents are aware of the program, and those who have surfed<br />
government websites learn more about it. Not surprisingly, over 50% respondents are not really satisfied<br />
with the limited program scope and promotion strategies. Even though the rate of program awareness and<br />
satisfaction is not so high, more than 70% respondents are still willing to use government websites due to<br />
the accessibility improvement and 93.9% respondents think the government should continue promoting<br />
the web accessibility program.<br />
Table 2: The survey results of the program quality and adoption (n = 504)<br />
Yes No<br />
Aware of the program 293 211<br />
(58.1%) (41.9%)<br />
Very<br />
negative<br />
Program scope<br />
Completeness of accessible web 65<br />
(12.9%)<br />
Promotion of accessible web 147<br />
(29.2%)<br />
Social acceptance<br />
Willingness to surf the Internet 8<br />
(1.6%)<br />
Negative Neutral Positive Very<br />
positive<br />
196<br />
(38.9%)<br />
186<br />
(36.9%)<br />
23<br />
(4.6%)<br />
Continuous promotion 0 7<br />
(1.4%)<br />
Program goals<br />
Time saved on searching government information 11<br />
(2.2%)<br />
Trust in government 4<br />
(0.8%)<br />
4.4 The results for the web quality and adoption<br />
20<br />
(4%)<br />
38<br />
(7.5%)<br />
153<br />
(30.4%)<br />
124<br />
(24.6%)<br />
103<br />
(20.4%)<br />
22<br />
(4.4%)<br />
138<br />
(27.4%)<br />
217<br />
(43.1%)<br />
51<br />
(10.1%)<br />
28<br />
(5.6%)<br />
186<br />
(36.9%)<br />
133<br />
(26.4%)<br />
191<br />
(37.9%)<br />
164<br />
(32.5%)<br />
13<br />
(2.6%)<br />
9<br />
(1.8%)<br />
174<br />
(34.5%)<br />
340<br />
(67.5%)<br />
125<br />
(24.8%)<br />
67<br />
(13.3%)<br />
Don’t<br />
know<br />
26<br />
(5.2%)<br />
10<br />
(2%)<br />
10<br />
(2%)<br />
2<br />
(0.4%)<br />
19<br />
(3.8%)<br />
14<br />
(2.8%)<br />
More than 70% of them think government websites are easy to use and government online information is<br />
easy to understand. Overall, our respondents largely approve of the system and information quality of<br />
government websites since both measures receive less than 18% negative evaluation. Service quality,<br />
however, demonstrates much room for improvement (see Table 3).<br />
Web adoption refers our respondents’ usage experience of government websites. The results show that<br />
nearly 60% of government websites provide accessibility features of link purpose, bypass block, sitemap,<br />
and page titled. However, features of access key and alt design demonstrate room for much improvement<br />
(see Table 4).<br />
Table 3: The survey results of the web quality (n = 504)<br />
Usability of the government website<br />
Very<br />
negative<br />
Negative Neutral Positive<br />
System Quality<br />
11<br />
(2.2%)<br />
70<br />
(13.9%)<br />
Successful linkage between websites 10 78<br />
(2%) (15.5%)<br />
Information Quality<br />
163<br />
221<br />
(43.8%)<br />
188<br />
(37.3%)<br />
158<br />
(31.3%)<br />
168<br />
(33.3%)<br />
Very<br />
positive<br />
29<br />
(5.8%)<br />
43<br />
(8.5%)<br />
Don’t<br />
know<br />
15<br />
(3%)<br />
17<br />
(3.4%)
Readability of the government website<br />
Understandability of the government website<br />
Completeness of the government website<br />
Problem-solving level in general<br />
Effectiveness of privacy protection<br />
Pin-yu Chu et al.<br />
5<br />
(1%)<br />
Very<br />
negative<br />
9<br />
(1.8%)<br />
9<br />
(1.8%)<br />
Service Quality<br />
20<br />
(4%)<br />
25<br />
(5%)<br />
83<br />
(16.5%)<br />
223<br />
(44.2%)<br />
150<br />
(29.8%)<br />
Negative Neutral Positive<br />
52<br />
(10.3%)<br />
52<br />
(10.3%)<br />
104<br />
(20.6%)<br />
102<br />
(20.2%)<br />
211<br />
(41.9%)<br />
201<br />
(39.9%)<br />
205<br />
(40.7%)<br />
177<br />
(35.1%)<br />
186<br />
(36.9%)<br />
199<br />
(39.5%)<br />
141<br />
(28%)<br />
141<br />
(28%)<br />
Table 4: Accessibility features of government websites perceived by respondents (n= 504)<br />
31<br />
(6.2%)<br />
Very<br />
positive<br />
35<br />
(6.9%)<br />
31<br />
(6.2%)<br />
21<br />
(4.2%)<br />
34<br />
(6.7%)<br />
Yes No Don’t know<br />
Link purpose 278 (55.2%) 122 (24.2%) 104 (20.6%)<br />
Access key 179 (35.5%) 215 (42.7%) 110 (21.8%)<br />
Bypass block 320 (63.5%) 91 (18.1%) 93 (18.5%)<br />
Sitemap 289 (57.3%) 135 (26.8%) 80 (15.9%)<br />
Non-text content 166 (32.9%) 257 (51%) 81 (16.1%)<br />
Page titled 328 (65.1%) 119 (23.6%) 57 (11.3%)<br />
4.5 The results for the impact dimension<br />
12<br />
(2.4%)<br />
Don’t<br />
know<br />
11<br />
(2.2%)<br />
12<br />
(2.4%)<br />
13<br />
(2.6%)<br />
The main purpose the government promotes web accessibility is to satisfy the needs of people with<br />
disabilities, as well as earning positive perception from the general public. The impact measures<br />
summarized in Table 5 indicate positive responses from the respondents regarding their experience using<br />
the government webs. In the cost reduction dimension, though nearly 35% respondents think they need<br />
better computer hardware and software and 30% of them agree that the government should try to reduce<br />
their costs, 71.4% respondents are still more willing to use government websites due to the accessibility<br />
improvement. Most measures of time and effort saving benefits earn more than 60% positive perceptions<br />
from the respondents. For example, over 60% of the respondents reveal that they are able to access most<br />
public services online and complete their tasks without any assistance from others. Web accessibility even<br />
makes purchasing railway tickets online easy. However, over 30% of them still think search time efficiency<br />
for government websites needs to be further improved.<br />
As for the attitude toward the program, more than 90% of the respondents will continue using the online<br />
public services, and encourage the government to make efforts to promote the program. As for the future<br />
direction of the program, 80% of the respondents think that an official accreditation mechanism and<br />
organization is necessary. Also, inviting people with disabilities to get involved in the accreditation process<br />
will also be very helpful.<br />
We further compare the perceived impact of the G2D program on our respondents with different vision<br />
disabilities. Regarding trust in government and satisfaction with the particular program, there is no<br />
164<br />
25<br />
(5%)
Pin-yu Chu et al.<br />
significant difference between people with mild and moderate low vision and people with severe vision<br />
impairments (see Table 6).<br />
Table 5: The survey results for the impact dimension<br />
Need of better computer hardware (n = 504)<br />
Willingness to use government websites (n = 504)<br />
Be able to access most public services online. (n =<br />
504)<br />
Be able to access most public services without<br />
assistance from others (n = 504)<br />
Convenience of purchasing Taiwan Railway ticket (n<br />
= 234)<br />
Make continuous efforts to promote the program (n<br />
= 504)<br />
Willingness to continual usage (n = 504)<br />
Improving information literacy (n = 504)<br />
Institutionalization of web accessibility (n = 504)<br />
Building license system for web accessibility<br />
inspector (n = 504)<br />
Very<br />
negative<br />
Cost reduction<br />
14<br />
(2.8%)<br />
8<br />
(1.6%)<br />
Negative Neutral Positive<br />
84<br />
(16.7%)<br />
23<br />
(4.6%)<br />
Time and effort saving benefits<br />
15<br />
(3%)<br />
18<br />
(3.6%)<br />
5<br />
(2.1%)<br />
56<br />
(11.1%)<br />
61<br />
(12.1%)<br />
19<br />
(8%)<br />
Attitude toward the G2D program<br />
0<br />
(0%)<br />
2<br />
(0.4%)<br />
1<br />
(0.2%)<br />
1<br />
(0.2%)<br />
2<br />
(0.4%)<br />
7<br />
(1.4%)<br />
2<br />
(0.4%)<br />
3<br />
(0.6%)<br />
5<br />
(1%)<br />
13<br />
(2.6%)<br />
201<br />
(39.9%)<br />
103<br />
(20.4%)<br />
103<br />
(20.4%)<br />
106<br />
(21%)<br />
48<br />
(20.3%)<br />
22<br />
(4.4%)<br />
37<br />
(7.3%)<br />
33<br />
(6.5%)<br />
39<br />
(7.7%)<br />
62<br />
(12.3%)<br />
124<br />
(24.6%)<br />
186<br />
(36.9%)<br />
167<br />
(33.1%)<br />
170<br />
(33.7%)<br />
85<br />
(35.9%)<br />
133<br />
(26.4%)<br />
200<br />
(39.7%)<br />
132<br />
(26.2%)<br />
148<br />
(29.4%)<br />
156<br />
(31%)<br />
Very<br />
positive<br />
52<br />
(10.3%)<br />
174<br />
(34.5%)<br />
153<br />
(30.4%)<br />
139<br />
(27.6%)<br />
66<br />
(27.8%)<br />
340<br />
(67.5%)<br />
251<br />
(49.8%)<br />
332<br />
(65.9%)<br />
303<br />
(60.1%)<br />
247<br />
(49%)<br />
Table 6: The impact comparison among people with different vision disabilities<br />
Negative Neutral Positive Don’t<br />
know<br />
T test<br />
Trust in government<br />
People with mild and moderate low 11 98 75 6<br />
χ<br />
vision<br />
(69.5%) (22.6%) (4.7%) (3.2%)<br />
People with severe vision 31 119 156 8<br />
impairments<br />
(72.6%) (19.1%) (7%) (1.3%)<br />
2 = 10.364 (df=3) ,<br />
p-value=0.016
Pin-yu Chu et al.<br />
theoretical underpinning on the impact assessment of eGovernment programs. We propose a conceptual<br />
model to examine elements of web accessibility and the associations between program/web quality and<br />
program impacts with empirical evidence. We use survey methodology to examine this framework and<br />
make detailed assessments of performance of the Web Accessibility Initiative Program in Taiwan.<br />
Generally speaking, most respondents regard the program is in the interest of them, but there is still<br />
something left to be desired. In the short term, this research suggests the government should create<br />
incentives for compliance with the WCAG 2.0 guidelines. The government can promote the program<br />
through policy advocacy and marketing and let more potential users understand the policy and use public<br />
online services so to enlarge the advantage of the policy. For providing more incentives for government<br />
agencies, the government is suggested to add the Guidelines as criteria for financial subsidies and<br />
program evaluation for proactive compliance. The government can award enterprises with high<br />
performance on web accessibility and subsidize non-profit organizations to enhance their ability to provide<br />
Accessible Web.<br />
At the same time, the government should communicate closely with the demand side. The government is<br />
suggested to conduct more surveys and forums to understand the needs of the disabled so that the design<br />
of the websites can really meet their needs. We also suggest that the responsible agencies should provide<br />
professional trainings for both webmaster and users to strengthen their ability for operating and accessing<br />
websites.<br />
In the mid-future, the government is suggested to build an accreditation mechanism to certify webs with<br />
accessibility. Because the criteria of Accessible Web are stricter than general website, we suggest that only<br />
organizations with official accreditation are eligible for inspecting the web pages and certain ratio of the<br />
inspectors should be the blind. The inspecting organization should establish formal complain channel and<br />
clear punishment rules. Furthermore, if the government develops a barrier-free cross-boundary<br />
eGovernance mechanism, the program would be greatly strengthened. To be more specific, the<br />
government should proactively check whether governments’ website meet the disabled’s need, especially<br />
for those websites closely related to citizens’ lives such as public transportation and public banks. The<br />
governments should further offer one-stop web page and integrate back-office services to enhance policy<br />
satisfaction.<br />
In the long term, the governments should continue public communication and build a cross-sector<br />
eGovernance system. The government should let the public understand that Accessible Web is not only<br />
built for the disabled. Its design concept can also create advantage for the elders and the younger<br />
generation. Therefore, the government should start education and building a friendly environment to<br />
deepen the spirit of Accessible Web. The mentioned tasks not only pertain to technology provision and<br />
customization, but also need the cross-sector cooperation among government, private organizations, and<br />
the third sectors. The ultimate end is to make the Accessible Web concept realized in citizens’ lives.<br />
Despite all the care given to this study, there are several limitations that should be noted and addressed in<br />
any future research. First of all, the changes in perception and user behavior over any significant period of<br />
time, with regard to the promotion of the G2D program, have not been investigated in this research. It is<br />
therefore recommended that further research should be undertaken to examine whether, with increasing<br />
experience over time, there is any change in satisfaction and usage of public online services. Secondly,<br />
this paper only covers the program impact on people with eyesight problem. Further investigation on<br />
people with various disabilities should be carried to identify the key factors affecting the success of the<br />
web accessibility program in general.<br />
References<br />
Barnes, S.J. and Vidgen, R. (2003) “Measuring Website Quality Improvements: A Case Study of the Forum on<br />
Strategic Management Knowledge Exchange”, Industrial Management and Data Systems, Vol. 103, No. 5, pp<br />
297-309.<br />
Chu, P.Y. and Huang, T.Y. (2010) “Measuring EGovernance Performance: Theory and Practice in Taiwan”, Beyond<br />
eGovernment Measuring Performance: A Global Perspective, edited by Alan R. Shark and Sylviane Toporkoff,<br />
Public Technology Institute and ITEMS International, pp 279-292.<br />
Connolly, R., Bannister, F. and Kearney, A. (2010) “Government Website Service Quality: A Study of the Irish Revenue<br />
Online Service”, <strong>European</strong> Journal of Information Systems, Vol. 19, pp 649–667.<br />
Curran, K., Walters, N. and Robinson, D. (2007) “Investigating the Problems Faced by Older Adults and People with<br />
Disabilities in Online Environments”, Behavior and Information Technology, Vol. 26, No. 6, pp 447-453.<br />
Davis, F.D. (1989) “Perceived Usefulness, Perceived Ease of Use and User Acceptance of Information Technology”,<br />
MIS Quarterly, Vol. 13, No. 3, pp 318-339.<br />
166
Pin-yu Chu et al.<br />
DeLone, W.H. and McLean, E.R. (1992) “Information System Success: The Quest for the Dependent Variable”,<br />
Information Systems Research, Vol. 3, No. 1, pp 60-95.<br />
DeLone, W.H. and McLean, E.R. (2003) “The DeLone and McLean Model of Information System Success: A Ten-year<br />
Update”, Journal of Management Information Systems, Vol. 19, No. 4, pp 9-30.<br />
Heeks, R. (2006) “Benchmarking EGovernment: Improving the National and International Measurement, Evaluation<br />
and Comparison of EGovernment”, Paper presented at iGovernment Working Paper, University of Manchester,<br />
Manchester.<br />
Heintzman, R. and Marson, B. (2005) “People, Service and Trust: Is There a Public Sector Service Value Chain”,<br />
International Review of Administrative Science, Vol. 71, No. 4, pp 549-575.<br />
Holden, S. H. and Fletcher, P. D. (2005) “The Virtual Value Chain and EGovernment Partnership: Non-monetary<br />
Agreements in the IRS E-File Program”, International Journal of Public Administration, Vol.28, No. 7and8, pp<br />
643-664.<br />
Holzer, M. and Kim, S. (2007) Digital Governance in Municipalities Worldwide (2007) - A Longitudinal Assessment of<br />
Municipal Websites Throughout the World, The EGovernance Institute National Center for Public Performance<br />
Rutgers, the State University of New Jersey, Campus at Newark.<br />
Horan, T.A., Abhichandani, T. and Rayalu, R. (2006) “Assessing User Satisfaction of EGovernment Services:<br />
Development and Testing of Quality-in-use Satisfaction with Advanced Traveler Information System (ATIS)”,<br />
Paper presented at the 39th Hawaii International <strong>Conference</strong> on System Sciences, Hawaii.<br />
Hsiao, N.Y., Lee, C.P. and Chu, P.Y. (2011) “Impact of EGovernance on Businesses – Model Development and Case<br />
Study”, EGovernance and Cross-boundary Collaboration: Innovations and Advancing Tools, edited by Chu, P.Y.<br />
and Chen, Y.C., IGI Global.<br />
Jaeger, P.T. (2006a) “Assessing Section 508 Compliance on Federal EGovernment Websites: A Multi-method,<br />
User-centered Evaluation of the Accessibility of EGovernment”, Government Information Quarterly, Vol. 23, pp<br />
169-190.<br />
Jaeger, P.T. (2006b) “Telecommunications Policy and Individuals with Disabilities: Issues of Accessibility and Social<br />
Inclusion in the Policy and Research Agenda”, Telecommunications Policy, Vol. 30, No. 2, pp 112-124.<br />
Jaeger, P.T. (2008) “User-centered Policy Evaluations of Section 508 of the Rehabilitation Act: Evaluating<br />
EGovernment Websites for Accessibility for Persons with Disabilities”, Journal of Disability Policy Studies, Vol. 1,<br />
No. 19, pp 24-33.<br />
Jaeger, P.T. and Matteson, M. (2009) “EGovernment and Technology Acceptance: The Case of the Implementation of<br />
Section 508 Guidelines for Websites”, Electronic Journal of eGovernment, Vol. 7, No. 1, pp 87-98.<br />
Jassen, D., Rotthier, S. and Snijkers, K. (2004) “If You Measure It They Will Score: An Assessment of International<br />
EGovernment Benchmarking”, Information Polity, Vol. 9, No. 3-4, pp 121-130.<br />
Loiacono, E.T., Watson, R.T., and Goodhue, D.L. (2002) “WebQual: A Measure of Website Quality”, 2002 Marketing<br />
Educators’ <strong>Conference</strong>: Marketing Theory and Applications, Chicago, American.<br />
Millard, J. (2008) “EGovernment Measurement for Policy Makers”, <strong>European</strong> Journal of ePractice, Vol. 4, pp 1-14.<br />
OECD. (2005) “Proposed Outline for Accessing EGovernment Benefits”, [online] OECD publishing,<br />
http://webdomino1.oecd.org/COMNET/PUM/egovproweb.nsf/viewHtml/index/$FILE/GOV.PGC.EGOV.2006.1.d<br />
oc.<br />
The Australian Human Rights Commission. (2009) “A Brief Guide to the Disability Discrimination Act”, [online],<br />
http://www.hreoc.gov.au/disability_rights/dda_guide/dda_guide.htm.<br />
The Cabinet Office. (2007) “Guidelines for UK Government Websites”, [online],<br />
http://archive.cabinetoffice.gov.uk/eGovernment/docs/localgov/pdf/localgov.pdf.<br />
The United Nations /ASPA. (2001) “Benchmarking EGovernment: A Global Perspective”, [online],<br />
http://unpan1.un.org/intradoc/groups/public/documents/un/unpan021547.pdf.<br />
The United Nations. (2003) World Public Sector Report 2003: EGovernment at the Crossroads, United Nations, New<br />
York.<br />
The United Nations. (2008) United Nations EGovernment Survey 2008: From EGovernment to Connected<br />
Governance, United Nations, New York.<br />
The Web Accessibility Initiative. (2008) “Web Content Accessibility Guidelines (WCAG) 2.0. “, [online],<br />
http://www.w3.org/TR/WCAG20/.<br />
Verdegem, P. and Verleye, G. (2009) “User-centered eGovernment in Practice: A Comprehensive Model for Measuring<br />
User Satisfaction”, Government Information Quarterly, Vol. 26, No. 3, pp 487-497.<br />
Wang, Y.S. and Liao, Y.W. (2008) “Assessing EGovernment Systems Success: A Validation of the DeLone and<br />
McLean Model of Information Systems Success”, Government Information Quarterly, Vol. 25, No. 4, pp 717-733.<br />
Wassenaar, A. (2000) “EGovernment Value Chain Models: EGovernment from a Business (modeling) Perspective”, In<br />
Tjoa, A.M., Wagner, R.R. and Al-Zobaidie, A. (Eds.), Proceedings of the 11th International Workshop on<br />
Database and Expert Systems Applications, pp 289-293, IEEE Computer Society, Washington.<br />
Wauters, P. (2006) “Benchmarking EGovernment Policy Within the e-Europe Programme”, Asilib Proceeding, Vol. 58,<br />
No. 5, pp 389-403.<br />
Welch, E.W., Hinnant, C.C. and Moon, M.J. (2005) “Linking Citizen Satisfaction with EGovernment and Trust in<br />
Government”, Journal of Public Administration Research and Theory, Vol. 15, No. 3, pp 371-391.<br />
Wolfinbarger, M.F. and Gilly, M.C. (2003) “eTailQ: Dimensionalizing, Measuring, and Predicting eTail quality”, Journal<br />
of Retailing, Vol. 79, No. 3, pp 183-198.<br />
Zeithaml, V.A., Parasuraman, A. and Malhotra, A. (2002) “Service Quality Delivery through Websites: A Critical Review<br />
of Extant Knowledge”, Academy of Marketing Science Journal, Vol. 30, No. 4, pp 362-375.<br />
167
Predictive Analytics in the Public Sector: Using Data Mining<br />
to Assist Better Target Selection for Audit<br />
Duncan Cleary<br />
Revenue Irish Tax and Customs, Ireland<br />
dcleary@revenenue.ie<br />
Abstract: Revenue, the Irish Tax and Customs Authority, has been developing the use of data mining techniques as<br />
part of a process of putting analytics at the core of its business processes. Recent data mining projects, which have<br />
been piloted successfully, have developed predictive models to assist in the better targeting of taxpayers for possible<br />
non-compliance/ tax evasion, and liquidation. The models aim, for example, to predict the likelihood of a case<br />
yielding in the event of an intervention, such as an audit. Evaluation cases have been worked in the field and the hit<br />
rate was approximately 75%. In addition, all audits completed by Revenue in the year after the models had been<br />
created were assessed using the model probability to yield score, and a significant correlation exists between the<br />
expected and actual outcome of the audits. The models are now being developed further, and are in full production in<br />
2011. Critical factors for model success include rigorous statistical analyses, good data quality, software, teamwork,<br />
timing, resources and consistent case profiling/ treatments. The models are developed using SAS Enterprise Miner<br />
and SAS Enterprise Guide. This work is a good example of the applicability of tools developed for one purpose (e.g.<br />
Credit Scoring for Banking and Insurance) having multiple other potential applications. This paper shows how the<br />
application of advanced analytics can add value to the work of Tax and Customs authorities, by leveraging existing<br />
data in a robust and flexible way to reduce costs by better targeting cases for interventions. Analytics can thus<br />
greatly support the business to make better-informed decisions.<br />
Keywords: tax; predictive analytics; data mining; public sector; Ireland<br />
1. Introduction: Revenue and Ireland<br />
The Irish Revenue Commissioners were established by statute in 1923. Their mission is to serve the<br />
community by fairly and efficiently collecting taxes and duties and implementing Customs controls. In<br />
broad terms Revenue’s work includes:<br />
Assessing, collecting and managing taxes and duties that account for over 93% of Exchequer<br />
revenue;<br />
Administering the Customs regime for the control of imports and exports and collection of duties and<br />
levies on behalf of the EU;<br />
Working in co-operation with other state agencies in the fight against drugs and in other cross<br />
departmental initiatives;<br />
Carrying out agency work for other departments;<br />
Collection of PRSI (Pay Related Social Insurance) for the Department of Social Protection;<br />
Provision of policy advice on taxation issues.<br />
Net total receipts in 2009 were EUR 33bn. In 2010 receipts were ~ EUR 31.5bn.<br />
Increasingly, Revenue is applying advanced analytics in its business processes. One of these initiatives<br />
is applying predictive analytical techniques to assist in better case selection for audit. This paper<br />
describes this approach as applied recently by Revenue.<br />
2. Revenue’s research and analytics branch<br />
Revenue's Research and Analytics Branch conducts program-wide and macro-level research at a<br />
corporate level. The branch conducts analyses to transform data into information often using SAS<br />
analytical software. The branch’s work in Revenue includes large sample surveys, data mining<br />
(population profiling/ customer segmentation, pattern recognition, forecasting, predictive modelling) data<br />
quality exercises, experimental design for evidence based decision support, economic research and risk<br />
analysis. The branch uses both Revenue data and data from other sources. This work enables Revenue<br />
to make better use of its data and provides an improved understanding of the taxpayer population. The<br />
results are used to better target services to customers and to improve compliance.<br />
This paper focuses on a number of recent uses of predictive analytics in Revenue.<br />
168
2.1 Business context<br />
Duncan Cleary<br />
Revenue has a dual focus on its taxpayers. The first is on customer service, and the second is on<br />
compliance. RAB have conducted a number of exercises using analytics with a customer service focus<br />
(Refs). This paper will focus the use of analytics from a compliance perspective, with the following<br />
targets:<br />
Likelihood to yield if audited<br />
Likely amount of yield if audited<br />
Likelihood to liquidate (business failure)<br />
The aim of using analytics in Revenue is to show how analytics can assist the development of effective<br />
business strategies for Revenue, therefore optimising the use of Revenue resources. Analytics can<br />
demonstrably reduce costs, increase yields, and improve Revenue’s service to taxpayers.<br />
3. Why use predictive analytics for target selection?<br />
Increasingly analytics are being used in companies and entities that are seeking means of making<br />
smarter decisions and getting better results by utilising their data assets, advances in computational<br />
power and software and a new emerging class of analysts who can extract the knowledge from the vast<br />
amounts of data and information currently available. Thought leaders in this area are offering sound<br />
guidance to those who wish to improve how they go about their business and achieve their goals.<br />
Revenue is pursuing the use of analytics as it recognises the value that can be gained by such an<br />
approach. The reader is referred to a number of recent publications for a more detailed exposition of why<br />
using analytics is making increasing sense in both private and public sector (Davenport & Harris, 2007;<br />
Davis et. al, 2006; Miller et. al, 2006; Davenport & Harris, 2010).<br />
3.1 Data and variables: Data integration<br />
The primary source of data for the predictive models is Revenue’s sophisticated risk analysis programme,<br />
REAP (Risk Evaluation Analysis and Profiling), which electronically screens taxpayers’ data covering<br />
several years. It uses ~300 business rules to quantify risk for approx. 800,000 taxpayer entities, and a<br />
risk run is created at least three times annually. Predictive analytics can be used to extend from the<br />
quantification of risk in a case, to predicting, for example, likelihood of yield, if a case were to be audited,<br />
and the potential amount of yield, or likelihood to liquidate. The inputs for predictive models were<br />
therefore the outputs from the REAP system.<br />
As with any Data Mining exercise, there is considerable effort required at the data integration stage,<br />
before modelling proper can begin. A process of ETL (Extraction, Transfer and Load) must be conducted,<br />
and RAB use SAS DI Studio (DI = Data Integration). The purpose of using this DI tool is to establish a<br />
process that would be scalable and semi automatic. Data from the REAP system and other sources in<br />
Revenue’s Data Warehouse Environment are sourced and processed. Inherent in any data mining<br />
exercise is a review of data quality, which is not a trivial matter, and needs care and attention. The REAP<br />
system data is an opportunistic source of data, i.e. it is not designed specifically for predictive analytics.<br />
However, it is good quality in its format and completeness, which offers a solid platform for analysis. It is<br />
also readily available. Extensive work was required to understand the business context, the logic of the<br />
rules in REAP, and the underlying data that leads to those rules firing. A number of summarisations of the<br />
REAP system are produced for use in modelling, these included a table with the frequency of the rules<br />
fired in each case, and a binary indicator for rules firing/ not firing. In instances where data entailed many<br />
rows per entity, transpositions were performed, to create a flat file with one row per entity. Variables from<br />
the REAP system that summarise certain classes of rules, such as monetary risk and behaviour, are also<br />
assessed and incorporated for analysis. A target variable must be created for the training data (e.g.<br />
cases that had been audited in the previous two years). The target can be set as a binary target, e.g.<br />
where any yield over EUR 2,500= ‘1’, and yield < EUR 2500 = ‘0’. The reason why the target should be<br />
set at EUR 2,500 is to avoid modelling for cases where the yield will be below the cost of a typical audit. If<br />
the target is the monetary amount of yield, this can be the second stage of a two stage model with the<br />
binary yield/ no yield as the first stage. In the case of liquidations, a database of known liquidations is<br />
used to train the model, using the profiles of the cases in REAP before the case liquidated. Additional<br />
data can include variables such as geography and economic sector.<br />
This data integration process results in an ABT (Analytics Base Table) of one row per taxpayer with all of<br />
the attributes of interest as variables included for each taxpayer. These ABTs form the core inputs into<br />
169
Duncan Cleary<br />
the models. There will be a sub set where the target variable is populated (i.e. the data to be used to<br />
create the model). The bulk of the ABT will describe the population, which will be scored once the model<br />
is constructed. It should be noted that a lengthy exploratory analysis phase at univariate, bivariate and<br />
multivariate levels should be factored in and conducted with the raw input data and the final ABT. These<br />
univariate and bivariate analyses are performed by RAB in SAS Enterprise Guide (Ver. 4.3). Many<br />
variables are transformed to allow for better modelling, for example, to improve normality assumptions for<br />
continuous variables, or to optimally bin variables to better predict the target variable. ‘Unsupervised’<br />
techniques (i.e. analyses without a target) are also conducted on the data, to further understand the data<br />
before predictive models are attempted. These unsupervised techniques can typically include cluster<br />
analysis and association analysis. If time allows, a full segmentation of the ABT can prove fruitful prior to<br />
modelling.<br />
4. Data mining methodology<br />
A predictive model by its nature has a target or interest. It can therefore be described as a ‘Supervised’<br />
technique. Cases that have been audited (and been concluded), or cases that have gone into liquidation<br />
in the past can be used to train models. A predictive model produces a probability score for current and<br />
future cases of the likelihood of some outcome of interest occurring. This score can be deployed and<br />
used for decision support, e.g. case selection for audit. If the target is binary, both positive and negative<br />
outcomes need to be available to create a model to score unknown cases. If the target is numeric, e.g.<br />
monetary, a good range of values can be helpful.<br />
RAB use SAS Enterprise Miner as their tool of choice for producing predictive models. Essentially the<br />
modelling process can be summarised as SEMMA: Sample, Explore, Modify, Model, & Assess. This<br />
process has been developed by SAS and it forms a solid framework for analysis. Scoring the full<br />
population completes the process. As cases are worked/ events happen, these can be used to improve<br />
the model. It is a very iterative process, with backwards and forwards movement within the SEMMA<br />
steps. Figure 1 illustrates a typical process flow.<br />
Figure 1: Screen grab of SAS E Miner project, showing a SEMMA process flow<br />
4.1 Sample<br />
The ABT having been created, this essentially reflects a snapshot of the population of interest. Revenue<br />
is in the relatively luxurious position of not needing to worry about sampling as others may have to, who<br />
do not have access to full population data. However, training cases, or cases with a known outcome of<br />
interest, e.g. audit result, are often a biased sample. There are a number of ways of addressing this bias.<br />
170
Duncan Cleary<br />
One is to utilise a method known as ‘Reject Inference’. This is a common method used in Banking and<br />
Insurance, wherein cases that have been accepted, for example for a loan, form a biased sample for<br />
modelling. Reject Inference assigns an imputed outcome to cases (based on their profile) that never had<br />
a loan, so that they can be used in further modelling. This method has been used successfully by<br />
Revenue in instances where audit cases, which form an analogous biased training dataset, can be<br />
augmented by cases as yet not audited.<br />
Another means of addressing bias is to conduct random sample exercises, and record the outcome of<br />
interest for the random cases. This has two advantages. Firstly, it gives an approximation of the true<br />
proportions of, for example, a binary target’s two levels in the population, which may be very different to<br />
the proportions in biased training data. These proportions can be used to adjust any model using biased<br />
training data by telling SAS E. Miner in the Decisions Processing function the approximation for the true<br />
population proportions. Secondly, a random sample may surface factors that lead to an outcome of<br />
interest, that are not typically used in case selection, thus giving a better picture of the overall population,<br />
for example the full range of taxpayer risk types. Revenue has therefore used data from its Random Audit<br />
program as inputs to training predictive models.<br />
Over-sampling can be used when modelling rare events, such as liquidations. This is a process whereby<br />
when the target is binary (0,1), for example, a 100% representation of the ‘1’s is included in the sample,<br />
and a complimentary random sample of ‘0’s is selected from the population, often as a similar proportion.<br />
Thus one may have 50:50 proportioned ‘1’s and ‘0’s in the training data, even though the proportion of<br />
‘1’s in the population is very low, e.g. less than 1%. The purpose of this exercise is to avoid creating a<br />
model that is very accurate, but that classifies every case as a ‘0’.<br />
Data partition also occurs at the sampling stage. This is where the training data is divided randomly into<br />
two or three groups. These groups are used for different aspects of the modelling process. In SAS they<br />
are labelled ‘Training’, ‘Validation’, and ‘Test’. The proportions of cases in each category can vary<br />
according to the modeller’s preferences and the data available. A model will be created using the training<br />
data, often judged by the validation data, and finally verified by the test data (which is not used in model<br />
creation). One must maximise the data available for modelling, while allowing enough data for validation.<br />
Typically proportions such as 60:20:20, 70:30:0 and 40:30:30 are used, depending on the model method<br />
used and the amount of training data available.<br />
4.2 Explore<br />
A thorough statistical exploratory analysis must take place next, before modelling. Univariate, bivariate<br />
and in some instances multivariate (perhaps ‘unsupervised’) analyses should be conducted. This can<br />
surface any data quality issues, data distribution and content should be assessed, outliers identified etc.<br />
The findings from this analysis may demand that the ABT be reconfigured, or that the raw data is<br />
augmented, or that new derived variables be created. This process then leads to the next stage of data<br />
modification.<br />
4.3 Modify<br />
Nearly always in predictive modelling, it is wise to perform some transformations of the data. Typically<br />
this involves log (or other) transformations of highly skewed numeric variables, imputation of values<br />
where they are missing in the data, binning of categorical variables to remove rare levels, ranking of<br />
numeric data and creating a monotonic relationship between independent variables and the target<br />
variable. This last method is typically achieved by RAB using SAS Credit Scoring ‘Interactive Grouping’<br />
node, which allows manual adjustment of the bins in each variable to maintain their usefulness at<br />
predicting the target, but to also ensure that they do so in a logical way.<br />
4.4 Model<br />
Once the process flow has been developed to a sufficient point, modelling can begin.<br />
Several model methods are available in SAS E. Miner. Typically, a regression (for binary targets use<br />
logistic regression), a decision tree, and a neural network are chosen to prepare models. Various<br />
parameters can be set to suit the model requirements (see Sarma, 2007). For example, with logistic<br />
regression, a logit stepwise regression can be specified. The ranges of the options that are available in<br />
SAS E. Miner are beyond the scope of this paper, and the reader is referred to www.sas.com for details.<br />
171
Duncan Cleary<br />
Often, once models are produced, there is an iterative process involving returning to earlier steps in the<br />
model process flow. Issues heretofore unseen can be highlighted in the model results, and the modeller<br />
needs to adjust for problems like over-fitting. Typically many parameter changes will be made to<br />
maximise the predictive performance of the models, by for example making changes that increase the lift<br />
provided by the models, and by getting similar results for both training and validation data (i.e. making the<br />
model more robust). It should be noted however, that tweaking model parameters rarely exceeds the<br />
addition of new variables as a means of improving model performance.<br />
Figure 2: Results screen from a neural network<br />
The outputs from each model are examined and then their comparative performance is assessed.<br />
Outputs from a neural network (Figure 2) and a decision tree (Figure 3) are shown as examples here.<br />
Figure 3: Results screen from a decision tree<br />
172
4.5 Assessment<br />
Duncan Cleary<br />
Assessing models can be done in a number of ways. Three main methods are:<br />
Within model process-flow assessment<br />
Sample tests of cases ranked by a model<br />
Back validation of model with subsequent events.<br />
This section covers the first of these three; the next two are covered under the Results section below.<br />
SAS E Miner offers an assessment node. There are many criteria for assessing the performance of a<br />
model. As an example, here a logistic regression with a binary target will be used. Criteria such as<br />
misclassification or average square error can be used, but often the most effective measure of the<br />
success of a model is the ROC curve (Receiver Operating Characteristic). A ROC curve shows the<br />
values of the true positive fraction and the false positive fraction at different cut-off values (Sarma, 2007).<br />
The cut-off values can be set to maximise the number of true positives in a set of cases. A set of ROC<br />
charts can be produced, that compares Training, Validation and Test data (see Figure 4), for all of the<br />
models fed into the assessment node. Essentially, the model that looks most similar across the three<br />
modelling data sets, and also has the maximum distance between the curve and the diagonal line (which<br />
represents no predictive power, i.e. an equivalent to flipping a coin), is usually the best model to use for<br />
scoring the full population/ new cases.<br />
Figure 4: Results screen from a model comparison node<br />
5. Results and evaluation<br />
A number of successful models have been produced by RAB. Following within modelling process<br />
validation, these have also been field tested and back validated with success.<br />
Each model has been used to score the population of relevance. These scores have been assessed,<br />
binned into deciles and demi-deciles, and have been used to rank the case base in descending order of<br />
likelihood. Cut-offs have been set based on criteria such as misclassification rate and the amount of<br />
cases that can be worked based on resources available.<br />
For this paper the example results to be shown are for the Yield model, i.e. the Likelihood to yield if<br />
audited model.<br />
6. Yield prediction model<br />
A successful pilot exercise testing a predictive model focused on yield was conducted in 2009/2010. The<br />
pilot exercise resulted in a 3:1 hit rate for the cases provided for working. Both case specific reviews and<br />
‘Back Validation’ against all closed audits suggested that the approach was robust. Following on from<br />
173
Duncan Cleary<br />
this, a new predictive model was created using similar Data Mining techniques (the pilot used Credit<br />
Scoring, the subsequent model used a Neural Network model). The model uses data from the most<br />
recent REAP Risk run available as inputs, and was trained with closed audits from prior years, as before.<br />
As noted above, the purpose of the model is to identify cases, which have a similar profile to known<br />
yielding audits, and to rank the likelihood of yield in the event of an audit of those cases. The full case<br />
base receives a probability score, and for the purposes of this model a cut-off of 80% probability to yield<br />
has been set. This cut-off, which in effect creates a binary Yes/No indicator for each case, has been<br />
provided to auditors for case selection, through the REAP system. As such, each case selector and<br />
worker can access some of the power of this predictive analytics model. Approximately 40,000 cases (5%<br />
of case base) fired the rule. As with any model, feedback is critical for evaluation and model<br />
improvement.<br />
3500<br />
3000<br />
2500<br />
2000<br />
1500<br />
1000<br />
500<br />
0<br />
0.95 - 1.00<br />
0.85 - 0.90<br />
0.75 - 0.80<br />
0.65 - 0.70<br />
0.55 - 0.60<br />
0.45 - 0.50<br />
0.35 - 0.40<br />
0.25 - 0.30<br />
0.15 - 0.20<br />
0.05 - 0.10<br />
NonEvents<br />
Events<br />
Figure 5: Training cases, with yielding and non-yielding, by model probability score. X axis: Probability to<br />
yield left to right, high to low, Y axis: Training cases, frequency, events= yielding cases, non<br />
events = non yielding<br />
At the 0.8 (80%) cut-off and above shown by the red line (i.e. to the left) in Figure 5, the majority of cases<br />
were yielding in training data. Thus the focus was placed on cases scoring similarly to these cases in the<br />
full risk run population.<br />
An evaluation of the Predictive model using the latest REAP run was conducted in mid January 2011.<br />
The method used was ‘Back Validation’ of the 2010 yield prediction model, with closed audits (i.e. known<br />
results) from 2010. These audits were not used in the training of the model; hence the model can be<br />
assessed on the basis of how well it predicted events unknown to it at the time of its creation. The results<br />
were very positive, showing a strong relationship between predicted likelihood to yield and actual average<br />
yield. Each point on the graph below represents approximately 475 cases (total of 9500 cases<br />
represented in Figure 6). There is a strong positive correlation between realised yield and predicted audit<br />
outcome, i.e. as the probability to yield increases so too does the average (median) yield. This suggests<br />
that the model is robust and a good case selection tool. Cases from the uppermost probability deciles<br />
have yield on average twice that of cases from the lowermost deciles (Figure 7).<br />
7. Conclusions<br />
The Yield model has since been rerun (late 2010 REAP run), with modifications based on feedback, and<br />
incorporated in the nationally disseminated current REAP run in the form of an indicator rule for cases<br />
where there is a high probability to yield. In effect, the model output is available to case selectors. This<br />
qualifies the model as being in production. As cases are selected using this rule, results will be assessed<br />
and incorporated into future models. In addition, a liquidation probability model has also been made<br />
available by similar means, having been validated with events since model creation.<br />
174
Duncan Cleary<br />
Figure 6: Correlation between modelled likelihood to yield and actual audit yield, probability demi-deciles<br />
and median yield per decile<br />
Figure 7: Median yield per decile of model probability to yield<br />
RAB is developing more models for the business (e.g. quantity of monetary yield, specific economic<br />
sectors, regional models etc.). RAB continues to evaluate models through field-testing, in co-operation<br />
with Revenue regions. RAB thus hopes to extract more value from the data and information Revenue<br />
already has, and is increasingly making analytics more central to how Revenue performs its work.<br />
References<br />
Davenport, T.H. & Harris, J. 2007. Competing on Analytics: The New Science of Winning. Harvard Business School<br />
Press.<br />
Davenport, T.H. & Harris, J. 2010. Analytics at Work: Smarter Decisions, Better Results. Harvard Business Press.<br />
175
Duncan Cleary<br />
Davis, J., Miller, G.J. & Russell, A., 2006. Information Revolution: Using the Information Revolution Model to Grow<br />
Your Business. Wiley.<br />
Miller, G.J, Bräutigan, D. & Gerlach, S.V. 2006. Business Intelligence Competency Centres: A Team Approach to<br />
Maximising Competitive Advantage. Wiley.<br />
Sarma, Kattamuri S. 2007. Predictive Modelling with SAS Enterprise Miner: Practical Solutions for Business<br />
Applications. Cary, NC: SAS Institute Inc.<br />
SAS E. Miner reference (accessed March 2011):<br />
http://www.sas.com/technologies/analytics/datamining/miner/index.html<br />
176
Citizen Participation in Urban Planning: Looking for the “E”<br />
Dimension in the EU National Systems and Policies<br />
Grazia Concilio 1 and Francesco Molinari 2<br />
1 DiAP-Politecnico di Milano, Italy<br />
2 PARTERRE Project, Italy<br />
grazia.concilio@polimi.it<br />
mail@francescomolinari.it<br />
Abstract: This paper maps the EU27 national urban planning systems according to the provisions for citizens<br />
involvement at various stages of the decision making process. It also analyzes the scope and potential for ICT<br />
implementation in support to public participation as framed within the existing EU and Member State legislative and<br />
regulatory framework. To this end, it briefly overviews a variety of recently established methods and tools in a<br />
number of <strong>European</strong> countries. The common traits and the current gaps of a prospective <strong>European</strong> Union-wide (EU),<br />
Electronic (E), participatory governance model in the domain of spatial planning are introduced and assessed.<br />
Keywords: eParticipation, spatial planning, territorial development, strategic environmental assessment,<br />
participatory governance<br />
1. Background<br />
Empowering citizens and businesses through ICT (Information and Communication Technologies) for an<br />
increased access to public information and stronger involvement in the policy process is one of the four<br />
political priorities of the Malmö Declaration on eGovernment [2009] and the resulting Action Plan<br />
[<strong>European</strong> Commission, 2010b]. The latter borrows from the Digital Agenda for Europe [<strong>European</strong><br />
Commission, 2010] in underlying the capacity of people to have their voice heard and make decisive<br />
suggestions for policy actions as connatural to a new, extended concept of “digital citizenship” in modern<br />
Knowledge and Information Society.<br />
Traditionally, the spatial planning domain has been one of the earliest where the concept itself of public<br />
participation – and its opposites, see [Arnstein, 1969] – was rooted. Thus, it would be (and partly is) quite<br />
normal to find fertile ground here for ICT supported participation (eParticipation) as well. Yet the<br />
<strong>European</strong> scenario, not to speak of the international one [Yeh et al., 2010], is far more complex, and<br />
available evidence less clear-cut. Not only do we record a plethora of one-off experiments, some of which<br />
quite innovative under a purely technical viewpoint (as it is the case, by the way, for the whole electronic<br />
participatory governance model), but mostly unrelated to the underlying normative process and possibly<br />
unaware of each other’s achievements. Also, the majority of these experiences does not seem to grasp<br />
the full potential of ICT for improved transparency and better community engagement in any particular<br />
way.<br />
Does this have to do with the distribution of planning competences across public sector authorities in the<br />
various Member States? As it is well known [Nadin and Stead, 2008], spatial planning remains one of the<br />
very few policy domains in Europe where “diversity” and “self-government” are still more pronounced with<br />
respect to the usual strive for “harmonisation” and “coordination” deriving from the political centre – i.e.<br />
the Union’s institutions. However, there are some good examples of substantial improvement, even in<br />
that very respect: just think of the EU Territorial Agenda [Expert Document, 2003; COPTA, 2008] and the<br />
revised Cohesion Policy [<strong>European</strong> Commission, 2008], or the adoption of the Aarhus [2003/35/EC] and<br />
of the SEA - Strategic Environmental Assessment - [2001/42/EC] Directives, both of which have had<br />
substantial impact on enforcing, enlarging and systematising the available spaces for stakeholder<br />
integration into the design and implementation phases of key plans, programmes and projects for any<br />
urban and rural community in Europe.<br />
This paper aims to shed light on the current situation of participatory planning (whether technology<br />
assisted or not) in the EU27 Member States, assuming a particular, normative perspective: the one of<br />
identifying, and possibly nurturing, the possibility of introducing ICT solutions and tools as a stable<br />
component, not an optional alternative, of the policy making process. This is what has been called<br />
elsewhere [Molinari, 2010] a “sustainable approach” to eParticipation.<br />
The structure of the paper is as follows: Section 2 examines the provisions for public participation<br />
deriving from the Community initiative in the domains of SEA (Strategic Environmental Assessment) and<br />
177
Grazia Concilio and Francesco Molinari<br />
ESDP (<strong>European</strong> Spatial Development Perspective), as well as their historical antecedents. It also maps<br />
the situation at EU27 Member State level as far as the transposition of the ESDP and the participatory<br />
urban planning legislation and practice are concerned. Section 3 discusses the results and Section 4<br />
draws some conclusions and recommendations for future work.<br />
2. <strong>European</strong> state of the art<br />
In 1983, the Council of Europe’s <strong>Conference</strong> of Ministers responsible for Regional Planning (CEMAT)<br />
adopted the <strong>European</strong> Regional Spatial Planning Charter (so-called “Torremolinos Charter”). The Charter<br />
[http://www.coe.int/t/dg4/cultureheritage/heritage/cemat/versioncharte/Charte_bil.pdf] defined the scope<br />
of spatial planning and identified its key objectives and activities, including:<br />
Coordination between different policy sectors,<br />
Coordination and cooperation between the various levels of decision-making, and<br />
The promotion of public participation.<br />
A “participation principle” was stated as follows: “Any regional/spatial planning policy, at whatever level,<br />
must be based on active citizen participation. It is essential that the citizen be informed clearly and in a<br />
comprehensive way at all stages of the planning process and in the framework of institutional structures<br />
and procedures”. Clearly, there was a gap between this broad statement of principle (the promotion of<br />
“active” participation) and the resulting enforcement of citizen’s right to “clear and comprehensive”<br />
information, which is only preliminary to effective involvement in decision making.<br />
Later in 1992, the Agenda 21 Action Plan, adopted by 178 Governments at the United Nations<br />
<strong>Conference</strong> on Environment and Development (UNCED), devoted a whole chapter (#10) to the public’s<br />
participation in the planning and management of land resources. Here the “participation principle” was<br />
reformulated as per the following paragraphs:<br />
5.(d) “Create mechanisms to facilitate the active involvement and participation of all<br />
concerned, particularly communities and people at the local level, in decision-making on<br />
land use and management, by not later than 1996”.<br />
11.(c) “Provide the appropriate technical information necessary for informed decision-making<br />
on land use and management in an accessible form to all sectors of the population,<br />
especially to local communities and women”.<br />
10. “Governments … should establish innovative procedures, programmes, projects and<br />
services that facilitate and encourage the active participation of those affected in the<br />
decision-making and implementation process, especially of groups that have, hitherto, often<br />
been excluded, such as women, youth, indigenous people and their communities and other<br />
local communities”.<br />
Basically the first two paragraphs are simply rephrasing the Torremolinos Charter, so the third one<br />
represent the most important advance – although it shares with the former statements a generic<br />
reference to the nature of these “innovative procedures, programmes, projects and services” that are<br />
required to “facilitate and encourage” participation.<br />
In fact, a wide number of participatory approaches have been implemented to define the specific contents<br />
of Agenda 21 at local level worldwide. In retrospect, the role of ICT has been supportive, but apparently<br />
not decisive in making the difference with more “traditional” community involvement and evaluation<br />
processes [Lombardi et al. 2010].<br />
Another <strong>European</strong>-level instrument to coordinate spatial planning and public participation in policymaking<br />
is the Strategic Environmental Assessment (SEA), which was introduced by the Directive<br />
2001/42/EC of 27 June 2001 – hereinafter the 'SEA Directive'. The SEA is a “systematic process for<br />
evaluating the environmental consequences of proposed policy, plan or programme initiatives, in order to<br />
ensure they are fully included and appropriately addressed at the earliest appropriate stage of decisionmaking,<br />
on par with economic and social considerations” [Sadler and Verheem 1996]. In particular,<br />
Article 6 requires the introduction of public consultations of the citizens and environmental authorities,<br />
which reflect (and in some cases overlap to) the publicity and participation provisions of spatial planning<br />
regulations at Member State level.<br />
178
Grazia Concilio and Francesco Molinari<br />
By 2009, all EU27 Member States had transposed the SEA Directive. Recently, the Environment<br />
Directorate-General of the <strong>European</strong> Commission undertook a study to check the conformity of this<br />
transposition [http://ec.europa.eu/environment/eia/pdf/study0309.pdf], reaching the following results:<br />
A majority of Member States highlighted the contribution of the SEA Directive to an improved<br />
organisation and structure of the whole planning procedure;<br />
In terms of duration of the public consultation, only a few Member States have set fixed time frames.<br />
Most allow for consultations of at least one month, while others decide on a case-by-case basis.<br />
Generally speaking, the requirement of consulting with other competent authorities and the public<br />
have led to increased transparency in the planning and programming procedures;<br />
Experience also shows that public consultation, especially when organised at an early stage of<br />
planning and when understood as a process, contributes to a higher acceptance of the new plan or<br />
programme, and therefore to an early identification and resolution of conflicts.<br />
Since the SEA Directive does not provide detailed specifications about the procedures for public<br />
consultation, a wide range of methods are actually used: public announcements, publication in official<br />
journals or the press, public meetings, internet surveys and questionnaires. To a certain extent, the<br />
transposition process of Directive 2003/35/EC, providing for public participation in respect of the<br />
preparation, modification and review of plans and programmes relating to the environment – hereinafter<br />
the ‘Aarhus Directive' – has contributed to defining the above scenario in the following manner:<br />
Article 2 of the Directive had the effect of firmly establishing the right of the public to participate in the<br />
decision making process on plans and programmes uniformly in the environmental legislation of<br />
Member States, following the provisions of Article 7 of the Aarhus Convention signed on 25 th June<br />
1998;<br />
In particular, the new principle has been introduced that the public must be informed, “whether by<br />
public notices or other appropriate means such as electronic media where available”, about any<br />
proposals for such new plan or programme, “including inter alia information about the right to<br />
participate in decision-making and about the competent authority to which comments or questions<br />
may be submitted”.<br />
By 2009, all Member States had transposed the Aarhus Directive except Ireland. Article 2, however, has<br />
been transposed into all the national legal systems.<br />
In April 2010, the <strong>European</strong> Commission issued another report [COM(2010)143 final] to check the degree<br />
of conformity of the Aarhus Directive transposition and particularly of Article 2, with the following results:<br />
Some Member States, notably France, the Czech Republic and Belgium, have transposed, at least in<br />
part, Article 2 jointly with the adoption of the acts transposing the SEA Directive.<br />
Numerous Member States pointed out that, thanks to the new rules regarding public participation, the<br />
standard of information acquired by the public on environmental issues, including those linked to<br />
plans and programmes, had been raised significantly.<br />
This has kindled the public's interest in environmental issues, as well as the sensitivity of officials<br />
responsible for drafting plans and programmes, and of the political authorities responsible for<br />
adopting them with respect to the need to seek the public's opinion before approving them.<br />
“Greater effort might, however, prove necessary on the part of local authorities”, the report<br />
concludes.<br />
The <strong>European</strong> Spatial Development Perspective (ESDP) was approved in Potsdam by the Informal<br />
Council of EU Ministers of Spatial Planning in May 1999. It is a (legally non-binding) policy framework<br />
presenting action items for all tiers of administration with a planning responsibility. Its strategic aim is to<br />
achieve a balanced and sustainable spatial development across the EU, via a “<strong>European</strong>isation of state,<br />
regional, and urban planning”.<br />
Increased public participation is seen as an integral part of a well co-ordinated spatial development policy<br />
across the various administrative levels of a single Member State, among the different Member States by<br />
transnational cooperation, and within the EC Directorates involved. At national level, it is proposed that<br />
the Member States should take more account of the <strong>European</strong> dimension of spatial planning in their<br />
national policies and inform the public about <strong>European</strong> cooperation on spatial development. Moreover,<br />
cooperation and collaboration should involve, with a more prominent role than in the past, the lower tiers<br />
179
Grazia Concilio and Francesco Molinari<br />
of public administration (such as cities and regions) and the private sector as part of an extended<br />
governance system, in accordance with the principle of subsidiarity:<br />
(par. 7) “<strong>European</strong> integration could benefit spatial development by encouraging the<br />
participation of cities and regions”.<br />
(par. 21) “The ESDP conveys a vision of the future territory of the EU. In its aims and<br />
guidelines it provides a general source of reference for actions with a spatial impact, taken<br />
by public and private decision-makers. Beyond that, it should act as a positive signal for<br />
broad public participation in the political debate on decisions at <strong>European</strong> level and their<br />
impact on cities and regions in the EU”.<br />
(par. 100) “Many local problems cannot be solved nowadays without an integrated way of<br />
looking at towns and countryside, since they tend to be regional problems. Practical<br />
partnership expresses itself through co-operation and co-ordination. However, in order for<br />
co-operation to grow into a long-term successful partnership, several preconditions have to<br />
be created:<br />
The equality and independence of the partners;<br />
Voluntary participation in partnership;<br />
Consideration of different administrative conditions; and<br />
Common responsibility and common benefit”.<br />
(par. 164) “The successful development of a <strong>European</strong> … network depends on a spatially<br />
co-ordinated approach between different Community policies and on corresponding national<br />
measures. (…) The relationships between the elements of this network (…) must be<br />
identified and co-ordinated at a <strong>European</strong> level with the active participation of the local and<br />
regional levels”.<br />
(par. 186) “A number of Member States have institutionalised consultation processes on<br />
matters concerning spatial development. For development projects with a considerable<br />
spatial impact, some carry out territorial impact assessments. This is aimed at increasing the<br />
positive effects of investments on spatial development at an early stage through the<br />
participation of those affected”.<br />
(par. 316) “A well co-ordinated spatial development policy across the various administrative<br />
levels, including participation of the public, can assist…”<br />
In spite of all these references to public participation, no statement of principles is made (at least<br />
indirectly) and the ICT potential in support of electronic governance is not even mentioned.<br />
As there was no Community legal basis for ESDP, the policy debate on how to best ensure its<br />
implementation has continued over the years, leading to the formulation of a Territorial Agenda for the<br />
<strong>European</strong> Union, which was approved by the Informal Council of Ministers of Spatial Planning and<br />
Development in Leipzig in May 2007. The Agenda generically outlines the need for social dialogue and<br />
cooperation between stakeholders to reach the integration of the territorial dimension into national and<br />
EU policies, but once again, it falls short of highlighting the need for ICT take-up to ensure better<br />
participation.<br />
It is planned that the coming Hungarian EU Presidency will evaluate and review the Territorial Agenda in<br />
the first half of 2011. On that occasion, we would recommend:<br />
Generalising the “right to information” principle included in Article 2 of the Aarhus Directive (Directive<br />
2003/35/EC), so that electronic media become the “standard means of publicity” for any new plan or<br />
programme, including those concerning spatial development;<br />
Introducing the new principle that “electronic participation, where available” should integrate the<br />
technical means to involve citizens and stakeholders in thematic consultations and decision-making<br />
sessions.<br />
There is ample rationale for expanding these principles: everywhere, spatial planning decisions have<br />
such a wide and direct impact that the opportunities to participate in those decisions should be extended<br />
beyond the normal democratic process. Effective procedures for community involvement may enhance<br />
the legitimacy of policy- and decision-making by creating a sense of local ownership and ensuring<br />
appropriate consideration of citizens’ and property owners’ rights. A transparent decision-making process<br />
180
Grazia Concilio and Francesco Molinari<br />
implies that all citizens should made aware of the reasoning behind spatial planning decisions. ICT<br />
should be widely adopted to make sure that – without much pressure on financial and organisational<br />
costs for the competent authorities:<br />
Citizens get full access to information about development proposals, plans and policies,<br />
They are enabled to comment on proposals and if necessary, to make formal objections on draft<br />
plans<br />
They can easily communicate to the officers and political committees in charge for the process<br />
Those making proposals are enabled to appeal to a higher authority on negative or unfavourable<br />
decisions.<br />
2.1 National urban planning systems<br />
According to the EU Treaty, spatial planning is not the responsibility of the Community; this in spite of the<br />
paramount importance of the spatial planning aspects of EU and national policies, because:<br />
All political decisions are implemented in a given territory<br />
For the public opinion, the territory and its development are “vectors of coherence” for the Community<br />
policies.<br />
Land use planning is normally based on framework and regulatory instruments, the latter under the legal<br />
competence of the Municipality, while the former may belong to the State (in the relatively smaller<br />
countries), or to the Regional and/or Metropolitan tier of public administration (in the majority of EU27<br />
countries). Framework plans cover important parts of the national territory (if not the whole of it) and<br />
introduce general land use principles and infrastructure patterns through zoning criteria and land<br />
allocation maps. Regulatory plans provide detailed and site-specific indications like zonings for building,<br />
land use, and infrastructure.<br />
As the following picture shows, two main trends are characterising the EU27 Member State scenario:<br />
Devolution of planning power from the State to the “2 nd tier” (Regions and Counties or Districts),<br />
particularly as far as the framework instruments are concerned;<br />
Devolution of regulatory autonomy from the Regional/County/District level to the “1 st tier” (City and<br />
Municipality) level, in compliance with the framework instruments established.<br />
Figure 1: Devolution of spatial planning power – major trends<br />
181
Grazia Concilio and Francesco Molinari<br />
As a result of these trends, we can identify a first group of EU27 countries (such as Bulgaria, Cyprus,<br />
Czech Republic, Greece, Luxembourg, Malta, Portugal and Romania, the three areas depicted in light<br />
blue in the diagram), where the role of the central government is still predominant, and a second group of<br />
Member States, typically rather small in terms of population (such as Denmark, Estonia, Latvia,<br />
Lithuania, Slovakia and Slovenia), which have transitioned to a more uniform balance of power and<br />
competences.<br />
The remaining Member States can be clustered into three additional groups of almost the same<br />
numerical size:<br />
Countries where the devolution of power to local government is not associated with a strong role of<br />
the Regional level compared to the State – i.e. Finland, Hungary, Ireland, Sweden and the United<br />
Kingdom (depicted in pink colour);<br />
Countries where this devolution has progressed on par with the enhancement of the Regional<br />
government role in the planning system – i.e. France, Italy, and Netherlands (depicted in green);<br />
Countries where the devolution to Regions has not been associated with a stronger local autonomy –<br />
i.e. Austria, Belgium, Germany, Poland, and Spain (depicted in yellow).<br />
2.2 Participative planning practices<br />
Citizen engagement in planning decision-making is widely investigated in its current developments. Yet,<br />
academic research falls short of a comparative assessment of state of the art experiences and best<br />
practice at national level in Europe, particularly of identifying the government “tiers” holding the legal<br />
competence to act. Recently, the <strong>European</strong> Institute of Public Participation published a state of the art<br />
report [EIPP, 2009] referring to a wide range of policies, including the spatial planning domain, in three<br />
<strong>European</strong> countries (Germany, Italy and the UK). Among its conclusions is that “most public participation<br />
takes place at local and regional level” [EIPP, 2009: 40]. This is of no surprise, given the better proximity<br />
of this level to citizens and the significant devolution trends described in the previous section. At local<br />
level, many experiments of eParticipation in spatial planning have also been carried out [for a review see<br />
Kubicek, 2010] and others are being developed at present [see for example<br />
http://engagingcities.com/tagged/Project]. Support by electronic means looks promising to reduce the<br />
limits to participation [Innes and Boher, 2000; Coekoek et al., 2009; Brabham, 2009; EvansCowley and<br />
Hollander, 2010]. However, the use of ICT is often limited to rudimentary shifts of spatial planning<br />
settings into web-based environments, with reduced opportunities for process innovation. Most cases<br />
depend on the planners’ individual initiative and are therefore constrained by the planners’ ability to<br />
conceptualize the role of technologies with respect to participation.<br />
According to [Brabham, 2009: 2], “an embrace of technological solutions is needed. The medium of the<br />
Web enables us to harness collective intellect among a population in ways face-to-face planning<br />
meetings cannot. As open source production on the Web has proven itself as a collaborative method for<br />
designing superior software products, the crowdsourcing model may prove itself as a superior method for<br />
designing real spaces, planning the built environment.(...) The crowdsourcing model, a successful, Webbased,<br />
distributed problem solving and production model for business, is an appropriate model for<br />
enabling the citizen participation process in public planning projects”.<br />
3. Discussion<br />
The modes in which participation outputs are integrated into the plans are varying, in dependence of:<br />
The stage of planning process where participation is activated: it is widely shared that participation in<br />
spatial planning should have the purpose to develop a plan collaboratively and not to look for public<br />
consensus when the plan is already completed; even when purposes are high and intentions good,<br />
the integration is a really complex task;<br />
The real commitment of politicians and authorities and the related political mandate: participation is<br />
often a cosmetic stratagem of political actions, it adds an useful adjective to it thus enlarging the gap<br />
between citizens and administrators, reducing the will to participate and the trust towards institutions;<br />
The modes knowledge is managed and translated into planning action: knowledge is embedded in<br />
action, not revealed outside of action; it cannot be acquired, moved into and used in the planning<br />
action [Concilio, 2010]; rather it is planning that needs to enter the social space where (collective,<br />
collaborative, individual) knowledge is active within the public action;<br />
182
Grazia Concilio and Francesco Molinari<br />
The ability of participation managers to enable public capacity to negotiate their interests within a<br />
public discussion;<br />
The way participation is considered and regulated in the spatial planning normative environment (see<br />
previous sections);<br />
The structure and form of a plan: differently characterized by frameworks that vary across national,<br />
regional and local regulation systems, plans share a significant commonality, i.e. they have the form<br />
of “end products” that are not prone, in the way they are conceptualized, to be managed as “open<br />
products”. <strong>Academic</strong>s being aware of these intrinsic limits have transferred their attention from the<br />
plan (as product of plan making) towards the plan making process itself [Tewdwr-Jones, 2002; Hillier,<br />
2007; Albrechts, 2010b].<br />
Although participation in spatial planning is growing in importance as well as the acknowledgement of<br />
ICT potential, evidence shows persistent barriers [Brownill and Carpenter, 2007] that are basically the<br />
same all over Europe, if we control for national differences in democratic cultures and traditions<br />
[Wassenhoven, 2008].<br />
As early as in 2002, a survey of academics and practitioners within a Delphi framework [Albrechts, 2002]<br />
identified three main issues: 1) providing access to citizens and stakeholder groups to spatial planning<br />
settings; 2) adequate capacity building of citizens and public sector officials; and 3) how to ensure and<br />
visibly demonstrate real impact on decision making and outcomes.<br />
Concerning the first issue, structural, cultural and governance style barriers appear the most relevant<br />
obstacles to effective participation. Transversal to these barriers is the complexity of the planning task -<br />
especially when related to the larger geographical scale of individual plans. This in turn derives from the<br />
fragile attitude of non-experts to make their knowledge of large-scale spatial dynamics explicit and<br />
operational for plan making purposes. Non-expert knowledge is specifically linked to the micro-level: nonexperts<br />
are hardly aware of the interdependency of their experience with large-scale phenomena and the<br />
operational use of this knowledge into the plans is very difficult. This distance is particularly evident when<br />
dealing with participation of the weakest social groups: the problems discussed are far from their daily life<br />
and it is not clear enough how the decisions to be made will directly affect them [Piffero, 2009; Bauer et<br />
al., 2010; Monno, 2010].<br />
Related to the second issue, lack of experience in participation, in some cases this is mirrored by the<br />
inadequacy of rule settings, participatory protocols, and environments, which limits the collective capacity<br />
towards participation. Inadequacy has effect on both the public (citizens do not participate even when<br />
they are given the opportunity) and the planners or policy makers side (participation is not well prepared<br />
in advance, there are no codified procedures and its outcomes are inconclusive). Likewise, experience is<br />
very small in the use of eParticipation tools and methods in spatial planning, particularly considering the<br />
dynamics related to the explosion in the number of participants provoked by social networks and the<br />
small effectiveness these “wise crowds” seem to have in producing actual results [EvansCowley and<br />
Hollander, 2010].<br />
However, most crucial is certainly the third issue, represented by the need to guarantee participants that<br />
their views and interests will actually have an impact on policy making and related actions and decisions.<br />
This is generally true in a public policy domain [Friedmann, 1987], yet it is an extraordinary critical issue<br />
in spatial planning, which is strongly rooted in the political agenda of regional and local administrations<br />
and therefore under the risk of power groups’ influence and deviation. As the EIPP report puts it, “a core<br />
challenge for all public participation processes is the way the outcomes are fed into the decision making<br />
process; in order to increase the chance of public participation being successful, arrangements ought to<br />
be made in all countries to link public participation formally to the heart of decision making” [EIPP, 2009:<br />
40]. We agree with the conclusions of the Delphi survey of academics and practitioners according to<br />
whom “a legal guarantee is impossible” [Albrechts, 2002: 340). Yet, there actually are advantages from<br />
citizen involvement in spatial planning. According to Innes and Booher (2004), most justifications for<br />
public participation in planning decision-making are covered by five purposes:<br />
Public participation advances fairness and justice;<br />
Public participation helps ensure legitimacy for public decisions;<br />
Through participation, decision-makers can find out what the public’s preferences are and take<br />
Account of them in their decisions;<br />
183
Grazia Concilio and Francesco Molinari<br />
Decisions can be improved by incorporating citizens’ local knowledge;<br />
Participation is offered by planners and public officials because the law requires it.<br />
Apart from law requirements, we can split up these advantages in two groups:<br />
Reputation gains, as well as compliance with broader improvement and accountability goals for the<br />
government agency involved;<br />
Content related gains, which can be availed of either before or during the decision-making process<br />
(or in both stages of course).<br />
Grasping these benefits requires rethinking of spatial planning in several ways. The one that is most<br />
relevant to our discussion is to overcome the simplistic dichotomy of participation as something parallel<br />
or added on to the planning process [Funtowicz and Ravetz, 1993; Cerreta et al., 2010]. A second way is<br />
to reconceptualise the plan and make it a product of collective intellectual effort [Celino and Concilio,<br />
2006; Brabham, 2009]. Finally the planning process itself should fully open up to the potential of ICT,<br />
which are deeply restructuring the governance concepts, frameworks and dynamics.<br />
4. Conclusions and recommendations<br />
To sum up, existing evidence on EU27 spatial planning systems and policies displays a fair degree of<br />
complexity, a few commonalities across countries, and a considerable (context-related) variation in the<br />
provisions for public consultation and citizens involvement, both horizontally (= between) and vertically (=<br />
within) Member States. Cultures and traditions affect conceptualizations of participatory decision making;<br />
legal and social infrastructures determine different degrees of readiness of citizens and institutions<br />
towards public involvement; planning systems at different scales affect the way planners interpret their<br />
roles and related practices.<br />
Public participation has been a feature of the planning process for over 30 years during which many<br />
attempts have been made to improve access to citizens. Still spatial planning practices show inexorable<br />
barriers to participation, which have different causes. In spite of the wide development of ICT, there still is<br />
very limited usage of these in the context of participatory planning and programming processes.<br />
Practitioners act as if the demonstration of utility (= efficiency, effectiveness, quality of results) of ICT<br />
implementation into participatory spatial planning were required every time and on a case-to-case basis.<br />
In this scenario, it remains hard to disentangle how big the impact of Community policy has been on the<br />
creation and enlargement of “mandatory spaces” for civic engagement in the spatial planning process –<br />
not to speak of electronically enhanced participation.<br />
Lessons learnt are threefold:<br />
Evidence gathered shows a significant plurality and diversity of participative planning practices. This<br />
is mainly explained as a result of the growing and crucial need of planners to reinterpret wellestablished<br />
communication frameworks out of institutional protocols and to develop new ones that<br />
are better rooted in the dynamic contexts of the planning process. Consequently the use of ICT is still<br />
very differentiated and almost exclusively depending on planners’ personal visions and skills.<br />
The full potential of ICT is far from being grasped at the moment. ICT usage is currently limited to<br />
rudimentary protocols of the planning process and focused on the migration of selected stages of the<br />
process from off- to on- line environments. The majority of adopted systems merely mirror the<br />
traditional modes and tracks of citizen and stakeholder interaction with local planning agencies.<br />
There is significant room for <strong>European</strong> policy making here. Many electronic services already<br />
available in this domain are not scaling up at EU level (also) because of the different weight assigned<br />
to the “e” dimension in participation by the national urban planning systems. Based on the good<br />
progress made in the Aarhus and SEA directive implementation, additional efforts should be<br />
envisaged by the Commission and Member States towards the creation of electronically enhanced<br />
governance models for spatial planning and territorial development related issues.<br />
References<br />
Albrecths, L. (2010) “Strategic Planning and Regional Governance in Europe: Recent Trends and Policy Responses”.<br />
In: Yeh, J., Yeh, A.G.O. and Xu, J. (Eds.) Governance and Planning of Mega-City Regions: An International<br />
Comparative Perspective. Taylor and Francis group, pp. 75-97.<br />
Albrechts, L. (2010b) “More of the same is not enough! How could strategic spatial planning be instrumental in<br />
dealing with the challenges ahead?” In: Environment and Planning B, 37, pp. 1115-1127.<br />
184
Grazia Concilio and Francesco Molinari<br />
Albrechts, L. (2002) “The planning community reflects on enhancing public involvement. Views from academics and<br />
reflective practitioners”. In: Planning Theory and Practices, 3(3), pp. 331-347.<br />
Arnstein S. (1969): “A Ladder of Citizen Participation”. In: Journal of the American Institute of Planners, July Issue.<br />
Baker Associates and O’Rourke, T. (2008) Participation and policy integration in spatial planning. Spatial plans in<br />
practice: supporting the reform of local planning. Communities and Local Government, London. Retrieved<br />
online (January 2011) from:<br />
http://www.communities.gov.uk/documents/planningandbuilding/pdf/participationintegrationspat.pdf<br />
Bauer, V.E., Abma, T.A., and Widdershoven, A.M. (2010) Participation of marginalized groups in evaluation: Mission<br />
impossible? In: Evaluation and Program Planning, 33(3), pp. 238-245.<br />
Brabham, D.C. (2009) “Crowdsourcing the public participation process for planning project”. In: Planning theory 8(3),<br />
pp. 242-262.<br />
Celino A., and Concilio G. (2006) “Managing open contents for collaborative deliberation in environmental planning”<br />
in F. Malpica, A. Oropeza, J. Carrasquero, and P. Howell (Eds.) Proceedings of PISTA 2006. The 4th<br />
International <strong>Conference</strong> on Politics and Information Systems: Technologies and Applications, International<br />
Institute of Informatics and Systemics, July, Orlando, pp. 155-160.<br />
Cerreta M., Concilio G., Monno V. (Eds.) Making strategies in spatial planning. Knowledge and values. Springer.<br />
Concilio, G. (2010) “Bricolaging knowledge and practices in spatial strategy-making”. In: Cerreta, M., Concilio, G.,<br />
Monno V. (Eds.) Making strategies in spatial planning. Knowledge and values. Springer, pp. 281-302.<br />
COPTA (2008) The “Cooperation for Territorial Cohesion of Europe” portal. http://www.eu-territorialagenda.eu/Pages/Default.aspx<br />
Davies, H.W.E., Edwards, D., Hooper, A.J., and Punter, J.V. (1989) “Comparative Study”. In: Davies, H.W.E. (Ed.)<br />
Planning Control in Western Europe. London: HMSO, pp. 409–442.<br />
EIPP (2009) Public participation in Europe. An international perspective. Report of the <strong>European</strong> Institute for Public<br />
Participation. Retrieved online (January 2011) from: http://www.participationinstitute.org/wpcontent/uploads/2009/06/pp_in_e_report_03_06.pdf<br />
<strong>European</strong> Commission (2010). A Digital Agenda for Europe. COM(2010) 245 final.<br />
http://ec.europa.eu/information_society/digital-agenda/index_en.htm<br />
<strong>European</strong> Commission (2010b) The <strong>European</strong> eGovernment Action Plan 2011-2015. Harnessing ICT to promote<br />
smart, sustainable & innovative Government. COM(2010) 743. Retrieved December 15, 2010 from<br />
http://ec.europa.eu/information_society/activities/egovernment/action_plan_2011_2015/docs/action_plan_en_a<br />
ct_part1_v2.pdf<br />
<strong>European</strong> Commission (2008) Green Paper on Territorial Cohesion. Turning territorial diversity into strength.<br />
Brussels, 6.10.2008 - COM(2008) 616 final<br />
<strong>European</strong> Commission (1997) The EU Compendium of Spatial Planning Systems and Policies. Regional<br />
Development Studies. Luxembourg: Office for Official Publications of the <strong>European</strong> Communities.<br />
EvansCowley, J., and Hollander, J. (2010) “The new generation of public participation: internet-based participation<br />
tools”. In: Planning practice and research, 25(3), pp. 397-408.<br />
Expert Document (2003) “Managing the Territorial Dimension of EU Policies after Enlargement”. Retrieved online<br />
(30.12.2010) from http://ec.europa.eu/regional_policy/debate/document/futur/member/esdp.pdf<br />
Farinós Dasi, J. (Ed.) (2007) Governance of Territorial and Urban Policies from EU to Local Level. Final Report of<br />
ESPON Project 2.3.2. Esch-sur-Alzette: ESPON Coordination Unit.<br />
Friedmann, J. (1987) Planning in the public domain: from knowledge to action, Princeton University Press, Princeton,<br />
N.J.<br />
Funtowicz, S., and Ravetz, J. (1993) "Science for the Post-Normal Age". In: Futures 25(7), pp. 739-755.<br />
Hillier, J. (2007) Stretching Beyond the Horizon. A Multiplanar Theory of Spatial Planning and Governance, Ashgate,<br />
Aldershot.<br />
Innes, J.E., and Booher, D. E. (2004) “Reframing Public Participation: Strategies for the 21 st Century”. In: Planning<br />
Theory & Practice, Vol. 5, No. 4, December, 419-436.<br />
Innes J.E., and Booher, D.E. (2000) Public Participation in Planning: New Strategies for the 21st Century. URD<br />
Working Paper Series, Institute of Urban and Regional Development, UC Berkeley. Retrieved online (January<br />
2011) from: http://escholarship.org/uc/item/3r34r38h<br />
Jackson, J.B. (2010) “Cohering the spatial and strategic planning in the Czech Republic”. In: Proceedings of the<br />
REAL CORP <strong>Conference</strong>, Vienna 18-20 May, pp. 1041-1046.<br />
Janin Rivolin, U. (2004) <strong>European</strong> spatial planning. La governance territoriale comunitaria e le innovazioni<br />
dell'urbanistica. Franco Angeli<br />
Kingston, R. (2007) “Public Participation in Local Policy Decision-making: The Role of Web-based Mapping’”. In: The<br />
Cartographic Journal, 44(2), pp. 138-44.<br />
Koekoek A., Lammeren, van R.J.A. Vonk G.A. (2009) “The potential of integrating E-participation in planning support<br />
systems”. In: URISA Journal, 21(2), pp. 39-47.<br />
Kubicek H. (2010) “The Potential of E-Participation in Urban Planning: A <strong>European</strong> Perspective”. In: Carlos Nunes<br />
Silva (Ed.) Handbook of Research on E-Planning: ICTs for Urban Development and Monitoring, IGI global, pp.<br />
168-194.<br />
Lombardi, P., Huovila, P., and Sunikka-Blank, M. (2010) “The Potential of E-Participation in Sustainable<br />
Development Evaluation: Evidence from Case Studies”. In: Reddick C.G. (Ed.) Politics, Democracy and E-<br />
Government: Participation and Service Delivery. IGI Book Publishing Co. DOI: 10.4018/978-1-61520-933-0<br />
“Malmö Declaration on eGovernment” (2009). Retrieved online (September 2010) from http://www.egov2009.se/wpcontent/uploads/Ministerial-Declaration-on-eGovernment.pdf<br />
185
Grazia Concilio and Francesco Molinari<br />
Molinari, F. (2010) “On Sustainable eParticipation”. In: Proceedings of the IFIP ePart2010 <strong>Conference</strong>, Lausanne<br />
(Switzerland).<br />
Monno, V. (2010) “When strategy meets democracy: exploring the limits of the ‘possible’ and the values of the<br />
‘impossible’”. In: Cerreta M., Concilio G., Monno V. (Eds.) Making strategies in spatial planning. Knowledge and<br />
values. Springer, pp. 161-184.<br />
Nadin, V., and Stead, D. (2008) “<strong>European</strong> Spatial Planning Systems, Social Models and Learning”. In: The Planning<br />
Review 44 (1), pp. 35-47.<br />
Newman, P., and Thornley, A. (1996) Urban Planning in Europe: International Competition, National Systems, and<br />
Planning Projects. London: Routledge<br />
Piffero, E. (2009) What happened to participation? Urban development and authoritarian upgrading in Cairo’s<br />
informal neighborhood. Emil di Odoya Ed., Bologna.<br />
Sadler, B., and Verheem, R. (1996) Strategic Environmental Assessment: Status, Challenges and Future Directions,<br />
Report 53, Ministry of Housing, Spatial Planning and the Environment, The Hague, Netherlands.<br />
Tewdwr-Jones, M. (2002) The Planning Polity: Planning, Government and the Policy Process. Routledge, London.<br />
Wassenhoven, L. (2008) “Territorial Governance, Participation, Cooperation and Partnership: A Matter of National<br />
Culture?”. In: Boletín de la A.G.E. (46), pp. 357-362.<br />
Yeh, J., Yeh, A.G.O. and Xu, J. (2010) Governance and Planning of Mega-City Regions: An International<br />
Comparative Perspective. Taylor and Francis group<br />
186
Social Media and Local Government in England: Who is<br />
Doing What?<br />
Martin De Saulles<br />
University of Brighton, UK<br />
mdesaulles@gmail.com<br />
Abstract: This paper presents research on the use of social media by English local authorities. It presents<br />
quantitative data on the extent to which unitary authorities in England use social networking services such as<br />
Facebook, Twitter and YouTube to communicate with interested parties. A more qualitative analysis is carried out on<br />
a sample of the bodies in terms of the types of information they are pushing out through these services. The research<br />
presented in this paper shows a considerable range in the usage of social media by these bodies and raises<br />
interesting questions about why this might be the case. The paper provides some tentative answers to these<br />
questions and offers practical advice to local authorities wanting to better understand this area and how it might help<br />
them in their relations with the communities they serve.<br />
Keywords: social media, local government, eGovernment, web 2.0<br />
1. Introduction<br />
1.1 English local government<br />
The structure of local government in England is relatively complex with several tiers of bodies each with<br />
varying levels of authority. It is worth noting that the system in England differs to that found in Scotland,<br />
Wales and Northern Ireland. At the highest level in England there are 9 regional bodies which vary in<br />
authority from the London Assembly that has elected members and a Mayor to less powerful bodies that<br />
do not elect members and are more concerned with regional development issues. Below these 9 regional<br />
authorities are the county and then district level bodies which comprise 369 councils varying in size from<br />
the 6 large metropolitan counties down to far smaller district councils. This paper focuses on the 55<br />
unitary authorities that cut across county and district level bodies and range in size from 39,000<br />
constituents to over 500,000, representing over 12 million citizens in total. Most of these 55 bodies were<br />
established from the 1990s onwards and have responsibilities ranging from education and housing to<br />
transport, waste collection, leisure, recreation and libraries. Significantly, they also have revenue<br />
collection powers via the system of council tax. These wide-ranging responsibilities and fiscal duties give<br />
unitary authorities a high public profile, particularly in the current climate of budget cuts from central<br />
government. Many of the austerity measures being implemented by the current British coalition<br />
government will be most visible at the local level as libraries and leisure facilities are cut back and, in<br />
some instances, closed. Elected leaders of the unitary authorities and other local bodies will be under<br />
increasing pressure to explain to their constituents why the cuts are being made and what measures are<br />
being adopted to minimise their impact on front-line services. It is within this context of budgetary<br />
pressures and the increasing expectation by citizens of more transparent public bodies that the research<br />
described in this paper has been undertaken. Social media offers organisations of all types cost effective<br />
channels to communicate with individuals in a more interactive way than has been possible with more<br />
traditional media.<br />
1.2 The state of social media<br />
The term social media refers to a range of web-based services which emerged out of the second wave of<br />
internet innovation, often referred to as Web 2.0. According to Kaplan and Haenlein (2010):<br />
“Social Media is a group of Internet-based applications that build on the ideological and<br />
technological foundations of Web 2.0, and that allow the creation and exchange of User<br />
Generated Content.” (page 61)<br />
They use the term, User Generated Content (UGC) to describe one of the key differences of social media<br />
and Web 2.0 services from the first generation of internet services. The first wave of internet services<br />
were less dynamic and often resembled traditional media in that information was broadcast out via<br />
websites from centralised producers of content. Following the dotcom bust of the early 2000s, a new<br />
wave of web services emerged that offered far more interaction with users and, in many cases, relied on<br />
their users to generate much of their content. A good example of this is YouTube that hosts hundreds of<br />
millions of videos, many of them uploaded by individuals. Facebook also relies on UGC as it offers a<br />
platform for individuals and organisations to communicate and share information. Without the content that<br />
187
Martin De Saulles<br />
is uploaded by users, Facebook, YouTube, Twitter, MySpace and other social media services would not<br />
exist. It is the rapid growth of many of these services and their daily use by hundreds of millions of people<br />
across the world that has attracted the interest of organisations, public and private. Communicating with<br />
large numbers of people, whether for public service or commercial marketing reasons, has traditionally<br />
been an expensive and often inefficient process. Printing and sending out leaflets and brochures,<br />
advertising across traditional media or conducting telephone marketing campaigns is costly in time and<br />
money and beyond the budgets of many organisations. The internet and, more specifically, social media<br />
offer a chance to bypass the old media gatekeepers and to communicate directly with customers, voters<br />
or any other social media users at no or extremely low cost. Mui and Whoriskey (2011) point out that<br />
Facebook in mid-2010 had over 500 million active users, a number that had doubled in less than 2 years.<br />
For many people now, Facebook and other social media sites provide their primary interaction with the<br />
internet and are increasingly attracting public organisations, including local government bodies. Of<br />
course, the dynamic and rapidly changing nature of the internet means that services such as Facebook<br />
and YouTube come and go and organisations can be swept up in the general enthusiasm to have a<br />
presence on these sites. However, the extent to which the internet and certain social media services are<br />
now a part of many people’s lives is a sign that they or whatever new services replace them are<br />
significant channels for communication. Gibson (2010) argues, in the context of local government and<br />
social media, that:<br />
“...not engaging now represents a far greater risk than engaging. Citizens will still use these<br />
networks to talk about you, whether you add your voice to the conversation or not....The<br />
challenge for all councils now is to move social media off their list of challenges, and on to<br />
their list of opportunities.” (Page 5)<br />
While Gibson has practical experience in the use of social media to promote causes and organisational<br />
objectives and is broadly enthusiastic about its potential for enhancing democracy, it is important to<br />
beware of adopting a technologically deterministic approach to studies of social media use and impact.<br />
Technologies can be transformative but organisational changes are usually achieved in conjunction with<br />
other factors whether social, political or economic. Bertot et al. (2010) point out that the use of social<br />
media tools by government bodies can help increase transparency but the political will for change needs<br />
to exist first and that the technology comes second to aid the process.<br />
2. The study<br />
A key objective of the research described here was to measure the extent to which the 55 unitary<br />
authorities in England use social media in their external communications. The methodology adopted was<br />
a detailed analysis of the websites of these bodies to determine what social media profiles they linked to<br />
and the level of engagement with these services. This analysis was carried out on the 26 October 2010.<br />
Engagement with any social media services were looked for during the data gathering stage and, after<br />
examining all 55 websites, the following social media services were found to be used: Facebook, Twitter,<br />
YouTube and Flickr as well as the syndication technology RSS for updating users of new content being<br />
posted to the websites. The level of activity by the authorities on each of these services, where they were<br />
being used, was then measured to determine how engaged they were. These measures took the form of<br />
the number of tweets on Twitter, regularity of posting, number of videos uploaded to YouTube and<br />
number of views, number of photographs posted to Flickr and number of “likes” and members of<br />
Facebook pages and groups. A score was allocated to each authority based on whether they used any of<br />
the 5 social media services listed above. Giving a point for each service used, Figure 1 summarises the<br />
distribution of points awarded.<br />
As Figure 1 shows, only one unitary authority was found to be using all 5 of the social media services<br />
while 17 were not using any. Twitter was the most popular service with 27 authorities using the<br />
microblogging service followed by RSS (20 authorities), Facebook (16 authorities), YouTube (8<br />
authorities), Flickr (8 authorities). A statistical analysis was carried out to look for correlations between<br />
the size of authorities, in terms of both the geographical areas covered and populations served, and their<br />
social media usage but no statistically significant correlations could be found. The 23 authorities that<br />
scored 2 points or more in their aggregate social media usage score are shown in Figure 2.<br />
The ways in which the authorities use social media varies quite significantly but a common theme seems<br />
to be using these channels to make announcements relevant to their constituents. The most active<br />
council in this space, Darlington (www.darlington.gov.uk), uses Facebook and Twitter to post<br />
announcements about council meetings, news-worthy stories about local schools and council initiatives<br />
as well as job postings for the bodies they are responsible for. The local nature of these postings means<br />
188
Martin De Saulles<br />
their appeal is limited primarily to local people but for this group their relevance is significant. In terms of<br />
multimedia, Darlington uses YouTube to post public information videos it has been involved in producing<br />
while it uses the image sharing site, Flickr, for sharing photographs of local events as well as the entries<br />
to local photography competitions.<br />
Figure 1: Aggregate social media scores<br />
Figure 2: Most active social media users<br />
One of the issues that many organisations face when starting to use social media to communicate with<br />
stakeholders is being able to sustain the maintenance of their online presence. Opening a Twitter or<br />
Facebook account only takes minutes but creating a successful and thriving profile requires steady and<br />
sustained input from those responsible. A Facebook or Twitter page that has not been updated in weeks<br />
or even days may be worse, in terms of public perceptions, than not having a social media presence at<br />
all. This is particularly true with Twitter that is used by many people as a notification service. Unlike a blog<br />
where visitors may spend the time reading archived posts, Twitter posts which are more than a day or<br />
two old are seldom looked at. The frequency of posting to Twitter was considered in the analysis of<br />
unitary authority social media usage by looking at the number of tweets posted in the previous 7 days.<br />
The average was 13 tweets but the range went from 0 to 69. This wide variance may be an indication of<br />
the novelty of such a service with authorities still experimenting in terms of optimal activity. Of the 8<br />
189
Martin De Saulles<br />
authorities with their own YouTube channels there was also a considerable range in the extent to which<br />
they posted videos as well as the number of viewers for their videos. One council’s YouTube channel had<br />
received over 126,000 views while another had only 300. These variances are partly explained by the<br />
length of time the council had been on YouTube but the frequency of updates and how the main council<br />
webpage promoted the channel also seemed to play a part. A closer look at the content of the videos<br />
posted to YouTube by the councils offers the greatest clue to the popularity of their channels. The<br />
YouTube channel with the lowest number of views was dominated by relatively dry interviews with<br />
councillors while the channels with significantly higher views had a broader range of videos that looked at<br />
council activities such as library and welfare services. While 20 authorities offered RSS feeds of updates<br />
to the content posted to their websites, the visibility and utility of these feeds varied. Cheshire West and<br />
Chester’s website, for example, offered 4 clearly marked RSS feeds covering news, events, its Twitter<br />
posts as well as one for information about its cold weather initiatives such as road gritting. Other councils<br />
offered RSS feeds for job vacancies, press releases and road works updates. Most of the councils that<br />
provided RSS feeds also had a webpage explaining what the technology was and how people could use<br />
the feeds as well as, in some instances, providing links to RSS feed readers.<br />
3. Benefits of social media to local government<br />
By its nature, much of the content uploaded to social media sites is of limited utility and appeal to most<br />
people. The conversations and images that are shared are often very personal in nature and not intended<br />
to viewed or read by users outside the social circles of the people that posted them. However,<br />
organisations are beginning to realise that the amount of time many people spend on these networks and<br />
their wide reach offer opportunities for communication and sharing information that can be of mutual<br />
benefit to all (Agichtein et al. 2008, Qualman 2010, Scott 2010, Weber 2007). Large corporations such as<br />
Starbucks, Coke and Nike have created and developed large online communities around their brands<br />
and, to varying degrees, been successful in building customer loyalty through engaging in conversations<br />
with those purchasing their products. However, the potential of social media to directly connect with<br />
customers can also be a double-edged sword. Kiley (2009) describes the marketing challenge for<br />
Dominoes Pizza in the United States when 2 employees posted a video of themselves at work to<br />
YouTube showing them performing unsavoury acts with the pizzas they were making. Although<br />
Dominoes fired the employees and eventually restored consumer confidence in their products, the video<br />
did have an immediate impact on pizza sales as well as confirming the worst fears of many managers<br />
about the dangers of social media.<br />
While media coverage on the success and failure of high-profile social media initiatives tends to focus on<br />
the activities of large companies, less attention has been paid to how smaller and less visible<br />
organisations are engaging with these new technologies. Park and Cho (2009) and Kuzma (2010) point<br />
to the opportunities that social media offers public bodies in terms of connecting with their stakeholders<br />
and developing trust. This could be seen as particularly important at a time when politicians in many<br />
economies are increasingly viewed with suspicion. The personal nature of many social media services<br />
allows human voices and real personalities to be seen and heard as opposed to the faceless corporate<br />
messages of traditional public relations initiatives. However, as with the Dominoes example mentioned<br />
earlier the potential for public bodies and officials to be embarrassed by these channels is also a reality.<br />
The recent Wikileaks releases of confidential documents relating to the Iraq and Afghan wars is evidence<br />
of this.<br />
As well as using social media to develop trust between local government and their electors, there are<br />
also financial benefits from migrating services to the web. According to Gibson (2010), research by the<br />
Society of Information Technology Management concluded that customer service interactions cost on<br />
average 27 pence when conducted via the web, £3.22 by phone and £6.56 face-to-face. Gibson (2010)<br />
sees a broader role for social media in this context and believes:<br />
“...the really exciting cost-savings will come from restructuring the existing processes<br />
entirely. Social media allow far more people to contribute to solving a problem, which means<br />
potentially far greater efficiency overall, even given the increased burden on communicating<br />
and responding to the public.” (page 10)<br />
The heavy snow that fell across the UK in January 2010 showed the value of social media and Twitter, in<br />
particular to local councils in their attempts to help residents with transport problems. Cartmell (2010)<br />
describes how Brighton and Hove used Twitter successfully to appeal to residents with 4x4 vehicles to<br />
help with meals on wheels deliveries while Kirklees Council and Essex Council used Twitter to broadcast<br />
messages about the status of road gritting. Following the snow and in an attempt to deal with the<br />
190
Martin De Saulles<br />
resulting potholes in the roads, Birmingham City Council encouraged its residents to contact them via<br />
Twitter with details of the location of holes in the road.<br />
4. Best practice for deploying social media<br />
In terms of making the most of social media initiatives, the lessons for local government are often no<br />
different than for any organisation. Drawing on literature from digital marketing and social media<br />
practitioners, there are some key factors that need to be taken into account:<br />
Although it will probably evolve once a council starts experimenting with social media, it is important<br />
to set objectives for what it hopes to achieve. This will help in the selection of the most appropriate<br />
social media platforms (Hay 2011);<br />
Employees need to know who is responsible for posting information and responding to messages<br />
and time needs to be allocated to them for these tasks. Unless working with social media is seen as<br />
part of someone’s job description it is unlikely it will be taken seriously across the council (Safko &<br />
Brake 2010);<br />
Before creating profiles on Facebook, Twitter, YouTube or other services, it is worth experimenting in<br />
a low-key way to develop a feel for how those platforms work and the ways that users interact with<br />
them. Observing the types of messages and information that are being posted and looking at the<br />
discussions that take place online help develop an understanding of what people value (Fox 2010);<br />
Where appropriate, try to inject a personal touch into the information and messages that are posted.<br />
Simply posting press releases onto Twitter or Facebook is unlikely to be of much interest to<br />
constituents. However, posts that show a genuine concern by council employees for the services<br />
they provide can break down barriers. This does not need to be applied in all instances as sometimes<br />
just a straightforward information broadcast is most appropriate such as pushing out travel updates or<br />
cold weather warnings (Fox 2010);<br />
Without being too prescriptive it is important that a council sets out some broad guidelines for what is<br />
and is not appropriate as subjects for posting online as well as expectations in terms of style and tone<br />
(Elser & Lee 2010);<br />
Monitor the success of social media initiatives by using free tools such as Hootsuite for tracking<br />
Twitter postings. It is important to know which initiatives are generating the most interest so efforts<br />
can be focused on those and away from activities that are not working (Kaushik 2009).<br />
One of the problems that many councils have when starting to use social media is determining which are<br />
the most appropriate. This will largely depend on what the body wants to achieve but it is important that<br />
they tread carefully and not be seen as acting inappropriately. 16 of the 55 unitary authorities surveyed in<br />
this research were using Facebook to share information but some argue that Facebook, in the way it is<br />
used by private individuals, is often not the best place for councils to be online. The Head of<br />
Communications and Marketing for Medway Council, Simon Wakeman ((Wakeman 2009)), believes<br />
Facebook users identify with specific services that their council provides but are not generally interested<br />
in the council itself:<br />
“In Medway we’ve not created an official Facebook presence for the council, but we have<br />
used Facebook groups to promote festivals and theatres – as we know that the customers<br />
for these services do have a sense of belonging with the service and so there’s a basis for<br />
an online community to form.” (Wakeman 2009)<br />
5. Conclusion<br />
The rise of social media is a very recent phenomena with most of the high-profile services such as<br />
Facebook and Twittter only gaining a mass base of users in the last several years. The rapidly changing<br />
and dynamic nature of the sector means that new services will come and go; the rapid decline of<br />
MySpace and Bebo are evidence of that. However, the hundreds of millions of people that engage with<br />
social media on a daily basis mean that any organisation wanting to develop closer ties with its<br />
stakeholders needs to, at the very least, be aware of the potential of these services to strengthen links.<br />
Assuming that social media is a fad and only something for young people might be similar to someone in<br />
1995 dismissing email as a viable communications tool. Local government, in particular, may have a lot<br />
to gain from using these platforms to get closer to its electors and enhance the services it already offers.<br />
As Gibson (2010) states:<br />
191
Martin De Saulles<br />
“Citizens will expect their council to engage with them on their terms, via their channels, and<br />
to be openly available online. In fact, it is becoming increasingly clear that if councils don’t<br />
use these tools, the citizens will do it for them, and bypass the council entirely.” (page 5)<br />
As someone who makes his living by consulting on social media for organisations, Gibson could be<br />
accused of exaggerating the potential dangers to local government from neglecting to use these tools in<br />
their communications with electors. It is obviously in the interests of such consultants to encourage a<br />
perceived need for their services amongst potential clients. It is certainly true that many public sector<br />
investments in information and communications technology projects do not have a good track record<br />
(Gauld & Goldfinch 2006). However, the fact that the social media services described here are already<br />
being used by a significant proportion of the English population and, in most cases, cost little or nothing<br />
to deploy might indicate there may be real value in their use. The research described here is a<br />
preliminary step to developing a better understanding of how social media is being used by local<br />
government and what its potential might be for enhancing democracy. Further studies are planned to<br />
explore some of the more qualitative aspects of social media use through interviews with both local<br />
government employees deploying these services as well as members of the public interacting with them.<br />
It is hoped these interviews will allow a better understanding of the value being derived from using such<br />
tools. The research methodology presented here will also be repeated at the end of 2011 to determine<br />
the extent to which the use of social media tools by English unitary authorities is increasing or declining.<br />
References<br />
Agichtein, E. et al., 2008. Finding high-quality content in social media. Proceedings of the international conference on<br />
Web search and web data mining - WSDM ’08, pp.183 - 193. Available at:<br />
http://portal.acm.org/citation.cfm?id=1341531.1341557 [Accessed December 23, 2010].<br />
Bertot, J.C., Jaeger, P.T. & Grimes, J.M., 2010. Using ICTs to create a culture of transparency: E-government and<br />
social media as openness and anti-corruption tools for societies. Government Information Quarterly, 27(3),<br />
pp.264-271. Available at: http://linkinghub.elsevier.com/retrieve/pii/S0740624X10000201 [Accessed September<br />
7, 2010].<br />
Cartmell, M., 2010. Councils Go Digital During Bad Weather. PR Week, (January). Available at:<br />
http://www.prweek.com/uk/news/977387/Councils-go-digital-during-bad-weather [Accessed December 14,<br />
2010].<br />
Elser, E.L. & Lee, M., 2010. The nine commandments of social media in public administration. PA Times, 33(3), p.3.<br />
Fox, V., 2010. Marketing in the Age of Google: Your Online Strategy IS Your Business Strategy, Hoboken: John<br />
Wiley & Sons.<br />
Gauld, R. & Goldfinch, S., 2006. Dangerous Enthusiasms: E-Government, Computer Failure and Information<br />
Systems Development, Dunedin: Otago University Press.<br />
Gibson, A., 2010. Local by Social, London: I&Dea. Available at: http://www.idea.gov.uk/idk/aio/17801438.<br />
Hay, D., 2011. Social Media Survival Guide: Strategies, Tactics, and Tools for Succeeding in the Social Web<br />
Book/CD Package, Austin: Dalton Publishing.<br />
Kaplan, A.M. & Haenlein, M., 2010. Users of the world, unite! The challenges and opportunities of Social Media.<br />
Business Horizons, 53(1), pp.59-68.<br />
Kaushik, A., 2009. Web Analytics 2.0: The Art of Online Accountability and Science of Customer Centricity, Hoboken:<br />
John Wiley & Sons.<br />
Kiley, D., 2009. Domino ’ s Pizza Youtube Video Lesson. Business Week, pp.4-5. Available at:<br />
http://www.businessweek.com/the_thread/brandnewday/archives/2009/04/dominos_pizza_youtube_video_less<br />
on_focus_on_standards_and_pack_your_own_lunch.html [Accessed December 28, 2010].<br />
Kuzma, J., 2010. Asian Government Usage of Web 2 . 0 Social Media. <strong>European</strong> Journal of ePractice, (9), pp.1-13.<br />
Mui, Y.Q. & Whoriskey, P., 2011. Facebook tops Google; social networking passes search as web users’ top activity.<br />
San Jose Mercury News. Available at: http://www.mercurynews.com/business/ci_16983464.<br />
Park, J, Cho, K., 2009. Declining relational trust between government and publics, and potential prospects of social<br />
media in the government public relations. In EGPA 2009. Available at:<br />
http://www.egpa2009.com/documents/psg1/ParkCho.pdf.<br />
Qualman, E., 2010. Socialnomics: How Social Media Transforms the Way We Live and Do Business, Hoboken: John<br />
Wiley & Sons.<br />
Safko, L. & Brake, D., 2010. The Social Media Bible: Tactics, Tools, and Strategies for Business Success, Hoboken:<br />
John Wiley & Sons.<br />
Scott, D.M., 2010. The New Rules of Marketing and PR: How to Use Social Media, Blogs, News Releases, Online<br />
Video, and Viral Marketing to Reach Buyers Directly, Hoboken: John Wiley & Sons.<br />
Wakeman, S., 2009. Public Sector Communications and Marketing. Available at:<br />
http://www.simonwakeman.com/2009/02/25/why-local-government-shouldnt-be-on-facebook/ [Accessed<br />
December 14, 2010].<br />
Weber, L., 2007. Marketing to the social web: how digital customer communities build your business, Hoboken: John<br />
Wiley & Sons.<br />
192
Electronic Health Records Management and Preservation:<br />
The Case of Slovenia<br />
Mitja Decman<br />
University of Ljubljana, Slovenia<br />
mitja.decman@fu.uni-lj.si<br />
Abstract: This paper presents and discusses the technological possibilities that information technology (IT) offers<br />
within the health sector, focusing on health information technology (HIT), electronic health records (EHR), personal<br />
health records (PHR) and practice management systems (PMS). The current development in this area in the world<br />
shows that this topic is important and is included in the strategies, policies and plans of many countries, in some<br />
places even being pushed to the obligatory level. Consequently, there is a huge interest within the private sector for<br />
development and marketing of products that cover this area. Governments also therefore include the private sector in<br />
the strategic planning of solutions that can integrate different networks of public administration, particularly in the<br />
health sector. As is always the case and particularly here, because of the many players involved, these projects cost<br />
a lot of money, causing sceptics and critics to question the reasonableness, usefulness, ROI and similar topics.<br />
Slovenia is no exception in this area, in both positive and negative sense. Slovenian health reforms include the<br />
development of integrated health systems costing over a hundred million Euros, and many health practitioners in<br />
Slovenia lack internet connections, modern IT equipment, etc. Empirical research regarding the Slovenian health<br />
sectors, which was carried out in 2011 and is examined within the preliminary analysis presented in this paper, will<br />
outline the real situation in this area.<br />
Keywords: e-Health, health information technology, health information systems, electronic health records (EHR),<br />
medical health records (MHR), public health services<br />
1. Introduction<br />
Healthcare is a strategic element of each country, because it influences many areas of the society and<br />
the development of the whole nation. Although minor deficiencies might not cause a lot of damage,<br />
broader negative health trends and diseases may cause a lot of damage to the population, economy,<br />
growth, etc. In more recent years, informatics is gaining a more important role in many fields, including<br />
health. As stated in the communication of the <strong>European</strong> Commission, e-Health is important and enables<br />
improvements in terms of access to healthcare and boosts the quality and effectiveness of the services<br />
offered (<strong>European</strong> Commission, 2004).<br />
E-Health covers the area of services and systems that are available to citizens (patients), professionals<br />
and health authorities and includes electronic health record systems (EHR), practice management<br />
systems, personal health record systems (PHR), health portals, etc. These are primarily based on the<br />
internet and other information and telecommunication technologies that enable cooperation, sharing of<br />
data, exchange of data, knowledge based tools, etc.<br />
The reason for our research in this field is the lack of research regarding the drivers and barriers related<br />
to the implementation of EHR systems. Using the theory of EHR, we conducted empirical research in the<br />
Slovenian health sector to prove or disprove the theoretical statements and stress or weaken their<br />
importance.<br />
1.1 EHR, EPR, EMR, PHR, PMS …<br />
To have a clear start, it is important to resolve the definition of electronic health records (EHR) and other<br />
similar terms. There are many various definitions of what EHR is. At the same time, the term’s definition<br />
overlaps with terms like electronic patient record (EPR), electronic medical record (EMR), personal health<br />
records (PHR) and practice management system (PMS). PMS basically deals with the day to day<br />
operations of a medical practice including data about patient’s demographics, appointments, bills, etc.<br />
(administrative and financial data). These same data can also be found in EMR, which is more focused<br />
on clinical data and whose principle purpose is to support individual patient care (Rector, Nowlan & Kay,<br />
1991). The EMR can also be the legal patient record that is created in hospitals and ambulatory<br />
environments and is the data source for the EHR (Habib, 2010). The National Alliance for Health<br />
Information Technology (2008) defines EMR as “The electronic record of health-related information on an<br />
individual that is created, gathered, managed, and consulted by licensed clinicians and staff from a single<br />
organisation who are involved in the individual’s health and care,” while EHR is defined as “An electronic<br />
record of health-related information on an individual that conforms to nationally recognised<br />
193
Mitja Decman<br />
interoperability standards and that can be created, managed, and consulted by authorised clinicians and<br />
staff across more than one healthcare organisation.” The Healthcare Information and Management<br />
Systems organisation (HIMSS) stressed that EMR is “a legal record created in hospitals and ambulatory<br />
environments that is the source of data for EHR.” While EMR is owned and managed by an organisation,<br />
EHR is the aggregation of EMRs from different sources and demands connectivity. In the case of a<br />
country wide solution, it requires a network that is accessible to all stakeholders including patients, who<br />
can access and append information by using health portals. The HIMSS even developed a 7 stage<br />
adoption model (Figure 1) for EMR with the abilities of EHR (HIMSS Analytics, 2010). Thus the key<br />
property of EMR in order to be a part of EHR is interoperability according to standards (e.g. HL7, CCHIT)<br />
(Brailer, 2005).<br />
Stage Cumulative Capabilities<br />
Stage 7<br />
Complete EMR; CCD transactions to share data; Data<br />
warehousing; Data continuity with ED, ambulatory, OP<br />
Stage 6<br />
Physician documentation (structured templates), full CDSS<br />
(variance & compliance), full R-PACS<br />
Stage 5 Closed loop medication administration<br />
Stage 4 CPOE, Clinical Decision Support (clinical protocols)<br />
Stage 3<br />
Nursing/clinical documentation (flow sheets), CDSS (error<br />
checking), PACS available outside Radiology<br />
Stage 2<br />
CDR, Controlled Medical Vocabulary, CDS, may have Document<br />
Imaging; HIE capable<br />
Stage 1 Ancillaries - Lab, Rad, Pharmacy - All Installed<br />
Stage 0 All Three Ancillaries Not Installed<br />
Figure 1: 7-stage EMR adoption model, (source: HIMSS Analytics Database),<br />
http://www.himssanalytics.org/<br />
We might transfer the definition to a mathematical formula: EHR = EMR + data exchange capability. The<br />
data exchange capability is also called the health information exchange (HIE). EMR systems therefore<br />
include much data and functionality. Within a data set, we can find a patient’s demographic details, family<br />
history, medical history, allergies and alerts as well as a summary of services provided to the individual<br />
that are gathered from hospitals, dental clinics, emergency departments, etc. (Lazakidou, 2006). Within<br />
the set of functionalities, we can include the management and exchange of data, orders for laboratory<br />
tests, prescriptions, etc. A survey done in the United states defined a fully functional EHR as a system<br />
capable of “recording patients’ clinical and demographic data, viewing and managing results of laboratory<br />
tests and imaging, managing order entry (including electronic prescriptions) and supporting clinical<br />
decisions (including warnings about drug interactions or contraindications)” (DesRoches et al., 2008).<br />
Despite these definitions, the primary goal of any health information system should be patient<br />
participation, because the patient’s improved health care must be the main objective, as is argued by<br />
Karsh (Karsh, Weinger, Abbott, & Wears, 2010).<br />
1.2 Benefits<br />
We could endlessly expound upon the benefits of EHR as stated by various authors. In 2003,<br />
Waegemann stressed data sharing, uniform documentation, better information management and<br />
consecutively improved workflow and efficiencies of the patient care process (Waegemann, 2003).<br />
DesRoches also found a positive link between more capable systems and greater benefits (DesRoches<br />
et al., 2008). Galani and Nikiforu divide the benefits into groups including patients, the general public,<br />
health professionals, health administrators, policy makers, researchers and governments (Lazakidou,<br />
2006).<br />
From the patients’ point of view, the improved availability of data from various medical treatments,<br />
increased security through encryption, fewer mistakes during pharmacy orders by using the<br />
pharmaceutical database and electronic prescriptions are the most important benefits. Medical data can<br />
be available to them for access, checking and education (linking to the web pages or medical knowledge<br />
194
Mitja Decman<br />
databases). All of this allows patients to assume more control over their health records and become more<br />
active in their own care. Currently, one of if not the biggest healthcare IT programme in the world is<br />
gathering patients’ data into one huge IT system (the NHS database) in Great Britain and is expecting to<br />
gather over 50 million health summary records (Davies, Eccles, Braunold & Thick, 2008).<br />
From the health professionals point of view, there are benefits such as easier access to patient data, thus<br />
providing better decision-making support and consequently reducing medical error rates (Ford,<br />
Menachemi, & Phillips, 2006). The accessibility can also cause an increase in productivity. There is also<br />
a greater accountability of staff since their actions are tracked more easily (Hillestad et al., 2005).<br />
By moving away from paper media, electronic health systems also reduce out-dated and cumbersome<br />
paperwork, reduce the need for large storage facilities, do away with the problems of paper fragility and<br />
searchability, enable its availability to many people while storing it in only one place and enable an<br />
efficient aggregation of data (Lazakidou, 2006). At the University of Wisconsin Hospital and Clinics, a<br />
significant reduction (more than 85%) in the volume/cost of paper forms and a significant reduction in<br />
space required for storage was recorded after EHR implementation (HIMSS Analytics, 2010). Hillestad<br />
also adds that eliminating handwritten documents would improve the accuracy of patient data, adding<br />
that electronic forms would eliminate the danger of data loss resulting from natural disasters such as<br />
hurricanes, floods and fire (Hillestad et al., 2005).<br />
From the governments’ point of view, reduced health care costs are another benefit of health information<br />
technology (Lazakidou, 2006) and could save $81 billion annually in the US if the healthcare system<br />
would be properly upgraded (Hillestad et al., 2005). The potential includes reducing the hospital lengthof-stay,<br />
medication usage, nurses’ administrative time, etc. With electronic records, there is a huge<br />
potential for thorough statistical analysis, enabling better decisions, actions and planning and leading to<br />
better quality of health services (Ford, Menachemi, & Phillips, 2006). Researchers and scientists would<br />
also be stakeholders that would benefit from those data.<br />
1.3 Weaknesses<br />
So if there are so many benefits, why don’t we see EHR systems implemented everywhere? That is<br />
because there are also many weaknesses, and in that regard, Waegeman in particular indicated the lack<br />
of frameworks and standards, lack of motivation, lack of direct benefits for practitioners and confusion<br />
regarding the concept (Waegemann, 2003).<br />
At the level of the IT itself, EHR is a very crucial system that needs to run not only 24x7, but without<br />
mistakes, bugs, crashes, unpredicted states, etc. A dropping of the network connection or the crash of a<br />
system might mean losing lives, and it is indicated that EHR systems are among the least reliable<br />
(Johnson, 2006). The influence of errors is strong as well. A mistyped piece of information about a<br />
specific drug at the National Drug Centre might lead to hundreds of wrong decisions the next second<br />
within the EHR systems. Although a less-errors benefit is argued as a positive side of EHR, the risk of<br />
errors is shifted to system users since they make the decisions and confirm it in the system. This paradox<br />
is also stressed by Karsh et al. (2010).<br />
Economic barriers such as the lack of easily apparent returns on investments and the inadequate<br />
usability of ERH because of the network effect problems might cause a negative decision regarding<br />
implementation of EHR. Although the HIT Leadership Panel in the United States concluded that the<br />
potential benefits outweigh costs (Lewin Group, 2005), there is a problem of necessary large investments<br />
in software, hardware, installation, training, wiring and communications as well as a lack of certification<br />
and standardisation (Hillestad et al., 2005). The ability EHR has to exchange the data of individual<br />
organisations (e.g. one hospital) with others (e.g. competing hospitals) for free also represents a<br />
problematic issue in this area.<br />
Focusing on EHR as the interoperability portion of EMR, it often integrates or connects existing EMR or<br />
EHR systems. Such an integration of many different legacy systems might be very problematic. Not only<br />
within one organisation, such as hospital with different departments using different systems, but even<br />
more so on a national or international level. Within such a process, standards play a very important role.<br />
The users of EHR are countless: physicians, nurses, patients, pharmacies, insurance companies, drug<br />
providers, social workers, governments, etc. All of them need knowledge about EHR and training to use<br />
and gain from EHR. On the patient’s side, within environments where the digital divide and computer<br />
195
Mitja Decman<br />
illiteracy are problematic, not to mention problems such as using advanced secure technologies like<br />
smart cards, digital certificates and similar, are facing huge problems with the potentially low acceptance<br />
and adoption of EHR systems.<br />
We could not agree more with the National Academy of Science quote that EHR should be considered as<br />
“guilty until proven” (Karsh, Weinger, Abbott, & Wears, 2010).<br />
2. Health record management and preservation in electronic world<br />
E-Health promises a lot: assisting prevention, diagnosis, treatment, monitoring and lifestyle management<br />
(<strong>European</strong> Commission, 2004). Therefore, governments are expected to strengthen efforts to coordinate<br />
the adoption and use of health information technology and develop policies to achieve the goals (Lewin<br />
Group, 2005). The <strong>European</strong> Commission, in its Community Health Strategy for 2008–2013, stressed<br />
that one of the objectives is to “support dynamic health systems and new technologies, recognising that<br />
new technologies can improve disease prevention, diagnosis and treatment, facilitate patient safety and<br />
improve health systems’ coordination, use of resources and sustainability” (<strong>European</strong> Commission,<br />
2007). Within its i2010 strategy, the <strong>European</strong> Union also proposed a benchmarking system for e-Health,<br />
covering 27 <strong>European</strong> member states, Iceland, Norway, Canada and the United States. In its report from<br />
2009, the recommended set of indicators and the recommendation for the e-Health benchmarking<br />
approach were proposed (<strong>European</strong> Commission, 2009).<br />
A report from Empirica showed that almost all of the General Practitioner (GP) practices (87%) in the<br />
<strong>European</strong> Union use a computer, 69% of the EU27 GP practices have an Internet connection and<br />
broadband connections are used by almost half of the EU27 GP practices (Empirica, 2008). The same<br />
report stressed that simple e-Health applications (EMR) such as having electronic data regarding patients<br />
are quite common, while complex EHR systems are not. Denmark, the Netherlands, Finland, Sweden<br />
and the UK emerge as the <strong>European</strong> frontrunners in this regard.<br />
Since the primary player in the health system is of course the patient, countries are focused on the<br />
patient’s role and how to engage the patient. Eurostat data show that more and more people are seeking<br />
health information over the Internet (Figure 2). Research results from Norway, Denmark, Germany,<br />
Greece, Poland, Portugal and Latvia also indicated that people are seeking that information to read<br />
information about health matters and to decide whether to see a doctor and to prepare for and follow up<br />
on doctor's appointments (Andreassen et al., 2007).<br />
Figure 2: Percentage of individuals using the Internet to seek health information, whether for themselves<br />
or others (Source: Eurostat)<br />
196
3. The case of Slovenia<br />
Mitja Decman<br />
According to the Slovenian healthcare strategy, the benefits of health information technology correlate<br />
with the strategic goals of healthcare reform, namely an increased citizen role in health care and<br />
wellbeing, the enabling of safe and reliable access to medical records for health workers including for<br />
learning and knowledge management, easier planning and management of health organisations and<br />
health systems and increased ease of access for patients that would benefit from electronic means of<br />
healthcare (Ministry of Health, 2005).<br />
The Slovenian development of e-health was very influenced by the Slovenian Electronic Commerce, the<br />
Electronic Signature Act from 2000 as the base of e-commerce in public administration and the Strategy<br />
of Informatisation of the Slovenian Health System 2005–2010 (Ministry of Health, 2005), where e-Health<br />
was defined as a wide spectre of usage of information and communication technology within the<br />
Slovenian health system. It was more widely specified as a cluster of information systems and services<br />
that together with organisational changes and the development of new skills contribute to the progress of<br />
health, advances in the accessibility of health care, quality of services and efficiency and productivity.<br />
The strategy was also submitted to the <strong>European</strong> commission as a demand in the Alignment to<br />
Communication Regarding e-Health – Making Healthcare Better for <strong>European</strong> Citizens: An Action Plan<br />
for a <strong>European</strong> e-Health Area (<strong>European</strong> Commission, 2004).<br />
Despite all of this, the development did not produce the integration or interconnectivity of different<br />
systems. The reasons were the following:<br />
The development of informatics in health care was dispersed and not coordinated with the national<br />
strategy;<br />
Systems were used for administrative and technical support and lacked support for health workers<br />
while treating patients;<br />
A lack of technological and content-related exchange of data between health workers and<br />
organisations and between the primary and secondary level;<br />
Lack of knowledge regarding the importance and possibilities of informatics in health – expenses on<br />
average were 1% of the yearly health budget compared to 2.5 – 3% as the <strong>European</strong> average;<br />
Huge gap between the needs and possibilities of informatics within healthcare and other sectors<br />
(Ministry of Health, 2005).<br />
A similar situation was shown through Empirica’s benchmarking results, where Slovenia is one of the top<br />
places for indicators like the use of computers, internet access, practice websites, electronic recording<br />
and the storage of individual administrative patient data. It was among the worst, however, for indicators<br />
like the electronic storage of patients’ basic medical parameters, diagnosis data, medication data and the<br />
use of a computer during consultations (Empirica, 2008). This clearly shows that computer hardware and<br />
networking was widely adopted as part of the compulsory health insurance card system, while EMR and<br />
EHR systems were generally missing.<br />
Figure 3: Percentage of individuals in 2009 using the Internet to seek health information whether for<br />
themselves or others (source: Eurostat)<br />
197
Mitja Decman<br />
The last big milestone for Slovenia was the Action Plan for e-Health (April 2009) that announced the<br />
project called e-Health. This is one of the biggest national projects in the area of e-government, as it is<br />
projected to cost around 67 million Euros by 2015 (27 million Euros will be provided by the <strong>European</strong><br />
Social Fund). By the year 2023, the cost would total more than 130 million Euros. It is an important step<br />
for establishing efficient, flexible and modern national e-Health systems to support the strategic goals of<br />
the Slovenian healthcare system. The goal of the e-Health project is to create a modern interoperable<br />
health information system that would enable secure electronic business and efficient management of<br />
health and health related data. It includes three phases. The first one is the national EHR system (called<br />
eZIS) including the zNET health network (at a cost of 55 million Euros), the zVEM health portal (at a cost<br />
of 26 million Euros) and the EZZ health record notation. In the second phase, a national centre for health<br />
informatics (CIZ) would be established that would master and manage the eZIS system, and in the third<br />
phase, the improvement of health processes and accessibility of health services through promotion and<br />
education.<br />
It is obvious and logical that such a big project would need outsourcing. The huge amount of funding<br />
means good business for the private sector so “the battle can begin.” Already at the beginning of the first<br />
phase, the public procurement did not succeed, because the chosen provider was blamed for being<br />
connected with politicians and the leaders of health care institutions. That hindered the development of<br />
the project and the Minister of Health ordered a revision to find a solution. In the summer of 2010, the<br />
group of revisers from the <strong>European</strong> commission also came to Slovenia to check-on the spending of<br />
<strong>European</strong> money.<br />
4. Empirical research – analysis and findings<br />
Because of the lack of available data regarding the current state in the area of e-Health at the primary<br />
and secondary level of Slovenian health care, we decided to perform empirical research that would focus<br />
on practitioners in Slovenian health care at both levels.<br />
The survey was intended to find the level of general IT penetration into the health sector, the level of<br />
implementation of health systems, the opinion of respondents regarding the benefits and weaknesses of<br />
different properties of such systems and the level of agreement regarding the processes that are going<br />
on currently in the Slovenian health sector.<br />
The subject of the survey was one health care unit, for instance an outpatient’ department, hospital<br />
department, dispensary or whatever unit that involves a smaller group of people working with patients in<br />
a specific health area. We decided to use a web survey, finding respondents using the Business<br />
Directory of the Republic of Slovenia that includes data regarding basically all public and private<br />
organisations in the health care sector. We used a special standardised category filter that focused only<br />
on organisations working in the area of health care including hospital activities, general medical practice<br />
activities, specialist medical practice activities, dental practice activities, alternative medicine activities<br />
and residential care activities for the elderly and disabled (<strong>European</strong> Parliament, 2006). The survey email<br />
invitations were sent to 1064 organisational email addresses with requests to forward them to<br />
individual departments, dispensaries or divisions. Therefore, the primary focus group was not a final<br />
sample of respondents since forwarded invitations reached a second level of respondents unknown<br />
before the sending process. In 20 days, we received 161 fully answered questionnaires (N=161) from 97<br />
various organisations. We were using Survey System 10 software for invitations delivery, web surveys,<br />
password protection, data gathering, etc. Some answers were not answered by all respondents therefore<br />
N can be different in various charts. Among 161 respondents, 94 were doctors, 30 nurses, 10 heads of<br />
departments, 15 other medical staff and 12 other staff. Regarding the types of institutions, 21<br />
respondents were from hospitals, 54 from health centres, 28 from dental offices, 35 from specialist<br />
practices and 23 from other practices. Among respondents, 93 work in the private sector, 17 in the<br />
private sector only and 51 in private practices with concession.<br />
The analysis showed that although in 2004 Slovenia was already among the better equipped countries<br />
within the EU (number of computers per employee in the medical sector) (Meglič, Marušič, Anžur &<br />
Kodele, 2007), the situation in 2010 looks worse. Surprisingly large percentages of respondents<br />
described their internet connection and basic computer equipment as poor or very poor (Figure 4). The<br />
same respondent opinion was noted regarding printers, email, connection to the HIIS (which is<br />
compulsory for treating a patient and checking his/her insurance data) and EMR. Comparing them<br />
amongst each other, we noted that only basic IT, such as computers and printers with the addition of<br />
some application software for data management, was slightly better graded compared to other indicators.<br />
198
Mitja Decman<br />
Figure 4: Percentages of respondent answers to questions regarding basic IT satisfaction (N=154, 144,<br />
154, 160, 159, 160)<br />
Considering the benefits of IT in the area of the health sector, respondents agree with almost all benefits<br />
put forward by the theory, but they show more uncertainty regarding the benefits of faster patient<br />
treatment, lower health costs and improved patient care (Figure 5). Particularly regarding faster patient<br />
treatment, the level of disagreement was the highest.<br />
Figure 5: Percentages of respondent agreement with HIT benefits (N=152, 145, 152, 153, 154, 152, 153,<br />
153, 149)<br />
Considering the weaknesses of HIT, opinions are less one sided (Figure 6). On average, the respondents<br />
do not recognise problems in relation to data security threats but primarily in focusing on the computer<br />
instead of the patient and the “fear” of errors from process changes that arise with implementation of HIT.<br />
They do realise the importance of the widespread-ness and connectivity of EHR systems to minimise the<br />
weakness and inefficiency of isolated systems.<br />
Figure 7 shows that among the capabilities of EHR systems, the most important to respondents are the<br />
results from specialists and laboratory results. Various treatments can continue at the primary level after<br />
these results are received and even stored for future medical decisions at the health organisation instead<br />
of patients keeping them at home. Respondents also feel that the online checking of personal health<br />
records by the patients is not important including updating of this data by the patients alone. On average,<br />
however, they agree that all of the stated capabilities of EHR systems would significantly influence<br />
patients’ treatment and physicians’ work.<br />
Respondents detect various threats while implementing and using EHR systems (Figure 8).The most<br />
important on average is certainly the high costs of purchase and maintenance, while there is no fear that<br />
199
Mitja Decman<br />
the management of the organisation would not have enough interest is such projects. All of the other<br />
threats are graded on average to be relatively equal, giving some more concern to the limited or<br />
inadequate functionalities of existing solutions on the market.<br />
Figure 6: Percentages of respondent agreement with HIT weaknesses (N=144, 152, 155, 155, 155, 152)<br />
Figure 7: Percentages of respondent agreement regarding the importance of the stated capabilities of<br />
EHR (N=146, 147, 144, 145, 145, 151, 148, 150, 153)<br />
5. Conclusion<br />
Information technology in health care is a clear example of how complex and interconnected the field of<br />
informatics is. If not here, then where else are technology, legislation, knowledge, people and policies so<br />
connected and dependant upon one other? Each of these elements is important if not crucial for the<br />
whole and should be treated like that – carefully and of equal importance.<br />
Health information technologies, particularly EHR, are trends in health care, bringing together many<br />
theoretically and practically proven benefits and weaknesses as well so careful planning is essential.<br />
Although many papers question and criticise the most obviously stated benefits, they do not deny that<br />
health information technology should be in place now and in the future but warn that careful planning,<br />
design and implementation should also take place.<br />
200
Mitja Decman<br />
Figure 8: Percentages of respondent agreement regarding the importance of the stated obstacles to<br />
EHR implementation (N= 145, 146, 141, 136, 132, 138, 143)<br />
It should be understood the EMRs and EHRs are here to serve patients and their treatments. This is<br />
shown in the results of the Slovenian empirical research presented in this paper. EHR should be easy to<br />
use so doctors can focus on patients and not on computers as well as entering and retrieving data.<br />
Systems should be connected so patients would cease being the messengers, transporting prescriptions,<br />
laboratory results, orders, etc. Strategists, developers, managers, medical workers and other<br />
stakeholders should carefully consider existing and re-engineered business processes so as to create as<br />
few errors as possible when implementing health information technology.<br />
References<br />
Andreassen, H. K., Bujnowska-Fedak, M. M., Chronaki, C. E., Dumitru, R. C., Pudule, I., Santana, S., Voss, H., et al.<br />
(2007) “<strong>European</strong> Citizens use of E-health Services: A Study of Seven Countries”, BMC Public Health, No. 7,<br />
pp 53–53, doi:10.1186/1471-2458-7-53.<br />
Brailer, D. J. (2005) “Interoperability: The Key to the Future Health Care System”, Health Affairs,<br />
doi:10.1377/hlthaff.w5.19.<br />
Davies, M., Eccles, S., Braunold, G. W., and Thick, M. (2008) “Giving Control to Patients”, The British Journal of<br />
General Practice, Vol 58, No. 548, pp 148–149.<br />
DesRoches, C. M., Campbell, E. G., Rao, S. R., Donelan, K., Ferris, T. G., Jha, A., Kaushal, R., et al. (2008)<br />
“Electronic Health Records in Ambulatory Care — A National Survey of Physicians”, New England Journal of<br />
Medicine, Vol 359, No. 1, pp 50–60, doi:10.1056/NEJMsa0802005.<br />
Empirica. (2008) “Benchmarking ICT use among General Practitioners in Europe - Final Report”, [online], i2010 - A<br />
<strong>European</strong> Information Society for Growth and Employment,<br />
ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/gp_survey_final_report.pdf.<br />
<strong>European</strong> Commission. (2004) “Communication on e-Health - Making Healthcare Better for <strong>European</strong> Citizens: An<br />
Action Plan for a <strong>European</strong> e-Health Area”, [online], Information Society,<br />
ec.europa.eu/information_society/doc/qualif/health/COM_2004_0356_F_EN_ACTE.pdf.<br />
<strong>European</strong> Commission. (2007) “WHITE PAPER – Together for Health: A Strategic Approach for the EU 2008–2013”,<br />
Brussels: <strong>European</strong> Commission.<br />
<strong>European</strong> Commission. (2009) “eHealth Benchmarking (Phase II)”, [online], Information Society,<br />
ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/ehealth_ii_bench_final_report.pdf.<br />
<strong>European</strong> Parliament. (2006) “Regulation (EC) no. 1893/2006 of the <strong>European</strong> Parliament and of the Council<br />
Establishing the Statistical Classification of Economic Activities NACE Revision 2 and Amending”, [online],<br />
Official Journal of the <strong>European</strong> Union, eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2006:393:0001:0039:EN:PDF.<br />
Ford, E. W., Menachemi, N., and Phillips, M. T. (2006) “Predicting the Adoption of Electronic Health Records by<br />
Physicians: When Will Health Care be Paperless?”, Journal of the American Medical Informatics Association,<br />
Vol 13, No. 1, pp 106–112, doi:10.1197/jamia.M1913.<br />
Habib, J. L. (2010) “EHRs, Meaningful Use, and a Model EMR”. Drug Benefit Trends, Vol 4, No. 22, pp 1–3.<br />
Hillestad, R., Bigelow, J., Bower, A., Girosi, F., Meili, R., and Scoville, R. (2005) “Can Electronic Medical Record<br />
Systems Transform Health Care? Potential Health Benefits, Savings, and Costs”, Health Affairs: The Policy<br />
Journal of the Health Sphere, Vol 24, No. 5, pp 1103–1117.<br />
201
Mitja Decman<br />
Hillestad, R., Bigelow, J., Bower, A., Girosi, F., Meili, R., Scoville, R., and Taylor, R. (2005) “Can Electronic Medical<br />
Record Systems Transform Health Care? Potential Health Benefits, Savings, And Costs”, Health Affairs, Vol 24,<br />
No. 5, pp 1103–1117, doi:10.1377/hlthaff.24.5.1103.<br />
HIMSS Analytics. (2010) “Stage 7 Award”, [online], HIMSS Analytics,<br />
www.himssanalytics.org/hc_providers/stage7casestudies_UnivWisco.asp.<br />
Johnson, C. W. (2006) “Why did that happen? Exploring the Proliferation of Barely Usable Software in Healthcare<br />
Systems”, Quality and Safety in Health Care, Vol 15, No. 1, i76-i81. doi:10.1136/qshc.2005.016105.<br />
Karsh, B.-T., Weinger, M. B., Abbott, P. A., and Wears, R. L. (2010) “Health Information Technology: Fallacies and<br />
Sober Realities”, Journal of the American Medical Informatics Association, Vol 17, No. 6, pp 617–623.<br />
Karsh, B.-T., Weinger, M. B., Abbott, P. A., and Wears, R. L. (2010) “Health Information Technology: Fallacies and<br />
Sober Realities”, Journal of the American Medical Informatics Association, Vol 17, No. 6, pp 617–623,<br />
doi:10.1136/jamia.2010.005637.<br />
Lazakidou, A. A. (2006) Handbook of Research on Informatics in Healthcare and Biomedicine. Idea Group Inc (IGI),<br />
Hershey PA.<br />
Lewin Group. (2005) “Health Information Technology Leadership Panel Final Report”, [online], The Office of the<br />
National Coordinator for Health Information Technology, www.hhs.gov/healthit/HITFinalReport.pdf.<br />
Meglič, M., Marušič, D., Anžur, A., and Kodele, D. (2007) “Equipment and the Usage of Information Technologies in<br />
Hospitals and Health Care Centers in Slovenia”, Informatica Medica Slovenica, Vol 12, No. 2, pp 34–39.<br />
Ministry of Health. (2005) “E-Health Strategy 2010”, [online], Ministry of Health,<br />
www.mz.gov.si/si/delovna_podrocja/zdravstveno_varstvo/sluzba_za_informatiko/e_zdravje_2010.<br />
Rector, A. L., Nowlan, W. A., and Kay, S. (1991) “Foundations for an Electronic Medical Record”, Methods Inf Med,<br />
Vol. 30, No. 3, pp 179–186.<br />
The Health Insurance Institute of Slovenia. (2009) “Slovene Health Insurance Card”, [online], The Health Insurance<br />
Institute of Slovenia,<br />
www.zzzs.si/zzzs/internet/zzzseng.nsf/0/acb90e7f8d38b022c1256eb6002968b1/$FILE/informativni%20angle%<br />
C5%A1ki%20list.pdf.<br />
The National Alliance for Health Information Technology. (2008) “Defining Key Health Information Technology<br />
Terms”, [online], The Office of the National Coordinator for Health Information Technology (ONC),<br />
healthit.hhs.gov/portal/server.pt/gateway/PTARGS_0_10741_848133_0_0_18/10_2_hit_terms.pdf.<br />
Waegemann, P. C. (2003) “EHR vs. CPR vs. EMR”, [online], Healthcare Informatics Online,<br />
http://www.healthcareinformatics.com/issues/2003/05_03/cover_ehr.htm.<br />
202
Sustaining Electronic Governance Programs in Developing<br />
Countries<br />
Zamira Dzhusupova, Tomasz Janowski, Adegboyega Ojo and Elsa Estevez<br />
UNU-IIST Center for Electronic Governance, Macao, China<br />
zamira@iist.unu.edu<br />
tj@iist.unu.edu<br />
ao@iist.unu.edu<br />
elsa@iist.unu.edu<br />
Abstract: This paper focuses on the challenge of sustaining Electronic Governance (EGOV) initiatives in developing<br />
countries to ensure their real impact on the society. While the challenge is well-recognized in the international<br />
development community, there is little evidence of research that discusses this challenge and how it could be<br />
addressed. This paper attempts to fill this gap by presenting a comprehensive approach which directly addresses the<br />
sustainability issues as part of the EGOV development lifecycle, and demonstrates how this approach was applied in<br />
a real-life project context in Afghanistan, aimed at addressing country-specific EGOV sustainability challenges. In<br />
view of this experience, the paper also discusses the adequacy of the approach to meet a range of sustainability<br />
challenges, with concluding remarks to guide developing countries in their endeavors to sustain EGOV programs.<br />
Keywords: electronic governance program sustainability, electronic governance in developing countries, EGOV.*<br />
framework, national ownership, stakeholder engagement, institutionalization<br />
1. Introduction<br />
Electronic Governance (EGOV) in Developing Countries (DCs) is receiving increased attention given the<br />
‘leapfrogging’ opportunities available through modern technologies (Basu 2004). As in such countries,<br />
governments face resource constraints in improving their operations and delivering services to citizens,<br />
EGOV has been touted as a means of saving costs while improving quality, response times, and access<br />
to services (Westcott, C., Pizarro, M., Schiavo-Campo 2000). However, EGOV has yet to prove<br />
successful in the vast majority of DCs governments (Furuholt & Wahid 2008). Among other factors, the<br />
countries struggling with providing basic necessities to their citizens will not have the same priority for<br />
EGOV development as the wealthier nations (Evans & Yen 2006), (Backus 2001), (Heeks 2008).<br />
A general problem associated with EGOV in DCs, well recognized in the international development<br />
community, is the challenge of sustaining the benefits created by the EGOV programs. Many EGOV<br />
initiatives in DCs are supported by donor organizations which are more successful in achieving their initial<br />
objectives than in sustaining such initiatives beyond their completion time (Heeks 2003). Unfortunately,<br />
few studies focus on the challenges affecting sustainable implementation of EGOV initiatives and how<br />
these challenges could be addressed. This paper attempts to fill this gap. It presents an EGOV<br />
development framework (EGOV.*) which directly addresses a number of sustainability challenges as part<br />
of the EGOV development life-cycle, and discusses the experience with implementing this framework in a<br />
real-life EGOV project in Afghanistan (EGOV.AF).<br />
The remainder of this paper is organized as follows. Section 2 presents a methodology adopted in this<br />
research. Related work is reviewed in Section 3, followed by background in Section 4. The definition and<br />
major challenges for sustaining EGOV programs in DCs are outlined in Section 5, while the EGOV<br />
development framework and the experience of its practical application in Afghanistan are described in<br />
Sections 6 and 7 accordingly. Section 8 includes a discussion about the findings of this research, and<br />
Section 9 presents concluding remarks and recommendations for future work.<br />
2. Methodology<br />
This research was carried out in five steps. First, we conducted an extensive literature review related to<br />
EGOV sustainability, with the aim of synthesizing the EGOV sustainability factors. Second, we applied<br />
these factors to review an existing EGOV development framework called EGOV.* (Janowski et al. 2010)<br />
to address sustainability issues. Third, we localized the generic EGOV.* sustainability requirements to the<br />
case of Afghanistan. Fourth, we developed and implemented a concrete instance of the EGOV.*<br />
framework in Afghanistan (EGOV.AF) based on the localized requirements which include: collecting<br />
readiness assessment data at the national- and agency-levels, conducting interactive visioning and<br />
strategy development activities with focused groups, building human capacity in government agencies<br />
203
Zamira Dzhusupova et al.<br />
based on the training needs of the civil servants, etc. Fifth, based on the EGOV.AF experience, we<br />
identified certain preconditions for effective utilization of the EGOV.* framework in other DCs.<br />
3. Related work<br />
The discussion about sustainability of EGOV initiatives in DCs is still in its infancy (Schuppan 2009). A<br />
handful of the relevant scholarly articles are reviewed in this section. (Furuholt & Wahid 2008) indicated<br />
that long-term sustainability of the EGOV initiatives in DCs remains a challenge, even after a year of<br />
operation, and investigated the reasons. The paper claims that the greatest constraint to EGOV in DCs,<br />
and the reason of exposure to sustainability failures, is dependence on the aid agencies. The paper<br />
argues that strong political leadership, clear vision, early involvement of stakeholders, regular feedback<br />
and partnership are important to sustain progress with limited resources.<br />
Heeks claims that sustainability failures frequently occur because of the design-reality gap (Heeks 2003),<br />
lack of national ownership and weaknesses of the central EGOV institutions which fail to balance external<br />
and internal interests (Heeks 2001a). He argues that when many EGOV initiatives are donor-driven and<br />
key stakeholders are often ignored in planning, this results in insufficient focus on the local context. He<br />
highlighted the role of leadership, commitment of public officials, and the presence of institutions able to<br />
lead, coordinate and sustain EGOV. He emphasized the importance of strategic thinking, knowledge, and<br />
skills and attitudes, especially within the public sector.<br />
(Grönlund et al. 2005) identified the sustainability problem as a critical factor to overcome, claiming that<br />
even DCs at an early EGOV development stage require a comprehensive strategy in a country-specific<br />
context, with long-term political commitment to avoid dependence on the donor organizations. The paper<br />
also argues that sustaining the EGOV effort requires a decision-making system that provides substantial<br />
investment in human resources and social embedment to utilize local labor. (Kumar & Best 2006)<br />
examined the sustainability of EGOV projects in DCs and postulated that such projects fail to be<br />
politically and institutionally sustainable due to a range of people, management, cultural and structural<br />
factors: lack of effective public leadership and sustained commitment, inadequate training of government<br />
officials, and lack of performance evaluation and monitoring, and stakeholder involvement. (Schuppan<br />
2009) analyzed the potentials, opportunities, risks and implications of EGOV development in DCs, and<br />
claimed that a simple transfer of EGOV concepts from North to South is not working. The paper makes<br />
the case for considering the institutional, cultural, and wider administrative contexts to avoid unintended<br />
effects and for focusing on capacity development to build local management competence.<br />
Among the challenges to sustainable EGOV implementation in DCs, (Ali et al. 2009) identified the lack of<br />
capacity in government, limited financial and human resources, dependence on donor funding, lack of<br />
coordination among isolated projects and between levels of government, and lack of awareness and<br />
interest in EGOV from citizens. The paper argues that the reliance on foreign experts leads to little<br />
consideration of the cultural and social issues in the national context. In a summary, the reviewed<br />
literature identifies critical factors causing the EGOV sustainability failure in DCs. However, there is little<br />
evidence of research on possible ways of addressing such challenges.<br />
4. Background<br />
4.1 EGOV programs<br />
The evidence of the benefits and challenges facing EGOV implementations around the world was<br />
reported by the UN surveys (UNDESA 2010), OECD studies (OECD 2003b), reports by the World Bank<br />
and Asia Development Bank, and discussed in (Heeks 2001b), (Zwahr et al. 2005), (Gilgarcia & Pardo<br />
2005) and (Leitner 2006). Successful EGOV programs increase citizen satisfaction, improve government<br />
efficiency, drive down transaction costs (Jaeger 2003), (Evans & Yen 2006), transforms how citizens<br />
interact with government, and influences policy-making processes through e-democracy and eparticipation<br />
(Stanforth & Flynn 2008). However, the observation of the EGOV programs around the world<br />
shows that management-oriented organizational reform creates better conditions to EGOV<br />
implementation (Schuppan 2009).<br />
4.2 EGOV programs in DCs<br />
Many DCs initiated EGOV strategies and programs with support from donor organizations (Heeks<br />
2001a), (Schuppan 2009), (Grönlund et al. 2005), (Hanna & Qiang 2005), (Bhuiyan 2011) aimed at<br />
improving public services and delivering them efficiently and conveniently to customers (Schware &<br />
204
Zamira Dzhusupova et al.<br />
Deane 2003). Experience shows that EGOV can improve transparency and thus reduce corruption and<br />
poverty (Bhuiyan 2011). While the benefits of EGOV in DCs and developed countries are the same<br />
(Ndou 2004), many benefits remain unrealized in DCs due to their limited use of ICT.<br />
4.3 EGOV programs in DCs – implementation challenges<br />
As well described in the literature, EGOV initiatives face various challenges for successful<br />
implementation in DCs. (Furuholt & Wahid 2008) classified these challenges into: 1) management -<br />
strategy, change management, political leadership, institutionalization, and continuous project monitoring<br />
and evaluation; 2) infrastructure - ICT infrastructure, legislation and financial resources; and 3) human<br />
factors – competence, skills, training and trust. Alternatively, (Backus 2001) classified them into: 1)<br />
political - strategy and policy, law and legislation, leadership, decision making, funding, international<br />
affairs and political stability; 2) social - people, education, employment, income, digital divide, rural versus<br />
urban areas, rich versus poor, literacy and IT skills; 3) economic - funding, cost-savings, business<br />
models, e-commerce; and 4) technological - software, hardware, infrastructure, telecom, IT workforce,<br />
maintenance, safety and security. (Heeks 2008) identified ten success factors: 1) external pressure, 2)<br />
internal political desire, 3) overall vision and strategy, 4) project management, 5) change management, 6)<br />
politics and self-interest, 7) design, 8) competencies, 9) technological infrastructure and 10) others.<br />
(Grönlund et al. 2005) expressed concern about the lack of long-term political commitment, dependence<br />
on donor organizations and weak human capacity. Among EGOV failure factors (Kumar & Best 2006)<br />
pointed out the lack of effective public leadership and sustained commitment, inadequate training of<br />
government officials, lack of performance evaluation and monitoring, and lack of stakeholder<br />
involvement. (Schuppan 2009) postulated considering the institutional, cultural and administrative<br />
contexts, with particular focus on building local capacity in the setup of EGOV initiatives. Finally, (Ali et al.<br />
2009) identified the challenges to include lack of government capacity, lack of collaboration and<br />
partnership, dependence on external aid, lack of citizen awareness and cultural and social issues.<br />
Table 1 depicts a variety of views on the EGOV implementation challenges in DCs. Despite this variety, a<br />
common understanding among development researchers and practitioners is that the biggest concerns<br />
are policy, management, capacity, funding, cultural and social issues, not technology.<br />
Table 1: EGOV programs in DCs – implementation challenges<br />
(Furuholt & Wahid<br />
2008)<br />
Management - strategy, change, leadership, monitoring, evaluation<br />
Infrastructure - ICT, legislation, financial resources<br />
Human - competence, skills, training, trust<br />
(Backus 2001) Political - strategy, policy, legislation, leadership, funding, stability<br />
Social - education, employment, digital divide, literacy, IT skills<br />
Economic - funding, business models<br />
Technological - infrastructure, maintenance, safety/security<br />
(Heeks 2008) External pressure<br />
Internal political desire<br />
Overall vision and strategy<br />
Project management<br />
Change management<br />
(Grönlund et al.<br />
2005)<br />
(Kumar & Best<br />
2006)<br />
Lack of long-term political commitment<br />
Dependence on donor organizations<br />
Lack of focus on the country development context<br />
Weak human capacity<br />
Lack of public leadership and sustained commitment<br />
Weak government capacity<br />
Lack of evaluation and monitoring<br />
Lack of stakeholder engagement<br />
Politics and self-interest<br />
Design<br />
Competencies<br />
Technological infrastructure<br />
(Schuppan 2009) Lack of focus on institutional, cultural, and administrative contexts<br />
Lack of focus on local capacity and management competence<br />
(Ali et al. 2009) Lack of government capacity<br />
Dependence on donor organizations<br />
Lack of coordination in government<br />
5. Sustaining EGOV programs in DCs<br />
Lack of private sector partnership<br />
Lack of citizen awareness<br />
Cultural and social issues<br />
In this section, we explain the concept of EGOV program sustainability and determine the major<br />
challenges for sustaining EGOV programs in DCs.<br />
205
5.1 Sustaining EGOV programs – concept<br />
Zamira Dzhusupova et al.<br />
Despite the growing interest in EGOV program sustainability, no explicit definition was proposed in the<br />
literature. We refer to program sustainability as program continuation (Shediac-Rizkallah & Bone 1998)<br />
and particularly how a program can continue creating benefits to the stakeholders (Harvey 2006) through<br />
institutionalization (Pluye 2004) and local capacity building (Harvey 2006).<br />
5.2 Sustaining EGOV programs – challenges in DCs<br />
From the literature review in Sections 2 and 3, sustainability issues are common reasons for failure of the<br />
EGOV initiatives in DCs. Based on this review and our own experience, we identified seven challenges<br />
influencing the sustainability of EGOV programs in DCs:<br />
C1. Ownership - Lack of national ownership (Heeks 2001a), (Sarantis et al. 2011) results in the absence<br />
of a cohesive EGOV strategy (Ronaghan 2002), little consideration of the local context (Dada 2006) and<br />
cultural and social issues (Cloete 2004), (Schuppan 2009), (Bhuiyan 2011), (Kumar & Best 2006),<br />
(UNDESA 2008). The reasons are: reliance on external experts (Ali et al. 2009), (Grönlund et al. 2005),<br />
(Heeks 2003) and ignoring the main stakeholders in EGOV planning, causing lack of ownership, and<br />
dominance of politics and self-interest (Heeks 2001b), (Stanforth & Flynn 2008).<br />
C2. Leadership - Lack of leadership at different levels of government, especially sustained political<br />
leadership, (Heeks 2001b), (Grönlund et al. 2005), (Kifle et al. 2009), (Backus 2001), (OECD 2003a), lack<br />
of commitment from top management and senior officials, causing resource misallocation and negative<br />
message to other groups (Furuholt & Wahid 2008), (UNDESA 2008), (Rose & Grant 2010).<br />
C3. Vision and Strategy - Absence of a long-term vision (Backus 2001) and cohesive implementation<br />
strategy (Sarantis et al. 2011) results in the lack of guidance and connection between ends and means<br />
(Heeks 2008), uncoordinated and isolated projects, and dispersed responsibilities due to multiple<br />
ownership (Cloete 2004), (Ndou 2004).<br />
C4. Institutional Capability - Weak or absent institutions for EGOV policy and coordination (Heeks<br />
2001a), (Schuppan 2009), with low administrative capacity and management liabilities within government<br />
(UNDESA 2003), resulting in the lack of coordination among EGOV projects (Dada 2006), and lack of<br />
collaboration between different functions and levels of government and between public and private<br />
sectors (Heeks 2003). Also, poor project and program management, weakness of controls, ineffective<br />
procurement and change management (Ronaghan 2002), (Heeks 2001b), (Jaeger 2003).<br />
C5. Design Versus Reality - Unrealistic expectations (Dada 2006) and poor understanding of the needs<br />
of people (UNDESA 2008) resulting in poor design which does not match the local environment including<br />
culture, values and needs. This is caused by the lack of inputs from local stakeholders and occurs when<br />
foreign donors and consultants drive the EGOV efforts (Cloete 2004), (Heeks 2003).<br />
C6. Capacity and Awareness - A huge gap exists between the capacities required for EGOV and the<br />
capacities present in most DCs (Heeks 2001a), with shortage of qualified personnel in government and<br />
lack of awareness among officials (Ronaghan 2002) and citizens (Ali et al. 2009). Also the gaps between<br />
the educated and uneducated, the rich and poor result in negative attitudes to EGOV, resistance to<br />
change, and biased provision of e-services (Basu 2004).<br />
C7. Dependence on External Assistance - Because of limited financial and human resources, many<br />
EGOV initiatives in DCs are dependent on the aid agencies, vendors and consultants, making them<br />
particularly vulnerable when the outside funding ends (Heeks 2003), (Grönlund et al. 2005), (Furuholt &<br />
Wahid 2008). When donors work with different agencies, isolation, fragmentation and duplication of<br />
applications may be reinforced (Hanna & Qiang 2005), (Schware & Deane 2003).<br />
To address these factors, there is a need for a comprehensive approach to EGOV design and<br />
development which explicitly considers the sustainability issue.<br />
6. Sustaining EGOV program in DCs: The EGOV.* framework<br />
This section presents a holistic approach to EGOV program development in DCs called EGOV.*. By<br />
design, the approach addresses the challenges related to EGOV program sustainability.<br />
206
6.1 EGOV.* framework - overview<br />
Zamira Dzhusupova et al.<br />
The aim of the EGOV.* framework is to build the local ownership and capability for establishing and<br />
sustaining EGOV development in a given Public Administration (PA), particularly in the DCs context. The<br />
framework prescribes a set of six inter-related activities as follows:<br />
A1. Assessing EGOV Readiness – Establishing the state-of-readiness for EGOV development in the PA<br />
and identifying potential stakeholders and their interests, willing to provide inputs for developing a realistic<br />
strategy for EGOV in the PA and to engage in the implementation of this strategy.<br />
A2. Formulating EGOV Vision and Strategy – Engaging the stakeholders identified in A1 in formulating<br />
the long-term vision for EGOV in the PA and the goals, strategies and targets to realize this vision, based<br />
on the findings of the activity A1 and lessons learned from other countries.<br />
A3. Constructing EGOV Program – Setting up a whole-of-government program through which the EGOV<br />
strategy defined through A2 could be implemented across the PA, engaging the stakeholders.<br />
A4. Building Human Capacity – Raising the capacity of the government workforce in the PA, including<br />
leadership, management and technical skills to be able to lead, implement and maintain EGOV<br />
operations, and the capacity of citizens to be able to benefit from the EGOV program.<br />
A5. Building Institutional Capacity – Strengthening the organizational capacity in the PA to be able to<br />
implement and benefit from the EGOV Program constructed through A3.<br />
A6. Building Research Capacity – Building local EGOV research capacity, including the development and<br />
adaptation of methodologies, survey instruments, assessment tools and guidelines, and capacity for<br />
strategic planning and program management adapting international best practices to the local context.<br />
Three main actors in the EGOV.* framework is: government, local stakeholders and external assistance.<br />
The government acts in the role of driver, owner and leader. Local stakeholders are the major<br />
contributors to the EGOV strategy and its implementation. External assistance acts as a facilitator and<br />
mentor. Table 2 shows how the framework ensures a balance between these roles across its six<br />
activities.<br />
EGOV.* promotes the principles of:<br />
P1. National ownership<br />
P2. Strong leadership<br />
P3. Stakeholder engagement<br />
P4. Balancing internal and external roles<br />
Figure 1 depicts the six activities and four principles of the framework.<br />
6.2 EGOV.* framework – addressing sustainability challenges<br />
Here is how EGOV.* addresses the challenges to EGOV sustainability in DCs, identified in Section 4.2:<br />
C1.Ownership - EGOV.* helps secure the national ownership of the EGOV program by balancing the<br />
internal influences from the PA and external influences from the aid agencies, vendors and international<br />
consultants, and building leadership at all levels of the PA. Table 2 elaborates how this balance is<br />
achieved by all actors involved and across all EGOV.* activities.<br />
C2. Leadership - In order to build leadership in government, A4 prescribes the organization of schools for<br />
policy-makers, decision-makers and public managers to overcome EGOV implementation challenges<br />
through new competencies. Moreover, a governance structure defined within A3 aims at political,<br />
strategic and managerial leadership and long-term commitment to sustaining the EGOV program.<br />
207
Zamira Dzhusupova et al.<br />
C3. Vision and Strategy - Based on readiness assessment carried out in A1 and international<br />
experiences investigated in A6, A2 defines the vision and strategy for long-term EGOV operation, with<br />
concrete benefits created to various stakeholders. The participatory process ensures consensus on the<br />
EGOV direction among the key stakeholders and their collaboration in the EGOV implementation.<br />
P2 – Leadership P3 – Engagement<br />
A3 - Constructing EGOV Program<br />
P1 – National Ownership<br />
A2 - Formulating EGOV Vision and Strategy<br />
A1 - Assessing EGOV Readiness<br />
Figure 1: EGOV.* framework – principles and activities<br />
Table 2: EGOV.* framework – actors and roles<br />
Activities<br />
Government<br />
Actors and Roles<br />
Local Stakeholders External Assistance<br />
A1 -<br />
Raising awareness<br />
Providing information on Facilitating assessment process<br />
Assessing Building assessment team stakeholder profiles and Providing methodologies and tools<br />
EGOV Identifying/analyzing stakeholders<br />
interests<br />
Building assessment capacity<br />
Readiness Communicating with stakeholders Participating in the survey Adapting assistance to local<br />
Defining the scope of assessment Partnering in the assessment<br />
conditions<br />
Organizing the survey<br />
exercise<br />
Designing the assistance process<br />
Gathering data, providing Advisory and consultancy Analyzing survey data<br />
helpdesk<br />
services<br />
Providing feedback on<br />
assessment<br />
Offering recommendations<br />
A2 - Organizing visioning/strategy Providing inputs for vision, Facilitating visioning and strategy<br />
Formulatin<br />
events<br />
goals, strategies, directions development process and<br />
g EGOV Engaging stakeholders<br />
and action lines<br />
mentoring<br />
Vision and Gathering inputs from Providing feedback during Providing methodologies and tools<br />
Strategy<br />
stakeholders<br />
public consultation Building capacity for strategic<br />
Drafting strategy document Partnership for capacity<br />
planning<br />
Organizing public consultation building and strategic Analyzing and summarizing the<br />
Driving strategy adoption<br />
planning<br />
inputs from major stakeholders<br />
Building a partnership platform Advisory and consultancy<br />
services<br />
Offering recommendations<br />
A3 - Defining program objectives, Providing inputs for program Facilitating program development<br />
Constructin<br />
governance<br />
development<br />
between government and<br />
g EGOV Setting up planning, Capacity building for project<br />
stakeholders<br />
Program implementation, monitoring and<br />
management<br />
Providing methodologies and<br />
control of projects Partnership in implementation<br />
tools<br />
Adopting stakeholder, benefits, Advisory and consultancy Building program management<br />
portfolio and risk management<br />
services<br />
capacity<br />
Providing feedback on<br />
program design<br />
Offering recommendations<br />
A4 – Building Human<br />
Capacity<br />
P4 – Balancing Internal and External Roles<br />
208<br />
A5 – Building<br />
Institutional Capacity<br />
A6 – Building Research<br />
Capacity
Activities<br />
A4 -<br />
Building<br />
Human<br />
Capacity<br />
A5 -<br />
Building<br />
Institutional<br />
Capacity<br />
A6 -<br />
Building<br />
Research<br />
Capacity<br />
Zamira Dzhusupova et al.<br />
Actors and Roles<br />
Government Local Stakeholders External Assistance<br />
Raising awareness<br />
Organizing workshops and<br />
trainings<br />
Disseminating training materials<br />
Anchoring the culture of capacity<br />
building<br />
Disseminating learning materials<br />
Defining a platform for long-life<br />
learning of government managerial<br />
IT staff<br />
Adaptation of methodologies,<br />
surveys, tools and guidelines to<br />
local conditions<br />
Benchmarking studies and data<br />
analysis<br />
Partnership in developing<br />
human capacity for EGOV<br />
implementation and use<br />
Proving advisory and<br />
consultancy services<br />
Partnership in building<br />
leadership and management<br />
capability in government<br />
Advisory and consultancy<br />
services<br />
Designing capacity building<br />
programs<br />
Partnership in developing<br />
research capacity<br />
Providing advisory and<br />
consultancy services<br />
Facilitating partnership to build<br />
human capacity<br />
Providing methodologies, tools<br />
and courses<br />
Offering recommendations based<br />
on international experience<br />
Facilitating partnerships to build<br />
leadership and management<br />
capability<br />
Providing methodologies, tools,<br />
courses<br />
Offering recommendations<br />
Supervising and mentoring staff<br />
Facilitating partnership for<br />
research<br />
Engaging local staff in adapting<br />
instruments and data analysis and<br />
benchmark studies<br />
Providing methodologies, tools,<br />
courses, supervision, and<br />
mentoring<br />
C4. Institutional Capability - An EGOV program defined in A3 aims at raising the efficiency and assuring<br />
the alignment of EGOV initiatives with whole-of-government goals, towards institutionalizing EGOV<br />
development and ensuring its sustainable operation. The program facilitates the creation of new<br />
capabilities within government and engages various stakeholders in adopting tools to local conditions.<br />
C5. Design Versus Reality – A1 helps address this challenge by assessing the demand, capabilities and<br />
environment for EGOV, underpinning the development in A2 of a realistic EGOV strategy that responds<br />
to the local needs and context, and establishing within A3 a platform for sustaining EGOV.<br />
C6. Capacity and Awareness – In order to raise awareness of EGOV among the stakeholders and their<br />
capacity to contribute and benefit, A5 prescribes workshops on global trends, opportunities and<br />
challenges of EGOV in DCs, while A4 provides training to build capacity in the PA to lead, coordinate and<br />
implement the EGOV program. In addition, while implementing the EGOV program, a key strategy is<br />
building PA’s capacity to implement EGOV and citizen awareness to benefit from it.<br />
C7. Dependence on External Assistance - Active engagement of the EGOV stakeholders and building<br />
partnership with the private sector, academia and non-government organizations helps address the<br />
dependence on external assistance. In addition, balancing internal and external influences by defining the<br />
roles of different actors, focusing on building local capability and using local workforce for EGOV program<br />
implementation support self-sustained EGOV operation.<br />
7. Case study – EGOV.AF<br />
In this section we present our experience in applying the EGOV.* framework in Afghanistan and explain<br />
how the EGOV sustainability issues were addressed within the EGOV.AF project.<br />
7.1 About EGOV.AF project<br />
One of the poorest countries in the world, affected by long history of war and conflicts, Afghanistan has<br />
weak institutions (World Bank 2010) and low human development index (UNDP 2010). At the same time,<br />
the government recognizes that good governance, rule of law, human rights and public engagement are<br />
imperative for the country, and views the rapidly developing ICT sector as a huge opportunity.<br />
The EGOV.AF project was jointly initiated by the Ministry of Communications and Information Technology<br />
(MCIT) and the UNU-IIST Center for Electronic Governance (UNU-IIST-EGOV), aimed at developing the<br />
nationally-owned EGOV strategy and program, well-aligned with the national development and public<br />
reforms priorities. The authors designed this project and implementation it with MCIT.<br />
209
Zamira Dzhusupova et al.<br />
7.2 Addressing sustainability challenges within EGOV.AF<br />
The EGOV.* framework was utilized in Afghanistan through the project instance called EGOV.AF. Here is<br />
how EGOV.AF addressed the sustainability challenges specific to the Afghanistan context:<br />
C1. Ownership - Aiming to secure the local ownership of the EGOV program, the roles of the project<br />
partners and local stakeholders were agreed as follows: 1) MCIT, as project owner, coordinated all<br />
activities and communicated with internal and external stakeholders; 2) Local stakeholders - agencies,<br />
NGOs and international organizations, private sector ICT providers, banks and universities contributed to<br />
the assessment, vision, strategy and program design; 3) UNU-IIST-EGOV provided the direction,<br />
facilitation, methodological support, training, supervision and mentoring; and 4) program board was<br />
recommended to ensure the long-term top-level support to the EGOV program.<br />
C2. Leadership - While strong leadership exists in MCIT to drive EGOV and a few ICT champions are<br />
located in different ministries and agencies, the awareness of the role of EGOV is limited and the<br />
leadership capacity at different levels of PA to drive EGOV implementation is scarce, leading to isolated<br />
and often duplicated initiatives supported by different aid organizations and foreign consultants. In view of<br />
this, the project organized a series of schools and workshops for senior officials and managers from the<br />
central and provincial governments to build leadership at all levels. Active participation of government<br />
leaders from ministries and agencies and collaboration with MCIT during assessment and strategic<br />
planning were most useful. To ensure whole-of-government collaboration during program implementation<br />
and operation, it was recommended to establish the Government Chief Information Officer structure.<br />
C3. Vision and Strategy - A series of multi-stakeholder workshops were organized by MCIT and<br />
facilitated by UNU-IIST-EGOV, using local assessment data and international experiences to produce the<br />
whole-of-government EGOV vision, strategic goals and concrete action lines. The vision and strategy will<br />
guide MCIT in implementing EGOV to utilize the strengths of various stakeholders and to respond to the<br />
needs and development priorities of Afghanistan<br />
C4. Institutional Capability - In order to strengthen government capacity for developing and implementing<br />
the EGOV program, UNU-IIST-EGOV provided training, supervision and mentoring across all activities of<br />
the project, supplied methodologies and tools for stakeholder analysis, readiness assessment and<br />
strategy and program development, and offered fellowships to the staff from MCIT and Kabul University<br />
for learning and research. A whole-of-government EGOV program resulting from EGOV.AF will result in<br />
the institutionalization of EGOV development in Afghanistan.<br />
C5. Design Versus Reality - UNU-IIST-EGOV provided the assessment methodology and instruments,<br />
adapted them to the local context, and trained the local assessment team from MCIT. The team<br />
interviewed various stakeholders and reviewed official documents and reports, collecting information on<br />
the demand for EGOV, public services, enabling environment, available resources and capacity,<br />
perceptions and challenges, and stakeholders and their interests. The assessment helped develop a<br />
realistic EGOV strategy and a sustainable program that respond to the needs of Afghanistan.<br />
C6. Capacity and Awareness - A series of awareness-building events were organized by MCIT and UNU-<br />
IIST-EGOV to build support for EGOV, targeting representatives from government, private sector, NGOs<br />
and universities, while capacity building events developed the skills required for EGOV implementation -<br />
leadership, strategic planning, change management, program management and research. Among the<br />
key EGOV implementation strategies are: creating the enabling environment; building stakeholder<br />
partnership; and raising citizen awareness to be able to benefit from EGOV.<br />
C7. Dependence on External Assistance - This challenge has been addressed by assigning clear roles to<br />
major actors - MCIT as project owner, UNU-IIST-EGOV as facilitator and mentor, and local stakeholders<br />
as contributors, and using partnership arrangements to engage the stakeholders in implementation. For<br />
example, EGOV.AF enabled MCIT to establish the EGOV Competency Center in partnership with<br />
academia and international, to act as a source of local expertise.<br />
8. Discussion<br />
The sustainability of EGOV initiatives in DCs, characterized by resources constraints, corruption, weak<br />
governance and unstable political and economical conditions is a major need and challenge. In this<br />
study, based on existing works and our own field experience, we examined the major challenges to<br />
210
Zamira Dzhusupova et al.<br />
EGOV program sustainability in DCs. Our findings identified seven challenges: C1) lack of local<br />
ownership; C2) lack of leadership; C3) unrealistic or absent vision and strategy; C4) weak institutional<br />
capability; C5) design-reality gap; C6) lack of awareness and capacity; and C7) dependence on external<br />
assistance. To address such challenges, we proposed to use a holistic EGOV development framework<br />
called EGOV.*. EGOV.* prescribes six activities involved in the EGOV design and implementation, and<br />
focuses on building human, organizational and institutional capacity to be able to plan, coordinate,<br />
implement and sustain EGOV locally. EGOV.* identifies three main categories of actors and assigns<br />
them specific roles in EGOV development: the government leads, coordinates and implements EGOV;<br />
local stakeholders contribute to EGOV design, development, implementation and operation through<br />
partnerships; and external assistance facilitates the development of the national capacity. In particular,<br />
EGOV.* addresses the sustainability challenges throughout the EGOV program lifecycle, by utilizing<br />
strong leadership and stakeholder engagement to build the national ownership of the EGOV efforts, and<br />
by carefully balancing the internal and external influences to avoid dependence on external assistance.<br />
From our experience applying the EGOV.* framework in Afghanistan (EGOV.AF project), we observe that<br />
the presence of the following conditions is essential for successful EGOV implementation: 1) A<br />
government organization responsible for leading EGOV development, with dedicated staff for planning<br />
and coordination; 2) A few EGOV promoters at the political and strategic level, who can mobilize internal<br />
and external stakeholders; 3) Understanding of the complexity of EGOV design, development and<br />
implementation, at least within the government organization responsible for EGOV, and the recognition of<br />
the importance of building partnerships; 4) Some organisations outside government, with sufficient<br />
interest and capacity to engage in the partnership for EGOV; 5) A shared understanding within the<br />
government of the national development priorities and the potential of EGOV to offer improvements within<br />
and outside government; and 6) A critical mass of e-champions present in government ministries and<br />
agencies. When these conditions are not met, the effectiveness of the EGOV.* framework can be limited.<br />
9. Conclusions<br />
In this research, we examined the key challenges to sustaining the Electronic Governance (EGOV)<br />
programs in Developing Countries (DCs), and presented an approach to overcoming them, based on the<br />
EGOV development framework called EGOV.*. EGOV.* addresses the sustainability challenges<br />
throughout the EGOV program lifecycle by localization - considering the local context, promoting local<br />
ownership and developing local capability for leading, implementing and sustaining EGOV initiatives.<br />
Based on the EGOV.* implementation experience in Afghanistan (EGOV.AF), we argue that this<br />
approach could guide the development of sustainable EGOV programs in DCs. However, the effective<br />
application of this framework requires a number of conditions to be met. At present, the framework is<br />
being implemented in another country in Africa and a formal evaluation framework is under development<br />
to assess the sustainability of the resulting EGOV programs.<br />
References<br />
Ali, M., Weerakkody, V. & El-Haddadeh, R., 2009. The Impact of National Culture on E-Government Implementation :<br />
A Comparison Case Study. In Proceedings of the Fifteenth Americas <strong>Conference</strong> on Information Systems, San<br />
Francisco, California August <strong>6th</strong>-9th 2009. pp. 1-13.<br />
Backus, M., 2001. E-governance in Developing Countries, IICD Research Brief<br />
Basu, S., 2004. E-government and developing countries: an overview. International Review of Law, Computers &<br />
Technology, 18(1), pp.109-132.<br />
Bhuiyan, S.H., 2011. Modernizing Bangladesh public administration through e-governance: Benefits and challenges.<br />
Government Information Quarterly, 28(1), pp.54-65.<br />
Cloete, F., 2004. Maximising the potential of transforming policy failure into policy success : E-government , the<br />
digital divide and e-development In Annual Congress of the International Institute of Administrative Sciences<br />
(IIAS). pp. 14 - 18.<br />
Dada, D., 2006. The Failure of E-Government In Developing Countries: A Literature Review. The Electronic Journal<br />
on Information Systems in Developing Countries http://www.ejisdc.org, 26(1), pp.1- 10.<br />
Evans, D. & Yen, D., 2006. E-Government: Evolving Relationship of Citizens and Government, Domestic, and<br />
International Development. Government Information Quarterly, 23(2), pp.207-235.<br />
Furuholt, B. & Wahid, F., 2008. E-government Challenges and the Role of Political Leadership in Indonesia : the<br />
Case of Sragen. In Proceedings of the 41st Hawaii International <strong>Conference</strong> on System Sciences. pp. 1-10.<br />
Gilgarcia, J. & Pardo, T., 2005. E-government success factors: Mapping practical tools to theoretical foundations.<br />
Government Information Quarterly, 22(2), pp.187-216.<br />
Grönlund, Å., Andersson, A. & Hedström, K., 2005. NextStep eGovernment in developing countries: Report D1:<br />
State-of-the-art in eGovernment in developing countries , including needs , lessons learned , and research<br />
findings,<br />
211
Zamira Dzhusupova et al.<br />
Hanna, N.K. & Qiang, C.Z.-wei, 2005. National E-Government Institutions: Functions, Models, and Trends. In<br />
Information and Communications for Development 2009: Extending Reach and Increasing Impact. World Bank,<br />
pp. 83-102.<br />
Harvey, G., 2006. Exploring Program Sustainability : Identifying Factors in Two Educational Initiatives in Victoria.<br />
Evaluation, 6(1), pp.36-44.<br />
Heeks, R., 2001a. Building e-Governance for Development: A Framework for National and Donor Action. Working<br />
Paper Series, I-Government<br />
Heeks, R., 2003. Most eGovernment-for- Development Projects Fail: How Can Risks be Reduced? Working Paper<br />
Series, I-Government<br />
Heeks, R., 2008. Success and Failure in eGovernment Projects. Success and Failure in eGovernment Projects,<br />
p.eGovernment for Development. Available at: http://www.egov4dev.org/success/ [Accessed January 20, 2011].<br />
Heeks, R., 2001b. Understanding e-Governance for Development. Working Paper Series, I-Government<br />
Jaeger, P., 2003. E-government Around the World: Lessons, Challenges, and Future Directions. Government<br />
Information Quarterly, 20(4), pp.389-394.<br />
Janowski, T., Ojo, A. & Estevez, E., 2010. EGOV .* An Action Framework for Governance 2.0. , (May). Available at:<br />
http://unpan1.un.org/intradoc/groups/public/documents/un-dpadm/unpan039408.pdf.<br />
Kifle, H., Low, P. & Cheng, K., 2009. e-Government Implementation and Leadership – the Brunei Case Study.<br />
Electronic Journal of e-Government Volume www.ejeg.com, 7(3), pp.271 - 282.<br />
Kumar, R. & Best, M., 2006. Impact and Sustainability of E-Government Services in Developing Countries: Lessons<br />
Learned from Tamil Nadu, India. The Information Society, 22(1), pp.1-12.<br />
Leitner, C., 2006. e-Government: People and Skills in Europe s Administrations. Proceedings of the 39th Annual<br />
Hawaii International <strong>Conference</strong> on System Sciences (HICSS 06).<br />
Ndou, V. (Dardha), 2004. E– government for Developing Countries: Opportunities and Challenges. The Electronic<br />
Journal on Information Systems in Developing Countries, http://www.ejisdc.org, 18(1), pp.1-24.<br />
OECD, 2003a. Checklist for e-Government Leaders, Available at: www.oecd.org/dataoecd/62/58/11923037.pdf .<br />
OECD, 2003b. The e-government imperative : main findings, Available at:<br />
www.oecd.org/dataoecd/60/60/2502539.pdf.<br />
Pluye, P., 2004. Making Public Health Programs Last: Conceptualizing Sustainability. Evaluation and Program<br />
Planning, 27(2), pp.121-133.<br />
Ronaghan, S.A., 2002. Benchmarking E-government : A Global Perspective, New York. Available at:<br />
http://unpan1.un.org/intradoc/groups/public/documents/un/unpan021547.pdf.<br />
Rose, W.R. & Grant, G.G., 2010. Critical Issues Pertaining to the Planning and Implementation of E-Government<br />
Initiatives. Government Information Quarterly, 27(1), pp.26-33.<br />
Sarantis, D., Charalabidis, Y. & Askounis, D., 2011. A Goal-Driven Management Framework for Electronic<br />
Government Transformation Projects Implementation. Government Information Quarterly, 28(1), pp.117-128.<br />
Schuppan, T., 2009. E-Government in developing countries: Experiences from sub-Saharan Africa. Government<br />
Information Quarterly, 26(1), pp.118-127.<br />
Schware, R. & Deane, A., 2003. Deploying e-Government Programs: The Strategic Importance of “I” before “E.” Info,<br />
5(4), pp.10-19.<br />
Shediac-Rizkallah, M.C. & Bone, L.R., 1998. Planning for the Sustainability of Community-based Health Programs:<br />
Conceptual Frameworks and Future Directions for Research, Practice and Policy. Health education research,<br />
13(1), pp.87-108.<br />
Stanforth, C. & Flynn, M.O., 2008. The Promotion of E-Governance in Developing Countries : Reflections on E-<br />
Government in Two Asia-Pacific Countries 1 . Introduction : Good Governance and Development. In Prato<br />
CIRN 2008 Community Informatics <strong>Conference</strong>: ICTs for Social Inclusion: What is the Reality? Refereed Paper.<br />
pp. 1-20.<br />
UNDESA, 2008. United Nations e-Government Survey 2008 From e-Government to Connected Governance,<br />
Available at: http://unpan1.un.org/intradoc/groups/public/documents/un/unpan028607.pdf.<br />
UNDESA, 2010. United Nations E-Government Survey 2010 Leveraging e-government at a time of financial and<br />
economic crisis, Available at: http://unpan1.un.org/intradoc/groups/public/documents/un/unpan038851.pdf.<br />
UNDESA, 2003. World Public Sector Report 2003: E-Government at the Crossroads, New York. Available at:<br />
http://unpan1.un.org/intradoc/groups/public/documents/un/unpan012733.pdf.<br />
Wescott, C., Pizarro, M. & Schiavo-Campo, S., 2000. The Role of Information and Communication Technology in<br />
Improving Public Administration. In To Serve And To Preserve: Improving Public Administration In A<br />
Competitive World. Asian Development Bank.<br />
Zwahr, T., Finger, M. & Mueller, P., 2005. More than Digitisation - The Transformative Potential of E-Governance :<br />
An Exploratory Case Study. In Proceedings of the 38th Hawaii International <strong>Conference</strong> on System Sciences.<br />
pp. 1-9.<br />
UNDP 2010, Human Development Report, viewed 25 April 2010, .<br />
World Bank 2010, Countries and Economies, viewed 20 April 2010, .<br />
212
Adapting Family Card System by Means of Smart Cards<br />
Magdy Elhennawy, Tarek Saad, Ashraf abdel Wahab and Sameh Bedair<br />
Ministry of State for Administrative Development (MSAD), Cairo, Egypt<br />
mhennawy@ad.gov.eg<br />
tsaad@ad.gov.eg<br />
awahab@ad.gov.eg<br />
sbedair@ad.gov.eg<br />
Abstract: The Egyptian government has defined policies to provide subsidies to support its citizens. However, there<br />
have been obstacles in defining the citizens who truly deserve the subsidies as well as a need to monitor the<br />
allocation of funds more closely, and enhance the level of implementation of the process. The smart family card<br />
would replace the traditional ration book, which was filled out by hand at the grocery store registered as an outlet for<br />
rations and signed by the ration book holder. The system was no longer efficient enough to accommodate the<br />
growing population, and documentation was not accurately updated to ensure that subsidized goods were reaching<br />
targeted citizens. The new system allowed the registered outlet only replacing goods that have already been claimed<br />
by smart card, with all transactions being electronically monitored and documented, thus eliminating waste or illegal<br />
transactions. The electronic system for the family card was designed to provide citizens with the services offered by<br />
the government; such as pensions and medical insurance as well as subsidized goods or their monetary equivalent.<br />
The smart cards can be used at grocery stores authorized to sell subsidized goods as well as at ATM machines. The<br />
family card project has provided a comprehensive database of Egyptian families which can be used by decision<br />
makers in defining the families in need, as well as tracing consumption levels and patterns across the country. The<br />
implementation has resulted in over US$1,217 Million gross till now in savings through controlling distribution of<br />
subsidies. The system takes into consideration the need for constant updates to guarantee the accuracy of<br />
information. After in-depth study and analysis it was found to be financially feasible to outsource the project to a<br />
private sector company, who would be responsible for the design, implementation and maintenance of the<br />
technology related to the project as well as applying high level international standards for data and process<br />
security.In this research, Family Card System has been presented. In section 1, background about MSAD is<br />
presented. The case is introduced in section 2. The reason why using smart cards is introduced in section 3. The<br />
case is introduced in section 4 covering the operatuional aspects, the technical architecture, acceptance and<br />
development methodologies, then the lessons learned. The encountered obstacles is introduced in section5. The<br />
neat profit from the system deployment is introduced in section 6. The analysis of the system results is discussed in<br />
section 7. Finally the conclusions and future work is written in section 8.<br />
Keywords: smart cards, network communications, Information security<br />
1. Organization background<br />
One of the main roles of the Ministry of State for Administrative Development is to improve the<br />
governmental services provided to citizens, through evolved information and communications<br />
technologies.<br />
MSAD has been doing a lot of effort to achieve its roles, which improved Egypt international rank in<br />
human capital index; from 140 in 2003 to 138 in 2010, in e-Government; from 162 in 2003 to 23 in 2010,<br />
and in general rank; from 140 in 2003 to 86 in 2010. Figure 1 shows the above status over years.<br />
Figure 1: Egypt’s ranking in human capital, e-Government, and general ranking worldwide<br />
213
Magdy Elhennawy et al.<br />
MSAD has designed its organization structure in a resilient and effective way to cope with the rapidly<br />
changing market, as it divides its core activities into four programs; 1) Government Services<br />
Development, 2) Enterprise Resource Planning, 3) Establishing and Linking National Databases, and 4)<br />
Institutional Development Program.<br />
1.1 The government services development program<br />
In this program, objectives are set at: 1) Provide distinguished services for citizens, businessmen, and<br />
investors, 2) Provide a convenient working environment for both employees and citizens, 3) Promote<br />
transparency through separation between citizen and service provider , and 4) Enhance monitoring and<br />
follow-up procedures.<br />
To achieve such objectives, MSAD proposes the following service delivery channels which are: 1)<br />
Internet, through the Egyptian Government Portal (www.egypt.gov.eg), Investment Portal<br />
(www.investment.gov.eg), Business Portal, Education Portal, Governorates Portals , Phones ,<br />
Landline Phones (Call centers and CRM’s), and Mobile Phones, and 2) Service Providers, such as:<br />
Service Bureaus , and Individuals.<br />
For Internet Services, the number of visitors to the e-government portal www.egypt.gov.eg is about one<br />
million/month. On the other hand, the information provided on the investment portal<br />
www.investment.gov.eg is in four languages, for investors. Total number of visitors during 2009: 10<br />
million.<br />
1.2 The enterprise resource planning program<br />
In this program, objectives are set to increase accuracy & efficiency, and reduce expenditure. Many<br />
applications have been implemented to serve such objectives, such as: e-archiving & document<br />
exchange, financial units, purchasing, personnel & payroll, e-Inventory-exchange between different<br />
governmental bodies to reduce stagnant stock, Egyptian products online catalog, medical e-archiving,<br />
and payroll databases.<br />
Also, the government e-procurement portal, launched: January 2010, targets the following objectives:1)<br />
promote transparency in government procurement process , 2) provide Central registration of suppliers,<br />
3) optimize the procurement cycle through all government entities, 4) reduce procurement costs while<br />
increasing ROI, 5) optimize inventory levels through the adoption of efficient procurement practices, 6)<br />
improve the ability to audit the public procurement expenditures.<br />
1.3 The establishing and linking national databases program<br />
In this program, objectives are set to establish an integrated national database, where government<br />
entities and institutions can exchange data with one another in an efficient and safe environment. This<br />
will lead to simplifying the procedures for citizens, when requesting governmental services throughout the<br />
country. In addition, the program will also contribute to identifying various methods that could be used in<br />
delivering the different subsidized items to the specified target groups<br />
The objectives are to provide accurate & updated information to support the decision making process and<br />
serve investors, to cover both: social and economic outcomes.<br />
The social outcomes can be achieved by the family database, education database, and national ID<br />
database. Linking them together will reduce drop out from schools at for children in earlier stages. On<br />
the other hand, the economical outcomes can be achieved by the real-estate registration and unified<br />
economical establishments’ records.<br />
1.4 The institutional development program<br />
The objective is to study existing organizations in terms of roles & responsibilities, laws & regulations,<br />
and organizational structures to move from static hierarchical structures to dynamic structures from point<br />
of view of both teams & projects, cycles & processes, and human resources development & capacity<br />
building.<br />
214
2. Case introduction<br />
Magdy Elhennawy et al.<br />
The family card system has been proposed, studied, analyzed, designed, contracted and is currently<br />
operationally monitored by the MSAD. The stakeholders of the system include the Ministry of Social<br />
Solidarity (MSS), MSAD, and the Egyptian society.<br />
MSAD has outsourced the implementation of the system to a consortium which was responsible for the<br />
following: building the system components, technical support to system programs and applications,<br />
hosting of family card database, availing service provision centers, availing call center, applying networks<br />
and communication lines, training of civil servants responsible for managing the system, system<br />
management, system operation and maintenance, and availing of necessary applications and tools.<br />
The family card system is intended to build a complete system for achieving a set of objectives. Such<br />
objectives are: Guaranteeing the delivery of the support services to the deserved people, provide a<br />
families database to support the services delivery and help decision maker, allow civilized environment to<br />
provide the service in a civilized mode. The system was composed of a set of basic components as<br />
shown in Figure 2, namely: centralized database hosted in a specialized data center, set of applications<br />
to achieve the system functionalities, call center to allow interaction with the citizens, technical support<br />
center to guarantee the system security and service provision continuity, supply offices automation to<br />
supervise system activities, service centers to conduct families data manipulation. To allow delivering<br />
more than one service to the citizen using the same smart card, the system employs a multi-application<br />
smart card technology. (Hendry, 2007).<br />
Call<br />
Center<br />
Interaction<br />
Wholesaler<br />
Technical<br />
Support<br />
Technical Support<br />
Family Database<br />
System Applications<br />
Data<br />
Manipulation<br />
Supervision Service<br />
Center<br />
Supervision<br />
Technical<br />
Support<br />
Technical Support<br />
Centers<br />
Technical<br />
Support<br />
Supply<br />
Offices<br />
Figure 2: The system basic components<br />
The Egyptian government adopted some strategies and objectives to implement the project:<br />
Big projects should start by a pilot to measure the feasibility before generalization all over the<br />
country.<br />
Outsourcing the implementation, operation, and maintenance of the system.<br />
Employing only one smart card to support all support services.<br />
Ensuring that the citizen should not bear any extra costs.<br />
Centralizing the design and decentralizing the implementation. The system is designed once and<br />
implemented as a pilot, then it is deployed in other governorates in Egypt with little customization<br />
according to each governorate requirements.<br />
Decentralizing service provision by creating untraditional outlets to fulfill the citizen's needs. Before<br />
the system, the social pension was delivered to the citizen from a specific social unit, which led to<br />
long queues and crowdedness. After the implementation of the system, other outlets like banks<br />
branches, ATM units, etc… are present to deliver the pension from anywhere<br />
Applying new methods of management that consider the aspect of efficiency and guarantee the ideal<br />
usage of the resources<br />
215
Magdy Elhennawy et al.<br />
3. Why was the implementation through smart cards?<br />
The Egyptian government decided, in 2005, to deploy a system allowing the citizen to deliver his monthly<br />
ration commodities from any grocer all over the Egypt. Before the system deployment, in the paper card<br />
system, each family is associated with a specific grocer that can deliver his monthly commodities only<br />
from hem. The requested system should be reliable enough such that each family can deliver her<br />
monthly ration commodities in more than one time and from any grocer all over Egypt. To achieve this<br />
aim, we need a smart token that can provide the following facilities: can store information about the<br />
deserved monthly commodities, can process such data to deliver part of his monthly total and compute<br />
the remaining for a next delivery time, and can communicate on-line with the central system to control the<br />
delivery of the monthly commodities from any grocer anywhere in Egypt. Besides, it can store and<br />
communicate such data securely with the central system. The only smart token that allows such<br />
specifications is the smart cards.<br />
4. Case description<br />
4.1 The situation before implementing the project<br />
Before the project implementation, the process of delivering food commodities was completely manual<br />
and paper based, which led to lack of follow up, high leakage ratios, and in-accurate delivery of the<br />
commodities to the deserved families. The process implied that, each group of targeted families, to<br />
receive food commodities, is linked to a specific grocer. Accordingly, each grocer receives, on a monthly<br />
basis, the products corresponding to the summation of commodities for all families linked to that grocer,<br />
referred to as a full quota even if the grocer did not deliver all such quotas to deserved families.<br />
Each family is provided a paper card to receive the relevant monthly commodities. The family used to go<br />
to the grocer, receives the commodities, and then, pays for what has been received and then signs a<br />
grocer paper document. As a matter of fact, the subsidized commodities are cheaper than the market<br />
prices as it is supported by government.<br />
Eventually, indispensable commodities are not monitored and the grocer can sell them outside the<br />
system. The grocer prepares a monthly report stating his quota, revises it with the associated supply<br />
office, and gets approval that the full quota has been delivered to deserved people and eventually proof<br />
that what he will receive is correct. Then, the report goes to the wholesaler to receive the grocer's quota.<br />
So, the grocer receives, on a monthly basis, the full quota irrespective if he is actually delivering all of<br />
them to the citizens or not.<br />
Another weakness of the manual and paper based system is when the grocer receives his full quota from<br />
the wholesaler; he can manipulate the quota limit assigned to him illegally and informally with the supply<br />
office.<br />
Moreover, any changes that occur in the family data (new born insertion in the paper card, family address<br />
change, grocer change …) should be registered on the paper document in the supply office, manually.<br />
The manual system is time consuming and gives great chances for inconsistency of registries, corruption,<br />
and mistakes. Not to mention the large storage space needed for filling such documents.<br />
Similarly, the delivery of social pensions suffered the same shortcomings before the system, (same<br />
process, and same disadvantages). The people attaining the social pension were registered and received<br />
the service manually. However, the social pension is given to families according to certain social criteria<br />
which, in the manual system, can be forged, consequently, non-eligible citizens can privilege from<br />
pensions.<br />
This is similar in the delivery of health insurance; it suffered the same weak points before the system. It<br />
subject to bad manipulation and weak provision of the service.<br />
Hence, the Egyptian government has adopted smart cards as a tool to provide various social and support<br />
services (food commodities, social pension, health insurance, educational support,…) to underprivileged<br />
citizens. Thus, the government relied on the use of information and communications technology as a<br />
means to manage and control the delivery of social services to citizens. Meanwhile, a database for the<br />
Egyptian family is implemented to support the decision making related to subsidized services.<br />
216
4.2 System operational aspects<br />
Magdy Elhennawy et al.<br />
The family card system consists of operational components, which allows the successful delivery of<br />
services to eligible families. Each family receives a smart card. Smart card contains indicators for the<br />
quantities allowed for that family. The grocer is equipped with a point of sale, POS, to register the<br />
commodities delivery transactions. The family card holder inserts his card in the POS located in the<br />
grocer shop and chooses the needed commodities, the POS issues a receipt of such chosen quantities.<br />
Accordingly, family card holder receives commodities, pays the grocers the value of money, and the<br />
transaction is sent to the central system through the system network. Accordingly, a lot of processing and<br />
many operational and statistical reports can be issued to plan for the service delivery and the decision<br />
making support. Figure 3 shows the system operational aspects.<br />
Issuing &<br />
personalizing<br />
Smart Cards<br />
Grocer Card Distribution<br />
Citizen Card Distribution<br />
Paper<br />
Cards<br />
Figure 3: The system operational aspects<br />
Generating Electronic<br />
Data<br />
Electronic<br />
Database<br />
Citizen<br />
Card<br />
Transaction<br />
Registration<br />
Grocer Shop<br />
POS<br />
Central<br />
System<br />
Grocer<br />
Card<br />
4.3 System technical architecture<br />
The system technical architecture defines the technologies to be used by (or built in) one, more, or all<br />
information systems in terms of its data, processes, interfaces, and network components. (Kendal, 2003).<br />
It defines the framework for the general design of the system.<br />
To avoid monopoly, the system has been implemented by three vendors, each is responsible about<br />
implementing the system in a group of governorates. MSAD has studied the system requirements,<br />
prepared its specifications, then delivered specifications to various vendors for implementation.<br />
The system is transaction based one; it records the transaction of delivering commodities to the citizens.<br />
This transaction happened in the grocer shop, is be transferred to the central system, in which the system<br />
applications and database are hosted. The applications and database are hosted in professional center<br />
that provides the standard specifications needed to secure database and applications. Such center has<br />
been equipped with several power sources, main and alternate power generators, more than one Internet<br />
connections. Meanwhile, firewalls and protection equipment are installed to prevent any inbound<br />
suspicious. Figure 4 shows the system technical architecture. MSAD, on the other hand, continually<br />
restores master and backup copies of family database for safety reasons.<br />
As the family card system is a national and process critical system; expandability, system resilience,<br />
system robustness, key management and security, interoperability, and continuity, were critical factors<br />
that have been taken into consideration during its design process.<br />
As the system is designed for expandability, the system allows to add new services in the future, even<br />
after the distribution of cards to citizens. It has been achieved by employing multi-application smart card<br />
technology (Hendry, 2007; EMVCO, 2000; Katherine, 2002), which allows installing more than one<br />
application on the card. This technology should allow adding new application to the card remotely.<br />
Moreover, the internal file structure of the card should be built to be adoptable and expandable.<br />
217
Magdy Elhennawy et al.<br />
As system is designed in such a way to achieve resilience, the system has been designed to be<br />
completely fault tolerant system (two nodes of each server, using high availability clusters). It has been<br />
also designed to have double communication lines between different components (POS can<br />
communicate either over LAN or GPRS with more than one operator - support centers communicate with<br />
data center using frame relay and backup internet lines - availability of backup strategy.<br />
Service<br />
Centers<br />
Date Center<br />
Group#1 Govs.<br />
System Applications<br />
Grocers<br />
3 rd Vendor<br />
Backup Copy<br />
Family Database<br />
Supply<br />
Offices<br />
Service<br />
Centers<br />
Main Copy<br />
Family Database<br />
Date Center<br />
Group#2 Govs.<br />
System Applications<br />
Grocers Supply<br />
Offices<br />
2 nd Vendor<br />
Service<br />
Centers<br />
Date Center<br />
Group#3 Govs.<br />
System Applications<br />
Grocers<br />
1 st Vendor<br />
Supply<br />
Offices<br />
Figure 4: The system technical architecture<br />
As system is designed in such a way to achieve robustness, the system should be rigid, and robust, and<br />
can work under worst condition. To achieve this, the system has been designed such that POSs can<br />
work offline as well as online. Besides, reports can be available both on application server over http and<br />
using client/server over TCP/IP. Relevant tools have been built to support manual operations for<br />
uploading transactions using USB to transfer and upload batches even if communication between POS<br />
and data center is down. If batches are corrupted, tools are available to fix corruption. If batch is lost,<br />
manual screen is used to enter them manually using the printed receipts. Meanwhile, data is available in<br />
more than one location which helps the reconstruction of information even when some data is lost.<br />
The system should be secure and protected from any unauthorized entity, process, or individual.<br />
(Schneier, 1996; Stalling, 1995). To achieve this, the transactions exchanged over the system are<br />
encrypted to allow confidentiality of exchanged information over the network. (Schneier, 1996; Stalling,<br />
1995). This process has been achieved by acquiring the Host Security machine, HSM, which is<br />
responsible for encryption key generation, referencing when encrypting or decrypting the exchanged<br />
transactions. Besides, the system has a Communication & switching server software which facilitates the<br />
transaction authentication API, card management system API. Meanwhile, each card has unique<br />
different 24 keys derived from a master key, Smart cards support multi-applications technology, so, each<br />
application is protected by different set of keys which helps the concurrent use of card between different<br />
service providers.<br />
As for the interoperability, any component in the system in one governorate is able to interface with other<br />
components in other governorate. Since three vendors were responsible for building the system in<br />
various governorates of Egypt, the interoperability between them is a vital issue. A group of<br />
interoperability tests have been designed and executed to insure the POS, smart cards, and other system<br />
components in belonging to various vendors are interoperable.<br />
The system continuity means the system continues working even in case of any unexpected events<br />
happened. This has been achieved in the system through using main and alternate servers, applying<br />
backup and disaster recovery strategies, providing the various security features, using uninterrupted<br />
power supply UPS with grocers POSs, training the system operators and servants, and finally, procuring<br />
the system HW with a specifications suitable to the field of application.<br />
218
Magdy Elhennawy et al.<br />
The system development strategy provides development environment, followed by testing and staging<br />
environment where we can develop the system initially, or modify any bugs in batches, as well as adding<br />
any new required features in the system. This strategy allows the operational system is continually<br />
operated while any requested modifications are in progress as shown in Figure 5.<br />
Production<br />
Environment<br />
Family Database<br />
Hosting<br />
Figure 5: System development strategy<br />
4.4 System acceptance<br />
Test/Staging<br />
Environment<br />
Development<br />
Environment<br />
The system acceptance has followed a user acceptance methodology, which guarantees the correct<br />
deployment of the system. During the system design phase, the acceptance tests document has been<br />
prepared, revised, and approved by MSAD project team. This document includes the set of tests to be<br />
conducted, which are classified as: functional tests, performance tests, installation tests, network<br />
connection tests, and database hosting tests. The document covers, for each test, the following: test<br />
name, test objectives, tests steps, expected results for each step, and corresponding test report that<br />
should be filled during execution of the test. On the other hand, the document should contain the test<br />
data, the tests scenarios, and timing execution frame. Finally, each test has been executed on the<br />
system platform as well as on the field after system installation.<br />
4.5 Key benefits of implementing the project<br />
The system guarantees the delivery of the services to the underprivileged citizens through a<br />
computerized application, up-to-date database, and efficient incurring system. It establishes monitoring,<br />
controls over the infiltration and loss in supports, and allows creation of a civilized environment through<br />
which underprivileged citizens can acquire their services. It achieves transparency through the<br />
establishment of clear and neutral processes for acquiring and managing subsidies.<br />
The project also resulted in reduction of consumption/beneficiary. This is mainly due to the fact that<br />
distribution was not as controlled in the past. And even though 18 million new beneficiaries were added to<br />
the subsidies system, it still resulted in savings of US$1,217 Million Egyptian Pounds gross till now over<br />
subsidies.<br />
The system includes building an integrated family database to support the system together with relevant<br />
statistics needed to analyze the behavior of the Egyptian families. It avails accurate, up-to-date, and<br />
timely data needed for future support planning and supporting decision making which targets a better<br />
quality of living. Hence, the government can use such database to identify social problems and<br />
consequently exert efforts to enforce Egyptian families to change their living style. This can happen<br />
through eradicating illiteracy, and working against unhealthy habits.<br />
The system includes a call center, with low cost call fees, to allow citizens call and record their problems,<br />
remarks, comments, and recommendations that may lead to improve the system. Accordingly, the citizen<br />
has the chance to participate and better express their needs through electronic mean leading to influence<br />
policy-making.<br />
The system was implemented in phases. Phase 1 consisted of a pilot project in one governorate in 2005.<br />
In Phase 2, other fifteen governorates were covered in 2008. In addition, the social pension service has<br />
been added to the smart card, as well. Phase 3 was covering the remaining governorates. It has been<br />
completely covered by July 2010. It is working now properly. The system currently covers 29<br />
governorates with 12 million smart cards. The Health Insurance service has been added to the card for<br />
one governorate (as a pilot) and has started from January, 2010. (Elhennawy, 2011). New governorates<br />
are soon starting to be covered.<br />
219
Magdy Elhennawy et al.<br />
Moreover, the culture of using smart cards, which is one of the worldwide De facto delivery mechanisms,<br />
is expanding in Egypt. Hence, Egypt's technological pointer is subject to improvement.<br />
4.6 The development and implementation Methodology<br />
The Egyptian government has planned to enlarge and empower the subsidy of commodities, the social<br />
pension, health insurance, and other services to cover underprivileged families. The family card is geared<br />
towards achieving such goal. As a key development issue, MSAD has followed the spiral methodology to<br />
implement the system development life cycle.<br />
The key development and implementation steps were:<br />
Establishing an electronic database for Egyptian families including the transactions performed for<br />
each type of service.<br />
Defining the overall system technical architecture, and defining the various technologies and<br />
implementation strategies.<br />
Preparing the top-level design of the system, and defining the system configuration.<br />
Developing, for each service, an application to manage the service database to support provision of<br />
the service to the deserved families.<br />
Issuing multi-application smart cards for services delivery.<br />
Building the network infrastructure of the system that allows all stakeholders for the service to<br />
communicate together.<br />
Building the service centers that will manage the database updates according to predefined rules. It<br />
also manages the replacement of the damaged and lost smart cards. A formula defining the number<br />
of service centers corresponding to the number of families required to be covered has been proposed<br />
and implemented accordingly.<br />
Building a call center to receive the citizens' requests and complaints. The call center is equipped<br />
with a complaints management system that traces the received complaints until fulfillment.<br />
Training the system users. The training includes a theoretical and on-the–job training sessions.<br />
Hardware and Software installation and overall system deployment.<br />
4.7 The resources allocated for the system<br />
MSAD has allocated four different resources for the below mentioned purposes:<br />
Database Technical Unit (DTU); a dedicated unit to electronic database activities management, such as<br />
database design, validation and verification procedures. In addition, the unit proposes and implements a<br />
set of criteria to link the Family database with other national databases for further validation and<br />
verification purposes as well as fulfillment of other citizen support services.<br />
Distributed Team (DT); a contracted team dedicated to survey the system activities amongst different<br />
Egyptian governorates. It is responsible for enforcing the system regulations and implementations in the<br />
governorates. Also, ensuring the right and smooth distribution of smart cards to citizens, as well as<br />
making sure that the PIN mailer distribution is proceeding correctly. After establishing the service, DT<br />
responsibility extends to monitor and guarantee the quality of the service provision.<br />
Family Project Task Force (FPTF); responsible for DTU supervision, DT follow-up, and ensuring that the<br />
overall system components are correct. It also manages and ensures the follow up of various system<br />
standards, such as: system development life cycle, data entry and conversion procedures, fault resolution<br />
and analysis, performance evaluation activities, and smart cards versus PIN mailer restrictive distribution<br />
procedures.<br />
220
Magdy Elhennawy et al.<br />
Project Management Group (PMG); responsible for the follow-up of all previously mentioned resources,<br />
as well as managing other project procedures, such as: financial, management, and technical issues. It<br />
manages the contractual aspects of the project.<br />
4.8 The impact and lessons learned<br />
The system have resulted in better targeting of underprivileged families (since all relevant data is stored<br />
in an electronic database, it was easy to identify them), and better decision making; if statistical data<br />
show less tendency to use certain items, they can be replaced by other highly demanded ones.<br />
The main lessons learned, can be summarized as follows:<br />
Big projects should start with a pilot project to prove the success of the system even if on a smaller<br />
scale, to discover problems, rectify them and create a win-win case with all stakeholders.<br />
Social considerations of the project should be considered prior to technical aspects. Citizen<br />
considerations and requirements should be taken into account from the start before planning and<br />
implementation phases.<br />
Capacity building of different stakeholders is crucial to the success of the system. The system covers<br />
a training to grocers, supply offices employee's, and service centers employee's<br />
Considerable effort is required to change the citizen’s culture to use new technologies for service<br />
delivery. Public symposia for each new implemented governorate have been executed, the system<br />
has been explained and a round discussion for all the participating entities was conducted.<br />
The key performance indicators of the system should be clearly stated and followed up.<br />
5. The main obstacles during design phase.<br />
The system has encountered various obstacles that have faced the deployment of the project. They can<br />
be summarized as follows:<br />
The first obstacle: To achieve the system objectives, we need a network that covers all grocers all over<br />
Egypt. It can be through the dial up or ADSL connection. Unfortunately, some grocers have no telephone<br />
lines. It can be achieved through the GSM mobile networks. But, the three available mobile networks<br />
(Mobinil, Vodafone, Etisalat) have shortage in coverage of some regions in Egypt. The selected optimal<br />
solution is to use manual transfer of batches through flash memory wherever there is no available dial up<br />
or ADSL connection or mobile networks coverage.<br />
The second obstacle: During the deployment of the system, the grocers and supply offices employees<br />
culture, who used to use manual system and paper cards, was one of the obstacles. The grocer<br />
reluctance to use the automated system is another obstacles. They did not use any automated systems<br />
or smart cards technology, and have no any technical background before. It has been overcome by<br />
conducting public announcements through different seminars, meetings, and symposiums to explain the<br />
system components and roles of individual system stakeholders. On the other hand, training to grocers<br />
and supply offices employees has been conducted. Training has covered theoretical in class rooms,<br />
practical upon the system equipments and on the job training during the system installation on site.<br />
The third obstacle: The system should guarantee the continuation of the service provision, even in case<br />
of power failure or in case of equipment failure. The continuation of the service provision, in case of<br />
power failure has been solved by providing UPS units accompanied with each POS, or using a<br />
rechargeable battery. The continuation of the service provision, in case of equipment failure has been<br />
solved by duplicating the POS in sites, besides, contracting with a support policy that enforces the<br />
contractor to replace the failed POS during 2 hours of failure announcement, on site.<br />
The fourth obstacle: The environmental condition on grocer shop, which faces the POS and system<br />
equipment with shocks. On the other hand, with reference to the grocery store environment, the Point of<br />
Sale (POS) used lies between packs of sugar, oil, flour, and other types of commodities. This can make<br />
the POS liable to be intentionally or non-intentionally damaged and broken by the grocer. This has been<br />
overcome by selecting POS with rigid characteristics and making covers to such equipments to keep it<br />
clean from any environmental contamination.<br />
221
Magdy Elhennawy et al.<br />
Other obstacles: Other minor obstacles have been encountered. obstacle lies in the culture of the<br />
citizen who used to deal with paper card and may never have dealt with electronic equipment, making it<br />
difficult for her/him to get acquainted with the new system. In addition, getting to know the citizens'<br />
feedback, complaints, and comments, was a major obstacle that we encountered. Another obstacle<br />
related to the citizen, was how to force her/him to keep her/his smart card and PIN number away from the<br />
grocer to avoid illegal transactions. Big propaganda and announcement campaign have been conducted<br />
leaded by the ministries themselves to convince the citizen overcome such problems..<br />
6. The neat profit of the system deployment can be summarized as follows<br />
The neat profit of the deployment of the project can be summarized as follows:<br />
Direct saving in allocated budgets, comparing with the status before the deployment. There is a save<br />
in budgets for about US$1,217 Million gross till now according to the first issued reports about the<br />
actual system operation. The following chart shows the ratio of saving from start deployment till now.<br />
Building a complete database for the families deserving ration support, together with the related<br />
delivery transactions. The transaction contains enough data to trace the delivery process, and<br />
delivery evaluation. It have had helped government to optimize the support delivery. The evaluation<br />
process have led to cancel the delivery of some rations (ex: the blubber delivery ratio was 2%), other<br />
doze have been increased (ex: the sugar with delivery ration 94% have been doubled from 1kg. to 2<br />
kg. per person, the same for oil with delivery ration 98%).<br />
A system infrastructure have been built, covering the system technical architecture, called centre,<br />
database hosting, service centers, which can be used to launch other types of citizen support using<br />
the same smart card and the same infrastructure. It is worthy to state that already two other services<br />
have been installed on the same card, using the same infrastructure, namely: social pension and<br />
health care services.<br />
The change of citizen culture, to be accommodated with smart card technology. And automated<br />
system is another big profit to the deployment of the system.<br />
7. Analysis of the achieved results after system deployment<br />
The system has been deployed using the incremental approach. Deployment has started in 2006 by one<br />
governorate, until finally the last group of governorates have been deployed in 2010. Table 1 shows the<br />
gradual deployment of Egypt’s governorates. Figure 6 shows the gradual deployed smart cards in<br />
thousands cards.<br />
Table 1: The gradual deployment of Egypt’s governorates<br />
Year 2006 2007 2008 2009 2010<br />
Number of governorates deployed 1 1 5 16 29<br />
Annual Number of deployed Smart Cards (in<br />
thousands)<br />
765 1020 10860 72396 144000<br />
Figure 6: The gradual deployed smart cards and associated governorates<br />
222
Magdy Elhennawy et al.<br />
The direct save in quantities of commodities have been calculated starting from 2006 till 2010. Table 2<br />
shows the save in quantities of commodities during the above 5 years. Figure 7 shows such saved<br />
quantities, as: sugar (main), oil (main), sugar (added), oil (added), noodles, and tea. However, the direct<br />
save in support budgets have increased gradually, until reaching the maximum in 2010. The total value of<br />
save till now is US$1,217 million gross with average about US$243 million gross. If we consider the<br />
implementation cost of the system, which is about US$492 million tell now, the total value of save till now<br />
is US$725 million net with average about US$175 million, since the system has been deployed partially<br />
in 2005. Figure 8 contains a chart that shows the gradual growth in direct save in support budgets.<br />
Table 2: The save in quantities of commodities during the years 2006 to 2010<br />
Name<br />
Oil (main)<br />
Sugar (main)<br />
Tea<br />
Rice<br />
Oil (added)<br />
Sugar (added)<br />
Total Save in Quantities (in Tons)<br />
2010<br />
2009<br />
9,859,980<br />
18,754,055<br />
21,682,510<br />
152,661,198<br />
33,143,472<br />
14,407,421<br />
5,672,291<br />
11,349,134<br />
10,161,084<br />
77,096,739<br />
27,467,676<br />
9,374,054<br />
Figure 7: The saved quantities, as: sugar, oil, noodles, and tea<br />
Figure 8: The gradual growth in direct save in support budgets<br />
223<br />
2008<br />
900,720<br />
1,865,893<br />
1,469,074<br />
7,102,142<br />
4,394,865<br />
3,520,800<br />
2007<br />
56,976<br />
113,618<br />
91,291<br />
295,097<br />
49,256<br />
48,903<br />
2006<br />
42,173<br />
84,070<br />
66,551<br />
96,202<br />
37,705<br />
37,029
Magdy Elhennawy et al.<br />
It is obvious that these saved values in commodities quantities, and eventually in direct save in budgets<br />
will continue to be exist as the system controls the leakages holes in the system. This save will increase<br />
when new services will be added to the system.<br />
8. Conclusions and future work<br />
The family card system together with its design and implementation issues has been presented. The<br />
system have been resulted in direct save in support budgets for about US$1,217 million gross till now,<br />
US$725 million net with average about US$175 million, and it is expected to increase this value after<br />
the addition of new support services. It is assumed that there is a complementary G2G (Government-to-<br />
Government services) system that will be linked with this system in the future to support the direct<br />
updating of the family databases from the original sources responsible for updating of such data. The<br />
expected completion of the total system will lead to a great electronic society.<br />
References<br />
Elhennawy, M. (2011) ‘Health Care Implementation by Means of Smart Cards’, The International Journal of<br />
Computer Science Issues, IJCSI, Volume 8, Issue 1, January.<br />
EMVCO, (2000), EMV2000, Integrated Circuit Card Specification for Payment Systems, Version 4.0, [Online],<br />
Available: http://www.emvco.com/Specifications.cfm [December 2000].<br />
Hendry, M. (2007) “Multi-application Smart Cards Technology and Applications”, Cambridge University Press, 2007.<br />
Katherine M. Shelfer and J. Drew Procaccino (2002), Smart Card Evolution, Communications of ACM, Volume 45,<br />
Issue 7, ACM Press.<br />
Kendal, E.(2003) “System Analysis and Design”, Printic Hall, 2003.<br />
Schneier, B. (1996), Applied cryptography, John Wiley & Sons, Inc., 1996<br />
Stalling, W. (1995) “Network and Inter-Network Security”, Printic Hall, 1995.<br />
224
Collaborative Network Analysis of two eGovernment<br />
<strong>Conference</strong>s: Are we Building a Community?<br />
Nuša Erman and Ljupčo Todorovski<br />
University of Ljubljana, Slovenia<br />
nusa.erman@fu.uni-lj.si<br />
ljupco.todorovski@fu.uni-lj.si<br />
Abstract: In the last two decades, eGovernment research maturated into an active scientific field with a number of<br />
publication venues, many of them taking form of regular annual conferences. In this paper, we address the central<br />
question of whether the active researchers of these different venues converge towards a joint eGovernment research<br />
community. To answer this question, we perform a comparative analysis of the collaborative networks of coauthorship<br />
relationships between scholars that published papers at the two leading conferences in the field: this one,<br />
the <strong>European</strong> <strong>Conference</strong> on eGovernment, and the International <strong>Conference</strong> on eGovernment. Surprisingly, the<br />
obtained results show that each conference has built its own relatively stable community, and there are only weak<br />
ties that do not really indicate an emergence of a joint eGovernment scientific community.<br />
Keywords: co-authorship network, scientific community, social network analysis<br />
1. Introduction<br />
eGovernment research (EGR) focuses on studying the use of information and communication technology<br />
in public administration and government activities. In the last two decades, the interest in EGR has<br />
dramatically grown, resulting in its evolution into an active scientific field. EGR scholars established a<br />
number of formal and informal communication channels to disseminate knowledge and research results.<br />
Among them, academic conferences comprise the exchange of information and reinstatement of<br />
discussion among the participants through the formal and informal patterns, which represent a useful<br />
feedback for the improvement of scholars’ work (Lisée et al. 2008).In the relatively young and dynamic<br />
area of eGovernment, a number of conferences have emerged. Three of them get most of the attention<br />
from the EGR scholars: International <strong>Conference</strong> on eGovernment (EGOV), <strong>European</strong> <strong>Conference</strong> on<br />
eGovernment (ECEG), and International <strong>Conference</strong> on Digital Government Research. Two other more<br />
general conferences hold regular sections on eGovernment: Hawaii International <strong>Conference</strong> on System<br />
Sciences and the <strong>European</strong> <strong>Conference</strong> on Information Systems.<br />
Many authors have analysed the process of development and the state-of-the-art of the EGR field and its<br />
community. The abovementioned conferences and other EGR publication venues represent a rich data<br />
source for such analysis. Authors have considered maturity (Grönlund 2004, Grönlund and Andersson<br />
2006) and the development (Heeks and Bailur 2007) of EGR field, as well as the analysis of the nature of<br />
contributions and the evolution of research interests(Bannister and Connolly 2010). The main analytical<br />
approach used in the above exemplary studies is content analysis (Busch et. al 2005) of articles used to<br />
identify article types, methodologies, and data used or topics and issues addressed. Although content<br />
analysis is widely used approach in the study of scientific communication, it is often limited with the<br />
number of papers we can include in the study and therefore it is also often limited to a single publication<br />
venue or a limited sample of papers from different venues. Scaling up those studies to a large number of<br />
papers and venues can be a serious challenge and mostly prohibitive.<br />
In our previous studies (Erman and Todorovski 2009, 2010), we proposed an alternative approach based<br />
on social network analysis (Nooy et. al 2005). We focus on qualitative analysis of networks of various<br />
types of scientific communication (collaboration and citation) among researchers in the EGR field. One of<br />
the limitations of our previous studies is that they focused on the papers published at a single publication<br />
venue, the EGOV conference. In this paper, we overcome this limitation by extending our study of the<br />
EGOV collaboration networks to the ECEG conference. More specifically, we observe the networks of<br />
relations between authors publishing at the two conferences, where the relations represent coauthorships<br />
of joint papers. We build these networks using the electronic manuscripts of the papers<br />
published in the respective proceedings in the five-year period from 2005 to 2009. The main aim of this<br />
paper is then to compare the networks emerging from ECEG and EGOV to the joint network of coauthorships<br />
between all the authors from both conferences. By this comparison, we can check the validity<br />
of our central hypothesis that through the time, the scholars publishing at these two conferences<br />
converge towards a joint community of eGovernment researchers. We also use the collaborative network<br />
225
Nuša Erman and Ljupčo Todorovski<br />
analysis to identify the most prolific authors in the community and identify emerging sub-communities<br />
dealing with specific eGovernment topics.<br />
The rest of the paper is organized as follows. Section 2introduces the notion of scientific community and<br />
collaborative co-authorship network as formalism for representing and analysing communities. In<br />
continuation, it presents the data used in this study and the resulting collaborative networks for the<br />
ECEG, EGOV and the joint community. Section 3 presents the results of the comparative analysis of the<br />
networks. Section 4 discusses and compares the results, putting them in the context of related work.<br />
Finally, Section 5 draws conclusions and outlines the directions for further research.<br />
2. Scientific community as collaboration<br />
Scientific community, defined as a totality of working and interacting scientists through common and<br />
standardized procedures of scientific communication, is usually quantified through the analysis of<br />
scientific publications. The most commonly used methods to perform such an analysis are methods of<br />
scientometrics and bibliometrics which measure scientific activities through different levels of<br />
aggregation, enabling the analysis of research collaborations, evolution of scientific fields, and<br />
corresponding scientific networks (Borgman 1990).<br />
The defining aspect of every scientific community is the scientific communication performed according to<br />
several communication patterns. In contrast to other communication scenarios which usually capture only<br />
formal part of scientific communication, academic conferences comprise the exchange of information and<br />
encourage the discussion among the participants, and hence as a data source enable to examine formal<br />
and informal part of scientific communication. Among several communication patterns, the collaboration<br />
among scientists is measured through the cooperation of scientists in writing scientific papers, better<br />
known as co-authorship collaboration. The most approximate way to study co-authorship collaboration is<br />
a network approach, where the nodes represent individual researchers, and links among them represent<br />
co-authorship relations. (Bordons and Gomez2001).<br />
In this paper, we are interested in the analysis of a community formed through the papers published in<br />
the proceeding of two major eGovernment conferences, ECEG and EGOV from 2005 to 2009. In the<br />
continuation of this section, we introduce the data and corresponding co-authorship networks.<br />
2.1 Data description<br />
We build the data set for this study as extension of the data collected in Erman and Todorovski<br />
(2010).Hence, the bibliographic data about papers from EGOV conference is upgraded with data about<br />
papers published at ECEG conference. For both conferences, we included papers published from 2005<br />
to 2009. The extended data set includes 475 papers; 314 new papers from the ECEG proceedings and<br />
161 papers from the EGOV proceedings. These 475 papers were co-authored by 765 different<br />
researchers.<br />
The graphs of Figure 1 depict the dynamics of the number of papers and the number of authors through<br />
years for each conference. The number of papers published at EGOV conference is relatively stable and<br />
ranges from 30 to 40 papers per year. In contrast, the number of papers published at the ECEG<br />
conference is higher, fluctuating between 50 and 83 papers per year. The similar pattern is observed<br />
when the number of authors is considered; the number of authors at the EGOV conference varies<br />
between 70 and 100, whereas at ECEG it varies from 100 to 180 authors per year.<br />
2.2 From data to co-authorship network<br />
The bibliographic data can be transformed to a co-authorship network following a simple procedure. For<br />
each paper, we collect the list of paper authors A. For each of them, we add a corresponding node to the<br />
network, if one has not been there yet. If the list consists of a single author we proceed with the next<br />
paper, since it does not introduces any co-authorship links in the network. Otherwise, for each pair of<br />
authors from A, we add an undirected link (edge) connecting the corresponding network nodes. If the link<br />
has been present already, we increase its weight by one; if the link is new, we set its weight to one. Thus,<br />
the weight assigned to an edge connecting two nodes in the network denotes the number of papers that<br />
the corresponding two researchers co-authored.<br />
226
Nuša Erman and Ljupčo Todorovski<br />
Figure 1: Number of papers published in the proceedings of the ECEG (left-hand side) and EGOV (righthand<br />
side) conferences and number of authors thereof in the period from 2005 to 2009.<br />
Following the outlined procedure, we generated five weighted undirected co-authorship networks for the<br />
yearly proceedings of ECEG and EGOV as well as a joint network of both proceedings for each year from<br />
2005 to 2009. Using the single-year networks, we also constructed five “cumulative” co-authorship<br />
networks; the first network contains data from 2005 and each successive network is built by joining the<br />
next year network to the current one.<br />
Table 1 summarizes the basic properties of the five cumulative networks for the three analyzed<br />
communities, i.e., EGOV, ECEG and the joint community. The number of nodes corresponds to the<br />
number of authors, while the number of edges corresponds to the number of co-authorships between<br />
pairs of researchers. The percentage of edges with weight larger than one represents the portion of<br />
research pairs that co-authored more than one paper, and the density represents the portion of all<br />
possible edges that are present in the observed network.<br />
As expected, all three communities induce steadily growing networks both in terms of the number of<br />
nodes and edges. This increase in size is being strictly followed by density decrease. The ECEG<br />
community network is very sparse and has three times lower density than EGOV network in 2005.<br />
Densities of both networks, as new authors enter both communities, decline, and the more rapid decline<br />
is observed in the EGOV network. The low density of ECEG community network is reflected in the<br />
sparseness of the joint community network, where in 2009only 0.33% of all possible edges are present.<br />
The very low density of the joint network might also indicate the lack of communication between the<br />
ECEG and EGOV community.<br />
Table 1: Basic properties of the “cumulative” co-authorship networks for the ECEG, EGOV, and joint<br />
ECEG+EGOV community<br />
Community<br />
ECEG<br />
EGOV<br />
Network<br />
Property 2005 2005-2006 2005-2007 2005-2008 2005-2009<br />
#nodes 123 192 266 353 491<br />
#edges 92 164 234 326 500<br />
%edges(w>1) 2.2 9.8 12.0 12.3 11.4<br />
Density 0.0123 0.0089 0.0065 0.0052 0.0041<br />
#nodes 74 136 208 262 307<br />
#edges 91 170 295 395 467<br />
%edges(w>1) 0.0 1.2 7.5 7.8 9.4<br />
Density 0.0337 0.0185 0.0137 0.0116 0.0100<br />
#nodes 194 318 456 588 765<br />
ECEG+EGOV<br />
#edges<br />
%edges(w>1)<br />
183<br />
1.1<br />
328<br />
7.0<br />
516<br />
11.1<br />
706<br />
10.9<br />
950<br />
11.2<br />
Density 0.0098 0.0065 0.0050 0.0041 0.0033<br />
On the other hand, the portion of edges with weight larger than one is higher in case of ECEG community<br />
networks stabilizing at the level of 12% in the last three years, indicating the establishment of long-term<br />
collaboration between community members. The higher collaboration level in ECEG community<br />
influences the increase of collaboration activity in the joint community. The higher percentage of long-<br />
227
Nuša Erman and Ljupčo Todorovski<br />
term collaboration edges might be also due to the fact that ECEG conference publishes more papers per<br />
year.<br />
To further explore these initial conjectures based on the basic network properties, we will continue with deeper<br />
analysis of the structural properties and dynamics of the observed networks.<br />
3. Structure and dynamics of the EGR community<br />
To perform the analysis of the built cumulative co-authorship networks, we use Pajek software tool (Nooy<br />
et. al 2005). The results are presented in three subsections: in the first one, we quantify and analyze the<br />
dynamic change of the EGOV, ECEG and joint networks from 2005 to 2009; second section identifies the<br />
most active and most collaborative authors in the joint community; and in the third subsection we analyze<br />
the joint community structure in terms of subgroups of co-authoring researchers, their geographical<br />
distribution, and the thematic topics of their research. In each section, we also compare the results with<br />
the extract from our previous research (Erman and Todorovski 2010) emphasizing the aspects of<br />
interaction between the two observed conferences.<br />
3.1 Comparative community dynamics<br />
Table 2 summarizes the results of the analysis of the dynamics of the three observed communities. We<br />
first observe the percentage of “stable” community members, that is, “returning” scholars that published<br />
their papers in more than one proceeding. At the beginning of the observation period, in 2005, all authors<br />
are considered to be new to the community. The portion of returning authors in both communities is very<br />
high: more than half of the authors publish their papers repeatedly at the same conference. The<br />
percentage steadily increased to more than 75% in all three communities. A notable exception is the drop<br />
to 72% in 2005-2009 ECEG community, which is due to the fact that a large number of 180 authors<br />
contributed 83 papers to the 2009 ECEG proceedings. This is in contrast with the tightly constrained<br />
EGOV publishing policy, where small number of accepted papers stabilized the community with up to<br />
85% of returning authors. The latter situation can be considered as a sign of a stabilizing community.<br />
The joint community shows similar stabilizing trend with 77% returning authors. However, note that the<br />
joint community is merely a “joined” community network. A surprisingly low percentage of authors (1.6)<br />
published papers at both ECEG and EGOV in 2005. The percentage steadily increases through the<br />
years, and hardly hit 4% in 2007, but still remains below 5%. This indicates that we still have to wait for<br />
the co-existence of different eGovernment scientific venues to evolve into a synergy of real joint<br />
eGovernment scientific community.<br />
Table 2: Dynamics of the ECEG, EGOV and the joint community from 2005 to 2009 in terms of number<br />
of authors, percentage of returning authors, percentage of authors publishing at both<br />
conferences, number of papers, and percentage of papers with more than one author<br />
Community 2005 2005-2006 2005-2007 2005-2008 2005-2009<br />
#authors 123 192 266 353 491<br />
ECEG<br />
%returning<br />
#papers<br />
0.0<br />
68<br />
64.1<br />
118<br />
72.2<br />
175<br />
75.4<br />
231<br />
71.9<br />
314<br />
%co-authored 54.4 57.6 60.6 64.1 66.2<br />
#authors 74 136 208 262 307<br />
EGOV<br />
%returning<br />
#papers<br />
0.0<br />
30<br />
54.4<br />
59<br />
65.4<br />
95<br />
79.4<br />
127<br />
85.3<br />
161<br />
%co-authored 66.7 69 75.8 78.0 80.7<br />
#authors 194 318 456 588 765<br />
%returning 0.0 61.0 69.7 77.5 76.9<br />
ECEG+EGOV %joint 1.6 3.1 4.0 4.6 4.3<br />
#papers 98 177 270 358 475<br />
%co-authored 58.2 61.6 65.9 69.0 71.2<br />
The extent of collaboration between community members can also be measured through the percentage<br />
of co-authored papers. All three communities show stable increase in the percentage of co-authored<br />
papers, reaching the maximal value of 81% (EGOV), 66% (ECEG), and 71% (joint). In sum, there is a<br />
clear trend of growing collaboration among community members in both ECEG and EGOV. In both<br />
communities (and especially EGOV), this trend is accompanied by the process of community<br />
convergence and stabilization with researchers that regularly publish in the proceedings. On the other<br />
228
Nuša Erman and Ljupčo Todorovski<br />
hand, results indicate that the ECEG and EGOV induced two separate communities, where only a very<br />
modest number of authors publish papers at both conferences.<br />
3.2 Productivity and collaboration among community members<br />
We measure the productivity of a community member by the number of his/her published papers and the<br />
number of her/his appearances in the yearly proceedings. Table 3 presents the list of the ten most<br />
productive authors in the joint community in the period from 2005 to 2009. Five or 50% of them have<br />
published their papers at only one conference, and five of them at both conferences.<br />
Table 3: The ten most productive authors in the ECEG and EGOV conference community in the period<br />
between 2005 and 2009 measured in terms of number of published papers and number of<br />
years in which authors published their papers, the names of the authors that published at both<br />
conferences are emphasized (bold)<br />
Author #papers #ECEG-papers #years<br />
Janssen M. 9 7 5<br />
Fairchild A. 7 7 5<br />
Askounis D. 7 3 4<br />
deVuyst B., Neumann L. 6 6 4<br />
Polzonetti A., Corradini F. 6 4 4<br />
Grönlund Å. 6 0 4<br />
Lubbe S. 6 6 3<br />
Becker J. 6 0 3<br />
The list is, however, biased towards ECEG authors, since the number of papers published at ECEG is<br />
much higher. Thus, at the top of the list, Janssen M. has published nine papers, seven of them in the<br />
ECEG conference proceedings. Further down the list, we include authors that published at least six<br />
papers at any of the conferences. The list of most prolific authors in Table 3 includes a high percentage<br />
(33%) of authors that are active in both communities relative to the percentage of joint authors in the joint<br />
community (5%). This might be an early indicator of a trend of convergence towards joint community in<br />
the future.<br />
Activity of individual members is not as important to the process of community building as the degree of<br />
collaboration of an author with others. We can observe the collaboration through the degree of<br />
connectedness among nodes within a co-authorship network. In social network analysis, the degree of<br />
connectedness is expressed through measures of centrality of individual network nodes, i.e. degree,<br />
closeness, and betweenness centralities, which differ in the way the position of individual authors within<br />
the co-authorship network is referred (Nooy et al 2005). In co-authorship network, degree centrality<br />
equals the number of collaborators an author has, closeness centrality indicates the accessibility of the<br />
observed author to the others, and betweenness centrality indicates the number of shortest paths that<br />
pass through the observed node. Table 4 lists the most central authors with respect to each of these<br />
three measures.<br />
Table 4: The most central authors in joint conference community in the period between 2005 and 2009<br />
according to the degree, closeness, and betweenness centrality, emphasized (italic) names<br />
correspond to the most central authors according to three (two) centrality measures<br />
Degree centrality Closeness centrality Betweenness centrality<br />
Author % Author % Authors %<br />
1 Askounis D. 1.57 Askounis D. 1.72 van Dijk J. 0.02<br />
2 Corradini F. 1.44 Corradini F. 1.57 Henriksen H.Z. 0.02<br />
3 Polzonetti A. 1.44 Polzonetti A. 1.57 van der Geest T. 0.02<br />
4 Janssen M. 1.31 Charalabidis Y. 1.53 Tan Y.H. 0.02<br />
5 Charalabidis Y. 1.31 Janssen M. 1.44 Askounis D. 0.01<br />
6 Hahamis P. 1.18 Sourouni A.M. 1.44 Corradini F. 0.01<br />
7 van der Geest T. 1.18 van der Geest T. 1.43 Polzonetti A. 0.01<br />
8 Sourouni A.M. 1.18 Lampathaki F. 1.37 Janssen M. 0.01<br />
9 Lampathaki F. 1.05 van Dijk J. 1.36 Vintar M. 0.01<br />
10 Vintar M. 1.05 Hahamis P. 1.32 Wimmer M.A. 0.01<br />
229
Nuša Erman and Ljupčo Todorovski<br />
The lists presented in Table 4 contain 14 authors, most of them not being among the most prolific ones in<br />
Table 3. Five of them are among top 10 according to all three centrality measures: Askounis D., Corradini<br />
F., Polzonetti A., Janssen M. and van der Geest T. Further six authors are central according to two of the<br />
observed centrality measures. Most of these eleven authors come from the ECEG community, which is<br />
due the fact that ECEG authors and collaborations prevail the joint network in both number of nodes and<br />
edges (see Table 1). EGOV authors correspond mostly to the network nodes with high betweenness<br />
centrality.<br />
3.3 Community structure<br />
In this final part of the analysis, we shift our focus from the quantitative network properties to the network<br />
structure. We search for clusters of highly inter-connected nodes that might correspond to emerging<br />
eGovernment sub-communities. To this end, we apply methods for identifying components and cores in<br />
social networks.The search for components in co-authorship network enables to identify possible subgroups<br />
of authors which collaborate frequently and, presumably, share common research topic(s). On the<br />
other hand, the search for cores makes possible to identify such sub-groups of authors in which the<br />
authors are mutually linked. Hence, suchcore-sub-groups actually representsets of paper(s) in which all<br />
core members collaborated (Nooy et al. 2005).<br />
Our co-authorship joint network for the 2005-2009 period has 263 components. Out of these, 80<br />
components contain only one author; 80 authors are isolated since they never in the observed period coauthored<br />
a paper with others. On the other hand,we identified the largest component consisting of 16<br />
tightly interconnected authors. Note however, that here we can perceive the impact of papers with<br />
significantly higher number of authors compared to other papers: namely, in such a situation a single<br />
paper co-authored by many authors would induce a (non-)representative component. To overcome this<br />
problem, we augment each component with the list of corresponding papers and consider only those<br />
components that are induced by at least four joint publications. In addition, we also filter out all the<br />
components with less than five researchers.<br />
Table 5 presents the results of the component analysis by enlisting all eleven components that satisfy the<br />
four-joint-papers criterion explained above. Each community subgroup is described with the leading<br />
researcher that is a co-author of majority of the papers in the component, the geographical distribution of<br />
authors’ affiliations, and the list of thematic topics of the papers in the component.<br />
Table 5: The analysis of eleven largest components of the joint co-authorship network, we only<br />
considered components that correspond to at least four papers<br />
#authors/<br />
#papers<br />
Representative<br />
Geographical<br />
distribution<br />
16 9 Van Dijk J. Netherlands<br />
15 9<br />
Andersen K.N.<br />
Tan Y.H.<br />
Denmark,<br />
Norway,<br />
Netherlands<br />
14 8 Charalabidis Y. Greece<br />
12 10 Janssen M. Netherlands<br />
12 8 Vintar M.<br />
12 7<br />
Corradini F.<br />
Sabucedo L.A.<br />
11 8 Grönlund Å.<br />
Slovenia,<br />
Greece<br />
Thematic topics <strong>Conference</strong>s<br />
citizen-centric e-services; user profiling;<br />
delivery channels; e-services adoption<br />
and usage<br />
project evaluation; benefits of IT usage; ecustoms;<br />
super-national e-services<br />
interoperability; meta-data and (semantic)<br />
annotation of e-services<br />
service-delivery, eGovernment stage<br />
models<br />
indicators of eGovernment development;<br />
e-services adoption and usage; life events<br />
and integration of e-services<br />
Italy, Spain semantic-driven integration of e-services<br />
Sweden,<br />
Norway<br />
11 6 Ayo C. Nigeria<br />
eGovernment research analysis; misc<br />
e-voting, eGovernment progress,<br />
eGovernment and public administration<br />
reforms<br />
EGOV (9)<br />
EGOV (9)<br />
EGOV (5)<br />
ECEG(3)<br />
EGOV (3)<br />
ECEG (7)<br />
EGOV (7)<br />
ECEG (1)<br />
EGOV (3)<br />
ECEG(4)<br />
EGOV (7)<br />
ECEG (1)<br />
ECEG (6)<br />
9 7 Becker J. Germany Misc EGOV (7)<br />
8 6 Ferro E. Italy, USA digital divide and IT literacy EGOV (6)<br />
5 4 Mentzas G. Greece evaluating quality of e-services EGOV (4)<br />
230
Nuša Erman and Ljupčo Todorovski<br />
The results show that most of the components representatives (all but the representatives of the eighth<br />
and last components) were already identified as most productive or most central ones. Furthermore, most<br />
of the identified sub-groups have narrow geographical distribution: ten out of eleven components are<br />
entirely from Europe, six are even tighter, including single region or country, or, in some cases, a single<br />
institution. International or trans-Atlantic collaboration is relatively rare. Finally, there is a great variety of<br />
thematic topics addressed by the researchers in different groups. Note also, that the identified subcommunities<br />
are orthogonal in the topics they deal with; each of them develops its own (relatively narrow)<br />
expertise area that is different from the others. Most of this groups are mainly affiliated with EGOV<br />
conference. This is in line with our previous results that show the greater cohesivness of the EGOV<br />
community. Here it is reflected in a greater ability to stir groups of researchers with a commong research<br />
interest.<br />
When identifying the cores of the network, we applied the same four-joint-papers criterion. Figure 2<br />
depicts the six cores of the joint co-authorship network that follow this criterion. They confirm the findings<br />
of the component analysis: each of the six cores corresponds to one of the identified components from<br />
Table 5. Another fact can be derived from the result depicted in Figure 2: only these 15 authors (out of<br />
765; 2%) have been involved in more than three joint collaboration ventures. This is another piece of<br />
evidence that the long-term collaboration within the joint conference community is relatively rare.<br />
Figure 2: Six cores of the joint (ECEG+EGOV) community co-authorship network<br />
In sum, the structural analysis shows that a number of sub-communities have emerged, each of them<br />
dealing with topics that are orthogonal to the thematic topics of the other. Virtually almost all the subcommunities<br />
have a representative researcher that is ranked among top active or collaborative<br />
community members. Most of the sub-communities have narrow geographical distribution including a<br />
single region, country or even institution. The community members are mostly affiliated at institutions in<br />
<strong>European</strong> countries, and large-scale international collaborations are very rare. The findings virtually<br />
resembles the ones for the EGOV conference.<br />
4. Discussion<br />
There are number of studies that analyze the state-of-the-art and the dynamics of the development of the<br />
eGovernment research (EGR) field mentioned in the introduction. Our study differs from them in several<br />
ways. First, it relies on a standard scientometric method widely used to analyze other research fields. In<br />
this sense, it continues our previous studies (Erman and Todorovski 2009, 2010), where we have dealt<br />
231
Nuša Erman and Ljupčo Todorovski<br />
with the analysis of citation and co-authorship networks induced from the papers published in the EGOV<br />
conference proceedings. Here, we extend the scope of those studies to the ECEG conference.<br />
Another distinguishing property of our study is that we collect the empirical data systematically from all<br />
the papers published in the proceedings of the ECEG and EGOV conference in the five years period<br />
between 2005 and 2009. Most other studies perform analysis of a sample of data about articles and<br />
papers from various publication venues. Although this decision makes the definition and the scope of the<br />
scientific community clear, as opposed to the definition from another study of eGovernment community<br />
(Scholl 2009).<br />
The present paper offers the findings of co-authorship network analysis which is latterly used as a proxy<br />
for the study of collaboration (Bordons and Gomez 2001). We should note however, that there exist<br />
limitations related to the study of scientific collaboration through publications and to the bibliometric<br />
studies in general. The first is related to the practice of making colleagues or superiors “honorary coauthors”<br />
for purely social reasons. The second is that scientific collaboration does not necessarily lead to<br />
co-authored papers.<br />
5. Conclusion<br />
The answer to our main research question, outlined in the title of the paper, is clearly: No. The two<br />
publication venues considered in this study, proceedings of ECEG and EGOV conferences, do not<br />
converge towards a joint eGovernment scientific community. Only few authors (less than 5%) publish<br />
papers at both conferences. However, both communities do show maturity, in terms of large number of<br />
members publishing regularly, increasing collaboration between community members, and emergence of<br />
clearly profiled sub-communities. In this sense, EGOV community seems to be ahead of ECEG; the<br />
profiling and stability of the community being more evident. The high share of authors publishing at both<br />
conferences among the most prolific authors in the communities might be an early indicator of the<br />
emergence of the eGovernment community.<br />
The (non-) existence of eGovernment research community has to be further tested with extending the<br />
scope of this study. We have to include papers from other publication venues, both conference<br />
proceedings and journals, in our data set. Note also that in the present paper we focused on the coauthorship<br />
network, a study of the citation network of ECEG papers can be another line of further work.<br />
Finally, one can also look into other types of networks analysis of the citation networks that has<br />
publication venues where the referenced papers come from in the nodes. Such analysis would reveal the<br />
most influential “neighboring” scientific fields and publication venues with highest impact on the<br />
development and shape of the eGovernment research field. Ultimately, there is a challengeable issue of<br />
integrating the results of analyzing different networks of relations among scientists and/or publication<br />
venues into a unified map of the EGR field.<br />
Acknowledgments<br />
This material is based upon work supported by the Slovenian Research Agency through the funds for<br />
training and financing young researchers. Thanks also to Mitja Dečman who provided the electronic<br />
versions of the ECEG proceedings.<br />
References<br />
Bannister, F. and Connoly, R. (2010) “Researching eGovernment: A Review of ECEG in its Tenth Year” in O’Donnell<br />
D. (Ed.), Proceedings of the 10 th <strong>European</strong> <strong>Conference</strong> on eGovernment, Ireland, 17-18 June 2010, pp 53-62.<br />
Bordons, M. and Gómez, I. (2001) “Collaboration Networks in Science”, in Cronin, B. and Atkins, H.B. (Eds.), The<br />
web of knowledge: a festschrift in honor of Eugene Garfield, ASIS Monograph Series, Medford, Nj: Information<br />
Today.<br />
Borgman, C.L. (1990) “Editor’s Introduction”, in Borgman, C.L. (Ed.), Scholarly Communication and Bibliometrics,<br />
Sage Publications, Newbury Park, London, New Delhi.<br />
Busch, C., de Maret P.S., Flynn, T., Kellum, R., Le, S., Meyers, B., Saunders, M., White, R., and Palmquist, M.<br />
(2005) Content Analysis.Writing@CSU, Colorado State University, Department of English. Retrieved<br />
[20.12.2010] from http://writing.colostate.edu/guides/research/content/.<br />
Erman, N. and Todorovski, L. (2009) “Analyzing the Structure of the EGOVconference community”, in Wimmer, M.A.<br />
et al. (Eds.), EGOV 2010, LNCS vol 6228, pp 73-84, Springer, Heidelberg.<br />
Erman, N. and Todorovski, L. (2009) “Mapping the eGovernment Research with Social Network Analysis”, in<br />
Wimmer, M.A. et al. (Eds.), EGOV 2009, LNCS vol 5693, pp 13-25, Springer, Heidelberg.<br />
Grönlund, Å. (2004) “State of the Art in eGov Research – A Survey”, in Traunmüller, R. (Ed.), EGOV 2004, LNCS vol<br />
3183, pp 178-185, Springer, Heidelberg.<br />
232
Nuša Erman and Ljupčo Todorovski<br />
Grönlund, Å. and Andersson, A. (2006) “e-Gov Research Quality Improvements Since 2003: More Rigor, but<br />
Research (Perhaps) Redefined”, in Wimmer, M.A. et al. (Eds.), EGOV 2006, LNCS vol 4084, pp 1-12, Springer,<br />
Heidelberg.<br />
Heeks, R. and Bailur, S. (2007) “Analyzing eGovernment research: Perspectives, philosophies, theories, methods,<br />
and practice”, Government Information Quarterly, Vol 24, pp 243-265.<br />
Lisée, C., Larivière, V. and Archambault, É. (2008) “<strong>Conference</strong> Proceedings as a Source of Scientific Information: A<br />
Bibliometric Analysis”, Journal of the American Society for Information Science and Technology, Vol 59, No. 11,<br />
pp 1776-1784.<br />
Nooy, de W., Mrvar, A. and Batagelj, V. (2005) Exploratory social network analysis with Pajek, Cambridge University<br />
Press, New York.<br />
Scholl, H.J. (2009) “Profiling the EG Research Community and Its Core” in Wimmer, M.A. et al. (Eds.) EGOV 2009,<br />
LNCS vol 5693, pp 1-12, Springer, Heidelberg.<br />
233
E-Identity, E-Activities and E-Political Participation: How are<br />
College Students Embracing the Promise of the Internet?"<br />
Marcoux Faiia<br />
Rivier College, Nashua, U.S.A<br />
mfaiia@rivier.edu<br />
Abstract: The Internet is everywhere from the classroom to the bedroom. Online social networking sites like<br />
Facebook, have replaced the local hangouts and the mall for interacting with friends. Virtual communities and the<br />
Internet are evolving technologies that are intertwined with every aspect of society. This makes it a focus of interest<br />
for sociologists. Neither freedom nor exploitation is inherently promoted by new technologies. The Internet does<br />
harbor dangers but it also offers great promise. Those born into the Internet generation are referred to as "digital<br />
natives." Digital communication is "taken for granted" by young people who have grown up with the Internet. Political<br />
participation, books, and newspapers have evolved into digital formats that these "natives" feel comfortable using.<br />
Full participation in public life will soon require Internet access and competencies. The main domains of the Internet-<br />
1) communication, 2) information, 3) production, and 4) consumption- are significant areas of sociological<br />
investigation with regard to digital natives. This exploratory study was conducted in three phases over the academic<br />
years 2008-2011. It utilized a select sample of undergraduate students in a New England college in the U.S.A. A twoprong<br />
data gathering technique was employed: 1) questionnaires and 2) interviews. A total of 150 questionnaires<br />
were administered and 50 interviews were given. This study employed both qualitative and quantitative<br />
methodologies. It aimed at developing a descriptive "snapshot" of college students’ perceptions of safety and privacy<br />
online, of describing the creation of “self” online and of identifying participation in online activities.<br />
Keywords: e-identity, e-youth, e-activities, e-politics<br />
1. Background<br />
Sociologists are interested in what holds society together and in how society changes over time. One<br />
explanation for social change considers the impact of new technology. Major social revolutions that<br />
transformed whole societies have been identified throughout history. For example, the invention of the<br />
plow introduced the agricultural society, the invention of the steam engine helped to create the industrial<br />
society and now the invention of the micro-chip has brought us into the digital age. Today’s youth have<br />
grown up living in this digital society and are digital natives. The Internet is very much an aspect of their<br />
daily lives. According to Whit and Wyn (2008), the digital world offers an alternative space that is far more<br />
attractive to some young people than the non-digital world. Some young people spend as much time as<br />
possible in the virtual worlds.<br />
Through web pages, chat rooms, and blogs anyone can find out what others think about them. Online<br />
communication is very direct stimulating self-disclosure and anonymity. Online communication can be<br />
rude compared to face-to-face interaction. Face-to-face interactions are replaced by words and images.<br />
The nonverbal communication that is present in face-to-face encounters is missing. Cues from words and<br />
pictures are being used to form opinions of others. With the use of photo shop you can create your<br />
desired appearance. This may change the way that offline relationships are formed and structured<br />
(Andrews 2006). Meeting “dates” online, finding old friends and making new friends is a lucrative and<br />
growing business. A new form of popular culture is “cyber world cultures.” Sites like “Zine” culture allow<br />
young people to self-publish lists of text and images that present themselves to specific communities<br />
(Whit and Wyn 2008). Digital communications are giving young people a resource for expressing many<br />
different “personas.” In sites such as “Second Life” individuals can become someone else online.<br />
Creating avatars and interacting with others, as avatars, you can behave however you like (Coyne et al.<br />
2009).<br />
Social Interactionism as expressed by Erving Goffman emphasizes the interpretive, symbolic and<br />
meaning attachment aspects of human interaction. This exploratory study was informed by Social<br />
Interactionism and specifically by the work of Erving Goffman (1959, 1963, 1971). One important concept<br />
of Goffman’s (1959) thinking is the notion of “segregated audiences.” Individuals who may see us in one<br />
social role will not see us perform other social roles. This is pertinent to electronic communities where the<br />
audience who sees us on Facebook may never see us perform in any other social role. This allows<br />
individuals to create and recreate their presentation of self. Having different audiences witness different<br />
presentations of self allows inconsistent or contradictory role information to go unnoticed. There exists<br />
online a “pastiche personality” where members of the digital generation change their presentation of self<br />
in different ways for different audiences.<br />
234
Marcoux Faiia<br />
The “definition of the situation” is not clouded by these contradictory presentations of self. Also “covering<br />
up” or explaining the inconsistencies are not required in electronic communities. Online impression<br />
management is less challenging. Even for those individuals who carry “stigma” due to physical<br />
appearance or physical deformities their presentation of “self” online can be controlled (Goffman 1963).<br />
Several respondents in this study admitted to having flattering and “doctored” photos of themselves<br />
online. Goffman (1971) discusses “social identity” and “personal identity.” Social identity is expressed in<br />
broad categories like age and sex. Personal identity is more unique, expressed by names and<br />
information about personal biography and social attitudes. Each of these identities can be manipulated<br />
online. Nicknames can convey age, likes and dislikes and can be indecent, which challenges social rules.<br />
In this study several respondents admitted to lying about their age, their sex and of giving misleading<br />
data on their social attitudes. For example, “I told people on MySpace that I was a boy, I wanted to get<br />
dirt from boys on my girlfriends.” “I lied about my age, I said that I was 22 not 18 because I wanted to see<br />
if anyone would date me.” In electronic communities we can control the cues that we emit to others and<br />
manage the audience impression of us more firmly than in face to face interactions.<br />
The uncensored nature of digital communications creates opportunities for both healthy and unhealthy<br />
interactions. The Internet can provide opportunities for marginalized and isolated individuals to meet with<br />
others and to share their concerns and connect for support. Texting has been introduced as a new<br />
therapeutic technique for interventions with alienated and disturbed young people. For many of them<br />
texting is easier and more familiar than the traditional “talking cures” of psychotherapy (Haxell 2010). The<br />
Internet can encourage civic action and promote political and social responsibility. The Internet can<br />
educate and minimize workloads. The virtual network has many positive potential uses and applications.<br />
Richardson (2007) discussed the way the Seattle school system uses the Internet to improve student<br />
communications and to enhance learning. Digital communities are active participants in identity formation<br />
in very positive and helpful ways. Individuals can access important information regarding health, political<br />
positions and financial data that enables them to be better informed and to make better life decisions.<br />
Some social networks, however, are designed to foster harm and create social exclusion. Sufferers of<br />
bulimia can learn innovative ways of hiding their eating disorder. Pedophiles and other predators can<br />
communicate, share their tactics and pornographic literature and photos. Hate ideologies can be<br />
developed and spread and the net can be used to recruit new members to these hate groups.<br />
Cybercrimes, identity theft and cyber bullying are all growing concerns. In some ways it is harder to be<br />
anonymous or escape in the virtual world. Bullying online may be worse than in person (Andrews 2006).<br />
According to Ybarra and Mitchell (2004) bullying and harassment in the cyber world is a “significant”<br />
public health issue. Interestingly, while the typical off line bully is usually a boy, the online bully is just as<br />
likely to be a girl. The media has recently reported on several suicides within the USA that are linked to<br />
cyber bullying (Donaldson 2010).<br />
“Digital Addiction” is a recent mental health concern. Excessive video game playing, accessing gambling<br />
and pornography sites constantly and hour after hour spent in chat rooms, are some of the risks involved<br />
with digital addictions. Clemmitt (2006) states that social networking sites like Facebook raise many<br />
troubling issues of privacy and safety. She states that, “social networking is based on a faulty view of<br />
friendship—the premise that …if A is a friend of B, and B is a friend of C, then A must be C’s friend too…”<br />
(p.12). Chalfen (2009) gives the example of sexting (using the cell phone to send dirty pictures or nude<br />
photos) as a highly problematic behavior with serious repercussions. Some young sexters are being<br />
charged with felonies.<br />
Facebook was created for students by students but now many older adults are using it. Employers,<br />
college admissions and parents are all watching and learning about activities and behaviors that were<br />
once in the realm of “youth culture.” West, Lewis and Currie (2009) conducted an exploratory study to<br />
focus on the extent to which parents were accepted as “friends” on Facebook and what impact that had<br />
on feelings of privacy. They found that parents were not wanted as a “friend.” Worries about “mother’s”<br />
reactions and embarrassment were cited as reasons why parents were not welcome. The study also<br />
found that the line between the public and the private social worlds was blurred. Students did not seem to<br />
see these as two distinct fields. Similar findings emerged in the exploratory study presented in this paper.<br />
2. Methods<br />
Major research questions in this exploratory study included: 1) Do college students perceive the Internet<br />
as a safe and private space? What do they see as risks and dangers? 2) How do they create a<br />
“presentation of self”? Are online identities fluid? Is there a "pastiche personality"? Are there different e-<br />
235
Marcoux Faiia<br />
identities on different sites? 3) How do students use new technologies to get and share information? How<br />
do students communicate online? What social activities are engaged in online? How does the Internet<br />
foster political action?<br />
This research was conducted on the campus of a medium size New England college in the USA during<br />
the academic years of Fall 2008/Spring 2009 and Fall 2009/Spring 2010 and Fall 2010/Spring 2011. The<br />
initial impetus behind this exploratory study was a story the researcher heard about a part-time summer<br />
police officer who lost his position because photos of him partying with underage drinkers surfaced on<br />
Facebook. He was a student criminal justice major with hopes of attending the FBI academy. All that<br />
changed when he was fired for “immoral” acts. He was amazed at the “fallout” and outcome of his<br />
actions. I wondered if college students perceived risk online and had naïve notions of privacy. From this<br />
initial query this study evolved to focus on construction of identity online and participation in activities<br />
online.<br />
This research was conducted in three phases. The first phase examined student perceptions of safety<br />
and privacy online. In phase two "presentation of self" and constructing an e-identity with a focus on eactivities<br />
was studied. Phase three queried civic and political participation. Each phase considered the<br />
four domains of the Internet: 1) communication, 2) information, 3) production and 4) consumption.<br />
The sample consisted of a select sample (please see table 1 for demographics). The sample was 70%<br />
female and 30% male. The ages ranged from 18-25. Everyone who participated in this study was a<br />
college student with access and skill on the Internet. The digital divide today in the USA is about more<br />
than just access to the Internet. We must also consider differences in skills and uses that individuals have<br />
for the Internet. There are huge differences in the sophistication that people have in navigating the web<br />
(DiMaggio et al 2001). Spelling mistakes and functional literacy limit the ability of the less educated to<br />
conduct and benefit from online searches (Hargittai 2006). The result is social inequality. In this sample<br />
access to the Internet and their skill levels with the Internet were high due to social class and educational<br />
characteristics. College majors in this study included nursing, criminology, sociology and education. Over<br />
80% of the sample was single without children, 18 respondents were married and 5 had children. There<br />
were 17 respondents who identified themselves as non-white. One respondent was Hindu, seven were<br />
Protestant, two were Wiccans, five were Mormons, three stated that they were Atheists and the rest<br />
stated they were Catholic.<br />
This study utilized a two-prong data collection strategy: 1) questionnaires and 2) interviews. One hundred<br />
questionnaires (18 questions) were given out in classes in phase one and 50 questionnaires (24<br />
questions) were sent out via Surveymonkey.com in phase three. In phase two, 50 interviews were<br />
conducted by students trained to use a ten-question interview guide. The interview sample was chosen<br />
by the student researchers as a convenience sample. Most questions were open ended. There was no<br />
pilot for the data collection instruments as this was an exploratory study. Questions were developed in<br />
focus groups in various classes and pre-tested for clarity in these focus groups. Following Babbie (2008),<br />
the response categories were exhaustive and mutually exclusive giving an option for respondents to add<br />
details.<br />
Table 1: Demographics of respondents and interviewees<br />
Characteristics Number of respondents N=200<br />
Female 150<br />
Male 50<br />
Aged 18-21 188<br />
Aged 22-25 12<br />
Employed 160<br />
Married 18<br />
3. Results and discussion<br />
In each phase of this exploratory study it was found that the respondents felt very safe and secure selfdisclosing<br />
online. Most respondents relied on safety settings on their computers to control privacy. There<br />
was a perception of safety and also of privacy, even for those respondents who gave examples of being<br />
“fooled” or “fooling” others online. No one expressed a fear of a threat or of an invasion of privacy. Typical<br />
responses by students were: “People in virtual communities are not very honest. You often know the<br />
individuals that you are ‘friends” with, and are able to determine whether or not they are falsifying<br />
236
Marcoux Faiia<br />
information.” “I created a fake MySpace with friends to determine the identity of my ex-boyfriend’s new<br />
girlfriend.” “Some people lie about one thing or another for protection or malicious reasons.” “I know that I<br />
am safe because I am careful and because I always use the privacy settings.” Given that the websites<br />
warn users (EULAS) that they are not secure this was an interesting finding.<br />
In phase two this study found that in their “presentation of self” and construction of an e-identity college<br />
students do create a “pastiche” of their personalities and do as Goffman suggests, manipulate their<br />
identities on various websites. Their constructed identity on Facebook is different than the one on<br />
Linkedin. They employ various strategies (textual, nicknames or screen names, and visuals) to show<br />
different e-identities to different audiences (see table 2). According to this study digital natives are<br />
strategic manipulators with characteristics of independence and immediacy. Their self-disclosure on line<br />
depends on the web site. Their visual self-presentation strategies include photos and occasionally text.<br />
Respondents in this study stated that they never gave their social security numbers, cell phone numbers<br />
or financial information. All of the respondents in the study had photos of themselves online and many<br />
had photos in compromising or intimate settings, one girl stated “I have a photo of me topless”. Several<br />
respondents admitted to “playing jokes” and “tricking” others online. Several described creating fake<br />
MySpace accounts that fooled friends, “I was chatting for weeks before they knew it was me.”<br />
Respondents discussed having people lie about their age, their marital status and their gender. One 17<br />
year old was lying about his age to get more girl-friends. One respondent stated that she lied about her<br />
abilities online, to make others jealous. She claimed that she was a gourmet cook and that she spoke<br />
French. Another stated that she lied about being a virgin. Some respondents in this study stated that they<br />
showed their defiance and personality with their screen names. One respondent, who used a snake as a<br />
prop, stated that she used “Eve” as a screen name. She wanted to convey that she was like “Eve” in the<br />
Bible, “Eve” as the temptress and sinner. Another respondent had himself sitting on a surfboard in the<br />
middle of the ocean when he had never tried surfing.<br />
Table 2: Presentation of self<br />
Characteristics Number of respondents N=50<br />
Drawings 12<br />
Nicknames 37<br />
Screen Names 50<br />
Photos 43<br />
Text 28<br />
Costumes 18<br />
Props 06<br />
Settings 19<br />
Phase three data focused on political participation and contributes directly to the focus of this conference<br />
on E-politics. Thirty three percent of respondents used new technologies to participate in political or civil<br />
action. Examples of answers are: “I have used video and social networking posts about pro-life day and<br />
other events and my involvement.” “I have used video and social networking posts for cancer awareness<br />
and my experience.” “I have sent emails to my state representative giving my opinions on certain issues.”<br />
“I use Facebook to stay connected with a civil lawsuit.” Forty percent visited the Internet to obtain<br />
information about local, state or national election coverage. Responses included: “I used the Internet to<br />
research the candidates' views to see which one I wanted to vote for and I also used it to know the<br />
winners of the election.” “I don't usually go searching for it but if I come across something political, I will<br />
read it.” “I looked up policies, candidates, and opinions online.” Twenty percent of respondents stated that<br />
they did use the Internet to promote a candidate and twenty-six percent said that they engaged in civic<br />
activity online. One respondent stated, “on occasion I will post on my Facebook about laws that I believe<br />
should be passed.” Another, “I have used the Internet to promote for Pro-life awareness involvement. “<br />
One student signed petitions online and three stated that they wrote to their Senators urging attention to<br />
the Uganda conflict. One respondent stated “I am on the side of Libertarianism and I actively support the<br />
use of reason in politics.” Five students were working online with students at George Washington<br />
University to form a political action committee.<br />
Initial findings indicate that daily Internet use is prevalent with many students going online several times a<br />
day with every expectation of safety and privacy. This finding is consistent with the Pew Internet and<br />
American Life Project (2010) trends. The Pew Internet survey (2010) activities’ list results were also<br />
237
Marcoux Faiia<br />
mirrored in this study (see table 3). College students in this sample reported avoiding e-mail. They<br />
indicated that they only looked at e-mail to see if professors were communicating with them. Social<br />
communication was conducted via texting and Facebook. Carnevale (2006) noted similar findings and<br />
suggested that to reach college students, new technologies should be employed.<br />
During the 2010 mid-term elections in the U.S., online political activities were examined in each of the<br />
four domains. According to Calenda and Meijer (2009), the Internet does “reinvigorate the participation of<br />
youth in political process however it does not encourage a shift to new political thinking.” Young people<br />
are using the Internet within the domains of information and communication. This use of the Internet was<br />
apparent here with regard to online activities and political participation. Students gathered information on<br />
political parties, “I wanted to know what this Tea party was all about” and also on policy plans by different<br />
candidates. This sample discussed using new technologies to get information and to communicate.<br />
information on candidates' positions on specific topics and to see biographical information. The domains<br />
of communication, information and consumption were visited with very little use of the domain of<br />
production. One exception was a respondent who created an ad for her student government election<br />
campaign.<br />
College students engaged in a wide range of activities online, however civic and political activities did not<br />
rate high in this exploratory study. One interesting finding in this study was the blending of consumption<br />
with civic action. After learning about Nike shoe production online, one respondent stated “I would never<br />
buy another Nike product knowing how they are made.” Scammell (2000) discusses the “citizen<br />
consumer” who uses political power within the marketplace to make decisions about civic action.<br />
Table 3: Internet activities in the last 48 hours, phase one questionnaire (October 14 and 15, 2010)<br />
Domain One<br />
Communication<br />
e-mail<br />
Facebook<br />
Second Life<br />
online dating<br />
Twitter<br />
post comments<br />
send IM<br />
Domain Two<br />
Information<br />
Google<br />
ASK<br />
online discussion<br />
get political information<br />
research a job<br />
find health, financial information<br />
get news and weather<br />
get directions<br />
use government websites<br />
find apartment<br />
use Wikipedia<br />
watch live webcam<br />
get family history<br />
Domain Three<br />
Production<br />
Blogs<br />
Journal<br />
create webpage<br />
remix songs, images<br />
share your creations<br />
engage in hobby<br />
organize issue meeting<br />
donate to charity<br />
create an advertisement<br />
N=50<br />
Domain Four<br />
Consumption<br />
e-bay<br />
sell stocks<br />
online auction<br />
buy product<br />
play games<br />
just fun<br />
surf net<br />
buy tickets<br />
reservations<br />
bank online<br />
watch video<br />
download music<br />
This study provides a snapshot of how college students are using the Internet. It examined the creation of<br />
self online and general feelings about safety and risk. It also demonstrated some activities that students<br />
engage in online. One limitation of this study is that the sample was restricted to undergraduates<br />
attending a small Catholic liberal arts college. Utilizing a convenience sample will always limit the<br />
generalizability of the findings. The sample had far more women than men and far more whites than nonwhites.<br />
Some of the findings may actually reflect more “general” understandings of the new technologies<br />
than “personal” competencies and abilities in using new technology. The respondents in this study were<br />
not as “computer savvy” as stereotypes hold for this youth population.<br />
4. Conclusions<br />
Today’s “digital natives” have grown up living in a digital society. The Internet and the cell phone are very<br />
much an aspect of their daily lives. Technology can be understood as both the tools and the ability to use<br />
the tools created. In the past technology was what we did, for today’s youth technology is who they are. A<br />
new form of communicating, using emoticons and abbreviations, has replaced many face-to-face<br />
interactions. Old interaction rituals, like greetings, are disappearing. Miscommunication online is<br />
prevalent. In “constructed self” many now negotiate between self-description and social ascription.<br />
Students are struggling with the tensions created by technology. Tensions over “presentation of self”<br />
and expressing emotions are created. Technology provides emotional distance, e.g.: youth are being<br />
“dumped” online. Significant relations are ended without ever seeing each other. Respondents reported<br />
238
Marcoux Faiia<br />
texting to someone who was in the same room. What will be the impact of this new form of technology on<br />
communication and relationships?<br />
Overall, there exists a kind of cultural lag between technology and emotions. The cultural lag argument<br />
also suggests that concerns over technology will decrease over time as trust in new technologies<br />
increases. In this study respondents reported spending 10-15 hours a day online. What will be the impact<br />
of this new form of technology on communication and relationships? Will global citizenship be<br />
encouraged by the new technologies and the Internet? What is the role of the Internet in e-politics? Is it to<br />
promote social policy aimed at increasing youth participation in politics or is it a place where new forms of<br />
political participation are being created? What does this exploratory study suggest about “digital natives”<br />
and the promise of the Internet? Very simply, the opportunities presented by new technologies are<br />
embraced in some domains and not others. More specifically, respondents in this study used domains of<br />
communication, information and consumption more than the domain of production. Political participation<br />
was minimal and traditional. New forms of political participation were not found.<br />
Future research directions are plentiful. A larger and more diverse sample needs to be studied with<br />
greater in-depth focus on each of the domains of the Internet. The investigation about perception of<br />
privacy should look at the website disclaimers (EULAS) more closely. The literature that looks at the<br />
construction of meaning can be incorporated more fully. Recognizing how relationships impact the<br />
construction of meaning and how relationships are created online needs further study. What does a<br />
person’s online profile mean and how is it constructed?<br />
There is a task for the future here and it may require sociologists to move outside the boundaries of the<br />
traditional discipline. The task for the future is best seen as one for coordinated research by investigators<br />
drawing from many different traditions. The advances in cybernetics, computer technologies and related<br />
fields since WWII has stimulated the necessity of a new approach to the study of social action that will<br />
emphasize a systems’ framework instead of a one-way cause and effect sequence of action.<br />
5. Appendix 1: Questionnaire administered to classes during 2008/2009<br />
Title:"Virtual Social Networking: College Students' Perceptions of Privacy and Risk"<br />
Directions: This is an exploratory study of students’ perception of privacy and safety on virtual networks<br />
like MySpace and Facebook: The questionnaire takes about twenty minutes to complete. The study does<br />
not need any names, your participation in this survey is ABSOLUTELY VOLUNTARY and individual<br />
responses will be kept CONFIDENTIAL.<br />
1) Do you own a computer? Yes No<br />
2) Do you visit virtual networks? Yes No<br />
3) Do you have a web page? Yes No<br />
4) Who else should be asked to be a respondent?_______________________________<br />
Year in school_________ Major___________________<br />
Marital Status ________________ Age_____________________<br />
Number of Children______________________ Occupation_______________<br />
Religious affiliation_________________<br />
Gender___________________<br />
1) Do you have a Facebook or MySpace account? ___________________<br />
2) How often do you use the account? _____________________________<br />
3) How many contacts/friends do you have? _________________________<br />
239
Marcoux Faiia<br />
4) Do you know how to tell if a webpage is secure? _________________<br />
How? _____________________________________________________<br />
5) Are you familiar with your browser's security settings? ______________explain<br />
6) Do you put information on your account that you would share with your parents?<br />
_____________________ explain______________________________________<br />
7) Do you respond to people who want to be your virtual friends that you do not know?<br />
________________________________________________________________________<br />
If yes, how often______________ What happened?______________________________<br />
8) How did you feel about MySpace going worldwide? ___________________________<br />
9) Do you worry your activities are being broadcast without your knowledge?<br />
Explain________________________________________________________________<br />
10) Do you think about seeing images of yourself online at parties or drunken?<br />
________________________________________________________________<br />
11) Would you consider it a breach of privacy if pictures of you were posted without your knowledge?<br />
____________________________________________________________<br />
12) Do you think prospective employers look at these websites?________________<br />
13) Is your account limited to only your friends or do you use the security settings to limit those who can<br />
access your pictures and profile?________________________<br />
14) What would have to happen for you to consider your privacy had been violated?<br />
15) How do you think people would respond to the images you post of yourself?<br />
16) Would you use Facebook or MySpace to get revenge?<br />
_____________________________________________________<br />
17) Do you use Facebook or MySpace to get information about other people?<br />
_________________________________________________________________<br />
18) Is there anything about virtual networks that you know and that would be interesting for this study?<br />
Describe:______________________________________________________________<br />
6. Appendix 2: Interview guide for 2009/2010<br />
Title: “Presentation of Self in Virtual Communities”<br />
Directions to Student Interviewers: Choose five respondents for the interviews. You may choose other<br />
students, friends, staff or faculty. Please be sure that you do not interview anyone who was previously<br />
interviewed for this research. You need to choose someone who has been involved with Facebook,<br />
MySpace or some other virtual social network. Please identify yourself as a student researcher. Set up an<br />
appointment to conduct the interview. You will need at least one half hour for each interview and an<br />
additional half hour to record your responses. You will follow the interview guide provided by professor.<br />
Be prepared with pen and paper to take notes. Do NOT just hand the questions to the interviewees to fill<br />
in the answers .YOU are conducting the interviews with the questions as an interview guide. If an<br />
interviewee does not fully respond to a question then use a probe question. For example: “Please tell me<br />
more about that…” Tell your interviewees that their responses will be confidential not anonymous. Ask<br />
the questions in the order of the guide, record answers in detail. Following the interview add any other<br />
notes or observations to the data. Include plenty of direct quotes in your recording.<br />
Interview Guide:<br />
240
Identifying Data:<br />
Age:_____________<br />
Sex: Female_______Male______<br />
Occupation______________<br />
Major_____Year_________<br />
Marital Status:____________<br />
Children: yes______no____<br />
Marcoux Faiia<br />
Who else should be interviewed for this study?___________________<br />
Question One: Are you using a virtual network and if so which one/s?<br />
Question Two: How often are you on Facebook? Etc?<br />
Question Three: Do you have a photo/s online? If so, please describe<br />
Question Four: Do you have a special screen name?<br />
Question Five: Is there anything that you would not put into the virtual community?<br />
Question Six: Have you ever been “fooled” by someone in a virtual network? Please explain.<br />
Question Seven: Have you ever “fooled”someone else in a virtual network? Please explain.<br />
Question Eight: How honest are people in virtual communities?<br />
Question Nine: Have you ever been embarrassed by something you saw or placed in a virtual<br />
community? Please explain.<br />
Question Ten: Do you know of any cases where someone misrepresented themselves online and were<br />
“caught”? Please give details.<br />
7. Appendix 3: Questionnaire administered to classes during 2009/ 2010<br />
Title:"Student Online Activities and Use of Internet and New Technologies in Political and Civic<br />
Participation"<br />
Directions: This is an exploratory study of students’ online activities and use of the internet and new<br />
technologies to engage in political and civic social action. The questionnaire takes about twenty minutes<br />
to complete. The study does not need any names, your participation in this survey is ABSOLUTELY<br />
VOLUNTARY and individual responses will be kept CONFIDENTIAL.<br />
1) Do you own a computer? Yes No<br />
2) Do you visit virtual networks? Yes No<br />
3) Do you have a web page? Yes No<br />
Year in school_________ Major___________________<br />
Marital Status ________________ Age_____________________<br />
Religious affiliation_________________ Gender___________________<br />
241
Marcoux Faiia<br />
Occupation________________________ Number of Children__________<br />
Who else should be contacted for this study?______________________________<br />
1) Do you have a Facebook or MySpace account? ___________________<br />
2) How often do you use the account? _____________________________<br />
3) Do you use the Internet to get information or share information on politics?<br />
_________________________<br />
4) Have you used new technologies to participate in political or civic action?_________________<br />
How? _____________________________________________________<br />
5) Did you go online to get any information about the mid-term elections? ______________<br />
Was it biographical information?_______ Policy information?__________ Candidate’s positions on<br />
issues?________________<br />
6) Did you engage in any first time voter strategies with the help of Internet? _____________________<br />
explain______________________________________<br />
7) Have you ever used the Internet to promote a candidate or solicit for votes?<br />
________________________________________________________________________<br />
If yes, how often______________ What happened?______________________________<br />
8) Have you engaged in any civic action using new technologies ( boycotts, rallies, support for social<br />
movements) ___________________________Explain__________________<br />
9) Have you used a blog or wikis to enhance your participation in civic or political participation? Explain<br />
______________________________________________________________<br />
10) Make a list of everything that you have done on the Internet In the last 48 hours. In economic, social<br />
and political terms what did you get from these tasks? Use extra paper if needed.<br />
8. Appendix 4: Questionnaire administered to classes during fall 2010/spring<br />
2011<br />
Title:"Social Media and Civic Action: Student Online Activities and Use of Internet and New Technologies<br />
in Political and Civic Participation"<br />
http://www.surveymonkey.com/s/e-politics<br />
Directions: This is an exploratory study of students’ online activities and use of the Internet and new<br />
technologies to engage in political and civic social action. The questionnaire takes about twenty minutes<br />
to complete. The study does not need any names, your participation in this survey is ABSOLUTELY<br />
VOLUNTARY and individual responses will be kept CONFIDENTIAL.<br />
1. Do you own a computer?<br />
2. Do you visit virtual networks?<br />
3. Do you have a web page?<br />
4. Are you actively engaged in social media networks?<br />
Year in school:<br />
Major:<br />
242
Marital Status:<br />
Age:<br />
Religious Affiliation:<br />
Gender:<br />
Occupation:<br />
Number of Children:<br />
5. Who else should be contacted for this study?<br />
6. Do you have a Facebook or MySpace account?<br />
Marcoux Faiia<br />
7. If Yes, do you maintain an account on any other social networking sites?<br />
8. How often do you use the account?<br />
9. Do you use the Internet to get or share information regarding politics?<br />
10. Have you used new technologies to participate in political or civic action?<br />
11. If Yes, please describe.<br />
12. Did you visit the Internet to get information about local, state, or national election coverage?<br />
13. If Yes, what type of information were you looking for? (Circle all that apply)<br />
Biographical<br />
Policy related<br />
Candidate positions on particular issues<br />
14. Did you engage in any first time voter strategies with the help of the Internet?<br />
15. If Yes, please explain:<br />
16. Have you ever used the Internet to promote a candidate or solicit for votes?<br />
17. If Yes, how often?<br />
18. What was the outcome?<br />
19. Have you engaged in any civic action using new technologies? (Please circle all that apply)<br />
Boycotts<br />
Rallies<br />
Social movement support efforts<br />
20. If Yes, please explain.<br />
21. Have you used a blog or wikis to enhance your participation in civic or political participation?<br />
22. If Yes, please explain.<br />
243
23. Do you follow any political figures on Twitter?<br />
Marcoux Faiia<br />
24. If Yes, please list all those you consider politically relevant.<br />
References<br />
Andrews, M. (18 Sept. 2006) “Decoding MySpace”, U.S. News & World Report, Vol. 141, No. 10, pp 46-58.<br />
Babbie, E.R. (2007). The Basics of Social Research. Belmont, Calif: Wadsworth Pub. Co.<br />
Calenda, D. and Meijer, A. (2009) “Young People, the Internet and Political Participation: Findings of a web survey in<br />
Italy, Spain and the Netherlands”, Information, Communication & Society, Vol. 12, No. 6, pp 879-898.<br />
Carneval, D. (Oct. 6, 2006) “E-mail is for Old People”, Chronicle of Higher Education.<br />
Celizic, M. (2009) "Her teen committed suicide over 'sexting'", TODAY. Retrieved on 4 Feb 2010 from<br />
http://today.msnbc.msn.com/id/29546030/.<br />
Chalfen, R. (2009) “It’s only a picture: sexting ‘smutty’ snapshots and felony charges”, Visual Studies, Vol. 24, No. 3,<br />
pp 258-268.<br />
Clemmitt, M. (July 28, 2006) “Cyber Socializing: Are Internet sites like MySpace potentially dangerous?”, CQ<br />
Researcher Plus Archive, Vol. 16, No. 27, pp 1-14.<br />
Coyne, I., Chesney, T., Logan, B. and Madden, N. (2009) “Grieving in a virtual community: An exploratory survey of<br />
Second Life residents”, Journal of Psychology, Vol. 217, No. 4, pp 214-221.<br />
DiMaggio, P., Hargittai, E., Numan, W.R. and Robinson, J.P. (2001) “Social Implications of the Internet”, Annual<br />
Review of Sociology, Vol. 27, pp 307-336.<br />
Donaldson, S. (2010) “Immigrant Teen Taunted by Cyber bullies Hangs Herself”. Retrieved from<br />
www.cyberbullying411.org/what-is-cyberbullying.php<br />
Farrell, E.F. (Sept. 1, 2006) “Judging Roommates by Their Facebook Cover”, Chronicle of Higher Education, Vol. 53,<br />
No. 2.<br />
Garfinckle, S. (August 2009) “Privacy Requires Security, Not Abstinence: Protecting the Inalienable Right in the age<br />
of Facebook”, Technology Review.<br />
Goffman, E. (1959) The Presentation of Self in Everyday Life, Doubleday, New York.<br />
Goffman, E. (1963) Stigma: Notes on the Management of Spoiled Identity, Simon & Schuster, New York.<br />
Goffman, E. (1971) Relations in public:Microstudies of the public order, Harper Colophon Books, New York.<br />
Hargittai, E. (2006) “Hurdles to Information Seeking: Spelling and Typographical Mistakes During Users Online<br />
Behavior”, Journal of the Association of Information Systems.<br />
Haxell, A. (2010) “Empowerment in tight spaces; youth counseling in a text-messaging medium”, <strong>Conference</strong> paper<br />
at E-Youth, Antwerp, Belgium, June.<br />
Livingstone, S. (2008) “Taking risky opportunities in youthful content creation: teenagers’ use of social networking<br />
sites for intimacy, privacy and self-expression”, New Media and Society, Vol. 10, No. 3, pp 393-411.<br />
Pew Internet & American Life Project, 2000-2010. “The Internet Life Report”, Washington D.C. Reported in Witte and<br />
Mannon (2010) The Internet and Social Inequality, Routledge, New York.<br />
Richardson, W. (Sept. 2007) “From MySpace to SchoolSpace”, District Administration, pp 65-68.<br />
Scammell, M. (2000) “The Internet and Civic Engagement: The Age of the Citizen Consumer”, Political<br />
Communication, Vol. 17, pp 351-355.<br />
West, A., Lewis, J. and Currie, P. (Dec. 2009) “Students’ Facebook “friends”; public and private spheres”, Journal of<br />
Youth Studies, Vol. 12, No. 6, pp 615-627.<br />
White, R. and Wyn, J. (2008) Youth and Society. 2 nd edition, Oxford Press, Oxford.<br />
Ybarra, M. and Mitchell, K. (2004) “Youth engaging in online harassment: associations with caregiver-child<br />
relationships, internet use, and personal characteristics”, Journal of Adolescence, Vol. 27, pp 319-336.<br />
Young, K. (2004) “Internet Addiction: A new clinical phenomenon and its consequences”, American Behavioral<br />
Scientist, Vol. 48, No. 4, pp 402-415.<br />
244
Semantic-Driven eGovernment: Correlating Development<br />
Phases With Semantic eGovernment Specific Ontology<br />
Models<br />
Jean Vincent Fonou Dombeu 1, 2 and Magda Huisman 2<br />
1<br />
Vaal University of Technology, Vanderbijlpark, South Africa<br />
2<br />
North-West University, South Africa<br />
fonoudombeu@gmail.com<br />
Magda.Huisman@nwu.ac.za<br />
Abstract: Electronic government (eGovernment) has been one of the most active areas of ontology development<br />
during the past six years, resulting in several EGovernment Specific Ontology Models (ESOM) being developed in<br />
various researches and projects. However, the specific ontology models proposed are not aligned to any<br />
circumstance or phase of eGovernment development nor are detailed guidelines provided to facilitate their<br />
repeatability in the broader eGovernment community. This paper establishes a correlation between existing ESOM<br />
and eGovernment development phases. Firstly, ESOM developed in various eGovernment researches and projects<br />
are investigated and encoded. Thereafter, a semantic-driven eGovernment development framework based on<br />
ontology models prescribed in the ontology engineering field is proposed. Finally, an alignment scheme is drawn to<br />
correlate the encoded ESOM with the proposed eGovernment development framework phases. The aims of the<br />
study are twofold: (1) providing eGovernment developers, particularly those from the developing world with<br />
guidelines for adopting existing semantic ESOM in their eGovernment projects, and (2) strengthening the adoption of<br />
semantic technologies in eGovernment processes. The main contribution of the study is the investigation, analysis<br />
and correlation of existing ESOM with a proposed semantic-driven eGovernment development framework phases,<br />
which provides methodologies and techniques for the iterative adoption of ESOM in other eGovernment projects<br />
within the eGovernment development community.<br />
Keywords: eGovernment, ontology models, correlation, eGovernment development framework, semantic<br />
technologies<br />
1. Introduction<br />
As eGovernment evolves in maturity, heterogonous systems of government departments and agencies<br />
need to be integrated and interoperate to provide a seamless services delivery to citizens. In view of the<br />
current state of methodological approaches for eGovernment development, semantic technologies<br />
provide the best solutions for achieving seamless services delivery in eGovernment (Sanati and Lu 2007;<br />
Muthaiyah and Kerschberg 2008). These semantic-based solutions consist of describing, composing,<br />
mapping and merging eGovernment services (e-services) using ESOM (Apostolou et al. 2005a, 2005b;<br />
Sabucedo and Rifon 2006; Puustjarvi 2006; Xiao et al. 2007; Chen et al. 2008; Gugliotta et al. 2005;<br />
Sanati and Lu 2009; Sabucedo et al. 2010). The concern of this paper is the fact that these ESOM do not<br />
correlate with eGovernment development phases nor are detailed guidelines provided to facilitate their<br />
repeatability in eGovernment projects within the eGovernment development community. This paper<br />
establishes a correlation between existing ESOM and eGovernment development phases. Firstly, ESOM<br />
developed in various eGovernment researches and projects are investigated and encoded. Thereafter, a<br />
semantic-driven eGovernment development framework based on ontology models prescribed in the<br />
ontology engineering field is proposed. Finally, an alignment scheme is drawn to correlate the encoded<br />
ESOM with the proposed eGovernment development framework phases. The aims of the study are<br />
twofold: (1) providing eGovernment developers, particularly those from the developing world with<br />
guidelines for adopting existing semantic ESOM in their eGovernment projects, and (2) strengthening the<br />
adoption of semantic technologies in eGovernment processes. The main contribution of the study is the<br />
investigation, analysis and correlation of existing ESOM with a proposed semantic-driven eGovernment<br />
development framework phases, which provides methodologies and techniques for the iterative adoption<br />
of ESOM in other eGovernment projects within the eGovernment development community.<br />
The rest of the paper is organized as follows. Section 2 conducts a review of existing ESOM and the<br />
ontology models prescribed in the ontology engineering field, as well as their semantic alignment. The<br />
proposed semantic-driven eGovernment development framework is presented in section 3. Section 4<br />
describes the correlation scheme of the ESOM with eGovernment development phases. A discussion is<br />
carried out in section 5 and a conclusion is drawn in the last section.<br />
245
2. Methodology<br />
Jean Vincent Fonou Dombeu and Magda Huisman<br />
Figure 1 describes the correlation process. Firstly, a literature review is carried out in both eGovernment<br />
and ontology engineering domains to identify existing ontology models. As a result, eGovernment specific<br />
ontologies (eGovernment domain) and prescribed ontologies (ontology engineering domain) are<br />
identified. Thereafter, a semantic alignment of both categories of ontologies is established. The alignment<br />
result and a proposed eGovernment development framework are used to correlate the eGovernment<br />
specific ontologies with the development phases.<br />
Figure 1: Flowchart of the correlation process of existing ESOM with eGovernment development phases<br />
2.1 Background on existing ESOM<br />
There is no universal definition of ontology in the literature (Gomez-Perez and Benjamins 1999). The<br />
most commonly used definition was proposed by Gruber (1995). He defined ontology as an explicit<br />
specification of a conceptualization. A conceptualization is an abstract and simplified view of a domain of<br />
knowledge one wishes to represent for a certain purpose; the domain could be explicitly and formally<br />
represented using existing objects, concepts, entities and the relationship that exist between them<br />
(Gruber 1995). Ontology is widely used in disciplines such as computer science, software engineering,<br />
databases, artificial intelligence, and many more (Welty 2003; Calero et al. 2006). In these fields,<br />
developers use ontology to represent knowledge in a manner that can be automatically processed by<br />
computers. In eGovernment, ontology is being used to describe and specify e-services aiming at their<br />
easy composition, mapping, matching and merging for a seamless services delivery to citizens through<br />
one-stop portals (Wimmer 2002; Lee et al. 2009). Therefore, specialized ontologies are being developed<br />
to model government’s structures, laws and regulations, service delivery processes, interactions between<br />
government and citizens, integration and interoperability processes, and the like.<br />
Sanati and Lu (2009) use three kinds of ontologies namely: government ontology, regulatory ontology<br />
and service ontology to describe the e-services integration process. The ONTOGOV project (Apostolou<br />
et al. 2005a, 2005b) provides a platform which allows the composition, reconfiguration and evaluation of<br />
e-services using eight kinds of ontologies including legal ontology, organizational ontology, life-cycle<br />
ontology, domain ontology, service ontology, life-event ontology, profile ontology, and web service<br />
246
Jean Vincent Fonou Dombeu and Magda Huisman<br />
orchestration ontology. Other solutions for services integration based on specific ontologies are proposed<br />
in Chen et al. (2008) and Gugliotta et al. (2005). Chen et al. (2008) propose a framework for services<br />
integration based on citizen ontology, domain ontology, and generic eGovernment ontology, whereas,<br />
Gugliotta et al. (2005) establish the mapping of legacy ontology, workflow ontology, service ontology, lifeevent<br />
ontology, and eGovernment domain ontology to a predefined eGovernment system reference<br />
model, aiming at achieving services integration and interoperability for One-Stop portals. The issue of<br />
services interoperability is further addressed by Sabucedo and Rifon (2006), Xiao et al. (2007) and<br />
Sabucedo et al. (2010) with specialized ontology models. Xiao et al. (2007) model the interoperability<br />
process using the eGovernment business ontology. Sabucedo and Rifon (2006) use the life-event<br />
ontology, variable ontology, and legal document ontology, developed in a semantic-based platform, to<br />
enable the interoperability of eGovernment services. A holistic solution for services interoperability is<br />
proposed by Sabucedo et al. (2010) based on the life-event ontology and document ontology. Another<br />
relevant literature by Puustjarvi (2006) proposes a process-document ontology model for the business<br />
process modeling in eGovernment.<br />
None of the above researches and projects has established a correlation between the proposed ESOM<br />
and eGovernment development phases nor do they provide detailed guidelines to facilitate their<br />
repeatability in other eGovernment projects and strengthen the adoption of semantic technologies in<br />
eGovernment processes. This research establishes a correlation of the abovementioned ESOM with a<br />
proposed semantic-driven eGovernment development framework phases; which provides methodologies<br />
and techniques for the iterative adoption of ESOM in other eGovernment projects.<br />
Table 1 summarizes the 26 existing ESOM presented above (see the third column of Table 1), the<br />
eGovernment issues they were used to address (see the second column of Table 1), as well as a brief<br />
summary of their purposes and/or roles in the eGovernment domain (see the fourth column of Table 1).<br />
In the third column of Table 1, the ESOM are also encoded to facilitate their later reference in this paper.<br />
Each eGovernment specific ontology model in the third column of Table 1 is encoded as EGovernment<br />
Ontology x (EOx); where x is a number between 1 and 26 inclusive. It is worth noting that some ESOM in<br />
Table 1 which are sharing the same name have been assigned different codes; this is due to the fact that<br />
in certain cases, the purposes and/or roles for which these ESOM were used are different from one<br />
author to another. The ontology models prescribed by the ontology engineering field are described in the<br />
next section.<br />
2.2 Ontology models prescribed by the ontology engineering field<br />
There is no universal classification of ontologies in the ontology engineering research domain. Several<br />
classifications of ontologies are provided in the literature (Mizoguchi and Ikeda 1995; Uschold 1996;<br />
Gangemi et al. 1999; Gomez-Perez and Benjamins 1999; Beck and Pinto 2003). However, two main<br />
criteria could be used to classify ontologies: the formality used and the nature of the domain of<br />
knowledge that the ontology is characterizing. The formality refers to the level of detail employed to<br />
create the ontology’s vocabulary and specifies the meaning of terms. The domain of knowledge could be<br />
anything at all; it could refer to a domain such as medicine, geographic information system or<br />
eGovernment; it could also refer to an area of problem solving or knowledge representation language<br />
(Uschold 1996). A classification of ontologies according to the above criteria is as follows:<br />
1. Formality<br />
Informal ontology (Uschold 1996; Gangemi et al. 1999): expressed either in natural language or in<br />
a semi-structured form of natural language.<br />
Semi-formal ontology (Uschold 1996): expressed in a formally defined language.<br />
Formal ontology (Uschold 1996): terms are meticulously defined with formal semantic, theorems<br />
and proofs.<br />
2. Domain of Knowledge<br />
Domain ontology: characterizes domains such as medicine, geology, eGovernment, etc; provides<br />
vocabularies about the concepts within a domain and their relationships, the activities that take place<br />
in that domain, and theories and elementary principles governing the domain (Gomez-Perez and<br />
Benjamins 1999; Beck and Pinto 2003).<br />
247
Jean Vincent Fonou Dombeu and Magda Huisman<br />
Table 1: Existing ESOM, eGovernment issues addressed, and purposes and/or roles<br />
248
Jean Vincent Fonou Dombeu and Magda Huisman<br />
Task/Method/Problem solving ontology: terms are specific to a particular task or problem solving<br />
methods (Uschold 1996; Gomez-Perez and Benjamins 1999); describe specific tasks or activities<br />
using the vocabulary specified in the domain ontology (Gangemi et al. 1999).<br />
Representation or Meta ontology: represented in an existing ontology language (Uschold 1996);<br />
written in description logic (Beck and Pinto 2003); uses the syntax employed to formalize knowledge<br />
in knowledge representation paradigms; reusable across domains (Gomez-Perez and Benjamins<br />
1999)<br />
In the remaining sections of this work, we will refer to the above types of ontologies defined in the<br />
ontology engineering field as Prescribed Ontology Models (POM). The next section establishes the<br />
semantic alignment of ESOM in Table 1 with the POM.<br />
2.3 Semantic alignment of existing ESOM with POM<br />
To semantically align ESOM with the POM, we have formulated three propositions which broadly define<br />
the characteristics of the POM. Then, an eGovernment specific ontology model is aligned to a prescribed<br />
ontology model i.e. it belongs to the class of ontologies formed by the prescribed ontology model, if its<br />
purposes and/or roles described in Table 1 satisfy the corresponding proposition. Let’s consider an<br />
ontology O. The propositions are formulated as follows:<br />
P1: O describes the entities of a domain of knowledge and the relationships between them; these entities<br />
may have a physical, abstract or moral representation.<br />
P2: O describes the processes of a domain of knowledge; it describes specific tasks or activities needed<br />
to carry out the processes using the domain concepts.<br />
P3: O describes either the entities or processes of a domain of knowledge and it is formally written in<br />
such a way that it can be processed by a computer.<br />
Figure 2: Alignment of ESOM with POM<br />
After having defined the propositions, the semantic alignment is carried out manually by analyzing the<br />
purposes and/or roles of each eGovernment specific ontology model in Table 1 and finding out which of<br />
the above propositions is satisfied by these purposes and/or roles. The result of the semantic alignment<br />
is provided in Figure 2. The ESOM are represented using the encoding established in the third column of<br />
Table 1. Furthermore, ontology models which purposes and/or roles satisfy a common proposition are<br />
grouped into a set (see the left part of Figure 2). The proposed semantic-driven eGovernment<br />
development framework is presented in the next section.<br />
249
Jean Vincent Fonou Dombeu and Magda Huisman<br />
3. Proposed semantic-driven eGovernment development framework<br />
In Fonou-Dombeu and Huisman (2010), we have proposed a three phase semantic-driven eGovernment<br />
development methodology framework amalgamating eGovernment development methodological features<br />
from the public administration, software engineering and Semantic Web domains. Figure 3 depicts the<br />
architecture of the proposed semantic-driven eGovernment development methodology framework.<br />
Figure 3: The proposed three phase egovernment development framework aligning the united nation<br />
maturity model stages with ontologies<br />
A complete description of the specification of the proposed methodology framework in Figure 3 is out of<br />
the scope of this research; more information could be found in Fonou-Dombeu and Huisman (2010). This<br />
research provides a brief description of the framework and emphasizes on the semantic alignment of the<br />
development phases with the ESOM.<br />
In the proposed methodology framework in Figure 3 we present a new generation of eGovernment<br />
applications development methodology as a system with three layers namely: maturity model stages<br />
layer, service development layer and ontology layer. The maturity model stages layer is the domain of<br />
public administrators who provide a certain number of stages for eGovernment development as well as<br />
guidelines for the planning and implementation of eGovernment systems. The service development layer<br />
in the middle, falls under the software engineering domain and provides tools and platforms for the<br />
analysis, design and effective implementation of e-services; in particular, we are more interested at this<br />
layer by the agile software development techniques which would allow fast development of e-services,<br />
iterative and incremental development, constant review of e-services requirements as well as constant<br />
prototyping during development. The ontology layer is the semantic-based layer which prescribes the use<br />
of semantic technologies as ontologies for the modelling and specification of e-services at each stage of<br />
development to facilitate their integration, maintenance and interoperability at advanced stages of<br />
development.<br />
More importantly, the proposed methodology framework in Figure 3 provides three phases for<br />
eGovernment development namely: scope definition, identification and categorization of services, as well<br />
as Web Services development. At each phase of the framework is aligned a POM for the semantic<br />
description and specification of eGovernment services at that particular phase. The aim of this study<br />
being to correlate the ESOM with the three phases of the proposed framework in Figure 3, we present in<br />
the next section the correlation scheme of the ESOM with the framework phases.<br />
250
Jean Vincent Fonou Dombeu and Magda Huisman<br />
4. Correlating ESOM with the proposed eGovernment development framework<br />
phases<br />
We recall that the proposed eGovernment development framework in Figure 3 is based on ontology<br />
models prescribed in the ontology engineering field. It can be noticed that these prescribed ontology<br />
models represented at each phase of the framework, under its ontology layer, are the same as the POM<br />
mentioned earlier in this research. Then, correlating the ESOM with the framework phases will consist of<br />
establishing an alignment of the POM in Figure 2 with those in Figure 3. To this end, the following<br />
propositions have been formulated:<br />
P4: A prescribed ontology model is aligned to one or many phases of the proposed eGovernment<br />
development framework.<br />
P5: If a prescribed ontology model is aligned to a phase of the framework, then, the ESOM which are<br />
aligned to it are also aligned to that same phase of the framework.<br />
In light of the above propositions, the correlation of ESOM with the proposed eGovernment development<br />
framework phases in Figure 3 is provided in Figure 4. Figure 4 shows that all the ESOM classified as<br />
domain ontologies in Figure 2 are aligned to the first and second phases of the proposed framework.<br />
Similarly, all the ESOM classified as task and Meta ontologies respectively are aligned to the second and<br />
third phases of the framework respectively. More information on the structure of the framework phases is<br />
given in Figure 3.<br />
Figure 4: Correlation scheme of ESOM with proposed eGovernment development framework phases<br />
5. Discussion<br />
This research has investigated, analysed and correlated specific eGovernment ontology models that are<br />
being developed in various researches and projects, with the phases of our proposed eGovernment<br />
development framework (see Figure 3). The correlation scheme in Figure 4 has aligned thirteen ESOM to<br />
the first phase of the framework namely: scope definition; at this phase of eGovernment development, the<br />
aligned ESOM will mainly be used to describe and specify the government business domain. In<br />
particular, the ESOM at the first phase of the framework will be employed to model government structure<br />
and services ([EO1], [EO4], [EO16], [EO20], [EO21], [EO25]), describe government documents, laws and<br />
regulations that govern government services ([EO2], [EO3], [EO10], [EO14], [EO22]), describe citizens’<br />
status ([EO13]), and concepts related to the interaction of citizens with government ([EO19]). Eight<br />
ESOM as well as some of the ESOM aligned to the first phase, are aligned to the second phase of the<br />
framework namely: identification and categorization of services; at this phase of the framework, the<br />
ESOM will serve to model government processes ([EO5], [EO9], [EO11], [EO15]), describe e-services<br />
flows ([EO6], [EO17]) and transitions of citizens’ life ([EO12], [EO24]). At the third phase of the<br />
framework, five ESOM are aligned; they are formally written with Semantic Web technologies ([EO18])<br />
251
Jean Vincent Fonou Dombeu and Magda Huisman<br />
and provide mechanisms for automatic composition, mapping, matching and merging of e-services<br />
([EO7], [EO8], [EO23], [EO26]) and facilitate their integration and interoperability.<br />
As mentioned previously, the researches investigated to identify the ESOM described above do not<br />
provide detailed guidelines on how one can repeat the proposed ESOM in other eGovernment projects.<br />
This study has overcome this weakness by aligning the various ESOM to the ontology models prescribed<br />
in the ontology engineering field. This is a great opportunity to eGovernment developers as the wider<br />
range of methodologies and techniques for building ontologies (Uschold 1996; Fernandez-Lopez 1999;<br />
Beck and Pinto 2003; Calero et al. 2006) which are available in the ontology engineering domain could<br />
be exploited for a widespread use of the ESOM in future eGovernment projects. Furthermore, the<br />
correlation of the proposed ESOM with the phases of the proposed eGovernment development<br />
framework presented above, provide eGovernment developers with a stepwise based mechanism for the<br />
iterative adoption of ESOM in future eGovernment projects.<br />
6. Conclusion<br />
The study reviews researches focusing on semantic eGovernment and published between 2005 and<br />
2010 inclusive. As a result, 26 eGovernment specific ontology models were identified, analysed and<br />
correlated with a proposed semantic-driven eGovernment development framework phases; this provides<br />
methodologies, techniques and mechanisms for the iterative adoption of the proposed eGovernment<br />
specific ontology models in other eGovernment projects within the eGovernment development<br />
community.<br />
The study reveals that various authors are proposing eGovernment specific ontology models under the<br />
same name, but with different purposes/roles. Then, it would be useful to normalize the semantic<br />
ontology models characterizing the eGovernment domain in the near future, so as to prevent<br />
inconsistency and confusion in the semantic eGovernment development community.<br />
References<br />
Apostolou, D., Stojanovic, L., Lobo, T.P., Miro, J.C. and Papadakis, A. (2005a) “Configuring EGovernment Services<br />
Using Ontologies”, IFIP International Federation for Information Processing, Springer Boston, Vol. 189, pp.<br />
1571-5736.<br />
Apostolou, D., Stojanovic, L., Lobo, T.P and Thoensen, B. (2005b) “Towards a Semantically-Driven Software<br />
Engineering Environment for EGovernment”, IFIP International Federation for Information Processing, M.<br />
Bohlen (Eds), Vol. 3416, pp. 157-168.<br />
Beck, H. and Pinto, H.S. (2003) Overview of Approach, Methodologies, Standards, and Tools for Ontologies,<br />
Agricultural Ontology Service (UN FAO).<br />
Calero, C., Ruiz, F. and Piattini, M. (2006) Ontologies for Software Engineering and Software Technology,<br />
Calero.Ruiz.Piattini (Eds.), Springer-Verlag Berlin Heidelberg, 2006.<br />
Chen, D., Nie, G. and Liu, P. (2008) “Research on Knowledge Sharing of EGovernment Based on Automatic<br />
Ontology Mapping”, In Proceedings of the 6 th Wuhan International <strong>Conference</strong> on E-Business, China, pp 105-<br />
111.<br />
Fernandez-Lopez, M. (1999) “Overview of Methodologies for Building Ontologies”, In Proceedings of the IJCAI-99<br />
workshop on Ontologies and Problem-Solving Methods (KRR5), Stockholm, Sweden, 2 August.<br />
Fonou-Dombeu, J.V. and Huisman, M. (2010) "Integrating EGovernment Services: A Stepwise Ontology-Based<br />
Methodology Framework", In proceedings of the 6 th International <strong>Conference</strong> on EGovernment 2010<br />
(ICEG2010), Cape Town, South Africa, 31 September – 01 October 2010,<br />
pp. 18-29.<br />
Gangemi, A., Pisanelli, D.M. and Steve G. (1999) “An Overview of the ONIONS Project: Applying Ontologies to the<br />
Integration of Medical Terminologies”, Elsevier, Data and Knowledge Engineering, Vol. 31, No. 2, pp 183-220.<br />
Gomez-Perez, A. and Benjamins, V.R. (1999) “Overview of knowledge Sharing and Reuse Components: Ontology<br />
and Problem-Solving Methods”, In Proceedings of the IJCAI-99 workshop on Ontologies and Problem-Solving<br />
Methods (KRR5), Stockholm, Sweden, August 2.<br />
Gugliotta, A., Cabral, L., Domingue, J. and Roberto, V. (2005) “A Conceptual Model for Semantically-based<br />
EGovernment Portals”, In Proceedings of International <strong>Conference</strong> on E-Government (ICEG 2005), Ottawa,<br />
Canada.<br />
Gruber, T. R. (1995) “Toward Principles for the Design of Ontologies used for Knowledge Sharing”, International<br />
Journal Human-Computer Studies, Vol 43, No. 5-6, pp 907-928.<br />
Lee, T.,Hon, C.T. and Cheung, D. (2009) “XML Schema Design and Management for EGovernment Data<br />
Interoperability”, Electronic Journal of EGovernment, Vol. 7, No. 4, pp. 381-390.<br />
Mizoguchi, R. and Ikeda, M. (1995) “Ontology for Modeling the World from Problem Solving Perspective”, In<br />
Proceedings of the IJCAI-95.<br />
252
Jean Vincent Fonou Dombeu and Magda Huisman<br />
Muthaiyah, S. and Kerschberg, L. (2008) “Achieving Interoperability in EGovernment Services with two Modes of<br />
Semantic Bridging: SRS and SWRL”, Journal of Theoretical and Applied Electronic Commerce Research , Vol.<br />
3, No. 3, pp. 52-63, December.<br />
Puustjarvi, J. (2006) “Using Knowledge Management and Business Process in EGovernment”, In Proceedings of the<br />
Information Integration and Web-based Applications and Services 2006 (iiWas2006) <strong>Conference</strong>, Yogyakarta<br />
Indonesia, pp. 331-339, 4 - 6 December.<br />
Sabucedo, L.A. and Rifon, L.A. (2006) Semantic Service Oriented Architecture for EGovernment Platforms,<br />
American Association for Artificial Intelligence.<br />
Sabucedo, P., Rifon, L.E.A., Corradini, F., Polzonetti, A. and Re, B. (2010) “Knowledge-based Platform for<br />
EGovernment Agents: A Web-based Solution Using Semantic Technologies”, Journal of Expert Systems with<br />
Applications, Elsevier Inc., Vol. 37, No. 5, pp. 3647-3656.<br />
Sanati, F. and Lu, J. (2007) “A Methdological Framework for EGovernment Service Delivery Integration”, In<br />
EGovernment Interoperability Campus, Paris, France, 2007.<br />
Sanati, F. and Lu, J. (2009) “Multilevel Life-event Abstraction for EGovernment Service Integration”, In Proceedings<br />
of the 9 th <strong>European</strong> <strong>Conference</strong> on EGovernment 2009 (ECEG 2009), London, UK, pp. 550-558, 29-30 June.<br />
Uschold, M. (1996) “Building Ontologies: Towards a Unified Methodology”, In Proceedings of Expert Systems 96, the<br />
16 th Annual <strong>Conference</strong> of British Computer Society Specialist Group Expert Systems, Cambridge, 16-18<br />
December, UK.<br />
Welty, C.A. (2003) “Ontology Research”, AI Magazine, Vol. 24, No. 3, pp 11-12<br />
Wimmer, M. A. (2002) “Integrated Service Modelling for Online One-Stop Government”, Electronic Markets, Vol. 12,<br />
No. 3, pp.149-156.<br />
Xiao, Y., Xioa, M. and Zhao, H. (2007) “An Ontology for EGovernment Knowledge Modelling and Interoperability”,<br />
IEEE International <strong>Conference</strong> on Wireless Communications, Networking and Mobile Computing, (WiCOM<br />
2007), Shanghai, China, 21-25 September, pp. 3600-3603.<br />
253
Towards a Unified Semantic-Driven Methodology Framework<br />
for eGovernment Systems Development<br />
Jean Vincent Fonou Dombeu 1, 2 and Magda Huisman 2<br />
1<br />
Vaal University of Technology, Vanderbijlpark, South Africa<br />
2<br />
North-West University, South Africa<br />
fonoudombeu@gmail.com<br />
Magda.Huisman@nwu.ac.za<br />
Abstract: The ultimate goal of e-governance is to reach the stage of seamless service delivery in one-stop<br />
eGovernment. This raises the engineering issues of integration, reusability, maintenance and interoperability of<br />
autonomous eGovernment systems of government departments and agencies. Therefore, appropriate methodologies<br />
which consistently address the aforementioned engineering issues throughout eGovernment development phases<br />
are needed. This study presents a methodology framework which amalgamates features from maturity models,<br />
traditional software engineering and semantic knowledge representation research domains for a unified and agile<br />
semantic-driven development of eGovernment systems. Firstly, the methods and techniques currently used for the<br />
planning, design, and implementation of eGovernment systems worldwide are investigated; a critical analysis is<br />
carried out to identify their advantages and disadvantages, as well as their contribution towards addressing the<br />
aforementioned engineering issues. Secondly, the proposed methodology framework is drawn and described.<br />
Finally, a flowchart is used to specify the iterative and incremental business process model of the proposed<br />
methodology framework. The aims of the study are twofold: (1), providing direction for the semantic-driven<br />
development of future eGovernment systems which would facilitate their integration and interoperability towards onestop<br />
eGovernment, and (2), unifying the currently used methods and techniques for efficient planning and<br />
implementation of future eGovernment systems based on semantic technologies. The main contribution of the study<br />
is the investigation and amalgamation of features from the maturity models, traditional software engineering and<br />
semantic knowledge representation research domains to enable the planning and agile semantic-driven<br />
implementation of future eGovernment systems. The research would be of interest to eGovernment project teams,<br />
particularly those of developing countries where little or no progress has been made towards the development of<br />
one-stop portals for online services delivery to citizens.<br />
Keywords: eGovernment, methodology framework, one-stop portal, ontology, semantic technologies, maturity<br />
models<br />
1. Introduction<br />
In recent years, many countries worldwide have adopted e-governance, resulting in several web-based<br />
applications being developed in various government departments and agencies for online services<br />
delivery to citizens. The increasing number of these autonomous eGovernment applications (eapplications)<br />
has raised several software engineering issues such as reusability, maintenance,<br />
integration and interoperability of these applications (Choudrie and Weerrakody 2007; Muthaiyah and<br />
Kerschberg 2008; Lee et al. 2009; Saekow and Boonmee 2009), in the context of one-stop eGovernment<br />
which requires e-applications to be accessed at a single point and function as a whole for better<br />
efficiency and seamless services delivery (Wimmer 2002; Lee et al. 2009).<br />
On the other hand e--government is a broad research field with several research works being undertaken<br />
in various domains (Lofstedt 2005); aiming at addressing simultaneously political, institutional, legal,<br />
technological, cultural and societal issues for effective electronic services (e-services) delivery to citizens.<br />
However, the development and deployment of e-services in one-stop portal/shop remain a key and<br />
challenging priority in eGovernment development. In fact, (1), eGovernment strategies of various<br />
countries include e-services development as vehicle for effective online delivery to citizens and<br />
stakeholders; examples from countries with successful eGovernment implementation encompass<br />
Singapore(Devadoss et al. 2003), Australia (Teicher and Dow 2002), Taiwan (Sang et al. 2005) and UK<br />
(Beynon-Davies 2005) and (2), research studies reporting on successful eGovernment implementation<br />
show that few countries have reached the stage of one-stop portal where citizens can seamlessly access<br />
all government’s services; in fact, a United Nations survey in 2002 reported that amongst its 190 member<br />
states, only 26 out of 169 websites had one-stop portals and less than 20 offered online transactions<br />
(Chen et al. 2006). Therefore, it is important to look at appropriate methodologies for developing eapplications<br />
which provides structured guidelines for the design, implementation and deployment of<br />
various government services on the Web to citizens, while consistently addressing the aforementioned<br />
engineering issues in an incremental and iterative manner, towards one-stop eGovernment portals. A<br />
review of current literature in eGovernment implementation has allowed identifying three main methods<br />
254
Jean Vincent Fonou Dombeu and Magda Huisman<br />
and techniques that deal with the planning, design, implementation and deployment of e-services for<br />
effective online delivery to citizens; these include maturity models (MM), traditional software engineering<br />
(TSE) and semantic-based techniques (SB).<br />
Considerable research has been conducted by public administrators for eGovernment planning and<br />
implementation. They propose different stages for eGovernment development in maturity models or stage<br />
of growth models (Layne and Lee 2001; Howard 2001; Deloitte and Touche 2001; Moon 2002; United<br />
Nation 2003; West 2004; Zarei et al. 2008; Bri 2009). A maturity model or stage of growth model is<br />
designed as a sequence of stages of eGovernment growth and constitutes a guiding and benchmarking<br />
tool for eGovernment planning and development. Each maturity model stage prescribes a list of web<br />
features that are needed online or mechanisms required to create changes at that particular stage of<br />
eGovernment development. An example of eGovernment initiative that has used the Layne and Lee<br />
(2001) model is the Integrated Acquisition Environment (IAE) eGovernment project in the US (Sang et al.<br />
2005). The shortcoming of maturity models or stage of growth models is that they lack design guidelines<br />
throughout their various stages. Furthermore, maturity models emphasize eGovernment services<br />
integration at advanced stages of eGovernment growth but they do not mention how this can be done.<br />
The authors carried out a detailed review of maturity models in Fonou-Dombeu and Huisman (2010).<br />
Despite their shortcomings mentioned above, maturity models provide useful methodological features for<br />
eGovernment planning and development (Estevez et al. 2007). However, the aforementioned<br />
shortcomings could be addressed with TSE and SB techniques as described below.<br />
In the software engineering field, it is believed that an eGovernment application is a software system;<br />
existing software development methodologies (SDM) are used in eGovernment projects and existing<br />
standards are employed for services integration and interoperability (Vassilakis et al. 2002; Heeks 2006;<br />
Janowski et al. 2007; Salhofer and Ferbas 2007; Sanati and Lu 2007; Arif 2008; Lee et al. 2009). In this<br />
research, existing SDM refers to structured and object-oriented analysis and design methods, and agile<br />
methods. The advantages of TSE techniques is that they provide a large range of tools and mechanisms<br />
for analyzing and describing the requirements of the complex public administration systems (Arif 2008;<br />
Janowski et al. 2007; Lee et al. 2009), and provides platforms for implementing and deploying web-based<br />
eGovernment applications. However, traditional software development methodologies are inappropriate<br />
for the planning and benchmarking of e-services development as public administrators do with maturity<br />
models. Furthermore, the traditional software engineering techniques use existing Web services<br />
standards for e-services integration and interoperability as described in Arif (2008) and Lee et al. (2009).<br />
However, Muthaiyah and Kerschberg (2008) have demonstrated that existing Web services standards<br />
provide only syntactical interoperability and that the trend is towards semantic interoperability which is<br />
more reliable. This is in line with the work of Sanati and Lu (2007) who argued that traditional software<br />
engineering methodologies provide only limited solutions to the problem of services integration in<br />
eGovernment. They recommended that more research work be carried out to develop new<br />
methodologies approaches that provide appropriate solutions to the integration problem in eGovernment.<br />
To this end, semantic technologies have emerged as promising solutions (Muthaiyah and Kerschberg<br />
2008; Sabucedo et al. 2010).<br />
The SB techniques belongs to the semantic knowledge representation field which uses ontology to model<br />
eGovernment systems (Apostolou et al. 2005a, 2005b; Xiao et al. 2007; Muthaiyah and Kerschberg<br />
2008; Sanati and Lu 2009; Sabucedo et al. 2010), facilitating their semantic integration and<br />
interoperability. The advantage of SB techniques is that they provide efficient and reliable solutions to the<br />
engineering issues of integration, reusability, maintenance and interoperability in eGovernment (Sanati<br />
and Lu 2007; Muthaiyah and Kerschberg 2008). Further, the SB techniques share some tools and<br />
platforms with TSE techniques (Sanati and Lu 2007) for the analysis and design of e-services, and the<br />
development of web-based eGovernment applications. However, the semantic ontology models being<br />
developed in the eGovernment domain are mainly ad hoc solutions and are not aligned to any<br />
eGovernment development phases or stages as proposed by maturity models, which might makes it<br />
extremely difficult to plan and benchmark a semantic-driven eGovernment development project.<br />
Furthermore, various ontologies are being used in different research and projects for the modeling and<br />
specification of e-services, but it is unclear which kinds of ontologies were used (Muthaiyah and<br />
Kerschberg 2008; Saekow and Boonmee 2009) and when and in which circumstances of e-services<br />
development processes the proposed ontologies are required (Apostolou 2005b; Xiao et al. 2007;<br />
Muthaiyah and Kerschberg 2008; Salhofer et al. 2009; Saekow and Boonmee 2009; Sanati and Lu 2009),<br />
nor how to represent them from the complex public administration system (Apostolou 2005b; Xiao et al.<br />
2007; Muthaiyah and Kerschberg 2008; Saekow and Boonmee 2009; Sanati and Lu 2009; Sabucedo et<br />
255
Jean Vincent Fonou Dombeu and Magda Huisman<br />
al. 2010). Finally, to the best of our knowledge, none of current semantic based eGovernment solutions<br />
provides a holistic stepwise methodology for a semantic-driven planning and implementation of<br />
eGovernment systems.<br />
This study presents a methodology framework which amalgamates features from maturity models,<br />
traditional software engineering and semantic knowledge representation research domains for a unified<br />
and agile semantic-driven development of future eGovernment systems. Firstly, the proposed<br />
methodology framework is drawn and described. Secondly, the methodology of the research is<br />
presented. Finally, a flowchart is used to specify the iterative and incremental business process model of<br />
the proposed methodology framework. The aims of the study are twofold: (1), providing direction for the<br />
semantic-driven development of future eGovernment systems which would facilitate their integration and<br />
interoperability towards one-stop eGovernment portals, and (2), unifying the currently used models and<br />
techniques for efficient planning and implementation of future eGovernment systems based on semantic<br />
technologies. The main contribution of the study is the investigation and amalgamation of features from<br />
the maturity models, traditional software engineering and semantic knowledge representation research<br />
domains to enable the planning and agile semantic-driven implementation of future eGovernment<br />
systems. The research would be of interest to eGovernment project teams, particularly those of<br />
developing countries where little or no progress has been made towards the development of one-stop<br />
portals for online services delivery. The rest of the paper is organized as follows. Section 2 presents and<br />
describes the proposed methodology framework. The methodology of the research is explained in<br />
Section 3. Section 4 draws the flowchart of the business process model of the proposed methodology<br />
framework. The limitations and future trends of the research are described in Section 5 and a conclusion<br />
ends the paper.<br />
2. Proposed methodology framework for eGovernment systems development<br />
The methodology framework described here was presented in Fonou-Dombeu and Huisman (2010). It<br />
was employed to show how maturity model stages could be complemented with tools and platforms for<br />
the stepwise semantic-driven design and implementation of e-services to enable their easy integration<br />
and interoperability at advanced stages of eGovernment development towards one-stop portals. The<br />
proposed methodology framework is depicted in Figure 1; it displays and overlay of features from<br />
maturity models (top layer), traditional software engineering (middle layer) and semantic knowledge<br />
representation (bottom layer) domains as mentioned earlier. This study explains why the proposed<br />
methodology framework is useful for eGovernment systems development and emphasizes on its<br />
business process model for the iterative and incremental development of e-services towards one-stop<br />
portals. The study does not repeat the explanation of the e-services development processes at various<br />
phases of the framework. Interested readers may refer to Fonou-Dombeu and Huisman (2010) for more<br />
information.<br />
First of all, in a software engineering perspective, eGovernment systems implementation entails<br />
gathering the requirements of the government service to be delivered online to citizens, design,<br />
implement and deploy the e-service on the Web for online interaction with citizens; these processes could<br />
be carried out iteratively and incrementally with state-of-the-art software engineering techniques. In view<br />
of the complexity of the public administration system, eGovernment implementation as described above<br />
requires (1), mechanisms for the planning and implementation of e-services at various stages or phases<br />
of eGovernment development, (2), state-of-the-art software engineering techniques and platforms for the<br />
design and implementation of e-services, as well as (3), emerging technologies as the Semantic Web<br />
technologies which have potential to facilitate the integration and interoperability of e-services towards<br />
one-stop eGovernment (Muthaiyah and Kerschberg 2008). These three requirements are provided in the<br />
proposed methodology framework in Figure 1. The framework in Figure 1 is composed of three layers<br />
namely maturity model stages layer (MMSL), services development layer (SDL) and ontology layer (OL).<br />
The MMSL provides various stages for eGovernment development; each stage prescribes the web<br />
features that should be implemented and launch on the web site of the government department or<br />
agency for online interaction with citizens. The stages are complemented with software engineering and<br />
semantic-based tools and techniques at various phases of the framework to enable the effective design,<br />
implementation and deployment of the prescribed web features of maturity models. At each phase of the<br />
framework, the SDL and OL provides system analysis and design techniques as well as platforms for the<br />
implementation and deployment of the required web features at the corresponding maturity model<br />
stage(s). In particular, the SDL provides state-of-the-art software engineering techniques as objectoriented<br />
and agile methods for the design and development of e-services; these e-services can further be<br />
integrated and interoperated using existing Web services standards (Arif 2008; Lee et al. 2009) and<br />
256
Jean Vincent Fonou Dombeu and Magda Huisman<br />
promote the advancement towards one-stop portals. Furthermore, the proposed framework phases might<br />
not be followed chronologically or in a linear order in practice, then, agile methods at SDL provide<br />
mechanisms for the iterative and incremental development of e-services through a continuous review of<br />
e-services requirements and prototyping to enable the quick development of required e-services (Greg et<br />
al. 2006). The OL provides various ontology models that capture at each phase of the framework the<br />
semantic content of e-services under development; the resulting e-services ontology models are<br />
implemented in Semantic Web ontology languages such as XML, Resource Description Framework<br />
(RDF) and/or Web Ontology Language (OWL) with Semantic Web platforms to enable their easy<br />
composition, matching, mapping and merging and facilitate their integration and interoperability towards<br />
one-stop eGovernment. The next section describes the methodology that was used to carry out this<br />
study.<br />
Figure 1: The proposed three phase egovernment development framework aligning the united nation<br />
maturity model stages with ontologies<br />
3. Methodology<br />
Several journals, conferences papers, research reports and magazines on eGovernment topic published<br />
between 2000 and 2010 inclusive were reviewed. The aim was to investigate the current methods and<br />
techniques used in eGovernment systems development worldwide. Firstly, the selection of relevant<br />
papers was done by mean of keyword search in Google search engine. Keywords include "eGovernment<br />
development", "eGovernment development methodology", "eGovernment development framework", "eservice<br />
development", "semantic eGovernment", "semantic-driven eGovernment", " eGovernment in<br />
country"; where country include US, UK, Singapore, etc, which are countries with successful<br />
eGovernment implementation experiences (Chen et al. 2006). In total, 244 related research works were<br />
downloaded. Secondly, the content analysis of the downloaded research was carried out based on the<br />
title and abstract; in certain cases, the introduction and selected sections were analysed as well. As a<br />
consequence, (1), research which focuses on eGovernment development methodology or framework in<br />
general i.e. which address general issues such as adoption, strategies, etc., and (2), research which<br />
does not focus on or discuss processes for eGovernment systems development, e-services development,<br />
or semantic web integration and interoperability of e-services was discarded. 59 research works which<br />
meet the abovementioned criteria remained. These remaining research works were read one by one and<br />
analysed thoroughly; finally, journal articles and conference papers where sources were widely<br />
accessible were selected as well as research reports from specialized institutions as the United Nations.<br />
The selected papers were published in various peer reviewed journals, conferences and magazines<br />
worldwide including : Electronic Journal of EGovernment (EJEG), International Journal of Electronic<br />
257
Jean Vincent Fonou Dombeu and Magda Huisman<br />
Government Research (IJEGR), Government Information Quarterly, Public Administration Review (PAR),<br />
Journal of Theoretical and Applied Electronic Commerce Research (JTAER), Journal of Expert Systems<br />
with Applications (JESA), Electronic Markets (EM), The International Information & Library Revew,<br />
Government Finance Review, International Federation for Information Processing (IFIP), <strong>European</strong><br />
<strong>Conference</strong> on EGovernment (ECEG), International Digital Government Research <strong>Conference</strong> (IDGRC),<br />
IEEE International <strong>Conference</strong> on Wireless Communication, Networking and Mobile Computing<br />
(WiCOM), CMA Management, etc. Based on a thorough analysis of these selected research, it was<br />
discovered that, methods and techniques that are widely used for the planning, design and<br />
implementation of eGovernment systems include, (1) maturity models or stages of growth models which<br />
prescribe iterative processes of development through various stages (Layne and Lee 2001; United Nation<br />
2003; West 2004), (2) traditional software engineering techniques including structured, object-oriented,<br />
and agile methods (Vassilakis et al. 2002; Heeks 2006; Janowski et al. 2007; Salhofer and Ferbas 2007;<br />
Sanati and Lu 2007; Arif 2008; Lee et al. 2009) and (3) Semantic Web technologies (Saekow and<br />
Boonmee 2009; Sanati and Lu 2009; Sabucedo et al. 2010). Then, current eGovernment systems<br />
development methods and techniques that dealt with e-services planning, design, and implementation<br />
into three main categories namely: the Maturity Model Stages (MMS), the Traditional Software<br />
Engineering (TSE) and the Semantic-Based (SB) were classified. These three classes correspond to the<br />
three layers of the proposed methodology framework in Figure 1. Table 1 presents some selected<br />
research that we have reviewed. Furthermore, some of the works reviewed were describing practical<br />
experiences of eGovernment implementation processes; the corresponding papers are presented in<br />
Table 2.<br />
Table 1: Selected research studies reviewed<br />
258
Jean Vincent Fonou Dombeu and Magda Huisman<br />
It is worth noting that Table 2 does not refer to developed countries with successful eGovernment<br />
implementation experiences such as US, UK, Singapore, etc. because detailed studies on the software<br />
development techniques or processes of their eGovernments systems was unavailable. In fact, available<br />
research is mainly reporting or evaluating the implementation strategies of eGovernment systems of<br />
these developed countries as well as their success and/or failure factors without providing any<br />
information on the software engineering methods or techniques employed for e-services design and<br />
implementation. This situation is in part justified by the fact that in these countries, eGovernment systems<br />
implementation is mainly outsourced by private companies which are known to protect their proprietary<br />
information; examples include the implementation of the eGovernment system of the department of<br />
Inland Revenue in the UK (Beynon-Davies 2005), the Government Electronic Business (GeBIZ)<br />
procurement system in Singapore (Devadoss et al. 2003) and the e-Tax system of the National Tax<br />
Agency in Japan (Chatfield 2009). The business process model of the proposed methodology framework<br />
in Figure 1 is presented in the next section.<br />
Table 2: Research studies describing eGovernment implementation case studies<br />
4. Flowchart of the business process model of the proposed methodology<br />
framework<br />
As shown in Figure 1, the service development layer provides the names of the framework phases: scope<br />
definition, identification and categorization of services, and web services development. It represents the<br />
process of e-services development, from the requirements of a government’s business domain to the<br />
effective e-services implementation. Figure 2 depicts the flowchart of the business process model of the<br />
proposed framework in Figure 1; it describes the incremental and iterative process for realizing the web<br />
features prescribed by the maturity models stages, at each phase of eGovernment implementation. Table<br />
3 describes the variables used in the flowchart.<br />
Table 3: Variables of the business process model algorithm<br />
259
Jean Vincent Fonou Dombeu and Magda Huisman<br />
The incremental and iterative process in Figure 2 follows the agile software development paradigm (Greg<br />
et al. 2006; Clutterbuck et al. 2009); it commences with the selection of a maturity model. This means<br />
that, at the beginning of an eGovernment project, a maturity model has to be chosen. The chosen<br />
maturity model will provide the stages of development as well as guidelines for the planning and<br />
implementation of the system from a simple web presence to a one-stop portal. Further, each maturity<br />
model will provide the web features required at each stage of eGovernment growth. After having chosen<br />
the appropriate maturity model, its stages need to be aligned to the framework as described in Fonou-<br />
Dombeu and Huisman (2010). Thereafter, the iteration starts with the first phase of e-services<br />
development (see the outer loop in Figure 5). At each phase of development an iterative process is<br />
performed (see the inner loop in Figure 5) to realize and launch the web features required by the maturity<br />
model stages aligned to the corresponding phase of the methodology framework. The iterative process is<br />
performed until the required web features are realized at that particular phase, or the required web<br />
features are to be completed in the next phase of the framework as it is explained in Fonou-Dombeu and<br />
Huisman (2010).<br />
Figure 2: Flowchart of the business process model of the methodology framework<br />
260
Jean Vincent Fonou Dombeu and Magda Huisman<br />
In all the cases, after the semantic modelling of the business requirements of the eGovernment business<br />
domain during iteration, a prototype has to be developed and tested or the resulting prototype from the<br />
previous iteration has to be improved and tested. After all the web features or changes required by the<br />
maturity model stages aligned to the current methodology framework phase have been realized, the<br />
iterative process continues to the next phase of the framework. The requirements of the eGovernment<br />
business domain are revisited during iterations (See the inner loop in Figure 5) to ensure that the<br />
prototype systems developed meet the requirements of users who are the citizens and civil servants. The<br />
process is repeated until all the web features or changes prescribed by the maturity model are realized<br />
i.e. until a complete one-stop portal is implemented. The phases of the framework might not be followed<br />
in a linear order in practice; then, the business process model in Figure 2 allows a direct selection of a<br />
particular phase in order to implement and launch a desired web feature on the government web portal.<br />
5. Future trends<br />
This study has presented a conceptual model of a semantic-driven methodology framework for<br />
eGovernment applications development. However, there are certain limitations; firstly, eGovernment<br />
development is not only about technology adoption; other issues including political, institutional, societal,<br />
cultural, etc., may influence the application of the proposed framework in the eGovernment development<br />
context of a given country; secondly, the proposed model has to be empirically validated to demonstrate<br />
its feasibility. Finally, the specification of the proposed model has to be expanded to provide more<br />
insights on the semantic modelling and description of e-services during iterations. This will be the focus of<br />
the next stage of research.<br />
6. Conclusion<br />
This study has presented a methodology framework for eGovernment systems development. The<br />
proposed framework provides stages, tools and techniques for the implementation of e-applications at<br />
various phases of eGovernment development. Due to the fact that the framework phases might not<br />
always be applied chronologically or in a linear order, its business process model was developed to<br />
enable the iterative and incremental development of e-applications.<br />
The proposed framework provides directions for the software development of future eGovernment<br />
systems based on semantic web technologies which are emerging in the field of eGovernment and which<br />
have potential to facilitate the integration and interoperability of resulting eGovernment systems towards<br />
one-stop eGovernment. The technology oriented nature of the framework makes it a useful tool to be<br />
used by eGovernment project teams in conjunction with political, cultural, institutional, legal, and societal<br />
conditions of each specific country.<br />
Finally, the study would particularly be of interest to eGovernment project teams of developing countries<br />
where little or no progress has been made towards the development of one-stop portals for seamless<br />
online services delivery to citizens.<br />
References<br />
Apostolou, D., Stojanovic, L., Lobo, T.P., Miro, J.C. and Papadakis, A. (2005a) “Configuring EGovernment Services<br />
Using Ontologies”, IFIP International Federation for Information Processing, Springer Boston, Vol. 189, pp.<br />
1571-5736.<br />
Apostolou, D., Stojanovic, L., Lobo, T.P and Thoensen, B. (2005b) “Towards a Semantically-Driven Software<br />
Engineering Environment for EGovernment”, IFIP International Federation for Information Processing, M.<br />
Bohlen (Eds), Vol. 3416, pp. 157-168.<br />
Arif, M. (2008) “Customer Orientation in EGovernment Project Management: a Case Study”, The Electronic Journal<br />
of EGovernment, Vol. 6, No. 1, pp. 1-10.<br />
Beynon-Davies, P. (2005) “Constructing Electronic Government: the Case of the UK Inland Revenue”, International<br />
Journal of Information Management, Vol. 25, No. 1, pp. 3-20.<br />
Bri, F. D. (2009) “An EGovernment Stages of Growth Model Based on Research within the Irish Revenue Offices”,<br />
Electronic Journal of EGovernment, Vol. 7, No. 4, pp. 339-348.<br />
Chatfield, A.T. (2009) “Public Service Reform Through EGovernment: a Case Study of e-Tax in Japan”, Electronic<br />
Journal of EGovernment, Vol. 7, No. 2, pp. 135-134.<br />
Chen, Y.N., Chen, H.M., Huang, W. and Ching, R.K.H. (2006) “EGovernment Strategies in Developed and<br />
Developing Countries: An Implementation Framework and Case Study”, Journal of Global Information<br />
Management, Vol. 14, No. 1, pp. 23-46.<br />
Choudrie, J. and Weerrakody, V. (2007) “Horizontal Process Integration in EGovernment: The perspective of UK<br />
Local Authority”, International Journal of Electronic Government Research, Vol. 3, No. 3, pp. 22-39.<br />
261
Jean Vincent Fonou Dombeu and Magda Huisman<br />
Clutterbuck, P., Rowlands, T. and Seamons, O. (2009) “A Case Study of SME Web Application Development<br />
Effectiveness via Agile Methods”, The Electronic Journal of Information Systems Evaluation, Vol. 12, No, 1, pp.<br />
13-26.<br />
Deladoss, P.R., Pan, S.L. and Huang, J.C. (2003) “Structurational Analysis of EGovernment Initiatives: A Case Study<br />
of SCO”, Decision Support Systems, Elsevier Science, Vol. 34, No. 3, pp. 253-269.<br />
Deloitte and Touche (2001) “The Citizen as Customer”, CMA Management, Vol 74, No. 10, p 58.<br />
Estevez, E., Janowski, T. and Ojo, A. (2007) “Planning for EGovernment -A Service-oriented Agency Survey”,<br />
Research Report No. 361, Centre for Electronic Government, United Nations University-International Institute<br />
for Software Technology (UNU-IIST), Macao, China.<br />
Fonou-Dombeu, J.V. and Huisman, M. (2010) "Integrating EGovernment Services: A Stepwise Ontology-Based<br />
Methodology Framework", In proceedings of the 6 th International <strong>Conference</strong> on EGovernment 2010<br />
(ICEG2010), Cape Town, South Africa, 31 September – 01 October 2010, pp. 18-29.<br />
Grey, J., Huisman, M. and Goede, R. (2006) An Investigation of the Suitability of Agile System Development<br />
Methodologies for the Development of Data Warehouses, Msc. Dissertation, North-West University,<br />
Potchefstroom, South Africa.<br />
Heeks, R. (2006) “Implementing and Managing EGovernment”, Book Review, Journal of Scientific & Industrial<br />
Research, Vol. 65, No. 10, pp. 845-846.<br />
Howard, M. (2001) “EGovernment Across the Globe: How Will "e" Change Government?” Government Finance<br />
Review, August 2001, pp. 6-9.<br />
Janowski, T., Estevez, E. and Ojo, A. (2007) “A Project Framework for EGovernment, Research Report No. 359,<br />
Centre for Electronic Government”, United Nations University-International Institute for Software Technology<br />
(UNU-IIST), Macao, China.<br />
Layne, K. and Lee, J. (2001) “Developing Fully Functional EGovernment: A Four Stage Model”, Government<br />
Information Quarterly, Elsevier Inc., Vol. 18, No. 2, pp. 122-136.<br />
Lee, T., Hon, C.T. and Cheung, D. (2009) “XML Schema Design and Management for EGovernment Data<br />
Interoperability”, Electronic Journal of EGovernment, Vol. 7, No. 4, pp. 381-390.<br />
Lofstedt, U. (2005) “EGovernment – Assessment of Current Research and some Proposals for Future Directions”,<br />
International Journal of Public Information Systems, Vol. 1, No.1, pp. 39-52.<br />
Moon, M.J. (2002) “The Evolution of EGovernment Among Municipalities: Rhetoric or reality?” Public Administration<br />
Review, Vol. 62, No. 4, pp 424-433.<br />
Muthaiyah, S. and Kerschberg, L. (2008) “Achieving Interoperability in EGovernment Services with two Modes of<br />
Semantic Bridging: SRS and SWRL”, Journal of Theoretical and Applied Electronic Commerce Research , Vol.<br />
3, No. 3, pp. 52-63, December.<br />
Sabucedo, P., Rifon, L.E.A., Corradini, F., Polzonetti, A. and Re, B. (2010) “Knowledge-based Platform for<br />
EGovernment Agents: A Web-based Solution Using Semantic Technologies”, Journal of Expert Systems with<br />
Applications, Elsevier Inc., Vol. 37, No.5, pp. 3647-3656.<br />
Salhofer, P., Stadlhofer, B. and Tretter, G. (2009) “Ontology Driven EGovernment”, Electronic Journal of<br />
EGovernment, Vol. 7, No. 4, pp. 415-424.<br />
Salhofer, P. and Ferbas, D. (2007) “A Pragmatic Approach to the Introduction of EGovernment”, In Proceedings of<br />
the 8 th Annual International Digital Government Research <strong>Conference</strong>, Philadelphia, Pennsylvania, USA, May<br />
20-23, pp. 183-189.<br />
Saekow, A. and Boonmee, C. (2009) “A Practical Approach to Interoperability Practical Implementation Support<br />
(IPIS) for EGovernment Interoperability”, Electronic Journal of EGovernment, Vol. 7, No. 4, pp. 403-414.<br />
Sanati, F. and Lu, J. (2007) “A Methdological Framework for EGovernment Service Delivery Integration”, In<br />
EGovernment Interoperability Campus, Paris, France, 2007.<br />
Sanati, F. and Lu, J. (2009) “Multilevel Life-event Abstraction for EGovernment Service Integration”, In Proceedings<br />
of the 9 th <strong>European</strong> <strong>Conference</strong> on EGovernment 2009 (ECEG 2009), London, UK, pp. 550-558, 29-30 June.<br />
Sang, M.L., Tan, X. and Trimi, S. (2005) “Current Practices of Leading EGovernment Countries”, Communication of<br />
the ACM, Vol. 48, No. 10, pp. 99-104.<br />
Teicher, J. and Dow, N. (2002) “EGovernment in Australia: Promise and Progress”, Information polity, Vol. 7, No. 4,<br />
pp. 231-246.<br />
United Nation (2003) “UN Global EGovernment Survey 2003”, [online],<br />
http://unpan1.un.org/intradoc/groups/public/documents/un/unpan016066.pdf<br />
(Accessed 28/03/2011)<br />
Vassilakis, C., Laskaridis, G., Lepouras, G., Rouvas, S. and Georgiadis, P. (2002) “Transactional EGovernment<br />
Services: An Integrated Approach”, Lecture Notes in Computer Science, Springer Berling Heidelberg, Vol.<br />
2456, pp. 276-279.<br />
West, D.M. (2004) “EGovernment and the Transformation of Service Delivery and Citizen Attitudes”, Public<br />
Administration Review, Vol 64, No. 1, pp 15-27.<br />
Wimmer, M. A. (2002) “Integrated Service Modelling for Online One-Stop Government”, Electronic Markets, Vol. 12,<br />
No. 3, pp.149-156.<br />
Xiao, Y., Xioa, M. and Zhao, H. (2007) “An Ontology for EGovernment Knowledge Modelling and Interoperability”,<br />
IEEE International <strong>Conference</strong> on Wireless Communications, Networking and Mobile Computing, (WiCOM<br />
2007), Shanghai, China, 21-25 September, pp. 3600-3603.<br />
Zarei, B., Ghapanchi, A. and Sattary, B. (2008) “Toward National EGovernment Development Models for Developing<br />
Countries: A Nine Stage Model”, The International Information & Library Review, Vol. 40, No. 3, pp. 199-207.<br />
262
An Information System to Collect and Analyze Data From<br />
Educational Units During Epidemy Spread Periods<br />
John Garofalakis, Andreas Koskeris, Evangelia Boufardea, Theofanis Michail and<br />
Flora Oikonomou<br />
University Campus of Patras, Greece<br />
garofala@cti.gr<br />
koskeris@cti.gr<br />
mpoufard@westgate.gr<br />
michail@westgate.gr<br />
oikonom@westgate.gr<br />
Abstract: The 2009 flu pandemic was a global outbreak of a new strain of H1N1 influenza virus, often referred to as<br />
"swine flu", which infected thousands of people. In order to improve Public Service efficiency and effectiveness for<br />
the virus’s prevention, governments all over the world started collecting data and recording laboratory-confirmed<br />
cases of the flu. Due to the proliferation of the Internet and the World Wide Web applications and the increasing<br />
interaction of people with eGovernment systems, the recorded flu occurrences were available to scientists around the<br />
world in order to help them draw meaningful conclusions regarding the H1N1 spread. In Greece apart from the other<br />
measures which were taken, special interest was given to the flu high risk groups, such as young children. The<br />
presented project concerns the development and the use of a web based tool to collect and analyze students’<br />
absences on a daily basis from the educational units in Greece. Aim of this effort was to assist the epidemiology<br />
monitoring of H1N1 epidemic evolution in Greece, in the whole country and per Region, leading – in comparative<br />
analysis with other factors collected from other sources – to the extraction of important conclusions for taking<br />
precautionary measures against the flu (e.g. temporarily school closures). Such a survey system to collect and<br />
analyze the daily students’ absences from Greek schools is very useful due to the fact that it provides a precise view<br />
concerning the H1N1 spread in “real time”. The whole system has been integrated to the central Resources<br />
Management System of the Greek Ministry of Education and it operated utilizing the backbone of Greek School<br />
Network. The daily data entry was carried out in a secure hierarchical way (data entry from schools, and data<br />
monitoring from administrative offices). Several statistics were presented, providing capability for comparative<br />
analysis results.<br />
Keywords: electronic government (eGovernment), public sector, H1N1 virus, school units, information system<br />
1. Introduction<br />
The pervasive adoption of the Internet since the 1990s has stimulated business to embrace e-commerce.<br />
In the public sector, eGovernment has emerged and grown enormously as well. Indeed, the development<br />
of eGovernment has clearly mirrored the development of e-commerce. As a result, public organizations<br />
across the globe and at different governmental levels have been applying Internet technologies in<br />
innovative ways to deliver services, engage citizens, and improve performance. Many information<br />
systems have been developed in order to provide quality public services, make interactions between<br />
citizens and government agencies smoother, easier and more efficient and assist government agencies<br />
in the decision making process.<br />
The presented work, concerns an e-tool which was developed for the Greek Ministry of Education and<br />
the “Greek center of monitoring and prevention of deceases - KEELPNO”. The tool has been used to<br />
assist the daily collection and statistical analysis of students’ absences from primary and secondary<br />
educational establishment in Greece. The objectives of this application were:<br />
To support the epidemiological monitoring of H1N1 evolution in Greece (for whole country and per<br />
region), leading to the extraction of several important conclusions for taking public health measures in<br />
the country. Additionally, the extracted conclusions were combined with several additional data<br />
collected from the epidemiological monitoring system of Greece.<br />
To assist the Greek Ministries of Education and Health on their effort to monitor constantly the<br />
evolution of H1N1 virus in Greek schools.<br />
The tool which will be presented within the following sections, is collecting daily data from all Greek<br />
schools and it produces several statistics on various levels (per municipality, region etc), as long as<br />
important alerts and comparative analysis reports. It has been integrated in the existing Resources<br />
Management System of the Greek Ministry of Education (Garofalakis, et al., 2007) and it operated over<br />
the Greek school network (Greek School Network, 2010) utilizing its access / security policies. The<br />
263
John Garofalakis et al.<br />
application started on October 2009, leading to important results assisting in real time the relevant Greek<br />
Authorities responsible to deal with the H1N1 spread. Within the next sections, we present: the<br />
Background information concerning specific needs leading to the decision to implement the tool, the<br />
whole system (on user and technical level), the actual results (quantitative and qualitative) of the<br />
application and the planned further work.<br />
2. Background<br />
Since the late 1990s governments at all levels have launched electronic government (eGovernment)<br />
projects aimed at providing electronic information and services to citizens and businesses (Torres, et al.,<br />
2005). Many governments have realized the importance of using information and communication<br />
technologies (ICT) to provide efficient and transparent government (Prattipati, 2003). Government<br />
agencies around the world have embraced the digital revolution and placed a wide range of materials on<br />
the Web including publications, databases and actual online government services (West,<br />
2002).EGovernment can be broadly defined as a government’s use of ICT, particularly web based<br />
internet applications, to enhance the access to and delivery of government information and service to<br />
citizens, business partners, employees, and other agencies and entities.<br />
The construction and management of eGovernment systems are becoming an essential element of<br />
modern public administration (Torres, et al., 2005). For example, individual citizens may interact with<br />
government electronically by filing their income tax documents online. In Korea, for example, Choudrie &<br />
Lee (2004) found that the use of broadband within government departments and agencies has had a<br />
catalytic impact on the quality of public services, and encouraged previously bureaucratic organizations<br />
to re-engineer the way services are delivered to citizens. In India the online delivery of municipal services<br />
to citizens minimized the time and speed of services and made the active participation of citizens in<br />
public decision-making process possible. In Jamaica customs automated services online led to fewer<br />
errors and inconsistency and increased the speed in entry processing. In Columbia a governmental portal<br />
has been designed which contains all federal government agencies and their relative information and<br />
services in order to facilitate search and information retrieval and enhance the active participation of<br />
citizens in the decision making process. (Ndou, 2004).<br />
Governments in delivering services may do so directly or indirectly through intermediaries such as banks,<br />
postal outlets in private businesses, and by other means. Consequently, any eGovernment effort must<br />
meet the needs of a diverse set of stakeholders that operate in the political, business, or civic spheres of<br />
influence. EGovernment, however, is more than a technological phenomenon. Whether through<br />
deliberate choice or passive acceptance, it is transformative in nature, affecting the management of<br />
human, technological, and organizational resources and processes and facilitating the decision making<br />
process of national interest matters.<br />
One of these matters is the monitoring of factors related with epidemiology, which is a crucial element of<br />
the strategies used for the control of diseases. Various data sources are available to epidemiologists for<br />
routine, prospective monitoring of public health. The efficient collection and analysis of data requires<br />
specialized methods and tools (‘What is Epidemiology All About’, 1999 and Burkom, et al., 2005, ‘The<br />
changing phases of pandemic (H1N1) 2009 in Queensland: an overview of public health actions and<br />
epidemiology’, Appuhamy et al, 2010). Information and Communication Technologies (ICTs) can play a<br />
very important role to achieve this efficiently (Dialynas, et al., 2009 and Garofalakis, et al. 2007) providing<br />
efficient utilization of Geographical Information systems to provide mapping and constant analysis of<br />
correlated factors (e.g. cancers in relation with pollutants nearby a specific area (Garofalakis, et al.,<br />
2007), sexual activity and HIV spreading (Lenselink, et al., 2008)).<br />
The wide fast spread of the new H1N1 virus all over the world is a specific case where such ICTs can<br />
provide important help on relevant authorities at their effort to: take the needed measures on time (e.g.<br />
closing of public organizations) and communicate the reality effectively to the public (e.g. to avoid public<br />
panic). Automated applications can easily collect and analyze various data concerning different factors<br />
(directly or indirectly related with the epidemic) Leonardo (2009) giving information which otherwise will<br />
have to take days to assemble. Successful cases of such systems have already applied world widely<br />
(‘TheraDoc’, 2009). The presented project concerns a specific tool developed to collect and analyze data<br />
concerning factors indirectly related with H1N1 spread. That is, students’ daily absences from schools.<br />
Studies have shown that children are prone to viruses and the monitoring of this age group can provide<br />
useful information about the H1N1 spread in a country. The analysis of data collected daily from all<br />
264
John Garofalakis et al.<br />
schools in Greece, provides a useful tool for relevant public health authorities on their effort to take the<br />
needed measures to control, as much as possible, the H1N1 spread.<br />
3. The system<br />
The Absences system is a web application resembling a portal. The application is accessed after<br />
authentication through a browser and the authenticated users belong into five levels with different<br />
privileges. The authentication is made by using the Greek Schools Network Directory Service<br />
infrastructure. After the authentication the system is customized according to the user level. In the<br />
following paragraphs there is an extent description of the structure and the system’s special<br />
characteristics. In order to better understand the system, we will first depict the structure of the<br />
administration of the Educational System in Greece upon which the project has been based. Afterwards<br />
we will present the “survey system” on which the “absences system” is based for the data retrieval. At<br />
next we will analyze in detail the presented system.<br />
3.1 Multilevel system<br />
The organizational model of the Ministry of Education includes six levels of structures (Figure 1).<br />
Figure 1: Levels of educational system in Greece<br />
Starting from the top, the uppermost level of the Central Administration is the Ministry departments which<br />
supervise every managerial and school unit of the Primary and the Secondary Education. The next level<br />
includes the Educational departments in the Regional Offices, which are responsible for the Direction<br />
Offices, the Local Offices and schools that are set in the specific Regional body. The further down level is<br />
the level of Direction Offices that has under observation the Local Offices and the schools in the<br />
prefecture. The following level is the one of the local offices that is responsible only for the schools that<br />
they supervise and also have access to the data the schools register. The bottom level is the combination<br />
of the fifth and the sixth level of Figure 1. By this we mean that in the Educational level the teachers in the<br />
school fill in the data about themselves and the school unit they belong to. Every level has access to the<br />
units that supervises. Also, the above level has under observation the below level ensuring the right<br />
functioning of the project. The Local Offices monitor the data storage of their teachers and schools, the<br />
Direction Offices of their Local Offices, the Regional Offices of their Direction Offices and the Ministry of<br />
the Regional Offices. The schema that has been described is not strict and allows every higher level to<br />
have access to the data of a unit. For example the data of a school unit is available to the Ministry, to the<br />
Regional Office, to the Direction Office and to the Local Office that it belongs to.<br />
This model proposes a concrete interaction method in which each level has to collaborate only with its<br />
predecessor and its successor. Each user who belongs to an upper level can access queries, statistics<br />
and services referring to all other levels below them. For example: Central administration authorized<br />
users can have access to integrated statistical reports concerning number of schools and teachers in the<br />
whole Greece. Teachers can have access to their own information (history, hours teaching etc.).<br />
265
3.2 The “survey system”<br />
John Garofalakis et al.<br />
The Survey system (Garofalakis, et al., 2007) is used to record data about students in school units and<br />
teachers employed either in school units or in administration offices. In particular, every school unit fills in<br />
data about the unit, the students and the teachers. The data about the unit include data about the upper<br />
level which belongs to, address and contact information, information about the category, the type, the<br />
special characteristics and the working hours. Every school unit enters the number of students in every<br />
class including the additional classes for foreign languages and other parallel activities. Special classes<br />
that may exist in the unit are also stored due to Survey system. Moreover, every unit fills in information<br />
about the teachers who work there. The information entered is about their personal data, their specialty,<br />
their working hours, the classes they teach, their additional studies and their working status (permanent,<br />
replacer, time worker). There is also a recording about the amount of hours of a specialty that are missing<br />
or are in excess in a school unit. The next three levels of administration, the “Local offices”, the “Direction<br />
Offices” and the “Regional Offices” enter the same data about the teachers working there as well<br />
information about the administration unit like address, contact information etc. These users also have the<br />
responsibility to monitor the procedure of data entry at the lower levels that they are supervising.<br />
Moreover they have access to various statistics concerning data entered by all users belonging to their<br />
responsibility area.<br />
3.3 The presented “absences system”<br />
The Absences System is essentially an extension of the previous described Survey System of the Greek<br />
Ministry of Education (Garofalakis, et al., 2007) since it retrieves data from the latter and uses it properly<br />
for collecting the daily students’ absences from all the school units in Greece. It is a web application and<br />
as such requires authentication in order to access it. Every system’s user has access codes and<br />
according to them the application interface is organized appropriately, rendering only the content that the<br />
user is authenticated to deal with. In this paragraph there is a description of the way the Absences<br />
System interacts with the Survey System and the data that each user level enters.<br />
Every school unit connects to the Survey System and enters a plethora of information as mentioned in<br />
the previous section. This is usually done once at the beginning of the school year. Afterwards the units<br />
connect to the Absences System daily and enter or monitor information about the students’ and the<br />
teachers’ absences. Due to the fact that the school units connect primarily to the Survey System, the only<br />
thing they have to report is the school’s status and the number of absences. All the other information<br />
about the school’s data (like address, contact information, students’ and teachers’ number, classes) is<br />
retrieved automatically from the Survey System and thus the required effort to handle the system is<br />
minimized. After connecting to the Absences System every school unit fills in the school’s state on a daily<br />
basis, reporting if the school is open or closed. If the school is closed, the unit must declare the reason of<br />
its closure by selecting the appropriate choice from a dropdown menu. For example the 1st primary<br />
school of Athens was closed on 15th January of 2010, due to flu symptoms. Furthermore every school<br />
unit enters how many students were absent on a specific day and if the class in which they are attending<br />
is closed. If a school unit has a lot of classes closed, then the school will not function for a few days in<br />
order to prevent the spread of the flu virus. Besides students’ absences, a school unit enters the<br />
teachers’ absences on a specific day. If a mistake is made during the data entering process, the system<br />
provides the functionality of correcting the inserted data. Every school unit has one administration level to<br />
supervise it and the latter have access to the data which the school units enter and to many statistics and<br />
graphic charts which allow them to monitor the whole process. For example, the aforementioned levels of<br />
administration can see how many school units were closed and for what reason, how many students or<br />
teachers were absent and in which school and class these absences were reported. The uppermost level<br />
of the Central Administration is the Ministry departments which have the administration of the system.<br />
They supervise every managerial and school unit of the Primary and the Secondary Education and with<br />
the use of various statistics can have a precise view concerning the daily absences in schools in ‘real<br />
time’.<br />
The data entry of the information is completely converse from the way that can be accessed. By this we<br />
mean that the highest level, which is the central administration, can access the whole information in<br />
contrast with the school units which are the lowest level and the main action allowed is the data<br />
completion. By the description of the data storage in every level it is obvious that there is a strong<br />
interconnectivity among them. The flow of the data from one level to the other integrates the procedure<br />
and facilitates the decision making process since a lot of statistics and graph charts are provided to the<br />
higher administration levels. The way that every level takes an input from the lower levels is done in an<br />
266
John Garofalakis et al.<br />
automatic way releasing the Ministry of the continuous computations. At the end, the Ministry has access<br />
to statistic results and graphs concerning the teachers and students absences in the whole country and<br />
thus can extract important conclusions about viruses’ proliferation. These conclusions are important for<br />
the implementation of public health measures in the country.<br />
3.4 Functionalities<br />
Account Management. This is the first important functionality and this technique enhances the security so<br />
as the access is forbidden in malicious users. Every user in every level has to be authenticated so as to<br />
enter for filling in, extracting or manipulating with the data, giving the opportunity of a control to the users<br />
that use and react with the system. The account management is also used for the specification of the<br />
interface to the users of every level.<br />
Data entry. In this functionality most of the data have been retrieved from the Survey System. In the form<br />
which contains the general status of the school the only thing the user has to do daily is to select if the<br />
school is open or closed as seen in the following figure.<br />
Figure 2: Data entry<br />
The System also contains more detailed forms about the students’ absences in every course and the<br />
teachers’ absences on a daily basis (Figure 3 and Figure 4). Apart from the absences the user reports if a<br />
specific course is open or closed. The depicted data are based on the data the school has entered at the<br />
Survey system.<br />
Statistics. The main goal of this eGovernment project is the monitoring of H1N1 virus spread at the<br />
school units in Greece, by inspecting the daily teachers’ and students’ absences. One of the most<br />
important functionalities of the system is the provision of statistics to the higher levels of Administration.<br />
The system was implemented to give the government the ability to have a general view of the number of<br />
closed school units and the total number of teachers’ and students’ absences in Greece at every<br />
moment. The system provides its administrative users with this information through the statistics which<br />
are extracted from the application. The statistics provided by the system daily, are as follows: Report of<br />
the number of schools which used the system, Closed schools and for what reason they are closed (flu,<br />
holiday, etc), Number of closed school classes in open schools, Daily analysis of students’ and teachers’<br />
absences, Daily analysis of students’ absences above a specific threshold level. For all these statistics<br />
results, weekly graphic charts are available (see Figure 6) in order to enhance the readability of the given<br />
results.<br />
Figure 3: State of courses (open or closed) during a period<br />
267
John Garofalakis et al.<br />
Figure 4: Number of teachers’ absences week period<br />
The system is connected with a central database server and every moment the user can enter the<br />
system and extract information relevant to the data entered. The statistics can extract information about<br />
the whole country (see Figure 5). Moreover, with the filters used, the user can select a specific region or<br />
type of school to extract only the data he needs eliminating the work load for the server and taking a<br />
more readable format of information.<br />
Figure 5: Students‘ absences in whole Greece on a specific date<br />
It, also, gives the ability to monitor the status of every school in the country. That is to view how many<br />
students and teachers were absent, how many school classes were not operating and if the school was<br />
closed and for what reason, in a specific date. The Ministry, which is the highest level of the Educational<br />
System, uses the statistics of the Absences System as a consulting tool. From the data entered the<br />
Ministry is lead to the extraction of important conclusions for the implementation of public health<br />
measures in the country. For example, if in a specific region a peek of students’ absences is recorded<br />
within a week period the Ministry will examine if there is a virus spread in this region and take needed<br />
precautionary public health measures.<br />
Figure 6: Graph chart of students' absences for a week period<br />
268
4. Results obtained<br />
John Garofalakis et al.<br />
The system which is presented here is an eGovernment system and as such is used for facilitating Greek<br />
Ministry of Public Education to assess the spread of virus H1N1 in Greece. It is well known that this virus<br />
has widespread trends in crowded places. Schools are such crowded places, so, through this Absences<br />
system, Greek Community has the ability to know almost exactly how widespread the flu in the country is.<br />
Furthermore, with this system it was easy for the Ministry of Education, Life Long Learning and Religious<br />
Affairs to have an overview of how many schools are closed in a daily basis. Moreover, the Absences<br />
system provides valuable information for the Center of Disease Control and Prevention, which monitors<br />
the evolution of the epidemic and provides several statistics for comparative analysis results. The site of<br />
Center of Disease Control and Prevention presents weekly results especially for the school absences. It<br />
informs people how many schools are updated from the total number of the Greek schools and shows the<br />
total absences. Below you can see the periodical analysis of some statistics from the Absence system,<br />
which are very useful for all the above mentioned considerations.<br />
In Figure 7 we can see the rate of the schools which update the system for two months. Secondary and<br />
High Schools had better percentage of update for this period. This happened because of the fact that<br />
most of primary and nurseries schools have not informed the survey system. Another important statistic<br />
refers to the closed schools all over the country and in every region separately. You can see above<br />
Figure 8 the closed schools all over the territory a specific period. Other important statistics which are<br />
produced from the system are the students’ and teachers’ absences for every level of Greek education<br />
system. Figure 9 and Figure 10 correspond to these statistics. An obvious clue from these results is that<br />
students of first levels of education were more vulnerable to the virus than the older ones. In contrast to<br />
this, teachers have the same rate of absences. As a concluding remark it has to be mentioned that the<br />
above presented statistics from system utilization provided two important results for relevant authorities<br />
dealing with H1N1 outbreak in Greece: a) The Greek Center of Disease Control and Prevention used the<br />
data to proceed on important comparative scientific analysis of the correlation of absences with data<br />
collected from the Greek Health system. This analysis made possible to properly design needed actions<br />
towards the dealing with the H1N1 crisis. b) The Greek regional offices responsible for Schools operation,<br />
utilized the results from the system in correlation with info on H1N1 instances to decide on daily basis, on<br />
which schools had to be closed to prevent the further H1N2 spread.<br />
Figure 7: Schools’ update rate over a two month period<br />
5. Further work<br />
A planned and under development upgrade to the system is the integration of a web GIS adaptive<br />
interface for better visualization of absences in the whole country and per Region. This GIS interface will<br />
not only be platform independent but also context aware, since system’s data have to be updated<br />
frequently and in a distributed way. The context aware interface will be adapted to the delivery of<br />
information and the spatial representation according to the user’s objects of interest. For example, if a<br />
user wants to see the number of absences in the whole country fewer details will be depicted in the map<br />
whereas if a user wants to see specifically which school units are closed in a town more details<br />
concerning the school unit and the exact location of that unit will be represented. Another further upgrade<br />
will be the enhancement of provided statistics with various types of graphs, more complex from those<br />
which are already provided, which would assist to the more effective visualization of the extracted results.<br />
269
John Garofalakis et al.<br />
Pie charts, bar charts and line graphs will be produced automatically and presented online to enhance<br />
the already provided statistical reports.<br />
Figure 8: Rate of closed schools<br />
Figure 9: Students’ absences<br />
Figure 10: Teachers’ absences<br />
270
6. In conclusion<br />
John Garofalakis et al.<br />
In this paper we presented an EGovernment application, which is a web based tool, in order to assist the<br />
epidemiology monitoring of H1N1 epidemic evolution in Greece, in the whole country and per Region,<br />
leading to the extraction of important conclusions for the implementation of public health measures in the<br />
country. One of those measures would be the development of vaccination plans based on the virus’s<br />
spread in order to protect the most vulnerable age groups in the country. Another measure would be the<br />
preventive closure of school units at areas where high percentages of students’ absences due to the<br />
virus are recorded. This would assist in minimizing the virus’ spread at facilities where high concentration<br />
of students is observed. In the clinical domain, focus can be given on preparing for the expected surge in<br />
admissions and requirement for intensive care services. Due to the fact that the created system provides<br />
real time information about the virus’s spread, the public health officials are able to keeping up with the<br />
stream of changing information and take priorities for public health action.<br />
References<br />
Appuhamy Ranil, Beard Frank, Phung Hai, Selvey Christine, Birrell Frances, Culleton Terry, (2010) “The changing<br />
phaces of pandemic (H1N1) 2009 in Queensland: an overview of public health actions and epidemiology”, MJA,<br />
Volume 192, Number 2, pp 94-97<br />
Burkom, Murphy, Coberly, Hurt-Mullen (2005) “Analytic Methods, Public Health Monitoring Tools for Multiple Data<br />
Streams, Morbidity and Mortality Weekly Report”, [online]<br />
http://www.cdc.gov/Mmwr/preview/mmwrhtml/su5401a11.htm<br />
Choudrie, J. and Lee, H. (2004) “Broadband development in South Korea: institutional and cultural factors.”,<br />
<strong>European</strong> Journal of Information Systems, Vol 13, pp. 103–114.<br />
Dialynas, Topalis, Vontas, Louis (2009) “MIRO and Irbase: IT Tools for the Epidemiological Monitoring of Insecticide<br />
Resistance in Mosquito Disease Vectors”, [online], PLoS Negl Trop Dis.,<br />
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2694272/<br />
Garofalakis J., Koskeris A., Michalopoulos S. et al (2007) “Environmental Health Surveillance System in Urban areas<br />
near incinerators and industrial premises”, 13th Annual Sustainable Development Research <strong>Conference</strong>.<br />
Mälardalen University in Västerås, SWEDEN, 2007. [online] www.eki.mdh.se/sdconf07<br />
Garofalakis J., Koskeris A., Vopi A. (2007) “An EGovernment Application for Integrated, Multi-level Management of<br />
Large Scale resources of the Greek Primary and Secondary Education”, 7th <strong>European</strong> <strong>Conference</strong> on<br />
EGovernment, Hague, 2007<br />
Greek School Network (2010) http://www.sch.gr<br />
Lenselink C.H., Melchers W.J.G., Quint W.G.V. et al (2008) “Sexual Behaviour and HPV Infections in 18 to 29 Year<br />
Old Women in the Pre-Vaccine Era in the Netherlands”, [online], PLoS ONE<br />
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2581437/<br />
Leonardo J. (2009) Public Health Informatics and the H1N1, Online Journal OF Public Health Informatics, Vol 1, No<br />
1, [online] http://journals.uic.edu<br />
Ndou V. (2004) EGovernment for Developing Countries., The Electronic Journal of Information Systems in<br />
Developing Countries. Vol 18, No 1, pp. 1-24., [online] http://www.ejisdc.org<br />
Prattipati, S. N. (2003) Adoption of eGovernment: Differences between countries in the use of online government<br />
service., Journal of American Academy of Business, Vol 3, No 1/2, pp. 386−391.<br />
TheraDoc Surveillance Technology Helps Hospitals Identify, Monitor & Report H1N1 Influenza Cases, (2009) [online]<br />
http://www.businesswire.com/portal/site/home/permalink/?ndmViewId=news_view&newsId=20090930005051&<br />
newsLang=en<br />
Torres, L., Pina, V., & Acerete, B. (2005) “EGovernment developments on delivering public services among EU<br />
cities”, Government Information Quarterly Vol 22, No 2, pp. 217−238<br />
‘What is Epidemiology All About’ (1999) American Journal of Public Health Devotes August Issue to Epidemiology<br />
and Statistics, [online] http://www.epimonitor.net/EpiWitWisdom/EpiWitWisdom/newsbulletins/news48.htm<br />
West, D. M. (2002) Global eGovernment, [online] http://www.insidepolitics.org/egovt02int.html<br />
271
Interoperability in the Justice Field: Variables That Affect<br />
Implementation<br />
Mila Gascó 1 and Carlos Jiménez 2<br />
1 Institute of Public Governance and Management (ESADE), Barcelona, Spain<br />
2 Information Systems Service, Justice Department of the Autonomous<br />
Government of Catalonia, Barcelona, Spain<br />
mila.gasco@esade.edu<br />
carlosjimenez@ieee.org<br />
Abstract: Several public institutions and agencies around the world have designed and implemented important<br />
electronic government strategies and plans. This has not been the case in the justice field. However, in the last very<br />
few years, the growing demand for efficient judicial systems has sped up the adoption of information and<br />
communication technologies (ICT) aimed at improving access to justice, increasing cooperation between legal<br />
authorities and strengthening the justice system itself. As in other areas, the new technologies are becoming a key<br />
tool in order to achieve these goals. That is so because information systems contribute to homogenize tasks and<br />
activities, to obtain management indicators and to make telematic connections with other public administrations and<br />
registers, with professionals and judicial institutions and with citizens. One of the more important aspects of this<br />
technological modernization has to do with interoperability since it guarantees the harmonic and cohesive functioning<br />
of different existing systems, processes, and applications that, in the justice field, are many as a result of the big<br />
variety of actors that are involved: judicial institutions but, also, different public administrations, such as those<br />
responsible of police forces, and law professionals. Taken this context into account, this paper is the result of an<br />
empirical research that was conducted during 2010 in the Generalitat de Catalunya (Autonomous Government of<br />
Catalonia) with regard to the e-government project “e-Justícia.cat”, an electronic justice initiative. In particular, the<br />
research was aimed at finding what factors conditioned the implementation of the interoperability modules of the<br />
project. In this respect, the paper presents the experience of GRP (management of police requests) and analyzes<br />
those variables that have been key in the implementation process in order to identify common patterns that may<br />
guide future interventions and projects in a field that is characterized by specific attributes that hinder technology<br />
adoption.<br />
Keywords: electronic justice, interoperability, back office integration, implementation<br />
1. Introduction<br />
Several countries around the world are attempting to revitalize their public administrations and make<br />
them more proactive, efficient, transparent and especially more service oriented. More and more, these<br />
countries’ leaders realize that information and communication technologies (ICT) are an important ally<br />
when it comes to modernize the public sector. In this context, e-government has become a powerful tool<br />
in the process of transforming government itself.<br />
Several public institutions and agencies have designed and implemented important e-government<br />
strategies and plans. This has not been the case in the justice field. However, in the last few years, the<br />
explicit recognition of the administration of justice both as a key component of the State of Law (it is one<br />
of the three powers) and as a public service has made evident the need to attain efficacy and efficiency in<br />
order to improve access to justice and to increase society’s trust towards the administration of justice. As<br />
a result, structures and organizational rules and procedures have had to adapt to the new situation.<br />
Investment in information and communication technologies can be considered one of the key elements to<br />
significantly improve the administration of justice. Velicogna (2007) gives a few examples of the potential<br />
of ICT in this field: “the availability of web services, the possibility of consulting on-line legislation and<br />
case law, the use of electronic filing, the electronic exchange of legal documents, are only some<br />
examples that are spurring the judicial administrations around the world to rethink their current functions<br />
and activities. ICT can be used to enhance efficiency, access, timeliness, transparency and<br />
accountability, helping the judiciaries to provide adequate services. New possibilities are emerging for the<br />
integration and automation of court procedures and practices. In addition, the use of the internet, can<br />
offer the chance to open the judiciary to the public, providing both general and specific information on its<br />
activities, thereby also increasing legitimacy” (p. 129). Other authors, such as Cerrillo and Fabra (2009),<br />
confirm his words and maintain that since the very organization of judicial systems is based on the<br />
exchange of information, the potential to be attained by the introduction of ICT is even higher in this area<br />
than in other fields.<br />
272
Mila Gascó and Carlos Jiménez<br />
The growing attention to ICT as a means to reduce delay and to improve economy, efficiency and<br />
effectiveness as well as to promote confidence in the justice system has given rise to a new term, now<br />
generally accepted: e(lectronic)-justice.<br />
According to the <strong>European</strong> Commission (2008), e-justice is a specific field under the more general<br />
umbrella of e-government. In particular, it refers to the use of ICT aimed at improving access to justice,<br />
increasing cooperation between legal authorities and strengthening the justice system itself. Its main<br />
benefits, as listed by Cerrillo and Fabra (2009), are: 1) a more efficient judicial system (ICT increase<br />
productivity and diminish costs of transaction within a system that is highly information intensive), 2) a<br />
more effective judicial system (ICT reduce the duration of procedures –thus saving both time and money-<br />
and put systems for document resources administration within the reach of judges and courts), 3) a<br />
greater access to justice (ICT provide the best information available and a better understanding of both<br />
the way the courts work and the legal instruments citizens have to ensure recognition of their rights), 4)<br />
more transparency (ICT make possible an improved control of cases and allow a better qualitative<br />
evaluation of outputs), 5) an increase of beneficiaries’ confidence, and 6) a greater legitimacy of the<br />
judicial power.<br />
One of the more important aspects of this technological modernization and of the implementation of ejustice<br />
initiatives has to do with interoperability since it guarantees the harmonic and cohesive functioning<br />
of different existing systems, processes, and applications that, in the justice field, are many as a result of<br />
the big variety of actors that are involved: judicial institutions but, also, different public administrations,<br />
such as those responsible of police forces, and law professionals.<br />
Taken this context into account, this paper is the result of an empirical research that was conducted<br />
during 2010 in the Generalitat de Catalunya (Autonomous Government of Catalonia) with regard to the egovernment<br />
project “e-Justícia.cat”, an electronic justice initiative. In particular, the research was aimed<br />
at finding what factors conditioned the implementation of the interoperability modules of the project. In<br />
this respect, the paper presents the experience of GRP (management of police requests) and analyzes<br />
those variables that have been key in the implementation process in order to identify common patterns<br />
that may guide future interventions and projects in a field that is characterized by specific attributes that<br />
hinder technology adoption.<br />
2. About interoperability<br />
According to the <strong>European</strong> Commission (2010), interoperability is “the ability of disparate and diverse<br />
organizations to interact towards mutually beneficial and agreed common goals, involving the sharing of<br />
information and knowledge between the organizations, through the business processes they support, by<br />
means of the exchange of data between their respective ICT systems” (p. 2). Generally speaking, three<br />
levels of interoperability are recognized: the technical level (planning of technical issues involved in<br />
linking computer systems and services), the semantic level (precise meaning of exchanged information<br />
which is preserved and understood by all parties), and the organizational level (coordinated processes in<br />
which different organizations achieve a previously agreed and mutually beneficial goal).<br />
To achieve interoperability at any of these levels, it is important to establish a governance process that,<br />
according to Abramowicz et al. (2008), is concerned with the definition of 1) rules, processes, and<br />
procedures guiding strategic decisions, 2) roles, relationships and responsibilities of people/organizations<br />
involved, and 3) objective evaluation metrics of performance.<br />
The benefits of interoperability might be identified in terms of the defining purposes of digital government.<br />
In Gottschalk and Solli-Saether words (2009): “high-ranking issues among the defining purposes of egovernment<br />
are highly agile, citizen-centric, accountable, transparent, effective, and efficient government<br />
operations and services (…). For reaching such goals, the integration of government information<br />
resources and processes, and thus the interoperation of interdependent information systems are<br />
essential” (p. 10).<br />
However, interoperability initiatives are not easy to implement and current research has identified several<br />
factors that affect government efforts to improve data exchange and information sharing. The challenges<br />
that the academic literature has addressed first and most practitioners begin to tackle when a problem<br />
arises are those requiring technical know-how and a high degree of attention to details. In this respect,<br />
several authors have referred to technical and technological difficulties such as ownership and<br />
stewardship of data, security and privacy, data redundancy, data inconsistency, timeliness of data flows,<br />
273
Mila Gascó and Carlos Jiménez<br />
legacy computer systems, or the complexity of setting and adhering to a common set of standards<br />
(Criado, Gascó and Jiménez 2010; Fedorowicz et al. 2006).<br />
Contrary to what it may seem, these variables are relatively easy to undertake. Actually, beyond<br />
technological challenges, there exists a set of political, cultural and organizational variables that may<br />
hinder success of interoperability projects. Due to their intricacy, they have not always been addressed<br />
by the scientific literature on interoperability neither have practitioners known how to deal with them.<br />
What’s more, these are unstructured problems in that little consensus exists about how to define them,<br />
cause and effect are unclear, and attempts to solve them often cause them to morph into different<br />
problems (Pardo and Burke 2008).<br />
Some of these challenges have been identified by Archman and Kudlacek (2008) who, in a study of the<br />
<strong>European</strong> Union, found problems related to cultural differences between agencies, unsatisfactory<br />
workflows, convincing stakeholders of the importance of the system, legal issues, political support, and<br />
funding. In different works, Scholl and Klischewski (2007) and Eynon and Margetts (2007) referred to<br />
interoperability limitations such as leadership failures, financial inhibitors, differences in motivations and<br />
competences, poor coordination across jurisdictional, administrative, and geographic boundaries,<br />
workplace and organizational inflexibility, or legal barriers. Similarly, Gascó (2010), after analyzing<br />
different experiences all over the world, concluded that an interoperability initiative usually fails as a result<br />
of a mix of circumstances that may include the absence of a wide collaboration culture among public<br />
administrations, the lack of a public information management policy, the shortage of personnel trained<br />
according to the capacities and attitudes that interoperability projects require, the nonexistence of a<br />
transversal governing body in charge of leading and promoting (technological) innovation initiatives, and<br />
the lack of a legal framework specifically referred to interoperability.<br />
Other authors have focused on specific issues. Thus, Pardo et al. (2009) carried an in-depth research on<br />
the clarity of roles and responsibilities (CRR). According to the authors, three are the most important<br />
determinants of CRR: the exercise of authority, diversity of the participating organizations and their goals,<br />
and past experiences. They all influence the effectiveness and performance of both organizational and<br />
inter-organizational or cross-boundary group efforts. In the same way, Bekker (2007), as a result of a<br />
comparative study in which four projects in the Netherlands were studied, referred to the political nature<br />
of back office integration and pointed out several issues such as the emerging dependency patterns, the<br />
strategic behavior of back office, or the existence of different rationalities that mix conflict and<br />
cooperation.<br />
In the specific field of electronic justice, Jiménez (2010) draws attention to some of the factors, previously<br />
identified by the literature, that play a particularly important role regarding the implementation of<br />
interoperability projects. Beyond technological and security variables, the author refers to: 1) a lack of<br />
strategy, which he links to a weak political commitment, 2) normative barriers that have to do either with<br />
insufficient or with contradictory legislation when it comes to regulate the new situations, 3) poor<br />
processes of collaboration and coordination among the many public administrations and governing<br />
bodies of the judicial power in the administration of justice and therefore in electronic justice initiatives, 4)<br />
resistance to change, particularly experienced by those actors with plenty of power (for example, judges)<br />
or with a lot to lose (such as intermediary bodies, like procurators in Spain), and 5) a deficient<br />
governance or institutional framework.<br />
3. The research<br />
Given this context, in order to identify new issues and confirm some ideas already presented by<br />
academicians and practitioners in relation to interoperability and e-justice initiatives, during 2010, an<br />
empirical research was conducted within the Generalitat de Catalunya (Autonomous Government of<br />
Catalonia) with regard to the e-government project “e-Justícia.cat”. In particular, the GRP module<br />
(“gestión de requerimientos policiales” - management of police requests) was studied.<br />
The research aimed at analyzing those variables that had been key in the implementation process in<br />
order to identify common patterns that might guide future interventions and projects in a field that is<br />
characterized by specific attributes that hinder technology adoption. Therefore, the main research<br />
question was: what are the factors/variables that condition the implementation process of interoperability<br />
projects in the e-justice field?<br />
Together, the specific research questions were:<br />
274
Mila Gascó and Carlos Jiménez<br />
How did the GRP implementation process develop?<br />
Was it a successful implementation process? Why?<br />
What are the lessons that can be drawn from this experience in order to start new interoperability<br />
projects in the e-justice field?<br />
Who were the key actors in the GRP implementation process and what type of leadership did they<br />
exert?<br />
Accordingly, the main hypothesis was: interoperability projects in electronic justice initiatives are less<br />
conditioned by technological variables than by strategic, political, management, institutional or legal ones.<br />
Field work was conducted during the second semester of 2010. Two qualitative methods were used<br />
during the field work in order to collect the needed information. First, several documents and web pages<br />
were observed and examined. Conceptual papers about e-government, e-justice and interoperability,<br />
case studies, plans, legal measures, project presentations, indicators, and performance reports were<br />
detailed studied.<br />
Second, seven in-depth interviews were conducted: four with different people from the Department of<br />
Justice and three with police officers from the Catalan police force, Mossos d’Esquadra. In the main, the<br />
interviewees were selected according to three criteria: 1) their level of involvement in e-Justícia.cat, 2)<br />
their seniority, and 3) the degree to which they had been affected by the implementation of the GRP<br />
module. Different interview guides were prepared to make sure that all relevant topics were covered and<br />
to keep the interaction focused. However, individual perspectives and experiences also emerged during<br />
the conversations.<br />
Finally, in order to collect more information and to be able to get the insights of other actors involved, a<br />
survey was administer to 17 additional individuals who included civil servants from the Justice<br />
Administration, one person from the Information and Communication Technologies Department, two<br />
individuals from the training centre of the Department of Justice and two more from the communication<br />
team and one person from the change management unit.<br />
4. Results<br />
The Spanish Constitution forces the police to assist the Justice Administration. Since the limits of this<br />
collaboration are not clear, the Justice Administration uses police forces to carry out many different tasks<br />
and the police forces have to accomplish the orders. Given this context, before the GRP module was<br />
implemented, paper and fax were used in order to communicate the orders. This was very bureaucratic:<br />
not only tasks were repeated (the Justice Administration faxed the requirement and, after getting it, the<br />
police had to type the data in their system again) but information was also lost. There was also the need<br />
to make the communication between the Mossos d’Esquadra and the Justice Administration more agile<br />
and effective. In this respect, the project was a need for the Justice Administration and a claim for the<br />
Mossos d’Esquadra police force.<br />
The GRP module started back in 2006. It was initiated by the Information System Service of the<br />
Department of Justice of the Autonomous Government of Catalonia in the framework of the e-Justícia.cat<br />
project. However, the design of the application was done jointly with the Mossos d’Esquadra. In this<br />
respect, a functional analysis was carried out both from a technical and an operational perspective.<br />
The last version of the module was finished in 2009 and a pilot was carried out between July and October<br />
of that same year. In October 2009, it was the court of first instance number 11 of the city of Barcelona<br />
the first one to send requests by means of the new system.<br />
The project has been gradually implemented throughout the territory (by administrative areas) because<br />
the Justice Administration needs to implement it progressively. Currently, the system is already working<br />
in Barcelona and 80% of the South metropolitan area. This process is expected to end by mid 2012. By<br />
that date, the civil servants of all the Catalonian penal courts will be trained and therefore the new system<br />
will be put into service all around Catalonia.<br />
275
Mila Gascó and Carlos Jiménez<br />
Generally speaking, field work shows that the implementation of the GRP module is thought to have been<br />
successful. In this respect, 87,5% of the survey respondents stated that the process had been positive or<br />
very positive 1 . The following reasons were given to justify such perception:<br />
The coordination between the Information Systems Service of the Department of Justice and the<br />
Mossos d’Esquadra police force was very good.<br />
The participation of other actors made the implementation process easier.<br />
The users were very involved.<br />
Dead-lines were respected and actions were carried out in time.<br />
Training activities were simple and easy to follow.<br />
Communication was efficient.<br />
Regarding areas of improvement, only two issues were significantly underlined: the existence of technical<br />
problems that could have been avoided (27,03% of the survey respondents) and the scarce political<br />
leadership and commitment (15,39%).<br />
Next, some explanations are given regarding the above topics.<br />
4.1 Technology<br />
Both survey respondents and interviewees referred to the importance of technical and technological<br />
obstacles. For them, these problems made implementation more difficult, particularly, because they gave<br />
rise to a greater resistance to adopt the new system. Thus, they were important issues to take into<br />
account. However, the people consulted also stated that, despite their existence, technology was not the<br />
main difficulty to address and, in any case, it did not make the project fail.<br />
4.2 Actors<br />
As has been stated, although the Information Systems Service of the Department of Justice was the<br />
leader of the initiative, the design of the application was done jointly with the Mossos d’Esquadra police<br />
force but also with several other actors, such as expert users, members of the provider private company<br />
or technical staff of the Information and Communication Technologies Department. Therefore, since the<br />
beginning of the project, there was a need to set up coordination rules that included periodical meetings,<br />
working protocols, joint pilots, or transversal contingency plans.<br />
According to the interviewees, the will to collaborate proved key, both at a strategic and at operational<br />
level. In this respect, although consensus was not always reached easily, the existence of a common<br />
goal (the search for efficiency) redounded to a higher level of cooperation and collaboration. This was so<br />
despite the fact that, according to 43,75% of the survey respondents, it was the Mossos d’Esquadra<br />
police force the most important beneficiary of this project 2 .<br />
4.3 Strategy and political commitment<br />
e-Justícia.cat is an electronic justice initiative aimed at making the Justice Administration in Catalonia<br />
more effective and more efficient. The main goals of e-Justícia.cat are to homogenize the tasks of the<br />
new judicial office and to electronically connect several public administrations and registries, citizens, and<br />
law professionals.<br />
Simultaneously, e-Justícia.cat is the result of the need to modernize the Justice Administration. In this<br />
respect, its conception dates back to 2006, a little after the Green Book on Justice Administration was<br />
launched (July 2005). The strategic plan 2007-2010 of the Department of Justice of the Autonomous<br />
Government of Catalonia emphasized the adoption of ICT and stressed the need for innovation and<br />
interoperability and decided on e-Justícia.cat to be the tool in order to do so.<br />
1 A 5-point scale was used (1 - very negative, 2 - negative, 3 - neutral, 4 - positive, 5 - very positive).<br />
2 Although the outcome of the project has not been assessed yet, it is already known that 1) the information Mossos d’Esquadra get<br />
is of more quality than before; therefore, the number of orders that are returned is lower than it used to be, 2) police officers can<br />
monitor the requirement, something they were not able to do before, and this supervision increases the quality of performance, 3)<br />
there have been savings in paper and people (with less people, the task is carried out faster and with more quality), 4) the time it<br />
took to transfer/delegate the requirement has decreased (currently, in five minutes, one can do it).<br />
276
Mila Gascó and Carlos Jiménez<br />
E-Justícia.cat is structured into several management modules that facilitate adaptation to different<br />
organization models. The GRP module is only one of them. Each module, and also GRP, has therefore,<br />
been designed and implemented following the main philosophy of e-Justícia.cat: to have a paperless<br />
judicial office.<br />
A clear strategy is only possible when there is political support. This has been the case in e-Justícia.cat.<br />
Mainly, the last Councilor of the Department of Justice. Mrs. Montserrat Tura, noticeably promoted this<br />
electronic justice initiative to such an extent that several agreements, rules, and laws were approved (that<br />
is, there were important changes in the legal framework). But other political actors, such as the General<br />
Council of the Judiciary’s (“Consejo General del Poder Judicial”) or the Superior Court of Justice of<br />
Catalonia (“Tribunal Superior de Justicia de Cataluña”), also backed the project. In the particular case of<br />
the GRP module, political commitment was even more obvious since Mrs. Tura had previously been the<br />
Councilor of the Department of the Interior, which is in charge of the Mossos d’Esquadra police force.<br />
Therefore, she knew the problems both Departments experienced when they had to work together.<br />
Although high level political commitment seems to be a fact, several interviewees referred to a lack of<br />
political support at a lower level and in specific situations (which explains the survey results). In this<br />
respect, operational and technical leadership was perceived to be very valuable but also exhausting,<br />
particularly, in critical circumstances when a stronger support would have been very motivating to keep<br />
going.<br />
4.4 Planning<br />
The existence of a plan to implement GRP proved decisive for its success because it made clear the<br />
steps to follow as well as the roles and responsibilities each of the actors had. Therefore, it was quite<br />
easy to comply with dead-lines and tasks to carry out.<br />
More important was the decision to carry out a pilot. Pilots are especially positive when there is no<br />
previous experience. Phased introductions help not only to inform implementation but also to identify and<br />
prevent unintended consequences. A pilot is an important first stage of regular, longer-term project<br />
monitoring and evaluation. In the case of the GRP module, 92,31% of the survey respondents maintained<br />
that conducting a pilot had been useful or very useful. Particularly, the pilot was important because it<br />
helped identify resistance to change, technological problems as well as impacts on workflows.<br />
4.5 Change management<br />
Institutional adaptation to innovation in the Spanish justice field has always been a slow process because<br />
of the poor constitutional and legal designs included in the rules and because of the huge weight carried<br />
by an organizational structure anchored in nineteenth century criteria and a very strong corporate<br />
presence. E-Justícia.cat has not been an exception. In this respect, with the implementation of the GRP<br />
module (but also, of other modules), civil servants from the Justice Administration had to change their<br />
way of working and this was not easy. Thus, there was a need to show them the benefits of the new<br />
system, to train them and to engage them in the project.<br />
Several activities were carried out to manage resistance to change. In particular, the training and the<br />
communication strategies were perceived to be successful and to endorse the implementation process<br />
(86,67% of the survey respondents thought training had been useful or very useful; also, 78,57% of them<br />
stated that communication had been positive or very positive).<br />
Particularly interesting was the training strategy, led by the Information Systems Service and sponsored<br />
by the Training Centre of the Department of Justice: the former trained several civil servants (the socalled<br />
super-users) and these trained the rest of the employees (the users). This way of working gave<br />
rise to a high level of users’ involvement which, in return, reduced reluctance to use the new system (the<br />
users were being trained by their own colleagues who were also users of the module and therefore could<br />
encounter the same types of problems and difficulties).<br />
5. Conclusions<br />
Generally speaking, field work shows that the implementation of the GRP module was successful.<br />
Further, it can be more specifically concluded that:<br />
277
Mila Gascó and Carlos Jiménez<br />
The GRP module is part of a wider project: e-Justícia.cat. Therefore, e-Justícia.cat’s strategy guided<br />
its implementation and gave meaning to the actions that were carried out. Also, the existence of a<br />
plan regarding GRP let address implementation setbacks.<br />
The start of GRP took into consideration the existing legal framework. However, its completion led to<br />
the need to adopt new norms and agreements.<br />
The implementation of GRP required a high level of collaboration between the Mossos essentially<br />
d’Esquadra (the Catalan police force) and the Department of Justice of the Autonomous Government<br />
of Catalonia. However, the participation of other actors proved also key.<br />
Despite the natural resistance to change, training and communication were decisive elements of the<br />
change management strategy, which led to a successful implementation of the GRP module.<br />
Conducting a pilot gave rise to the possibility of detecting errors in time and therefore led to a<br />
successful implementation.<br />
The above issues can, therefore, be regarded as factors that positively conditioned the implementation of<br />
the project. The aforementioned variables are not related to technology or to technical topics. In fact, field<br />
work showed that these types of difficulties took place throughout the implementation process and,<br />
sometimes, even delayed it. Nevertheless, despite these situations, the GRP module was successfully<br />
put into service. This statement seems to confirm the main hypothesis of this research 3 : interoperability<br />
projects in electronic justice initiatives are less conditioned by technological variables than by strategic,<br />
political, management, institutional or legal ones. It also supports what other scientific works, such as<br />
those of Gascó (2010), Pardo et al. (2009), Archman and Kudlacek (2008), Scholl and Klischewski<br />
(2007), Eynon and Margetts (2007), or Bekker (2007), showed in the past.<br />
But research on electronic justice and on e-government interoperability is in its infancy and further work is<br />
needed in order to keep building a strong theoretical and conceptual body and to identify good practices.<br />
In this respect, in the light of the previous results, future studies could analyze the influence of the<br />
identified variables on the implementation of other modules of e-Justícia.cat or even on different<br />
electronic justice projects. Further, they could assess the outputs and the outcomes of this type of<br />
developments. Doing so would provide a holistic picture and understanding of electronic justice initiatives<br />
that necessarily involve interoperability.<br />
References<br />
Abramowicz, W., Bassara, A., Wisniewski, M. and Zebrowski, P. (2008) “Interoperability governance for egovernment”,<br />
Information Systems and E-Business Technologies, Vol. 5, part 2, pp 14-24.<br />
Archman, S. and Kudlacek, I. (2008) “Interoperability and the exchange of good practice cases”, <strong>European</strong> Journal of<br />
ePractice, Vol. 2 (February), pp 3-12.<br />
Bekker, V. (2007) “The governance of back office integration. Organizing co-operation between information<br />
domains”, Public Management Review, Vol. 9, Issue 3, pp 377-400.<br />
Cerrillo, A. & Fabra, P. (2009) E-Justice: Using Information Communication Technologies in the Court System, IGI<br />
Global, Hershey, PA.<br />
Criado, I., Gascó, M. and Jiménez, C. E. (2010) Marco Iberoamericano de Interoperabilidad, CLAD, Caracas,<br />
Venezuela.<br />
<strong>European</strong> Commission (2010) <strong>European</strong> Interoperability Framework for <strong>European</strong> public services, [online].<br />
Commission of <strong>European</strong> Communities, Brussels, http://ec.europa.eu/isa/strategy/doc/annex_ii_eif_en.pdf.<br />
<strong>European</strong> Commission (2008) Communication from the Commission to the Council, the <strong>European</strong> Parliament and<br />
the <strong>European</strong> Economic and Social Committee. Towards a <strong>European</strong> e-Justice Strategy, [online]. Commission<br />
of <strong>European</strong> Communities, Brussels, http://ec.europa.eu/civiljustice/docs/com_2008_329_en.pdf.<br />
Eynon, R. and Margetts, H. (2007) “Organizational solutions for overcoming barriers to eGovernment”, <strong>European</strong><br />
Journal of ePractice, Vol. 1 (November), pp 73-85.<br />
Fedorowicz, J., Gogan, J. L. and Williams, C. B. (2006) The e-government collaboration challenge: Lessons from five<br />
case studies, IBM Center for the Business of Government, Washington DC.<br />
Gascó, M. (2010) “Los retos de la colaboración. ¿A qué, si no a eso, pretendemos hacer frente con la<br />
interoperabilidad?, Paper read at XV CLAD <strong>Conference</strong>, Santo Domingo, Dominican Republic, November.<br />
Gottschalk, P. and Solli-Saether, H. (2009) E-government interoperability and information resource integration.<br />
Frameworks for aligned development, Information Science Reference, Hershey, PA.<br />
Jiménez, C. E. (2010) “Interoperabilidad en la administración de justicia: Experiencias y buenas prácticas en un<br />
ámbito complejo”, Paper read at XV CLAD <strong>Conference</strong>, Santo Domingo, Dominican Republic, November.<br />
3 It is important to take precautions when confirming the main hypothesis since this was, mainly, a qualitative study and, therefore, it<br />
has limitations (for example, the views of the people consulted are not representative or the findings cannot be extended to wider<br />
populations with the same degree of certainty that quantitative analyses can).<br />
278
Mila Gascó and Carlos Jiménez<br />
Pardo, T., Burke, B., Gil-García, R. and Guler, A. (2009) “Clarity of roles and responsibilities in government crossboundary<br />
information sharing initiatives: Identifying the determinants”, Paper read at the 5 th International<br />
<strong>Conference</strong> on E-Government, Boston, October.<br />
Pardo, T. and Burke, B. (2008), Improving government interoperability: A capability framework for government<br />
managers, [online], Center for Technology in Government, Albany, NY,<br />
http://www.ctg.albany.edu/publications/reports/improving_government_interoperability/improving_government_i<br />
nteroperability.pdf.<br />
Scholl, H. J. and Klischewski, R. (2007) “E-government integration and interoperability: Framing the research<br />
agenda”, International Journal of Public Administration, Vol. 30, No. 8, pp 889-920.<br />
Velicogna, M. (2007) “Justice systems and ICT. What can be learned form Europe?”, Utrecht Law Review, Vol. 3,<br />
issue 1 (June), pp 129-147.<br />
279
eGovernment and Service Delivery at the Local Level: A<br />
Comparative Analysis of Three Canadian Municipalities<br />
John Grant 1 , Frank Ohemeng 2 and Roberto Leone 3<br />
1<br />
McMaster University, Hamilton, Ontario, Canada<br />
2<br />
University of Ottawa, Ontario, Canada<br />
3<br />
Wilfrid Laurier University, Waterloo, Ontario, Canada<br />
grantkj@mcmaster.ca<br />
fohemeng@uOttawa.ca<br />
rleone@wlu.ca<br />
Abstract: The emergence of the Internet and information and communications technologies (ICTs) has, to varying<br />
degrees, transformed how governments deliver public services. However, while the role of ICTs in the provision of<br />
public services is well documented, contemporary literature, particularly North American, tends to neglect the impact<br />
of ICTs at the local level, focussing instead on the federal and state/provincial levels of government. This<br />
demonstrates a problematic void in the literature, especially when one considers the relationship between citizens<br />
and local government – it is, in many instances, the first point of contact for public service delivery. This paper<br />
examines the development, implementation and current state of eGovernment at the local level using three<br />
municipalities of similar size in the province of Ontario, Canada. In all three cases, the impetus for the adoption of<br />
eGovernment stemmed primarily from a province-wide push for municipal amalgamation, as well as the desire by<br />
local bureaucrats to realize the potential cost savings associated with enhanced service delivery options. The study<br />
also identifies some of the challenges associated with the implementation of local eGovernment and outlines what<br />
has and can be done to overcome those challenges. One of the key problems, for example, deals with efforts to<br />
reduce overlap and fragmentation through the creation of so-called one-stop-shops. This has proved difficult to coordinate<br />
at best, as there are myriad stakeholders involved, including entrenched and oft-times competing<br />
bureaucracies. The real question, however, is the extent to which ICTs have actually impacted or transformed<br />
service delivery at the municipal level, and what the prospects are for the acceptance and adoption of contemporary<br />
concepts such as eDemocracy.<br />
Keywords: ICTs, service delivery, eGovernment, eDemocracy<br />
1. Introduction<br />
The emergence of the Internet and information and communications technologies (ICTs) has, to varying<br />
degrees, transformed how governments deliver public services. However, while the role of ICTs in the<br />
provision of public services is well documented, contemporary literature, particularly North American,<br />
tends to neglect the impact of ICTs at the local level. Very few studies have addressed the impact of ICTs<br />
at the municipal or local government level (see, for example, Bontis, in Borins, Kernaghan, Brown, Bontis,<br />
and Thompson, 2007: 137-154; Lenihan and Hanna, 2002; Reddick and Frank, 2007; and Roy, 2006).<br />
This demonstrates a problematic void in the literature especially when one considers the relationship<br />
between citizens and local government – it is, in many instances, the first point of contact for public<br />
service delivery.<br />
This paper examines the development, implementation and current state of eGovernment at the local<br />
level using three municipalities in the province of Ontario, Canada: Ottawa, Hamilton and Kitchener. In all<br />
three cases, the impetus for the adoption of eGovernment stemmed primarily from a province-wide push<br />
for municipal amalgamation, as well as the desire by local bureaucrats to realize the potential cost<br />
savings associated with enhanced service delivery options.<br />
The paper is in five parts. The first describes the concept of eGovernment and the benefits alluded to in<br />
the literature on the subject. The second provides a brief outline of the study’s methodology. Part three<br />
presents an overview of the emergence and development of eGovernment in each of the three case<br />
studies. Part four compares the cases and outlines some of the challenges facing municipalities with<br />
respect to eGovernment implementation. We conclude with some general observations and proffer some<br />
suggestions as to what can be done to overcome identified challenges.<br />
2. Examining the concept of eGovernment<br />
The notion of eGovernment emerged in the 1990s as many governments attempted to find alternative<br />
ways of delivering improved services to the public. This followed the private sector adoption of e-business<br />
and e-commerce (Moon, 2002: 425). According to Bekkers and Zouridis (1999: 185), the idea was<br />
280
John Grant et al.<br />
premised on the assumption that improved public service delivery and a more efficient organization of<br />
public administration would restore citizens’ trust in politics, especially local politics. Politicians and public<br />
managers, therefore, saw ICTs as a means of achieving this objective. The outcome was the<br />
overwhelming adoption of ICTs for service delivery and, hence, the emergence and implementation of the<br />
eGovernment concept.<br />
Currently, there is significant discussion in the academic literature on the importance of eGovernment to<br />
public administration and, for that matter, service delivery. Despite this, there appears to be little<br />
consensus among scholars as to the term’s actual meaning. The definitional quagmire has arisen as a<br />
result of the incorporation of many different concepts into the mix (Chadwick, 2006; Grant and Chau,<br />
2008; Jaeger, 2003; Norris, 2001). Thus, the term “eGovernment” now encompasses the many<br />
dimensions of government’s presence online, including “the state’s economic and social programs; its<br />
relationships with the citizen and the rule of law (eDemocracy); its internal operations and its relationship<br />
with the international environment” (Brown, 2005: 241).<br />
Some scholars have defined eGovernment in a rather broad manner to include all the activities of<br />
government online, while others have tended to focus more on specific aspect of government activities<br />
such as service delivery. Jeffrey Roy, who has written extensively on eGovernment in Canada, refers to<br />
the concept as “the continuous innovation in the delivery of services, citizens’ participation, and<br />
governance through the transformation of external and internal relationships by the use of information<br />
technology, especially the Internet” (2006: 307).<br />
Other scholars have defined the concept from a narrower perspective. According to Jaeger (2003),<br />
eGovernment is the use of “technology, particularly the Internet, to enhance the access to and delivery of<br />
government information and services to citizens, business, government employees, and other agencies”<br />
(323). Therefore, from a technical standpoint, eGovernment involves several types of electronic and<br />
information systems, including databases, networking, discussion support, multimedia, automation,<br />
tracking and tracing, and personal identification technologies (323). The problem with these narrower<br />
definitions, however, is that they fail to “capture the more complex aspects of transforming government or<br />
acknowledge the roles of the information and information technology elements” (Grant and Chau, 2008:<br />
4). Thus, we have somewhat of a definitional dilemma: too broad on one hand, and too unrefined on the<br />
other. However, in order to avoid becoming obsessed with finding a concise, yet all-encompassing<br />
definition of eGovernment, we agree that it simply involves, to various extents, the many facets of<br />
government online.<br />
3. Methodology<br />
This comparative case study involves a qualitative examination of the development, implementation, and<br />
current state of eGovernment at the local level in three municipalities in the province of Ontario, Canada:<br />
Ottawa, Hamilton, and Kitchener. The three municipalities are similar in that they are roughly equal in<br />
size (between 500,000 and 800,000 people) and are located in the same province, which means that<br />
they are subject to the same provincial legislation that governs municipalities in Ontario. In addition, they<br />
possess similar timelines in terms of the eGovernment implementation process and thus experienced the<br />
same broader political dynamics (provincial and national) throughout. The municipalities differ, however,<br />
with respect to national prominence, economic activity and affluence. Ottawa, apart from being the capital<br />
of Canada, was until recently, Canada’s equivalent of the Silicon Valley. The economic activity in<br />
Hamilton is largely dominated by the steel and manufacturing sectors, while Kitchener is transforming its<br />
economy from a manufacturing base to one that is technology-driven.<br />
The research was designed to determine two things: the key actors and their relative impacts with<br />
respect to the implementation of eGovernment in each of the three municipalities; and, if and how the<br />
developmental processes differed from case to case. Ultimately, the objective was to compare the<br />
trajectory of eGovernment in the three municipalities and the prospects for the development of related<br />
activities such as e-governance, i.e., the movement from online service delivery to other areas such as<br />
eDemocracy.<br />
Data collection was undertaken using three methods: analysis of primary documents, review of relevant<br />
academic sources, and informal meetings and interviews. Primary documents included those generated<br />
by various governments and agencies (e.g., legislation, guidelines), <strong>Academic</strong> sources included relevant<br />
publications by political scientists, social scientists and those engaged in public administration. Meetings<br />
281
John Grant et al.<br />
and interviews were conducted on an ad hoc basis with key municipal bureaucrats, politicians, and<br />
stakeholders.<br />
4. The case studies<br />
In the early 1990s, the citizens of the City of Hamilton, together with councillors and City staff, articulated<br />
a vision for the development of the Hamilton community to the year 2020. Vision 2020: Strategies for a<br />
Sustainable Community identified several key priorities or goals which included, among others, “full<br />
participation by all citizens” in the City’s governance, and “building upon existing community information<br />
services to best organize the content and make it available in a user-friendly, needs-driven manner” (City<br />
of Hamilton, ND). It was not until 2001, however, that the vision began to be realized.<br />
On January 1 st 2001, six local municipalities, which had comprised the Regional Municipality of Hamilton-<br />
Wentworth, amalgamated to become the new City of Hamilton (for more information on the amalgamation<br />
process see, for example, Vojnovic and Poel, 2000). At the time, smart services were being provided in a<br />
piecemeal fashion through a variety of community networks, local organizations, and several partnership<br />
initiatives. Accordingly, the greatest smart service that needed to be realized was “to bring together a<br />
number of [those] systems and database applications via a single mechanism or suite of technologies,<br />
offering users a single point of entry” (City of Hamilton, 2001: 11), i.e., one-stop-shopping. In order to<br />
address this issue, the Connect Hamilton-Create Community project was implemented to develop a next<br />
generation community portal – the Hamilton WEB (Where Everything Begins).<br />
The Hamilton WEB was to be “a comprehensive integrated system” based on three components: “1) The<br />
integration of existing community information using meta data 2) Geo-Hamilton [a Geographic Information<br />
System for locating services] and 3) eGovernment/e-Service” (City of Hamilton, 2001: 11). The<br />
eGovernment/e-service component of the project was to utilize technology to provide an efficient,<br />
convenient and cost-effective service delivery channel for the municipal government.<br />
After amalgamation, and concurrent with its involvement in the Connect Hamilton-Create Community<br />
initiative, the City of Hamilton began to design a new IT strategy. A three-year Hamilton Information<br />
Technology Strategy (HITS) plan was unveiled in January of 2003, which concentrated on optimizing and<br />
enhancing the City’s support services to improve service delivery (City of Hamilton, 2003: 7-8). The City<br />
had long realized that transformation was necessary in order to move from a fragmented approach to<br />
service delivery to one that provided value through integration, agility and flexibility (9). After a two-year<br />
implementation period, the myhamilton.ca community portal was launched in September of 2005. Billed<br />
as a “supersite”, the portal represented an investment of almost $4 million in cash and in-kind<br />
contributions from over 40 community partners (McKay, 2005: 21-22).<br />
The Hamilton experience with the development of eGovernment was much like that of many other<br />
municipalities in that it was a logical step in the evolution of service delivery. However, although the<br />
priorities and goals for the implementation of eGovernment were articulated in the early 1990s by way of<br />
Vision 2020, much of the impetus resulted from the amalgamation process at the turn of the 21 st century.<br />
Nevertheless, according to Ken Roberts, the myhamilton.ca project co-director, what made the Hamilton<br />
experience truly unique was that it highlights “one of Hamilton’s greatest strengths – a willingness of<br />
organizations to work together” (2005: A17). Community partnership and collaboration effectively resulted<br />
in the project being delivered under time and under budget (McKay, 2007a).<br />
The City of Kitchener is an interesting case study because, unlike Hamilton and Ottawa, it resisted the<br />
movement toward single-tier government through the amalgamation process undertaken by many<br />
Ontario municipalities around the turn of the century. The City of Kitchener is a “lower tier” government<br />
within the Region of Waterloo, which acts as an “upper tier.” Thus, some of the services are split between<br />
the municipal and regional governments. Even with this institutional reality, however, the City of Kitchener<br />
still has a significant need for eGovernment services.<br />
The rationale for municipal amalgamation provided the original momentum for implementing<br />
eGovernment in Kitchener. Local Service Realignment (LSR) was the provincial government program in<br />
the late 1990s that sought to alter the state of municipalities in Ontario. LSR aimed to improve efficiency<br />
in local government service delivery. In Ottawa and Hamilton, this included municipal amalgamation. In<br />
Kitchener, however, it meant that many services, which were previously the domain of local<br />
municipalities, were now transferred to the upper-tier regional government. The whole goal of this<br />
realignment of services related to the desire to improve efficiency in service delivery.<br />
282
John Grant et al.<br />
LSR became the policy of the provincial government in 1997. It was around the same time that the City of<br />
Kitchener was attempting to broaden the use of ICTs in the provision of public services. Because of the<br />
discussions that were taking place within Waterloo Region and its constituent cities and townships, it was<br />
natural that the City of Kitchener’s development of eGovernment was largely in conjunction with the other<br />
local governments. There are three reasons for this collaboration. First, the mayors of all constituent<br />
lower-tier municipalities sit on regional council. Prior to the restructuring in the 1990s, even more<br />
municipal leaders sat on both city and regional councils. This linkage still remains even though it is<br />
somewhat diminished. Second, there is collaboration among bureaucrats of all governments in the<br />
region. For example, the Chief Administrative Officers of all the local governments frequently meet to<br />
share information about best practices. Third, everybody was doing it. Not only was this something that<br />
was occurring across Ontario, but the vision of the Government of Canada was for the country to be the<br />
most wired and connected in the world.<br />
The significant hype that surrounded eGovernment in Kitchener led to the speedy implementation of a<br />
corporate web site. The emphasis appeared to be on getting as much as possible onto the web site at an<br />
expedited rate. What this policy lacked, however, was a comprehensive outlook as to a coordinated web<br />
portal that would be easy to access for both citizens and industry. The web site existed, but there was no<br />
real articulation of its purpose or goals. In addition to this, the City took quite some time to actually come<br />
up with meaningful performance measures to benchmark the success of its eGovernment program. It<br />
was not until the middle of the decade that Kitchener got around to fixing these problems.<br />
The City of Kitchener 2007-2010 Strategic Plan highlights some of the initiatives that were planned to<br />
improve the coordination and comprehensiveness of eGovernment service delivery. Under the theme of<br />
providing effective and efficient government, the document outlines three ways in which the City can<br />
utilize information technology in an innovative way: (a) to maximize technology to support timely, relevant<br />
and accurate information; (b) to optimize technology solutions that will enhance the ability to interact and<br />
communicate more effectively with internal and external clients; and (c) to develop an enabled and<br />
knowledgeable workforce (City of Kitchener, 2008: 6). These now represent a set of values that guide the<br />
City in implementing its eGovernment strategy.<br />
The historical development of eGovernment in the current City of Ottawa can be traced back to the early<br />
1990s when the Regional Municipality of Ottawa-Carleton (RMOC) and the City of Ottawa accepted a<br />
proposal from the newly established Ottawa-based non profit community network, National Capital<br />
Freenet (NCF) to establish a presence on its network (Gattinger, in Graham and Phillips 1998: 200-240).<br />
The NCF had been incorporated to link the people and organizations of the region, provide useful<br />
information, and enable an open exchange of ideas with the world (Patrick, 1997).<br />
This invitation received a strong reception from administrators rather than politicians from the two levels<br />
of government. These administrators attended various meetings with FreeNet officials and were<br />
convinced about the need to move online. Their convictions enabled them to vigorously campaign in<br />
favour of their local governments’ participation in the NCF, not only by sharing their passion with other<br />
colleagues, but by investing time and effort in research to persuade regional and municipal councils to<br />
accept the idea (Gattinger, in Graham and Phillips 1998: 201-202).<br />
On January 1 st 2001, the Regional Municipality of Ottawa-Carleton, the City of Ottawa, and eleven other<br />
area municipalities amalgamated to form the new City of Ottawa. In creating the new city and to help<br />
facilitate smooth administrative transition, the provincial government established the Ottawa Transition<br />
Board (OTB). The OTB enjoyed tremendous powers to oversee, review, and restrain (if necessary) the<br />
action of the various municipal councils as well as implement the model for the introduction and function<br />
of the single municipality (Government of Ontario, 1999; Roy, 2003).<br />
The OTB recognized the importance of technology to enhance service delivery, and took every<br />
opportunity to ensure the integration of technology in the City’s service delivery model. The newly<br />
amalgamated City was thus forced to make on-line service delivery a key priority through a portal-led<br />
infrastructure designed and operated by the private sector (Roy, 2003: 391)<br />
The City created its first IM/IT Strategic Plan in 2002. The plan contained a set of priorities for a newly<br />
established Information Technology Services (ITS) organization and included the expectations for IT<br />
service delivery and governance. In addition to this, the City developed a new eServices Plan, which was<br />
developed in conjunction with two partners: Deloitte Consulting and the National Information Consortium<br />
283
John Grant et al.<br />
(NIC). The consortium was expected to provide services and infrastructure required to develop and<br />
maintain the eGovernment portal, while the new City of Ottawa retained ownership of, and control over,<br />
all data and portal operations.<br />
For two years, beginning in 2001, the consortium worked on the creation of an eGovernment enterprise<br />
portal (www.ottawa.city.on.ca), a “one-door” web-based gateway. In short, the City’s eGovernment portal<br />
was to enable it to meet the higher expectations of citizens and businesses in the Internet economy. It<br />
was also expected that through this investment, the City would save sufficient money in operating costs<br />
in the following years. Thus, it would be in a position to re-invest these savings to improve municipal<br />
services or to provide further tax relief to its residents (OTB, 2001: 39)<br />
After two years, the City and the consortium parted company and this allowed the City to assume full<br />
control of its portal. Currently, Ottawa is in the second phase of its eGovernment development, which<br />
began in 2006. This phase has been necessitated by the fact that, although the City made a great deal of<br />
progress under its original eService Plan including migrating many services online, a major site redesign<br />
in 2003, and a fivefold increase in the number of weekly visits to the site, there have been a number of<br />
concerns expressed by citizens (City of Ottawa, 2007). For example, the City currently supports several<br />
independent Internet sites including ottawa.ca, octanspo.com, bibioottawalibrary.ca,<br />
centrpointetheatre.com, ottawapolice.ca, ottawa.com, landsdownpark.ca, and teamottawagatineau.com.<br />
The problem associated with this is that there are too many inconsistencies across sites as well as<br />
dilution of brand. Hence, many citizens find it confusing in terms of obtaining information or services from<br />
the City. It is imperative, then, that the City integrates its family of web sites to provide uniformity, as well<br />
as reduce duplication of efforts such as multiple web metric tools.<br />
5. Comparative analysis of eGovernment in the three municipalities<br />
At the outset, it is clear that there are many similarities between the municipalities. First, bureaucrats<br />
initiated the push for eGovernment. This is not surprising since, at the municipal level, bureaucrats hold<br />
more sway in terms of policy development due to their knowledge and expertise, and the fact that<br />
Individual local politicians do not attend meetings with political party officials or advisers in tow, as do<br />
those at the provincial or federal levels. Thus, bureaucrats were able to get politicians onside and to<br />
garner continuing support for key strategies and programs.<br />
Second, the focus has centred on service delivery rather than on governance (e.g., eDemocracy). This<br />
follows the pattern noted by Bekkers and Zouridis (1999), whereby politicians and public managers saw<br />
ICTs as a means to improve service delivery and to manage the administrative apparatus more<br />
efficiently, which in turn would restore citizens’ trust in local politics. While eDemocracy is mentioned in<br />
most of the literature relating to the development of eGovernment in each of the municipalities we<br />
analyzed, the focus was clearly on service delivery. The Hamilton Information Technology Strategy<br />
(2003), for example, related to management expectations for efficiency and savings, and citizens’<br />
expectations for service. In the Ottawa case, the OTB’s recommendations were aimed at achieving<br />
greater efficiencies in service delivery through the introduction of new technologies. The City of<br />
Kitchener, although successfully resisting the amalgamation process, nevertheless cooperated closely<br />
with other municipalities in the desire to improve efficiency in service delivery. Only recently, however,<br />
with the establishment of an Accountability and Transparency Committee, do we see any serious<br />
implications for eDemocracy.<br />
Third, the amalgamation process facilitated the push for eGovernment considerably. Politicians and<br />
bureaucrats alike realized the need to integrate and standardize fledgling e-services. In the Hamilton<br />
case, the Province of Ontario provided much-needed funding, while the City of Ottawa received its<br />
impetus from the provincially established Ottawa Transition Board. Many other amalgamating<br />
municipalities received similar support from the province, although it may be argued that this was part of<br />
a downloading strategy undertaken by the province, which began immediately prior to the turn of the<br />
century. The City of Kitchener is unique in that it successfully resisted amalgamation; however, the<br />
underlying rationale for amalgamation (efficiency in service delivery) still provided the impetus for the<br />
implementation of eGovernment.<br />
In all the cases, there have been attempts to clean up the number of fragmented and/or overlapping<br />
websites with the delivery of municipal services. Such fragmentation and overlap makes it difficult for<br />
citizens in the search for services associated with their municipality’s website. The three municipalities<br />
under study have created, or are endeavouring to create, one-stop-shops through the integration of their<br />
284
John Grant et al.<br />
own sites and those of organizations that deliver services for the municipal government themselves. This<br />
has presented an important challenge: coordination. In Hamilton, for example the task of coordination has<br />
been onerous at best as a result of the fact that there were varied and numerous stakeholders, which the<br />
city had to deal with. This was complicated by the necessity of working around the established<br />
bureaucratic culture.<br />
In the case of Kitchener, even though it appears to be on the right track with regard to its eGovernment<br />
initiatives, coordinating of information among the various city organizations still presents a significant<br />
challenge. The City has a corporate web site for clients to access, it has an intranet that staff access, and<br />
it is creating a contact call centre that will be fielding phone calls from the public on behalf of the City. The<br />
major challenge that will unfold here is the extent to which the information available to one of these<br />
mediums is shared by them all.<br />
In Ottawa, there have been concerns relating to issues of inconsistencies across web sites and dilution of<br />
brand. Consequently, the municipality has initiated a number of steps including a standardized web<br />
design, consistent navigational element, and common feel to enhance the overall web-user experience.<br />
Further, it is coordinating and reducing organizational duplications as well as creating web standards<br />
across organizations. In Kitchener, the City would like to maintain uniformity of identity related to cityowned<br />
organizations and facilities that currently operate different corporate websites because municipal<br />
tax dollars are supporting these functions. At the same time, however, municipal organizations like golf<br />
courses are competing for clients with other similar private organizations, and this necessitates branding<br />
that promotes an identity that is different from that of the City. This becomes a very tricky game between<br />
brand marketing and civic identity with no obvious winner. To overcome these obstacles requires<br />
exceptional leadership and management skills, as well as extensive training of all personnel involved in<br />
municipal eGovernment initiatives.<br />
Overall, in terms of the development of fully functional eGovernment, it would appear that the three<br />
municipalities are on the cusp of horizontal integration, i.e., “integrating government services across<br />
different functional walls (Layne and Lee, 2001: 132). However, while this poses somewhat of a technical<br />
challenge, the greater difficulty lies in transforming the entrenched bureaucratic culture. Certainly,<br />
functional specialization has resulted in a tendency to silo information and processes within different<br />
departments, at different levels of government.<br />
Notably, one of the greatest challenges faced by the municipalities, in terms of eGovernment, relates to<br />
measuring value. In Hamilton, McKay (2007a) has observed that, while continuous data gathering and<br />
analysis must be undertaken in order to measure value, it is difficult to determine accurate indicators. For<br />
example, is it increased revenue, or a reduction in the number of telephone calls to municipal<br />
departments? The City of Kitchener uses the number of web hits to benchmark use of eGovernment<br />
services. It can thus track the perceived increase in demand for services and measure how many more<br />
citizens visit a site with more services added. Again, however, the statistics fail to measure precisely what<br />
is being assessed. Are citizens simply information seeking, or are they actually accessing a service?<br />
Ottawa uses an approach similar to the City of Kitchener to track and measure the use of its online<br />
services. It also uses mail-in forms and telephone surveys to determine who is using its online services,<br />
and any other information that may help make its homepage more user-friendly.<br />
6. Conclusions<br />
This paper set out to examine the development and implementation of eGovernment, which has become<br />
a global phenomenon, as a way of enhancing service delivery. The evidence indicates that the adoption<br />
and implementation of eGovernment in Ontario emerged from two main sources: the provincial<br />
government, through its amalgamation policy; and, the influence of municipal bureaucrats. Currently, the<br />
focus of the municipalities has been on how to adequately expand web services with the development of<br />
various service initiatives. This is not surprising since municipalities are the first point of contact for<br />
citizens in terms of service delivery. However, municipalities still face enormous challenges in this regard<br />
as they possess fewer financial resources as compared to the federal and provincial levels. In short, the<br />
power to tax is far less than at the higher levels of government.<br />
A related problem is the challenge of finding the needed resources to preserve the “one-door” or “onestop-shop”<br />
concept, which requires continuous updating of information from the various contributing<br />
organizations. While it may seem that integrating the numerous websites may be efficient in term of costs<br />
and accessibility, the cost of gathering the information and the timing of the release of this information for<br />
285
John Grant et al.<br />
uploading may outweigh the benefits. One potential fix to the one-stop-shop is to apply a decentralized<br />
environment for the uploading of information. However, under this scenario, there is the potential for<br />
some business units to upload information more frequently than others.<br />
Another important issue is the use of consultants to provide expert advice with respect to web-based<br />
service strategy. Despite the fact that these municipalities have well trained bureaucrats, there has been<br />
a shortage of in-house specialists necessary for the development of new websites. Thus, municipalities<br />
continue to rely on outside expertise for their technological needs. Nevertheless, the benefit to this is the<br />
sharing of ideas, not only between experts and the municipalities they serve, but also among all members<br />
of the community at large. Indeed, there has been the recognition by municipalities of the essential role of<br />
citizens in eGovernment development and implementation.<br />
The three municipalities studied have also attempted to reduce the digital divide (see, Norris, 2001; and<br />
Powell and Shade, 2005) that exists in their respective communities. For example, significant attempts<br />
are being made to provide accessibility for on-line service delivery to disabled persons. The City of<br />
Ottawa has initiated a project called Mobile Web Access Strategy, which is expected to provide service<br />
delivery to the public anywhere and anytime. Similarly, the City of Kitchener has developed an access<br />
plan to enable residents with vision impairment to use online tools to enhance service. In this respect, the<br />
City has also increased the font size on the corporate web site. However, not all services can or should<br />
be offered exclusively online because of the inherent technological barriers that some people face. This is<br />
demonstrated by the continuing use of traditional service channels. There are still a number of services<br />
that cannot currently be delivered without some form of face-to-face or verbal interaction. Applications for<br />
building permits, for example, which involve the submission of plans and detailed information, are more<br />
likely to require the assistance of a real person. Thus, as well as service delivery, there is also a need to<br />
focus on service transformation (McKay, 2007a).<br />
Finally, it is also important to examine the overall impact ICTs are having at the municipal level in terms<br />
of attempts to include citizens in the policy making process. Here lies the true untapped potential of<br />
eGovernment: eDemocracy. In terms of eGovernment maturity models, this represents the final stage of<br />
development (Siau and Long, 2005). However, only the City of Kitchener has come close in this regard,<br />
through its Accountability and Transparency Committee, which has sought to utilize the City’s web site as<br />
an electronic means to disseminate information, not sensitive to City business, to the public. Thus,<br />
although there have been attempts to incorporate democratic ideals/values such as transparency and<br />
accountability into the model, the original thrust of eGovernment remains on efficiency in service delivery.<br />
This demonstrates where the political will still resides. Addressing such issues may help to enhance<br />
public trust in government.<br />
References<br />
Bekkers, Victor J. J. M and Zouridis, Stavros (1999) “Electronic service delivery in public administration: Some trends<br />
and issues”, International Journal of Administrative Sciences, Vol. 65, No. 2, pp. 183-195.<br />
Borins, S., Kernaghan, K., Brown, D., Bontis, N. and Thompson, F. (eds.) (2007) Digital state at the leading edge,<br />
University of Toronto Press, Toronto.<br />
Chadwick, Andrew (2006) Internet politics: states, citizens, and new communication technologies, Oxford University<br />
Press, New York.<br />
City of Hamilton (ND), Connect Hamilton – Create community (CHCC) is an important step in the evolution of<br />
Hamilton, [online], Available: http://town.flamborough.on.ca/executive-summary.htm [10 December, 2007].<br />
City of Hamilton (2003). Hamilton information technology strategy 3-Year Plan 2003 – 2005 (Summary Report),<br />
Information Technology Steering Committee, Hamilton.<br />
City of Hamilton (2001). Connect Hamilton – Create community: Notice of intent to proceed with request for business<br />
plan funding Connect Ontario/GeoSmart program, [online], Available:<br />
http://town.flamborough.on.ca/pdf/CHCC_NOI.pdf [10 December, 2007].<br />
City of Kitchener (2008). City of Kitchener Business plans, Kitchener ON: Finance and Corporate Services<br />
Committee, [online], Available: http://www.kitchener.ca/default.aspx?tabid=3), [9 February, 2008].<br />
City of Kitchener (2007a) Accountability and transparency policy (Draft), Kitchener ON:<br />
Accountability and Transparency Committee.<br />
City of Kitchener (2007b) Performance measurement status update and 2006 results, Audit Committee, Kitchener.<br />
City of Kitchener (2007c) Strategic plan – Condensed version, [online], Available:<br />
http://www.kitchener.ca/Files/Item/item12606_cok_strategic_plan_-_effect___effic_govt.pdf. [4 February, 2008].<br />
City of Kitchener (2006) City of Kitchener 2006 annual report to citizens, Chief Administrative Office and the Office of<br />
the Mayor and Council, Kitchener.<br />
City of Ottawa (2007) Web Based Service Strategy, Draft Report, Version 1.3, City of Ottawa: Ottawa.<br />
286
John Grant et al.<br />
Graham, K.A., and Phillips, S.D. (eds.) (1998) Citizen Engagement: Lessons in Participation from Local Government,<br />
IPAC, Toronto.<br />
Grant, Gerald and Chau, Derek (2008) “Developing a generic framework for eGovernment”, Journal of Global<br />
Information Management, Vol. 13, No. 1, pp. 1-30.<br />
Government of Ontario (1999) City of Ottawa Act, 1999: Powers and duties of Transition Board, Queen’s Printer,<br />
Toronto.<br />
Jaeger, Paul T. (2003) “The endless wire: eGovernment as global phenomenon”, Government Information Quarterly,<br />
Vol. 20, No. 4, pp. 323-331.<br />
Layne, Karen and Lee, Jungwoo (2001) “Developing fully functional EGovernment: A four stage model”, Government<br />
Information Quarterly, Vol. 18, pp. 122-136.<br />
Lenihan, Donald and Hanna, Abla (2002) EGovernment: the municipal experience, Centre for Collaborative<br />
Government, Ottawa.<br />
McKay, Shannon (2007a) Senior Project Manager, my.hamilton.ca Community Portal and eGovernment Coordinator,<br />
City of Hamilton, Interview, 29 November.<br />
McKay, Shannon (2007b) “The art of balance, the science of business and the City of Hamilton’s continued journey<br />
towards success”, Presentation for the Municipal Information Systems Association 2007 Annual <strong>Conference</strong>.<br />
McKay, Shannon (2006) myhamilton.ca: life made easy – Final report for Ministry of Economic Development and<br />
Trade (19 May, 2006).<br />
McKay, Shannon (2005) “Application of leadership principles builds success for Hamilton portal”, Municipal Interface,<br />
November, pp. 21-24.<br />
Moon, Jae M. (2002) “The evolution of EGovernment among municipalities: Rhetoric or reality?”, Public<br />
Administration Review, Vol. 62, No. 4, pp. 424-433.<br />
Norris, Pippa (2001) Digital divide: Civic engagement, information poverty and the Internet Worldwide, Cambridge<br />
University Press, Cambridge.<br />
Ottawa Transition Board (2001) The new City of Ottawa: Fulfilling its potential, final report and recommendations,<br />
Ottawa Transition Board, Ottawa.<br />
Patrick, Andrew S. (1997) “Media lessons from the National Capital FreeNet”, Communications of the ACM, Vol. 40,<br />
No. 7, pp. 74-80.<br />
Powell, Allison and Leslie R. Shade (2005) “Going Wi-Fi in Canada: Municipal, and community initiatives”, CRACIN<br />
Working Paper No. 6, Canadian Research Alliance For Community Innovation And Networking, Toronto<br />
Reddick, Christopher G., and Frank, Howard, A. (2007) “The perceived impacts of eGovernment on U.S. cities: A<br />
survey of Florida and Texas City managers”, Government Information Quarterly, Vol. 24, No. 3, pp. 576–594.<br />
Roberts, Ken (2005). “myhamilton.ca is your city”. Hamilton Spectator, 3 October, p. A17.<br />
Roy, Jeffrey (2006) EGovernment in Canada: Transformation for the digital age, University of Ottawa Press, Ottawa.<br />
Roy, Jeffery (2003) “The relational dynamics of e-governance: A case study of the City of Ottawa”, Public<br />
Performance and Management Review, Vol. 26, No. 4, pp. 391-403.<br />
Siau, Keng, and Long, Yuan (2005) “Synthesizing eGovernment stage models – a meta-synthesis based on metaethnography<br />
approach”, Industrial Management & Data Systems, Vol. 105, No. 4, pp. 443-458.<br />
Vojnovic, Igor and Poel, Dale (2000) “Provincial and municipal restructuring in Canada: Assessing expectations and<br />
outcomes, Canadian Journal of Regional Science, Vol. 23, No. 1, pp. 1-6.<br />
287
Crowd-Sourcing Techniques: Participation, Transparency<br />
and the Factors Determining the Co-Production of Policy<br />
Mary Griffiths<br />
University of Adelaide, South Australia, Australia<br />
mary.griffiths@adelaide.edu.au<br />
Abstract: The establishment of trust in the transparency of government and the commitment to collaboration with<br />
citizens, through engagement initiatives, remain strong priorities for Australian governments. The paper discusses<br />
the Gov 2.0 Taskforce recommendations within the context of Australian uptake of social media, and the Web 2.0<br />
features of government initiatives. It compares the relative success of two engagement projects: Community<br />
Cabinets at the federal level; and SAPLAN consultation processes at state level. Comparative analysis suggests that<br />
participatory initiatives depend for their success on expanding the role of public servants; and on realistic<br />
assessments of citizen expertise and expectations of collaboration, which take account of the online capacities being<br />
formed by social media protocols in civil society sectors.<br />
Keywords: public servants, social media, community cabinets, SAPLAN consultations; citizen experts; dotmocracy<br />
1. Introduction<br />
The success of Australian state and federal government initiatives in citizen engagement depends on the<br />
recognition given to significant changes in citizens’ motivations and preferred methods of connecting<br />
since the social media revolution. New online means of connecting, in which collaborative work is made<br />
possible through crowd-sourcing and blended techniques, can be put to work in the engagement and<br />
policy formation areas.<br />
The creativity of large numbers of people who give their labour freely can result in stronger citizengovernment<br />
relations. In a commitment to the co-production of policy, Australian governments are using<br />
blended citizen forums and online means to crowd-source ideas, and to form and test policy proposals<br />
with the public. For example, nation-wide Prime Ministerial Community Cabinets (CC) ran on the initiative<br />
of the 2007-2010 Australian Labor Government, under the ex-PM, Kevin Rudd. CCs were designed as<br />
participatory engagement exercises for regional and district communities, to encourage deeper trust in<br />
democratic transparency and more citizen involvement in governmental processes. The calls for<br />
participation were open, but formal, resembling a scaled-up version of town hall discussions. In contrast<br />
to the theatricality and political focus of the federal CCs, the South Australian government’s strategic<br />
planning process (SAPLAN) was designed as a long, focussed period of broad consultation. Its<br />
engagement tactics demonstrated a greater knowledge of the viral communications techniques being<br />
used in civil society to mobilise, persuade, reassure and influence people. SAPLAN involved themed<br />
expert and citizen face-to-face community conversations, and used Web 2.0, social networking,<br />
community ambassadors, and dotmocracy protocols at face-to-face round-table consultations.<br />
By comparing the two main instances of government-citizen engagement, the paper prioritises the more<br />
sustainable and productive approaches to reinvigorating the citizen-government relationship.<br />
1.1 Engaged government and information culture<br />
eGovernment in Australia has a history of rapidly developing transparency and inclusiveness in its<br />
approach to multicultural citizen engagement and education. Complex, informative websites are provided<br />
at all three levels of government: federal, state and local. Citizens have gradually become more<br />
autonomous both as ‘consumers,’ by accessing government services and making informed decisions on<br />
available information; and as participants, in the co-production of policy. Broad federal engagement<br />
policies, allied to high national connectivity levels and a general willingness to adopt new technologies on<br />
the part of citizens, ensure that Australia has a growing number of Gov 2.0 projects.<br />
In fact, an open version of Internet culture and a radical re-visioning of public service traditions drove the<br />
considerations of the Gov 2.0 Taskforce, established in June 2009 and comprised of a group of ‘policy<br />
and technical experts and entrepreneurs from government, business, academia, and cultural institutions’.<br />
‘Engage’ was the Taskforce’s key theme, defined through three main trajectories of change. Firstly, it<br />
recommended that public agencies and the Australian Public Service (APS) should be encouraged to use<br />
the ‘collaborative web’ to join up existing communities of interest, and help deliver a more ‘informed,<br />
288
Mary Griffiths<br />
responsive, innovative and citizen-centric democracy.’ Secondly, public sector information should be<br />
‘liberated as a national asset’ to encourage people to create new public value. Lastly, the hierarchical<br />
public service culture must change in order to reward engagement while staying true to the values of<br />
‘impartiality, propriety and professionalism.’<br />
The Report itself demonstrated the openness and ‘gift culture’ which are hallmarks of much everyday<br />
online participation. Compiled by global experts and peers, and an example itself of crowd-sourcing<br />
protocols, it was published under a Creative Commons license. The three pillars of the thirteen<br />
recommendations are leadership, engagement and open-access Public Service information. The central<br />
recommendation is a ‘declaration of open government by the Australian government.’ This would require<br />
whole of government commitment to government 2.0, to the provision of all possible access to data, and<br />
to the facilitation of Australian citizens’ participation in their own governance. In order to make that<br />
happen, Web 2.0 collaborative tools would be applied to the processes of government, causing a culture<br />
of collaboration at all levels of government. The overarching tenet is radical enough, but of special note is<br />
Recommendation 4: ‘encourage public servants to engage online.’ The Taskforce argued that over time,<br />
public servants become experts in their fields, and can therefore make a more useful contribution to<br />
public debate by speaking out online on issues of public interest and concern; and also by contributing to<br />
cross-agency policy discussions. They could thus model engagement to other citizens. Info-philanthropy,<br />
if treated as an eligible activity for tax reduction, could help Government 2.0 flourish. There was an inbuilt<br />
contradiction in what the Taskforce proposed, and APS culture. The APS is governed by strictly enforced<br />
professional guidelines, which limit public comment by public servants in order to protect officials from<br />
accusations of political interference (see below).<br />
Among many innovative recommendations, Recommendation 6 suggested that Public Sector Information<br />
(PSI) should be open and re-usable by citizens, and released under a Creative Commons license, after<br />
de-identification of personal citizen information. Overall, the sixteen members of the taskforce were<br />
recommending a major information culture change in Australian government, which would first match and<br />
then overtake what was already happening in Australian society. Taskforce members were asking<br />
government to exert control, to influence, and to lead by example.<br />
The Report’s final appendix notes thirteen OECD principles for the access and use of PSI, which are<br />
couched in terms of use and reuse, and the education of users and re-users, to promote innovation,<br />
entrepreneurship, economic growth and social effects. Reception of the Report has been welcoming in<br />
some sections, although there are critics (Grubb, 2010).<br />
The radical nature of the report illustrates that the government’s crowd-sourcing approach begins with<br />
asking for expert commentary about distributed information and networks. The advice from the Taskforce<br />
chair was forthright:<br />
The use of the internet as a platform for collaboration is already transforming the economy.<br />
Whole industries and sectors are being refashioned by adoption of the social web. Citizens<br />
are being empowered to express themselves, organise and collaborate in myriad new ways.<br />
2.0 communicative tools include blogs, wikis, and social networking platforms. These tools<br />
enable communities of interest to develop rapidly to find people with local knowledge or<br />
technical expertise to build understanding of issues and solve problems as they emerge.<br />
They enable communities to filter the torrent of information on the internet and identify the<br />
most useful parts of it…These new tools and the culture of open collaboration which<br />
distinguishes the culture of Web 2.0 present important new challenges and possibilities for<br />
government.<br />
(Gruen, AGIMO, 2009, p.xi)<br />
Citizens are already familiar with, and ready to use Web 2.0 in multiple aspects of their daily lives.<br />
Crowd-sourcing approaches need to recognise that Australia has a strong internet connectivity profile,<br />
set to improve after the high-speed broadband network is completed. According to ‘The Australian<br />
Internet and Technology Report 2009-2010’ (Nielsen, 2010), internet participation in Australia is already<br />
high (84% in 2009). Participation has also matured, placing Australia almost as high on the global scale<br />
as North America (p.15). In terms of household technology ownership, 93% of users 16 + have home<br />
internet; but 13% now also have the new consumer item, BluRay players, and 4% registered their<br />
ownership of portable reading devices (p.25), demonstrating the country’s fast adoption of new<br />
technologies. Other indicators include the mobile market, which has almost reached saturation, with most<br />
future growth expected in online services, such as ticket bookings (see also Worthington, 2009).<br />
289
Mary Griffiths<br />
Australian Internet users spend about 17.6 hours online, the Internet being the preferred source of news.<br />
Usage patterns recorded by Nielsen reveal that most frequently conducted activities are email, banking<br />
and bill-paying. 45% of Internet users participate more in social networking in 2009, up from 28% since<br />
2007. Of the Nielsen survey’s 38 categories of online activity, online social networking is ranked at<br />
number 6 (45% ‘use regularly’) and the percentage who ‘use but not regularly’ are 23%. Nielsen trend<br />
indicators indicate that internet use is driven by socialising, customisation, user-friendliness, time saving<br />
and support of lifestyle activities.<br />
1.2 Government-citizen online interactions<br />
However, in contrast, Nielsen tables show that the first government-citizen interaction online is ranked<br />
number twelve, and is at the transaction level activity of ‘submitting forms/info to govt websites.’ Here<br />
31% regularly submit and 34% use the facility but not regularly. Ranked number fourteen and fifteen are<br />
‘local/community information’ - 29% and 27% respectively; and ‘make payments for govt services’ 28%<br />
and 27% respectively (Nielsen, p. 133).<br />
Thus, governments wanting to engage citizens through ICTs have strong online competition and big<br />
challenges to overcome. Nielsen is predicting growth of only 2% in the interactions with government.<br />
Governments aiming to promote active citizenship need to do more than provide online customer servicestyle<br />
transactions. New media theorists describe Internet culture as inhabited by online participants who<br />
see themselves as peers engaged in business, work or leisure activities and transactions, in usually<br />
horizontally-structured communities and organizations, frequently defined by mutual interests. The codes<br />
of organizational and personal interaction evolve through peer development work, and community<br />
acceptance (Tapscot and Williams, 2006; 2010). The phenomenon of gift culture and collaboration is now<br />
being embedded in new legal practices of sharing information, thus replacing long-established traditions<br />
for dealing with published material and intellectual property rights (Lessig, 2002, 2008). Alternative points<br />
of view and creative commons practices in the digital world exist, flourish, and can set the agenda for<br />
future change simply by being practised. Non-professionals may become co-creative ‘produsers’, rather<br />
than the consumers of others’ production content (Bruns, 2008). Creativity, innovation and participation<br />
can be seen as Internet norms.<br />
Citizens may see themselves as necessarily owing allegiance to communities and nations, but single<br />
online actors have no need to stay in any group or community failing to meet the personal needs of its<br />
members; or where disagreements occur over roles or practices of interaction. These characteristics of<br />
the social web were brutally illustrated in the overall lack of interest generated by the government-themed<br />
blog threads in the Australian E-Gov Blog in 2008. In the social media world, another example is provided<br />
by the desertion of the site by MySpace users when new protocols of user engagement were instituted<br />
without consultation. The site, which relies on freely given user time and content rapidly dropped in<br />
popularity, causing financial losses to its owner, NewsCorp. Citizens, as consumers and online peers, are<br />
developing familiarity with their own preferred online modes of interaction and have expectations of<br />
customised access and control.<br />
1.3 Citizen-driven interactions<br />
A striking example of successful political activism based on crowd-sourcing is GetUp!Australia, a<br />
mobilized, networked activist group of 437, 892 members (March, 2011) in a population of 22 million.<br />
GetUp!Australia campaigned successfully to change Australian Election Office rules to allow late<br />
subscribers to the 2010 electoral roll by auspicing a teenager’s High Court challenge; handed out issuebased<br />
scorecards on the 2010 national election day ranking the parties according to their policies; acted<br />
as a mediator between independents and rival parties during the 2010 federal ‘hung election’; tried with<br />
some success to change government policy on the mandatory filter through email and ad campaigns;<br />
and displayed a Pollute-O-Meter to track party policies on carbon emissions on its website, courtesy of<br />
the Climate Institute (GetUp!, 2010). Its avowed intention is to change democratic practice in Australia<br />
and create a new democracy (Sheikh and Marsh, 2010). It is swift to canvass its members through email,<br />
and then to use Web 2.0 tools to influence others, and action its ideas. It quickly garnered funding for the<br />
New York Times one-page advertisement supporting Wikileaks’ founder, Julian Assange. Given the<br />
requisite information, issues, and technology platforms, many Australian citizens engage in a variety of<br />
lobby and protest activities.That willingness to engage across a range of issues cannot be further<br />
discussed here, but suffice it to say that GetUp!Australia is successful, and the APS could copy its<br />
techniques.<br />
290
1.4 OECD advice: Citizens as partners<br />
Mary Griffiths<br />
How can government improve its own performance in co-producing policy alongside citizens?<br />
Governments have to place higher levels of importance on ensuring equity, risk-management,<br />
accountability, transparency, openness, good governance, and building trust than is required of a social<br />
networking site. Governments promoting the active citizenship recommended by the OECD and<br />
democratic theorists of co-production (e.g., Roberts, 2008) need to consider the 2.0 context and existing<br />
competencies before participatory consultative design takes place. Earlier OECD advice handbook<br />
(2001; Vergez, 2002) gives practical assistance to government workers planning strategies for<br />
strengthening democratic and business practices. It identifies guiding principles such as commitment,<br />
rights, clarity, time, objectivity, resources, co-ordination, accountability, evaluation, and active citizenship.<br />
Written before the five year old explosion in social media, its ten tips for engagement strategies are still<br />
good principles, but seem naïve now: ‘take it seriously; start from the citizens’ perspective; deliver what<br />
you promise; watch timing; be creative; balance different interests; be prepared for criticism; involve your<br />
staff; develop a coherent strategy; and act now!’ Communication practices have since developed in<br />
complexity, as sectors copy and recopy successful techniques of information distribution and the<br />
establishment of online communities of interest, practice and consumption. However, in contrast to nongovernment<br />
groups, the Taskforce Report identified the Australian Public Service (APS) as falling behind<br />
in engagement, missing the opportunities to unlock the ‘invention, creativity, and hard work of citizens,<br />
business and community organizations; and to ‘create public value’ (iii).<br />
Companies use social media and networked information distribution to develop new relationships with<br />
their customers and the communities where they operate. Business interest is growing in online brand<br />
communities and in the idea of developing customer competence so that sustainable networks can be<br />
established which include customers, employees, and the wider community. Importantly, Schau et al<br />
(2009) argue that value can be co-created. Using consumer culture literature, they argue that all<br />
collectives ‘exhibit community-like qualities, as understood by sociology, and address identity-, meaning-<br />
and status-related concerns for their participants’, continuing, ‘Moreover, this work suggests that such<br />
collectives provide value to their members through emergent participatory actions of multiple kinds and<br />
that consumer collectives are the site of much value creation.’ Values are changed by participation and<br />
co-creation in business practices (Benkler, 2006; Bauwens, 2007). Ten years ago, Web 1.0 government<br />
websites provided information with unintuitive navigation, and website design which was so text-based as<br />
to differ little from a government print brochure. Web page design has since improved and interactive<br />
features are being incorporated on a daily basis, and at more sophisticated levels of complexity on many<br />
government sites. This is a technology design change and a social one.<br />
2. Building new relationships with citizens<br />
The following examples are representative of the trend to change information culture and enable<br />
meaningful interactions between citizens and government workers through portals with a high<br />
interoperability. They demonstrate government’s commitment to engagement in key areas of citizen<br />
concern, tax and benefits.<br />
2.1 Australian Tax Office<br />
Transparency in taxation collection is an important feature of the relationship of trust between citizens<br />
and government. The Australian Tax Office (ATO) homepage offers citizens a clear step-by-step process<br />
for lodgement of tax returns, an online lodgement facility, tools and calculators, and FAQs. It offers a<br />
Twitter subscription, from which it sends a subscriber ‘no more than five tweets a day’ of the tax-related<br />
content which appears on news platforms, in publications, publicity campaigns, and ministerial speeches.<br />
Interactivity in terms of ATO responses to individual tweets is low. Return tweets are monitored weekly.<br />
The ATO promises not to ‘follow’ its subscribers (numbered 1842 in August, 2010). Project Wickenby, set<br />
up in 2006 and with operations’ leadership from the Australia Crimes Commission, represents its work as<br />
‘protecting the community’ on a related ATO website which documents the success of crime-prevention<br />
in tracking tax crime. These initiatives show the educational aspects and approachability of one of the<br />
main agencies through which citizens interact personally, and regularly, with government.<br />
2.2 Centrelink<br />
An important statuary government agency, Centrelink delivers a range of services in employment, tax,<br />
family and sickness and benefits. It reported six billion transactions annually in 2008 (Wadeson, 2008).<br />
291
Mary Griffiths<br />
Centrelink’s purpose is ‘serving Australia by assisting people to become self-sufficient and supporting<br />
those in need.’ Citizens are provided with choices from which they manage their own interactions with the<br />
agency. The growth of the Centrelink website demonstrates a neo-liberal approach as whether right or<br />
left-wing governments are in power, the focus is on information provision and the expectation that<br />
citizens will take up their own responsibility for conduct in the areas which the agency governs.<br />
Centrelink’s website developed a simple information provider online (in 1998, one year after its launch),<br />
to a dynamic portal with a range of potential interactions and feedback channels in 2011. Like the ATO,<br />
and most federal government sites, sixty-four community languages make it inclusive of multicultural<br />
Australia. Weblinks help citizens to link the homepage to their favourite social media sites, for example,<br />
Delicious, Facebook, StumbleUpon, LinkedIn and Twitter. Centrelink frequently adds new webpages and<br />
service information. For example, the Basics Card, a new service, is a PIN protected card, which assists<br />
subscribers to manage their own income, and any risky behaviour patterns. It permits all essential<br />
purchases such as food, clothes, health items and basic household products, but not alcohol,<br />
pornography, tobacco, gambling products or home brewing kits. Once a member of the Basics’ ‘brandcommunity’,<br />
a citizen is treated as a loyalty-card customer with special needs and rights. The adoption of<br />
viral advertising and social media marketing techniques works from a benefit, not deficit, model in the<br />
behaviour modification of citizens at risk. This approach helps citizens maintain a measure of control and<br />
self-respect, as recipients of government support.<br />
2.3 Victoria Online<br />
At state level, Victoria Online - ‘the fastest way to find local, state and federal government information<br />
and services’ - has developed from its 2008 minimalist approach, through including consultations on, for<br />
example, GIS data. The proof of concept trial on VisualPlace, even when ‘closed’ as a formal<br />
consultation, remains ‘open’ for comment, education and information. VictoriaOnline also supplies<br />
information about Australian government connections to social media: Twitter, (109 entries), Facebook<br />
(86 entries), MySpace (5 entries), Flickr (25), RSS (76 entries), Podcasts (20 entries), Video (60 entries),<br />
and YouTube (39 entries). This state example demonstrates the aggregator power of government<br />
portals. Through website descriptions of social media specifics, and notations of best practice use of<br />
social media, this site educates citizens in online risk management.<br />
The three examples above, ATO, Centrelink, and Victoria Online illustrate a policy framework aimed at<br />
developing co-ownership of national governance: citizens and governments working for mutual benefit in<br />
an integrated fashion. The two examples below show that ideas can be harnessed from the polity to<br />
improve the value chain in developing software applications.<br />
2.4 AppMyState<br />
AppMyState illustrates grassroots-citizen participation in Victorian state governance in the technology<br />
area. An innovative outreach competition in which citizens were invited to submit an idea for the design of<br />
a web or mobile application of benefit to Victorians, AppMyState ran for twelve weeks from April, 2010.<br />
Of the seven application winners, first prize was awarded for a phone application with a barcode scanner<br />
to assist people to recycle the right items, called ‘Which Bin?’ Other applications recognised included<br />
‘Transportle’ which tracked the best route from A to B in the city of Melbourne, and MymarketsVic, which<br />
used location tracking and user rankings to promote the pleasure and convenience of shopping in<br />
Victorian markets. AppMyState, an example of the crowd sourcing of good governance ideas, is a rich<br />
vein of citizen thinking about how public goods can be produced. Copied, it can build community capital<br />
elsewhere. It illustrates crowd-sourcing techniques.<br />
3. Raised expectations about inclusion<br />
As well as consultations and advice on the digital economy, social inclusion and sweeping change to the<br />
APS were strong messages after the 2007 election, as the Taskforce commentary above illustrates.<br />
When launching the Social Inclusion Toolkit on 20 th August 2009, Julia Gillard, then Minister for Social<br />
Inclusion, saw the social inclusion agenda as, ‘a whole of government effort, indeed an effort by all<br />
governments in this country, to bear down on both the causes and the consequences of long term<br />
disadvantage (Gillard, 2009).<br />
Falzon, a member of the Australian Social Inclusion Board (ASIB), explained the concept behind policy<br />
formation this way: ‘What it means is that this is really about ‘us’ not about some kind of imaginary ‘them’.<br />
It’s about all of us recognising that we have so much in common.’ He went on,<br />
292
Mary Griffiths<br />
First of all I would simply say that we’ve got to reclaim that sense of being in this together,<br />
this sense of the social, this sense that it’s not all about private interests, private gains; it’s<br />
about being in this together… So first of all there’s got to be that really strong change of<br />
consciousness, that sense of awareness. Secondly, we’ve got to act on it, we’ve got to<br />
embrace that sense of being in it together, of not leaving people out, not talking about ‘us’<br />
and ‘them’, but just we ourselves together. And thirdly, we need strong government<br />
leadership backed by strong public opinion to address those causes. (Falzon in ASIB, 2009)<br />
Australia was to be imagined as a strengthened, healthy democracy, with strong and reciprocal relations<br />
forged between citizens and government. To win in the so-called ‘YouTube’ election, the Australian Labor<br />
Party (ALP) had deployed the persuasive help of social media like My Space, YouTube and Facebook,<br />
creating new political commitment amongst the young (see also Macnamara, 2008). Kevin Rudd, the<br />
ALP leader, ran a presidential-style electoral campaign making sophisticated use of social media. Thus, a<br />
high level of ‘Obama-style’ expectancy was evident among political elites and the citizenry at large in late<br />
2007. On the part of government, there existed a commitment to technocratic means of providing<br />
solutions, which prioritized expertise and a speedier public service delivery of policy drafts and<br />
implementation. Why then implement the face-to-face Community Cabinets?<br />
4. Community Cabinets – a return to face-to-face<br />
‘it’s personal’<br />
‘..it’s really important that government does come to the people…’<br />
‘…it’s nice to see someone in the flesh rather than on the news…’<br />
‘…I think it’s a good sign of democracy.’ (Community Cabinet website 2008.)<br />
The Community Cabinets were designed because of Rudd’s published ‘commitment ensure consultation<br />
with the Australian people on the things which concern them whether they be national or local matters.’<br />
(Community Cabinet website, 2008) They were also a return to presidential ‘meet the people’ politics.<br />
Rudd chaired 24 ‘Community Cabinets’ (CC) to which most members of the Cabinet accompanied him.<br />
The events were community endorsement of a prime minister who was under attack within his own party.<br />
A recent biography of the former PM outlines the reasons for the personal difficulties that Rudd<br />
experienced blaming them on his leadership style (Sturt, 2010).<br />
The CCs were conceived of at the celebrated 2020 Summit and began in January 2008 in Canning Vale,<br />
Western Australia (WA). The last was held on June 9 th , 2010 in Perth WA, In between these dates<br />
Federal Cabinet crossed the Australian continent monthly. CCs were held in city suburbs, provincial<br />
towns and districts. Organising the online and offline features of such Cabinets was costly in terms of<br />
time and resources, not only because of the lengthy internal cross-Australia flights, but because of the<br />
security and numbers of staff involved. Online registrations were required by all citizens hoping to attend<br />
a CC. Background and police checks were conducted on those who wanted to meet government<br />
ministers for an individual meeting. Citizen applicants needed to provide advance notice online of the<br />
theme of their ministerial discussion, and a staffer would ring to check the details. Kevin Rudd chaired<br />
each CC and took randomly chosen questions from the floor. These he occasionally relayed to an<br />
appropriate minister. Staffers took notes on suggestions made.<br />
As feel-good government-community engagement they were on the whole mutually respectful events,<br />
and non-controversial enough - in their content - to draw little or only bemused media attention. The<br />
coverage by newspapers and television offered little detailed analysis, or much understanding of the<br />
opportunities offered by CCs.<br />
Rudd dominated the CCs, which were well attended. Policy areas such as Veterans’ Affairs, visas, or<br />
aboriginal health were discussed at a typical CC in South Australia. Follow-up to a citizen’s personal<br />
concerns was instantaneous, if possible, and included an answer, advice, or meetings with ministers.<br />
Crowd-sourcing ideas on policy was minimal. A question on the benefits of euthanasia and a query<br />
about whether relevant legislation would be introduced in future drew forth a personal memory fro the<br />
PM.<br />
They were resource-hungry. The expenses associated with CCs became a target of Coalition Opposition<br />
party attacks. Public servants from the Office of the Prime Minister and Cabinet, on the other hand, cite<br />
the numbers of citizens applying for attendance at the evening events, and point to the regular number of<br />
293
Mary Griffiths<br />
one-to-one conversations held with Ministers. Anna Bligh, the Queensland Premier copied the CC<br />
approach, running a number of CCs in regional towns.<br />
Overall the public effect achieved was of a government, in control, yet accessible at a personal level -<br />
without too much difficulty - to citizens. Despite the promising nomenclature, the Community Cabinet<br />
could be thought of as a sounding of citizen concerns, a gauging of popular opinion, rather than the<br />
through-going commitment to co-production of policy with citizens.<br />
5. Re-visioning the SA strategic Plan: A bi-annual consultation<br />
As engagement exercises, the 2010 South Australian community consultations were policy-focussed and<br />
peer events. Citizens’ ideas were collected, voted on, archived and would then have a direct impact on<br />
the words of themed planning documents. A transparent process involved the public servants as peers<br />
and partners in the open call to work on the South Australian plan.<br />
Participants were self-selecting: there was no vetting process, police checks or prior requests to register<br />
topics. The consultation themes were published online, well in advance of consultation events. Prior<br />
online discussion was invited, with moderators provided. YouTube-style videos by prominent SA figures<br />
and then, later, the videoed quotations of participants were used to encourage broad participation. At the<br />
‘Creativity and Innovation’ consultation, citizens (including public servants) were guided through an<br />
exercise in re-visioning the state by a professional consultant, an ‘honest broker’, before being asked to<br />
look at existing state targets, and the outcomes so far achieved in the SAPLAN documents.<br />
Using dotmocracy protocols, tables of citizen-peers drafted, discussed, eliminated and refined state<br />
targets, and identified potential metrics until the top three concepts emerged. By a process of displaying<br />
results, and voting with dots on paper, top-level group aspirations were identified, for publication online,<br />
further discussion, and implementation.<br />
At one panel, 100+ citizens worked on a set of targets over a morning session. There was time for<br />
individual reflection and small group deliberation. Later, online discussion boards continue on all themes<br />
and targets. The full set of ideas has been archived online, on an attractive social networking-style<br />
website. This facilitated an effect which social media expert Hopkins calls ‘brand evangelism’ (Hopkins,<br />
2009, 54), this time, it is citizen evangelism for a state.<br />
In comparison with the select groups attending CCs, the philosophy, tools used and organisational<br />
differences in SA are clear: collective motivation and participation seemed high; common broad goals<br />
were achieved; a de-politicised process took place; public servants assisted the process as citizen peers<br />
and sometimes experts; and a citizenry versed in democratic practices demonstrated its proficiency in the<br />
‘give and take’ of free discussion offline and online.<br />
6. Conclusion<br />
Australian governments have designed numerous projects to adapt to citizen expectations of information<br />
culture, with varied success. ICT uses include online management of face-to-face Community Cabinet<br />
consultations; the archiving of visual evidence of processes of policy consultations and the raw materials<br />
of discussions; the development of sophisticated test-beds and portals; the tentative use of social media<br />
to educate and network citizens; the adoption of viral marketing and social media techniques in managing<br />
risk; and the futures-oriented proposals of the Gov 2.0 Taskforce.<br />
Of all the projects discussed, the recent SAPLAN experimentation demonstrates many elements of viral<br />
online information culture, collaboration, and value creation (Rosen, 2007): transparency in the open call<br />
for contributions and ideas; a crowd-sourcing emphasis on treating participants, including public servants,<br />
as peers; an external moderator for multiple and inclusive public consultations; the visual display of<br />
participants’ ideas; and transparent voting on the value and ranking of proposals, using dotmocracy. In<br />
two years’ time, the exercise will occur again. Then, citizens will be able to judge how much of a<br />
difference their creative contribution has made.<br />
References<br />
Australia 2020 (2008) Summit Response on<br />
Governance.[online]http://www.australia2020.gov.au/docs/government_response/2020_summit_response_9_g<br />
overnance.pdf<br />
294
Mary Griffiths<br />
Australian Government (2009) Department of Innovation, Industry, Science and Research. Powering Ideas: An<br />
Innovation Agenda for the 21 st Century.<br />
http://www.innovation.gov.au/innovation/policy/pages/PoweringIdeas.aspx<br />
Australian Government Information Management Office (AGIMO) Policy Consultation [online]<br />
http://webpublishing.agimo.gov.au/Policy_Consultation.html<br />
-----, (2009) Engage: Getting on with Gov 2.0.<br />
[online]http://www.finance.gov.au/publications/gov20taskforcereport/doc/Government20TaskforceReport.pdf<br />
Bauwens, M. (2007). ‘The Political Economy of Peer Production’ [online] http://www.ctheory.net/articles.aspx?id=499<br />
Benkler, Y., (2006), The Wealth of Networks: How Social Production Transforms Markets and Freedom, Yale<br />
University Press.<br />
City of Campbelltown (2010) Online Citizens Panel.[online]<br />
http://www.campbelltown.sa.gov.au/site/page.cfm?u=1594.<br />
City of Ipswich (2010).Your Tutor.[online] http://library.ipswich.qld.gov.au/kids/yourtutor.htm<br />
Conroy, Stephen. (2010) Australia’s Digital Economy: Future Directions-Final Report [online]<br />
http://www.dbcde.gov.au/digital_economy/future_directions_of_the_digital_economy/australias_digital_econom<br />
y_future_directions/final_report<br />
Department of Broadband, Communications, and the Digital Economy, Australian Government Digital Economy Blog<br />
[online]http://www.dbcde.gov.au/communications_for_business/digital_economy/digital_economy_consultation/f<br />
uture_directions_blog<br />
____________. Future Directions for the Digital Economy.<br />
[online]http://www.dbcde.gov.au/digital_economy/future_directions_of_the_digital_economy/australias_digital_e<br />
conomy_future_directions<br />
Department of the Prime Minister and Cabinet. Community Cabinet. Australian Government.<br />
[online]http://www.dpmc.gov.au/community_cabinet/index.cfm.<br />
Gillard, Julia (2009) Social Inclusion.<br />
[online]http://www.socialinclusion.gov.au/Videos/SIToolkit/Pages/ToolKitP2.aspx).<br />
Grubb, B. (2010) ‘Govt 2.0 Report ‘Lacks Purpose and Aim’ ZDNet.com.au http://www.zdnet.com.au/govt-2-0-reportlacks-purpose-and-aim-339300788.htm<br />
Hopkins, L. (2009) Social Media: The New Business Communication Landscape. ARK, Sydney.<br />
Lessig, L., (2002), The future of ideas: The fate of the commons in a connected world, Vintage, New York.<br />
_________, (2008), Remix: Making art and commerce thrive in the hybrid economy, Penguin, NY and London<br />
McNamara, J (2009) ‘Australian Federal Government Online Public Consultation Trials: Local Learnings in e-<br />
Democracy’. ANZCAA09 Communication, Creativity and Global Citizenship: Refereed Proceedings. [online]<br />
http:anzacaao9.org<br />
NewsCorp.(2010)[online]http://www.newscorp.com/operations/newspapers.html<br />
Nielsen. (February 2010) The Australian Internet and Technology Report,2009-2010[online]<br />
http://www.agl.com.au/Downloads/Nielsen%20Internet%20and%20Technology%20Report%202009-<br />
2010%20FINAL.pdf<br />
OECD (2001) ‘Citizens as partners: OECD handbook on information, consultation, and public participation in policy<br />
making’.http://213.253.134.43/oecd/pdfs/browseit/4201131E.PDF<br />
Roberts, N. (2008) (ed) The Age of Direct Citizen Participation. Armonk ,NY &London: ME SHARPE, American<br />
Society of Public Administration Classics.<br />
Rosen, E. (2007) The Culture of Collaboration: Maximising Time, Talent and Tools to Create Value in the Global<br />
Economy. Red Ape Publishing: SF.<br />
SAPlan (2010) [online] www.saplan.org.au<br />
Shau, Hope J, Albert M. Miuniz Jr, & Eric J Arnould. ‘How Brand Community Practices Create Value.’ Journal of<br />
Marketing, Vol 5, No 5, 2009.<br />
Sheikh, Simon with Ian Marsh. (nd) A Blueprint for Australian Democracy: This Moment and the Renewal of<br />
Parliament, Government and Elections. GetUp! NewDemocracy.[online]<br />
http://cpd.org.au/wpcontent/uploads/2010/08/ablueprintforaustraliademocracy_small.pdf<br />
Sturt, Nicholas (2010) Rudd’s way: November 2007- June 2010, Scribe Publishing, Carlton North, Vic. Australia.<br />
Wadeson, John (2008) Seminar Presentation on Centrelink’s Interoperability, August 24. Access, Research,<br />
Knowledge (ARK) Seminars, Brisbane.<br />
Worthington Tom (2009) Mobile Government 2.0. Public Sphere #2- Government 2.0: Policy and Practice.<br />
[Online]http://www.katelundy.com.au/2009/05/29/public-sphere-2-open-government-policy-and-practice/<br />
295
Implementation of a Contact Centre in a Swedish<br />
Municipality<br />
Kerstin Grundén<br />
University West, Sweden<br />
kerstin.grunden@hv.se<br />
Abstract: Implementation of a contact centre (CC) in a Swedish municipality was analysed and discussed.<br />
Interviews were made with 16 respondents in different organizational units and positions. The implementation of CC<br />
was successful so far, but it will be a challenge to have continuous learning possibilities for the municipality guides, in<br />
order to avoid future monotonous work situations. There was an alternation between a top down and bottom up<br />
approach in the implementation work. There was even a need for increased focus on back-office and social aspects<br />
in the further implementation work. There was also a need to communicate personnel strategies related to the<br />
transfer of work tasks from the administrations and CC, in order to reduce anxiety and concerns about change of<br />
work situations for the handling officers. There were some problems with different mental images among the handling<br />
officers and the project management regarding the vision for the implementation. There was also a need for more<br />
co-operation between the project team and the handling officers in order to have a more homogenous<br />
implementation process at the different units. Furthermore, there was a need for increased competence development<br />
education of the handling officers. ELearning combined with group discussions could be relevant educational forms.<br />
Keywords: contact centre, eGovernment, implementation, municipality, evaluation, eLearning<br />
1. Introduction<br />
In this article we will analyze and discuss the implementation work of a contact centre (CC) in a Swedish<br />
municipality. The case study is part of a three-year research project Innoveta financed by Vinnova, and<br />
intends to support and evaluate the efforts of the municipalities to implement CC and e-services. The<br />
motivation for the project stems from the background aspects of access problems with very long waiting<br />
times for citizens needing to get in contact with a relevant handling officer for solving their personal<br />
matters. The long waiting hours could even lead to a drop of the call. Such drops of calls have been<br />
reduced from 15-20% to less than 10% due to the implementation of CC. The traditional bureaucratic<br />
structure of the municipal organization also had hampered the citizens’ understanding of the relationship<br />
between their needs and the organizational functions, a fact that had complicated contact even more. In a<br />
process-oriented organization the needs of the citizens are more focused. The customers should only<br />
need to make one contact with the municipality, in order to get their matters solved, instead of being<br />
juggled between different handling officers.<br />
The implementation of CCs in Swedish municipalities is inspired by the concept of a call centre. A call<br />
centre is a place where you deal with phone calls completely dependent on the use of IT. A call centre<br />
can be an internal function of an organization or an outsourced detached function. The use of the concept<br />
“contact centre” is more and more common indicating an extended function, not only focussing phone<br />
calls, but also other contiguous work tasks (Andersson, Bäck 2008). Office work is more and more<br />
decentralized and outsourced in the private sector to geographical areas with low salaries and real estate<br />
costs. It is not as easy to outsource activities within the public sector. The development of call centres in<br />
public sectors is especially influenced by aspects such as increased service and availability from a<br />
citizen’s perspective and internal efficiency.<br />
Implementation of eGovernment is often associated with increased customer availability to public eservices,<br />
but means also a fundamental organizational change of public organizations (Grönlund 2001).<br />
Implementation of CC is strongly related to implantation of eGovernment and contributes to increase<br />
customer availability to municipality services. There is, however, also a need for reorganization of the<br />
back-office routines in order to optimize the efficiency and quality aspects of the implementation of CC.<br />
The theories of New Public Management (NPM) have inspired some changes of organization and<br />
administration when eGovernment is implemented. According to NPM the use of lean and highly<br />
decentralized structures is stressed in public service, resulting in the breaking down of the former unitary<br />
bureaucracies (Homburg 2008). There is also emphasis on contract-like relationships and attention to<br />
management strategies, performance indicators and the service produced. The use of information and<br />
communication technology (ICT) is essential for this organizational transformation. In a virtual<br />
organization ICT mediates the communication among different units at different geographical locations.<br />
296
Kerstin Grundén<br />
The implementation of CC in the public sector is influenced by national policies and regulations. In a<br />
recent action plan the Swedish government stresses the importance of using ICT in order to effectively<br />
develop public administration (Regeringskansliet 2008). This could be done by combining organizational<br />
changes and new skills within the municipalities leading to improved accessibility and understanding. The<br />
278 municipalities in Sweden make up 70% of the total public administration and they are considered to<br />
be the closest to the citizens’ needs in terms of public service. They are governed by elected regional<br />
politicians and have a high degree of autonomy. The internal context of each municipality could be very<br />
different due to different geographical locations, different numbers and social structures of the inhabitants<br />
and different economic conditions. The service to the inhabitants concerns e.g. building permits,<br />
environmental permissions, matters regarding social services and schools, healthcare, day-care and<br />
welfare and booking of public halls.<br />
Swedish municipalities do not have a regulated obligation to set up offices or similar service places for<br />
their inhabitants. However, it is regulated by Swedish law that all Swedish municipalities should provide<br />
individual service, e.g. to meet visitors and to answer telephone calls from citizens. Such service should<br />
have as high a quality as possible from an economic resources perspective in the municipality. The<br />
development of eGovernment also varies to a great extent among municipalities.<br />
The main challenges for implementation of eGovernment seem to be the integration of front-end services<br />
with back end processes. According to a study of more than twenty governments in different countries<br />
Accenture (2007) found many governments at important crossroads. The main focus for public service<br />
organisations has been on improvements of front end services to the citizens, neglecting the importance<br />
of also aligning back end aspects.<br />
The main aim of this article is to analyze the implementation of CC in municipalities with focus on social<br />
implementation aspects such as strategies, participation, changes of work situations, competence<br />
development, attitudes and motivation.<br />
2. Research method<br />
The research method used in the case study were semi-structured interviews. The CC was launched in<br />
late 2010 and the interviews were made during the spring of 2010 with 16 managers, employees and<br />
trade union representatives at the CC, the technical and the social administrations of the municipality.<br />
The interviews were semi-structured and lasted about an hour. All interviews were recorded and written<br />
word-by-word. The analysis of the interviews was made by contents analysis.<br />
3. The municipality<br />
The studied municipality had a population of more than 100 000 inhabitants and was rapidly expanding.<br />
The municipality was situated in the middle of Sweden. Trade and industry were well diversified and<br />
represented many industries. The municipality was organized in nine operative administrations and<br />
departments. Most of these organizational units were led by a board or committee of political<br />
representatives. The departments and administrations carried out a wide range of operations such as<br />
childcare and care of the elderly, town planning, property management, traffic projects, street and road<br />
maintenance, water and sewage services, fire and rescue services, etc.<br />
4. The implementation process<br />
Some background aspects for the implementation were access problems with very long waiting times for<br />
citizens needing to get in contact with a relevant handling officer for solving their personal matters. The<br />
bureaucratic structure of the municipal organizations had also hampered the citizens’ understanding of<br />
the relationship between their needs and the organizational functions, a fact that further complicated the<br />
contacts. Another driving force behind the implementation was directives from the Swedish government.<br />
In the program formulated by the municipality a vision for the implementation was described. The image<br />
of the municipality should be profiled: service, meeting behavior towards the citizens, and availability. The<br />
use of IT should contribute to service production improvements.<br />
The discussions of consistent customer services were initiated in 2006 at the IS/IT department of the<br />
municipality during the procurement of a new telephone system. The concept of a “call center” was used<br />
in the initial discussions, but was later replaced with the concept of a “contact centre”. A pre-study was<br />
made with about 800 handling officers at the technical and social authorities. All incoming issues from<br />
citizens were classified by the handling officers according to the complexity of each matter. About 80% of<br />
297
Kerstin Grundén<br />
all matters (2.300) were classified as “simple matters”. The result from the pre-study was used as a basis<br />
for launching the implementation work of the CC. The project management was also inspired by the<br />
successful implementation of a contact centre in another municipality in Sweden.<br />
4.1 The implementation of the contact centre<br />
A qualified external manager was recruited for the implementation and management of the contact<br />
centre. The co-workers at the CC were recruited internally from the biggest administrations of the<br />
municipality. They were “handpicked” by the manager, and their most important qualifications were<br />
described as ”service minded”. About ten co-workers were recruited, mostly women. The recruited coworkers<br />
were called “municipality guides”. About six of the previous switchboard operators were also<br />
included in the organization of CC, but did not change their work roles. The municipality guides sat<br />
together in an open office. Their work tasks were mainly to answer simple phone questions from the<br />
citizens. They were given some initial internal training and after a few weeks the current work of the CC<br />
began. Employees from the different administrations informed and explained tasks that the municipality<br />
guides needed to know in order to answer the questions from the citizens correctly. The municipality<br />
guides could search in relevant home pages, in paper files and folders at their office, in order to answer<br />
the questions from the citizens.<br />
If handling of issues was required, the call was connected to a handling officer at the appropriate<br />
administration. It was still possible for the citizens to be connected directly to the handling officers at the<br />
different administrations, but there was a push to minimize such direct contact. The municipality guides<br />
were defined as generalists, according to the competence needs.<br />
The implementation of the CC was not externally marketed in the beginning. The only formal information<br />
about the CC was given by an automated telephone service when citizens called the municipality. There<br />
were separate dial tones for the switchboard and the CC. The phone calls to the municipality had<br />
decreased since the establishment of CC. The reason for the decrease of phone calls was interpreted as<br />
being due to fewer incorrect connections being made, and that the customers did not have to phone as<br />
many times as before. There were also fewer “lost calls”, according to the statistics. It was not possible<br />
for the citizens to visit the CC, but within a year the CC will be moved to the centre of the town, and then<br />
it will open for “face-to-face” visits by the citizens. The CC will then also be externally marketed.<br />
In order to initiate the co-operation among CC and the administrations, there was a need for anchoring<br />
the establishment of the CC with the different administrations, according to the manager of the CC. There<br />
was a need for a cultural change among the handling officers at the municipality administration, because<br />
of their traditional focus on internal processing instead of the needs of the citizens. The general culture of<br />
the municipality was to use few resources but with good cooperation considering the available resource<br />
and these ideas also influenced the implementation work, according to a respondent.<br />
An information system for registration of citizen’s questions and matters was developed using open<br />
source software as part of the Innoveta project. The system was not completed when the CC was<br />
launched, a fact that contributed to some user difficulties. The development work was made using agile<br />
work methods. Sometimes there were difficulties to co-ordinate the systems development work with the<br />
organizational development work, and resources had to be transferred from the development work to the<br />
work of the switchboard operators.<br />
The manager of CC was very appreciated by the municipality guides, and he described himself as an<br />
attentive, listening and guiding manager. He also supported a high degree of empowerment for the<br />
municipality guides at the CC. He was striving for a balance between formal and informal work routines,<br />
in order to produce high quality service for the citizens.<br />
The municipality guides at the CC seemed to like their work, according to the interviews. However, they<br />
still met new challenges and there were new questions to be answered in their work. Their work was<br />
individually oriented but the municipality guides tried to solve problems together, and help each other.<br />
Every municipality guide had an individual field of responsibility and a department that they had more<br />
close contact with than others. The departments had contact persons who participated in meetings with<br />
the municipality guides. The co-operation between the CC and the department could be discussed at<br />
such meetings. Work tasks that could be transferred from the department to the CC could be discussed<br />
and specified. The municipality guide then transmitted the information from the meeting to the other<br />
guides at the CC.<br />
298
Kerstin Grundén<br />
The municipality guides did not generally receive any feed-back from the handling officers at the<br />
administrations, when a matter was solved. Citizens could however ask the municipality guides about<br />
matters that not had been solved in time. It could be somewhat frustrating for the municipality guides to<br />
depend on other’s work in this way, when they not could affect the work of the handling officers.<br />
4.2 The implementation at the administrations<br />
4.2.1 The implementation at the technical department<br />
The implementation at the technical department was initiated with information from the project<br />
management and discussions with the top management of the technical administration. Then the local<br />
managers at the administration were supposed to pass the information on to their employees in the<br />
organisation. According to the initial information given, the handling officers at the administration should<br />
receive fewer phone calls when the CC was implemented. The municipality guides were supposed to<br />
inform the citizens about information that already existed on the home page of the municipality. There<br />
were no pressures on the administration to transfer work tasks to the CC. Instead the administrations<br />
were supposed to analyse such issues themselves, and suggest suitable work tasks to transfer.<br />
The amount of work tasks transferred from the administration to the CC varied among the different<br />
administration units. The administration unit dealing with land and utilization had transferred more work<br />
tasks compared with the unit dealing with property management. For example, this unit had also started<br />
to develop e-services. The unit that not had transferred many services stressed the fact that many<br />
questions from the citizens were about contracts and required a high level of expert-knowledge to be<br />
answered correctly.<br />
Initially, there were some concerns among the employees about what would happen with their jobs when<br />
the CC was implemented. Their fears were however reduced, when they realized that they could<br />
influence which work tasks were to be transferred and that their own work still seemed to be needed.<br />
Most of the respondents at the unit had a positive attitude towards the CC, but initially one unit did not<br />
want to co-operate very much. They were used to having a very independent work situation and were not<br />
available for the citizens during coffee breaks, for example.<br />
There were varied opinions as to whether the implementation of the CC had led to a reduction of calls for<br />
the handling officers at the unit. Some respondents meant that there was no need to transfer more work<br />
tasks to the CC, and meant that the work division already was optimal, although there was processmapping<br />
of more complex work tasks going on. Others showed more optimistic attitudes.<br />
4.2.2 The implementation at the social department<br />
The political decision about launching a CC in the municipality was already taken, when the top<br />
management was informed. It did not make sense then to argue against the decision, a respondent<br />
pointed out. Instead of first launching a CC and then trying to find motives to defend the decision, the<br />
reverse order would have been better, according to the respondent. There was not any intrinsic<br />
resistance among the employees towards the decision, but the researchers had difficulties getting<br />
interview respondents at the unit. Four proposed respondents declined interviews or were otherwise<br />
unavailable.<br />
The amount that the administrations should contribute for financing the CC was based on the results from<br />
the initial pre-study. The relevance of the study was however discussed, especially at the social authority.<br />
Some employees questioned whether all respondents had used the same basis for the classifying of<br />
different matters, for example. However, they had not found any relevant model at the department for<br />
specifying work tasks that could be transferred to the CC. The work at the unit was characterized by a<br />
high level of exercising public authority, legal security, and integrity for the clients. The matters of the<br />
clients required professional judgement and therefore it could be difficult to transfer such matters to the<br />
CC. “There are no simple solutions”, a respondent stressed.<br />
According to a respondent many employees at the unit were anxious and feared that their work tasks<br />
would “disappear”. In the long run, the saving requirements could lead to a reduction of reception clerks<br />
at the unit, according to a respondent. But the local receptions at the unit need to be manned even if the<br />
work of the local receptionists was reduced.<br />
299
Kerstin Grundén<br />
The knowledge about the implementation of the CC varied a lot among the respondents at the unit. One<br />
respondent stressed that there are many employees working as assistant nurses at local work units that<br />
did not even now about the CC yet. The involvement by the contact persons from the unit in the<br />
implementation work seemed to have been rather low.<br />
5. Discussion<br />
5.1 The implementation work<br />
The implementation strategy of the municipality seemed to be inspired by the general culture of the<br />
organization. The ambition was to use few resources but with good cooperation considering the available<br />
resources. The establishment of the CC was made in a very smooth way. There were no initial external<br />
marketing of the CC for example. Transfer of work tasks from administrations to the CC usually start with<br />
the technical department, due to the formal character of much information and work tasks related to their<br />
field. It is more difficult to transfer work tasks from social services, related to issues of integrity,<br />
regulations and law. But the social department seemed to be forced to transfer work tasks because of the<br />
amount that the administration should contribute with to the work of CC.<br />
The management strategy of the implementation work in the case study seems to alternate between top<br />
down and bottom up strategies. The decision making regarding the establishment of the CC was made at<br />
the political and top management level, but the realization of the transfer of work tasks from the<br />
administrations to the CC was left for the administrations to judge (bottom-up). A combination of a topdown<br />
and bottom-up strategy could have been an alternative strategy.<br />
The implementation strategy chosen is often a consequence of the prevailing organisational culture and<br />
decision-making processes in the organisation. Changes in municipality organisations are often<br />
influenced by established tradition (Bergström 2002). The implementation strategy at the municipality<br />
could have both advantages and disadvantages. The top-down strategy could be relevant in order to<br />
“make the change happen”, but a lack of participation could contribute to a sense that “the<br />
implementation has nothing to do with my work” and affect the willingness to contribute to the change.<br />
The management strategy of the implementation could thus affect the employees’ competencies and<br />
motivation. Participation in implementation work could instead increase motivation and reduce resistance<br />
towards change (Angelöw 1991). Participatory design has a long tradition (Kensing & Blomberg 1998),<br />
especially in Scandinavia (Scandinavian Journal of Information systems 1994). Participation of all users<br />
is however difficult to put into practice in large organisations. Representative participation could be used<br />
in such organisations when many users are affected by a new system or changes to systems (Ranerup<br />
1996). The organisation and forms of participation and change work could probably be developed and<br />
extended with relevant group discussions and competence development in order to include all users in<br />
new ways. Participation in the implementation process could be a way to learn and develop competence<br />
for the users. If the implementation work also focuses on organisational and competence issues then the<br />
mutual understanding of the different responsibility fields and changed work roles increase during the<br />
analysis work. Such an analysis of the work process could be a relevant basis for learning in the<br />
implementation work (Svensson & Åberg 2001).<br />
5.2 Increased focus on back-office and social aspects<br />
There is a need for increased focus on back-office and social aspects in the further implementation work<br />
at the municipality. Implementation of eGovernment has earlier been criticised for focussing too much on<br />
technical aspects (Grönlund 2001, Schedler and Summermatter 2003, Kifle and Low Kim Cheng 2009),<br />
thereby ignoring the importance of social aspects. According to a study of Accenture (2007) many<br />
governments face great challenges in order to integrate back-office aspects in the eGovernment<br />
development. According to the study of Accenture (ibid.) many governments have tended to<br />
underestimate the importance of attitudes and change of the work for employees, when eGovernment is<br />
implemented.<br />
Many handling officers seemed to react with initial anxiety and fear of the effects on their jobs, when work<br />
tasks were transferred to the CC. Their worries seemed to have been reduced when the handling officers<br />
realized that their jobs were still needed. There seemed not to have been clear strategies from the project<br />
management as to how to handle such issues. Such worries could probably have been reduced at an<br />
earlier stage, if clearer personnel strategies were formulated and communicated from the project<br />
management. It is not unusual however, that project management makes a stand by not emphasizing<br />
300
Kerstin Grundén<br />
such aspects, in order to eliminate potential conflict aspects in the implementation work of eGovernment.<br />
There is a tendency for “problematic silences” of such issues in implementation of eGovernment,<br />
according to Seyfyrin and Mortberg (2009). The project management seemed to be afraid that such<br />
aspects could contribute to increased anxiety and fear among the employees concerned. Instead such a<br />
strategy could have reverse effects. Important aspects that are not clearly formulated in the<br />
implementation work could contribute to uncertainty and lack of motivation. If all expected consequences<br />
of the implementation were more clearly formulated and discussed in a dialogue with the employees<br />
concerned, the sense of uncertainty could be reduced and affect motivation. Such a dialogue could be<br />
the basis for a strategy formulated for how to deal with the issues. Usually there are many employees<br />
retiring in the coming years in public organisations, and some strategies could be to not refill their<br />
positions changes of the current work division for example to enrich work situations with new work tasks<br />
or work rotations for the handling officers affected.<br />
5.3 The work situations for the municipality guides<br />
There are documented common risks with work in call centers as being monotonous, stressful and<br />
lacking variation (Tengblad et al 2002). The employees are generally women sitting in open offices,<br />
bounded to their work most of the day answering a lot of phone calls. The municipality guides were<br />
however, very satisfied with their work situations hitherto, and motivated to produce efficient service with<br />
high quality to the citizens, according to the interviews. There were still new questions to be answered<br />
and new competence challenges in the work. According to an evaluation study of the implementation of<br />
the CC in other municipalities (Grundén 2010a), there had been fears of increasing monotony and a lack<br />
of variation in the work situations when the “honey moon” was over. A lot of attention is generally given to<br />
the work of the municipality guides when a CC is launched, but it is a challenge to have continuous<br />
learning possibilities. The initial strong focus on the work of the municipality guides could contribute to the<br />
so-called Hawthorne-effect (Mayo, 1949), and increase the initial motivation of the work.<br />
5.4 Information and education<br />
The respondents in the study had very different views of the ambition and vision for the implementation<br />
work compared with the vision formulated by respondents from the project management. A common<br />
mental image facilitates the communication and dialogue in the implementation work. There is also a<br />
need for an understanding of connections between the internal implementation of eGovernment in the CC<br />
and external tendencies within the field. Lack of relevant competence and knowledge could contribute to<br />
misunderstandings, fears, lack of motivation and negative attitudes towards the implementation.<br />
There seemed to be a need for more information and education of the handling officers at the<br />
municipality in order to increase their competencies about implementation of the CC and eGovernment<br />
both from an internal and external perspective. ELearning could be a relevant educational form for such<br />
competence development in combination with group discussions. When eLearning courses are<br />
developed they could easily be spread to many users located at different geographical locations of the<br />
organization, and the studies could be made at different points in time. In-house development of<br />
eLearning education becomes more and more common, especially for larger organizations that can<br />
afford the development and production costs (Nunes et al 2009). A development strategy of such courses<br />
could be to co-operate with other municipalities in the same situation.<br />
According to an earlier study by Grundén (2010b) an eLearning course for competence development of<br />
handling officers at the County Administration of Sweden was developed and evaluated. The focus of the<br />
course was both internal and external aspects regarding the implementation of eGovernment. The<br />
pedagogy approach of the course was inspired by study circles. Study circles have a long tradition within<br />
the Swedish popular movement and have frequently been used by educational associations. Study<br />
circles have also been used in working life, most often as a complement to other change activities<br />
(Erikson & Holmer 1991). A study circle usually consists of a smaller group with a study leader, who is<br />
more of a co-ordinator than a teacher. The study circle often has a generally formulated subject for study,<br />
but the participants can decide what aspects of the subject they will study more thoroughly. Study circles<br />
could be a relevant pedagogical approach for learning together in a community of practice (Lave &<br />
Wenger 1991). Study circles could support productive reflection at work emphasizing the social collective<br />
aspects of reflection; people reflecting together in the workplace (Boud et al 2006).<br />
301
6. Conclusions<br />
Kerstin Grundén<br />
There was a need for increased focus on the back-office and social aspects in the further implementation<br />
work at the municipality. The implementation of the CC was successful so far, but it will be a challenge to<br />
have continuous learning possibilities, in order to avoid a future monotonous work situation for the<br />
municipality guides. There is also a need for the project management to articulate and communicate<br />
personnel strategies related to the transfer of work tasks from the administrations and the CC, in order to<br />
reduce anxiety and concerns about the change of work situations for the handling officers.<br />
The implementation strategy of the CC alternated between top down and bottom up strategies. There<br />
seems to be a need for more co-operation and dialogue among the project team and the administrations,<br />
in order to have a more homogenous implementation process at the different units. There were some<br />
problems with different mental images of the vision for the implementation among the handling officers at<br />
the administrations and the project management. There was also a need for competence development of<br />
the handling officers in order to develop their competencies about implementation of the CC and<br />
eGovernment. ELearning combined with group discussions could be relevant educational forms for such<br />
competence development.<br />
References<br />
Accenture (2007) Leadership in Customer Service: Delivering the Promise. [Electronic source]: www.accenture.com<br />
[2010-02-01]<br />
Andersson, Bäck, M. (2008) Conceptions, conflicts and contradictions at the introduction of a Swedish Health Care<br />
Centre. <strong>Academic</strong> thesis. University of Gothenburg, Department of Work Sciences.<br />
Angelöw, B. (1991) Det goda förändringsarbetet. Om individ och organisation i förändring. Studentlitteratur, Lund.<br />
Bergström, T. (2002) Organisationskultur och communal förnyelse. Förändring i gamla hjulspår? Liber AB, Malmö.<br />
Boud, D., Cressey, P., Docherty, P. (2006) Productive Reflection at Work. Learning for changing organizations.<br />
Routledge, London,<br />
Erikson, K., Holmer, J. (1991) Studiecirklar som stöd för förändring i arbetslivet, report No. 9, University of<br />
Gothenburg, Institution for Pedagogik.<br />
Grundén, K. (2010a) “Evaluation of contact centre implementation in a Swedish municipality with focus on social<br />
aspects”. O’Donnell, D. (ed.) Proceedings of the 10 th <strong>European</strong> <strong>Conference</strong> on eGovernment, National Centre<br />
for Taxation Studies, University of Limerick, Ireland, 17-18 June, Intellectual Capital Research, Limerick,<br />
Ireland: <strong>Academic</strong> Publishing International.<br />
Grundén, K. (2010b), “A Study Circle Approach for Competence Development of EGovernment”. EGOV2010, 29 th<br />
Aug. – 2 nd Sept. Chappelet, J-L., Glassey, O., Janssen, M. Macintosh, A., Scholl, J., Tambouris, E. and<br />
Wimmer, Maria, A. (eds.) Electronic Government and Electronic Participation. Joint Proceedings of Ongoing<br />
Research and Projects of IFIP EGOV2010 and ePart 2010, Lausanne, Schweiz.<br />
Grönlund, Å. (2001) “En introduktion till electronic government”. In Grönlund, Å. and Ranerup, A. (eds.) Elektronisk<br />
förvaltning, elektronisk demokrati. Visioner, verklighet, vidareutveckling. Studentlitteratur, Lund.<br />
Homburg, V. (2008) Understanding eGovernment. Information systems in public administration. Abingdon, Oxon,<br />
Routledge.<br />
Kensing, F. and Blomberg, J. (1998) “Participatory Design: Issues and Concerns”. In Computer Supported<br />
Cooperative Work, Vol. 7, No. 3-4, pp 167-185.<br />
Kifle, H., and Low Kim Cheng, P. (2009) “eGovernment Implementation and Leadership – the Brunei Case Study”. In<br />
Electronic Journal of eGovernment (EJEG), Vol. 7, Issue 3, pp. 271 – 282.<br />
Lave, J. And Wenger, E. (1991) Situated learning: Legitimate Peripheral participation, Cambridge University Press,<br />
Cambridge, United Kingdom<br />
Mayo, E. (1949) Hawthorne and the Western Electric Company, The Social Problems of an Industrial Civilisation,<br />
Routledge.<br />
Nunes, M., McPherson, M., Annansingh, F., Bashir, I. and Patterson, D. (2009) “The use of eLearning in the<br />
workplace: a systematic literature view”. In Impact: Journal of Applied Research in Workplace ELearning, Vol ,<br />
No. 1, pp 97-112.<br />
Ranerup, A. (1996) Användarmedverkan med representanter. Ak. doktorsavhandling. Göteborgs Universitet.<br />
Gothenburg studies in informatics, 1400-741X;9<br />
Regeringskansliet (2008) Handlingsplan för eFörvaltning. Nya grunder för IT-baserad verksamhetsutveckling.<br />
Available 2010-11-23: www.regeringen.se.<br />
Schedler, K. and Summermatter, L. (2003) ”eGovernment: What Countries Do and Why: A <strong>European</strong> Perspective”. In<br />
The World of eGovernment. Curtin, G.C., Sommer, M.H. and Vis.-Sommer, V. The Haworth Political Press.<br />
Sefyrin, J. and Mortberg, C. (2009) ”We do not Talk about this: Problematic silences in eGovernment”. In Electronic<br />
Journal of eGovernment (EJEG), Vol. 7, Issue 3, pp. 259 – 270.<br />
Svensson, L. and Åberg, C. (2001) ELearning och arbetsplatslärande. Bilda Förlag, Stockholm.<br />
Scandinavian Journal of Information Systems (1994)<br />
Tengblad, P., Wiberg, A., Herrman, L. and Backström, M. (2002) ”Hållbart arbete i informationssamhället. Call centre<br />
i utveckling”. In Call centre i utveckling – långsiktigt hållbart arbete med kunder på distans. Vinnova report VR<br />
2002:7.<br />
302
An Outline of the Technical Requirements on<br />
Governmental Electronic Record Systems Derived from the<br />
<strong>European</strong> Legal Environment<br />
Bernhard Horn, Gerald Fischer, Roman Trabitsch and Thomas Grechenig<br />
(INSO), Vienna University of Technology, Vienna, Austria<br />
bernhard.horn@inso.tuwien.ac.at<br />
gerald.fischer@inso.tuwien.ac.at<br />
roman.trabitsch@inso.tuwien.ac.at<br />
thomas.grechenig@inso.tuwien.ac.at<br />
Abstract: In modern e-government administrations, regulatory documents are not only drafted using computer<br />
tools but are increasingly managed using Electronic Record Systems (ERS). Such tools mean that coordination<br />
and administrative procedures do not only have to occur via e-mail or similar technologies. To execute the next<br />
administrational step using traditional methods, each officer has to know the inner organisational workflow and<br />
therefore those clerks responsible for performing the next administrational step to be able to forward the record to<br />
the correct person. Though till now this way of working has been quite common in many official organisations,<br />
there are a considerable number of software products available, which implement ERS, to assist performing<br />
administrative procedures electronically. When an officer has finished his respective process step, such a system<br />
automatically forwards the documents to the next responsible person. Moreover if several clerks have to perform<br />
a step in parallel, it is not necessary to copy the whole file several times but only to grant appropriate access<br />
permissions to the documents. Thus at any moment, everyone has the record in its latest version. Furthermore<br />
the whole administrative act can be tracked and monitored. It is important to remember however that within the<br />
<strong>European</strong> Union a couple of regulatory rules have to be obeyed when implementing and using such ERS. The<br />
providers of such systems as well as the authority using them are responsible for ensuring legal conformity. The<br />
aim of this paper is to give a brief overview of the applicable <strong>European</strong> regulations concerning ERS for<br />
responsible stakeholders, such as IT-system designers and providers, administration chiefs, or researchers in the<br />
field of e-government.<br />
Keywords: <strong>European</strong> legal framework, public administration, governmental electronic record systems, data<br />
protection directive<br />
1. Basics of the <strong>European</strong> legal system<br />
The <strong>European</strong> Union’s legal order differentiates between Primary Law and Secondary Law. Primary<br />
Law represents all the contracts signed by the Member States concerning the <strong>European</strong> Communities<br />
and the <strong>European</strong> Union. Since the commencement of the Treaty of Lisbon on December 1, 2009, in<br />
practice the most relevant of these contracts are the consolidated versions of the Treaty on the<br />
<strong>European</strong> Union, the Treaty on the Functioning of the <strong>European</strong> Union (2010/C 83/01) as well as the<br />
Charter of Fundamental Rights of the <strong>European</strong> Union on behalf of Article 6 of the Treaty on the EU<br />
(Westphal in Bauer and Reimer, 2009: 63-68).<br />
However, Secondary Law is based on Primary Law and is established by the organs of the <strong>European</strong><br />
Union within an accurately defined process constituted by Primary Law. The fundamental instruments<br />
of Secondary Law are the <strong>European</strong> regulations and directives. Regulations are applicable in each<br />
Member State directly and without any legislative transformation process. In contrast to regulations,<br />
directives only set regulatory objectives, which have to be accomplished by the Member States by<br />
legislating corresponding national law and regulations. Thus directives have to be transformed by<br />
each national legislator into national law (Streinz, 2008: 145-153).<br />
Three directives were identified as being applicable to administrative procedures supported by<br />
governmental ERS: the Data Protection Directive (95/46/EC), the <strong>European</strong> Directive on Electronic<br />
Signatures (1999/93/EC) and for some cases even the Electronic Commerce Directive (2000/31/EC).<br />
But as described above, these directives are not applicable directly and must be transformed into<br />
corresponding national legislation. Nevertheless by looking at these directives, legislative minimum<br />
standards can be discerned and the relevant national regulations to be found and obeyed can be<br />
identified (Streinz, 2008: 150-153).<br />
303
2. The data protection directive<br />
Bernhard Horn et al.<br />
The EU Data Protection Directive (DPD, 95/46/EC) contains the most relevant regulations.<br />
Summarized, this directive governs the processing of personal data irrespective of the way and<br />
method of processing (electronically or manually) (Recital 27), the purpose, area and industry, public<br />
or private sector (Recital 5 and 30) as well as whether this happens by a natural or juridical person.<br />
Thus the directive lays down general rules for processing personal data independent from the area of<br />
life or special circumstances. Because personal data processed within an ERS are to be seen as a<br />
structured set of personal data accessible according to specific criteria, such systems are to be seen<br />
as a “personal data filing system” in the sense of Article 2 subparagraph c DPD. As a consequence<br />
the DPD is relevant for the implementation and operation of ERS (Ehmann and Helfrich, 1999: 76-79).<br />
2.1 Applicability and implementation of the DPD<br />
Article 2 subparagraph a defines “personal data” as ‘any information relating to an identified or<br />
identifiable natural person ('data subject')’, irrespective of whether the person can be identified directly<br />
or only indirectly 'by reference to an identification number (e.g., passport, driving license, student<br />
number, national insurance number, etc.)'. The correlation’s intensity may vary case-by-case, but if<br />
the appropriate individual can be identified from the data, the DPD regulations are applicable. The<br />
legal term “processing of personal data” means ‘any operation or set of operations which is performed<br />
upon personal data, whether or not by automatic means, such as collection, recording, organization,<br />
storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission,<br />
dissemination or otherwise making available, alignment or combination, blocking, erasure or<br />
destruction’ (Article 2 subparagraph b).<br />
Thus the DPD is also applicable to the processing of personal data in (ERS-supported) administrative<br />
procedures, because in such procedures usually data that can refer to a definite individual as a data<br />
subject (e.g., party, national, litigant, etc.) are processed. But the directive is not applicable to any<br />
processing in the course of an activity which falls outside the scope of (EC-) Community law like<br />
public security, defence and State security. Nevertheless the DPD’s regulations can be relevant for<br />
data processing within authorities, if such a processing does not concern one of the mentioned<br />
governmental core tasks.<br />
2.2 Definition of actors and roles<br />
After analysing the applicability of the DPD, the participating actors and their roles in the entire<br />
processing have to be identified and assigned in a second step. Certain rights and obligations arise,<br />
dependent on the role of the actors (Jahnel, 2010: 96).<br />
The Data Controller is that actor for whose purposes and advantages the processing of personal data<br />
occurs. This could be ‘a natural or legal person, public authority, agency or any other body which<br />
alone or jointly with others determines the purposes and means of the processing of personal data’<br />
(Article 2 subparagraph d). In the case of processing personal data within a (ERS-supported)<br />
governmental procedure, the Controller is the concerned authority. So this authority is responsible<br />
that the processing of personal data is conducted according to the applicable regulations.<br />
Nevertheless the Controller is legally allowed to outsource the processing to another third party. Such<br />
a third party is termed Processor by legal definition (Article 2 subparagraph e) and could be either a<br />
private company or another authority. The Processor is only allowed to process the disclosed<br />
personal data according to the contract to be concluded between Controller and Processor (or any<br />
other legal act like a decree) and therefore acts like the Controller’s “elongated arm” (BSI, 2002: 21-<br />
22). However the responsibility for the legal conformity, reliability and security of the data processing<br />
remains with the Controller. (Ehmann and Helfrich, 1999: 242-243; Graf, 2010: 46)<br />
(Natural) persons, whose data are processed by or on behalf of the Controller, are termed Data<br />
Subjects.<br />
2.3 Legal requirements for the legitimacy of processing personal data<br />
The fundamental principle of processing personal data is that such processing is basically prohibited<br />
unless a legal exception is applicable. (Knyrim, 2003: 8)<br />
304
Bernhard Horn et al.<br />
Such legal exceptions can be found in Article 7 of the DPD and are to be transformed into national<br />
law. In the environment of (ERS-supported) governmental procedures such exceptions could be: a)<br />
the data subject's informed consent, c) ‘processing is necessary for compliance with a legal obligation<br />
to which the controller is subject’ or e) ‘the processing is necessary for the performance of a task<br />
carried out in the public interest or in the exercise of official authority vested in the controller or in a<br />
third party to whom the data are disclosed’ (Article 7). Because of the principle of mandatory<br />
prosecution, in most cases exceptions to this prohibition will be found in national legal regulation.<br />
2.4 The principles relating to data quality<br />
In addition to observing the above-mentioned legal requirements, regulatory regulations concerning<br />
data quality have to be obeyed. To do this, Article 6 defines five fundamental principles (Dammann<br />
and Simitis, 1997: 139-143; Ehmann and Helfrich, 1999: 111-117):<br />
Fair and lawful processing: If none of the other principles is applicable, this principle ensures a<br />
lawful processing of personal data as a general rule. For instance, this prevents the secret<br />
collection of personal data using special technical tools without the Data Subject’s notice.<br />
Principle of legitimate purposes: This principle lays down that personal data may only be<br />
‘collected for specified, explicit and legitimate purposes and not further processed in a way<br />
incompatible with those purposes’. Therefore it is illegitimate to collect any personal data in<br />
advance or for indefinite purposes. Thus before the recording of personal data is started, the<br />
purposes, (legitimate) objectives and scope of the processing have to be defined (BSI, 2002: 37).<br />
Principle of proportionality: This principle restricts the extent to which personal data can be<br />
collected legitimately and recorded to serve the defined purpose as mentioned above. Excessive<br />
collecting of personal data therefore is prohibited and shall protect data subjects from sprawling<br />
data recording.<br />
Principle of factual validity and actuality: Not only data provide information, but also the context in<br />
and extent to which data are processed. So in several cases data may not provide accurate<br />
information if the recording of certain details is omitted. A relevant factor in this context<br />
concerning the accuracy of personal data is time, because the background of processed data<br />
may have changed since they had been recorded. So in such cases personal data must always<br />
be updated, as necessary, to meet the purposes for which the data are to be processed.<br />
Principle of mandatory deletion: The last principle of Article 6 is the obligation to delete personal<br />
data irretrievably, if the purpose for which the data have been recorded is accomplished (e.g., the<br />
legal time span for mandatory archiving has expired). Therefore personal data may only be ‘kept<br />
in a form which permits identification of data subjects for no longer than is necessary for the<br />
purposes for which the data were collected or for which they are further processed’. So for that<br />
reason an anonymisation of such data would be conform to this principle as well (Ehmann and<br />
Helfrich, 1999: 75, 117).<br />
If no ERS is used, practice has shown that in many cases such mandatory deletions do not occur. If<br />
the personal effort necessary for doing this is taken into account, it is much cheaper to procure<br />
extended disk space instead of searching the whole stock of electronic files for those files to be<br />
deleted. To support an authority in complying with the last mentioned principle, an ERS could provide<br />
the functionality of an automated deletion at a definite date, such as if the period of time for which the<br />
data archiving is required by law has passed (This may also occur after an acknowledgement.). To do<br />
this, the records could be classified according to their mandatory period for archiving and would be<br />
deleted if this period expires.<br />
2.5 The gap between legal regulation and feasibility<br />
As mentioned above, in certain cases there is an obligation to delete files or specific documents/data<br />
within such files. At first glance such a legal regulation seems to be simple and plausible, but on<br />
closer examination certain difficulties become manifest concerning its technical implementation.<br />
Article 2 subparagraph b also legally defines the processing of personal data as the blocking, erasure<br />
or destruction of such data. Now in this context the question arises: Which action has to be performed<br />
so that the “processing” of personal data is terminated?<br />
The German Data Protection Act (BDSG) defines “blocking” as an action which denotes the<br />
appropriate data as blocked. As a result such data can no longer be accessed, used or processed by<br />
305
Bernhard Horn et al.<br />
the users (e.g., within an ERS). But such data are still stored in the database or similar data storages<br />
and as a consequence available to the Controller, though direct access is no longer possible. In<br />
effect, only blocking personal data does not lead to the termination of processing (Simitis, 2003: 267-<br />
268).<br />
Afterwards the question has to be discussed, whether it is sufficient to delete personal data logically<br />
(e.g., using the operation system’s standard deletion functionality) or whether an irretrievable deletion<br />
(destruction) is necessary. Recently this question was resolved by a judgement in the Austrian<br />
Supreme Court (April 15, 2010, 6 Ob 41/10p): The processing of personal data terminates only then if<br />
the data are destructed irretrievably. If such data are deleted by using the operating system’s function,<br />
such data will only be interpreted as being deleted, but in fact not destroyed. According to the first<br />
method of deletion there is no recognizable difference from “blocking” the data, because the<br />
Controller still (in most cases) is able to recover such data by using special recovery software.<br />
Therefore only blocking direct access does not fulfil the requirement of an irreversible deletion<br />
(Jahnel, 2010: 159).<br />
Furthermore the implementation of backup strategies can lead to considerable problems concerning<br />
the irreversible deletion of data. Article 17 requires the Controller to implement any technical solution<br />
to avoid accidental or unlawful destructions or accidental losses of personal data. To fulfil this<br />
obligation, in many cases the whole data stock is copied and saved to backup volumes. Now if certain<br />
data have to be deleted, it is not adequate to oblige the Controller to process such a deletion in all<br />
backup volumes in addition to the regular data store. In such cases, it is therefore only necessary to<br />
delete such data in the regularly used database, but those data also have to be deleted in backup<br />
volumes as soon as possible (Simitis, 2003: 270-271). If there is only a limited number of backup<br />
volumes used, this could be done by letting the data to be deleted be “outgrown” out of the backup<br />
data stock. Using this procedure, restore cases have to be considered to avoid data to be deleted<br />
from being restored into the regular data stock.<br />
Though considering all these cases and circumstances, many situations still remain in which a<br />
permanent and entire deletion of personal data is nearly not feasible. Nowadays data storage is not<br />
only performed on central hosts, but also decentralised on ambiguous storage media like local copies<br />
on employees’ PCs, online-drives, online-storage, network components, caches, flash drives,<br />
mobile/smart phones, temporary files and so on.<br />
2.6 Publicity and monitoring of the processing of personal data<br />
To ensure the legitimate processing of personal data and the Data Subject’s fundamental right of<br />
privacy, the DPD provides two different instruments:<br />
2.6.1 Publicity and monitoring by the supervisory authority<br />
Pursuant to Article 28 each Member State has established an independent supervisory authority to<br />
monitor the legal conformity of the processing of personal data generally. For this reason ‘the<br />
controller or his representative, if any, must notify the supervisory authority referred to in Article 28<br />
before carrying out any wholly or partly automatic processing operation or set of such operations<br />
intended to serve a single purpose or several related purposes’ (Article 18 paragraph 1). Responsible<br />
for this notification is the Controller, therefore in this context the authority processing personal data.<br />
Article 19 lists the information, which must be provided to the supervisory authority. If only nonsensitive<br />
data are to be processed, the processing can be initiated immediately after the notification. If<br />
a processing presents specific risks for the Data Subject (e.g., medical data, offences, criminal<br />
convictions), such a processing has to be examined by the supervisory authority before starting and<br />
may only be initiated, if the authority approves (Article 20).<br />
2.6.2 Publicity and monitoring by individual Data Subjects<br />
The second instrument provided by the directive to ensure a legitimate processing of personal data is<br />
the granting of comprehensive rights to Data Subjects. Such rights enable Data Subjects to control<br />
the processing of their own personal data by exercising these rights.<br />
Articles 10 and 11 grant Data Subjects the right to be informed about any processing of their personal<br />
data. Before initiating any processing, the Controller is obliged to inform the concerned data subjects<br />
306
Bernhard Horn et al.<br />
about the Controller’s identity, the purpose of the processing, the data to be processed, if such data<br />
will be transmitted to any third parties and, if any, their identity as well as the existence of the Data<br />
Subject’s right to access the personal data. This obligation ensures that Data Subjects are informed<br />
about any processing and, as a consequence, to have the ability to exercise their rights. Pursuant<br />
Article 12 concerned Data Subjects have the right of access to their data and to receive certain<br />
information about the processing to be obtained from the Controller.<br />
Data Subjects have the right to have inaccurate data corrected so that processed data are completed,<br />
corrected or deleted if the information represented by them is not accurate or is not accurate any<br />
more. Such a correction need not be performed only then, if the accuracy is not relevant for meeting<br />
the designated purposes of the data processing (e.g., files of closed proceedings need not be<br />
accurate unless the proceeding is resumed). If personal data are processed by any Controller not<br />
complying with the DPD, the Data Subject has the right to have such data deleted. Concerning the<br />
process of deletion, see the remarks discussed above. If an entitled rectification or deletion of<br />
personal data has been processed and such data had been disclosed to any third party before, such<br />
parties have to be notified to process the rectification or deletion as well, unless such a notification is<br />
impossible or undue. To do this, an ERS could provide appropriate support.<br />
But note that especially for the governmental sector Article 13 contains several exceptions for specific<br />
fields of processing for which these rights are not granted.<br />
2.7 The legitimacy of automated individual decisions<br />
Concerning an electronically supported file administration, Article 15 contains a quite relevant<br />
regulation: This affects automated decisions by IT-systems which concern an individual in a way<br />
‘which produces legal effects concerning him or significantly affects him and which is based solely on<br />
automated processing of data intended to evaluate certain personal aspects relating to him, such as<br />
his performance at work, creditworthiness, reliability, conduct, etc.’ (Article 15 paragraph 1). As Jahnel<br />
(2010: 471-480) outlines this regulation does not concern IT-supported decisions where a human<br />
being makes the final decision based on information provided by the IT-system, but decisions which<br />
are fully made by the IT-system. In the context of governmental IT-Systems, automated individual<br />
decisions are only legitimate if they are executed according to national law providing suitable<br />
measures to safeguard the Data Subjects’ legitimate interests or do not concern a Data Subject<br />
significantly.<br />
2.8 Legal requirements concerning the ERS’s technical implementation<br />
The previous sections dealt with the question: Under which legal premises and circumstances is the<br />
processing of personal data legitimate? Article 17 establishes regulations about technical measures to<br />
be adopted for such a (legitimate) processing of personal data: ‘Member States shall provide that the<br />
controller must implement appropriate technical and organizational measures to protect personal data<br />
against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or<br />
access, in particular where the processing involves the transmission of data over a network, and<br />
against all other unlawful forms of processing. Having regard to the state of the art and the cost of<br />
their implementation, such measures shall ensure a level of security appropriate to the risks<br />
represented by the processing and the nature of the data to be protected.’<br />
As can be seen, concrete technical measures or security standards to be implemented cannot be<br />
found in this article. The core element of Article 17 is the Controller’s obligation to implement<br />
organisational as well as technical measures and standards, which—as a whole—prevent ‘an<br />
accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in<br />
particular where the processing involves the transmission of data over a network, and against all other<br />
unlawful forms of processing’ (Subparagraph 1). How these objectives can be achieved by the<br />
Controller is not addressed in this regulation. Therefore the Controller is responsible and has to fulfil<br />
these requirements by any means. Relevant is only the success of those measures.<br />
But on the other hand, not every effort has to be made to achieve this objective. Such measures need<br />
not to be implemented are those which are undue in relation to and dependent on the processed<br />
data’s sensitivity, the current technical state of the art and the economical effort. Therefore the more<br />
sensitive processed data are, the more effort has to be made to ensure the confidentiality, integrity<br />
and availability of processed data. Such security measures have to be safeguarded throughout the<br />
307
Bernhard Horn et al.<br />
entire period of processing and not only at the very beginning. Such measures can be of a structural<br />
(restricted access to server rooms, fire protection, alert systems), organisational (strict access rules to<br />
rooms, technical infrastructure and systems, staff trainings, staff sensitisation to critical dangers and<br />
threats) or technical (data protection mechanisms, backups [also to external locations], mirroring,<br />
encryption of data volumes as well as data transmitted via the internet, implementation of a<br />
comprehensive logging concept so that the access, addition, alteration or deletion of data and the<br />
performing person can be tracked, regular performance of system and software updates or the<br />
pseudonymisation of data) nature (Dammann and Simitis, 1997: 227-229).<br />
Moreover such measures not only concern the confidentiality of data with regard to external parties,<br />
but also with regard to internal actors. To avoid potential data misuse by employees and to ensure<br />
data privacy with respect to Data Subjects, processed data may only be accessible to such persons,<br />
for whom these data are necessary to perform their job. For this reason illegitimate access to<br />
personal data or the extraction of information out of the ERS by persons external to the administration<br />
as well as to those internal to the administration must be prohibited. As a consequence the ERS must<br />
implement an authorisation concept which ensures that access to files and personal data will only be<br />
granted to those persons who need access for their work (Hof, 2005: 50). But even in this case, it<br />
must be ensured that information obtained via search functions cannot be retrieved illegitimately. The<br />
simple existence of a file (shown as the result of a search query) can provide comprehensive<br />
information about certain circumstances.<br />
3. Data processing using third parties<br />
Besides security measures, Article 17 also regulates the situation in which personal data are not<br />
processed by the Controller himself but by a third party on behalf of the Controller (e.g., an external<br />
data centre, a private company or another authority). In this case, the Controller remains responsible<br />
for the legitimacy of the data processing and has to ensure that appropriate organisational and<br />
technical security measures pursuant to Article 17 are implemented by the Processor. The<br />
implementation of these measures can be examined by the Controller, by external specialists or by a<br />
certification authority. The concrete details of this external data processing have to be regulated in a<br />
written contract or other legal act (Jahnel, 2010: 117-123). For the assignment of external processors<br />
the national regulations based on Article 17 paragraphs 2–4 have to be obtained and the Processor<br />
may process the disclosed data exclusively on behalf of the Controller.<br />
On the other hand, it is not necessary for an external processor to observe all of his customers’<br />
national legal orders, but only those regulations as defined by the law of that Member State in which<br />
the Processor is established (Article 17 paragraph 3).<br />
4. An ERS as an information society service<br />
The functionality of an ERS can also be provided by an external service provider via the internet as a<br />
cloud-service (Software as a Service, SaaS). Such a service is to be qualified as an “Information<br />
Society service” according to Article 2 of the Directive on Electronic Commerce (2000/31/EC). Hence,<br />
this directive is applicable to the provision of SaaS services, even if they are provided for<br />
governmental authorities. The directive defines “services”, for which the regulations of the directive<br />
are applicable, as ‘any Information Society service, that is to say, any service normally provided for<br />
remuneration, at a distance, by electronic means and at the individual request of a recipient of<br />
services’ (Article 1 Directive 98/34/EC), which also includes the provision of ERS as a service.<br />
Articles 3 and 4 oblige the Member States to ensure that the taking up and pursuit of the activity of an<br />
Information Society service provider may not be made subject to prior authorisation, and prohibit the<br />
establishment of any legal regulation restricting the provision of Information Society services from<br />
another Member State—if the provider obeys the legal regulations concerning taking up and pursuit of<br />
the activity laid down in the Member State in which it is established (Laga, Sehrschoen and Ciresa,<br />
2007, 8-23). Therefore a Provider can offer its services to any authority in any Member State as long<br />
as it is in compliance with the legal regulations of its Member State. But Member States can lay down<br />
exceptions to these principles for reasons of public security, including the safeguarding of national<br />
security and defence as well as public policy.<br />
308
5. Electronic signatures<br />
Bernhard Horn et al.<br />
Usually paperwork to and from an authority has to be signed manually either by the applicant or the<br />
officer establishing the governmental decision. By signing such documents, the identity of the<br />
signatory as well as the authenticity of the document can be proven (BSI, 2002: 24-25). As an<br />
alternative to manual signatures, the directive 1999/93/EC establishes a legal <strong>European</strong> Community<br />
framework for electronic signatures, which standardises the technical and organisational requirements<br />
for such signatures to have equal legal standing as manual signatures (Brenn, 1999: 23-28). Such<br />
electronic signatures can also be used to send electronic documents to an authority by an applicant or<br />
to be delivered by an authority to an addressee as a subject of a governmental act (Recital 19). But<br />
only national law governs the legal spheres in which electronic documents and electronic signatures<br />
may be used (Recital 19 and 21). Therefore the directive does not provide any regulations, for which<br />
cases and legal affairs signatures are necessary in general or which legal effects are caused by such<br />
signatures. Only the premises are standardized, under which an electronic signature causes legal<br />
effects equal to a manual signature (Recital 17). Pursuant Article 5, such signatures have to be<br />
advanced electronic signatures (Article 2 paragraph 2) based on a qualified certificate and created by<br />
a secure-signature-creation device (e.g., smartcards, SIM-cards). A qualified certificate must provide<br />
specific minimum information and be (digitally) signed by a certification service provider. Because of<br />
such a harmonisation of electronic signatures, techniques for the digital identification of citizens can<br />
be developed (e.g., eID cards) to be used across EU.<br />
6. Conclusion<br />
It can be stated that most of the relevant legal requirements concerning the implementation and the<br />
operation of an ERS can be found in the DPD. If an ERS is provided or utilized as a cloud-service, the<br />
E-Commerce-Directive is also applicable, because such a service has to be qualified as an<br />
Information Society service. The third directive which, if any, could be applicable is the Directive on<br />
Electronic Signatures. This directive provides harmonized standards to be transformed into national<br />
law by which—fulfilling special organisational and technical requirements—electronic signatures are<br />
to be treated equally to manual signatures. But as mentioned in the very beginning, these directives<br />
are—as directives are in general—intended to be transformed into national law by the Member<br />
States. Nevertheless these directives provide indications to each party (like software producers,<br />
service providers and authority members) as to which regulations can be found and must be obeyed<br />
in every Member State’s laws.<br />
To sum up, detailed technical or organisational implications for the operation or utilization of an ERS<br />
could not be derived from any of these directives. Only Article 17 of the DPD obliges the Controller to<br />
implement effective and reliable technical or organisational measures, which ensure the<br />
confidentiality, integrity and availability of processed personal data, concerning both external and<br />
internal parties. Using ERS has considerable advantages for modern governmental administrations<br />
like simultaneous and transparent processes, standardised and comprehensible workflows, full<br />
provision of necessary information to clerks, online access to records and digital preservation of<br />
records (Centner (ed.), 2006: 102). Moreover ERS enable consistent electronic administrative<br />
workflows from the petition to the service of regulatory documents and can provide comprehensive<br />
assistance in complying with the legal requirements.<br />
References<br />
Brenn, C. (1999) Signaturgesetz, Wien: Manz Verlag.<br />
Bundesamt für Sicherheit in der Informationstechnik (BSI) (2002) Datenschutzgerechtes E-Government, Exeter:<br />
Thomas Knaak.<br />
Centner, M. (ed.) (2006) Administraion on the Net, Wien: Federal Chancellery.<br />
Dammann, U. and Simitis, S. (1997) EG-Datenschutzrichtlinie, Baden-Baden: Nomos Verlagsgesellschaft.<br />
Graf, W. (2010) Datenschutzrecht im Überblick, 2 nd edition, Wien: facultas.wuv.<br />
Hof, S. (2005) Alternative Security Approaches in E-Government, Linz: Trauner Verlag.<br />
Jahnel, D. (2010) Handbuch Datenschutzrecht, Wien: Sramek Verlag.<br />
Knyrim, R. (2003) Datenschutzrecht, Wien: Manz Verlag.<br />
Laga, G., Sehrschoen, U. and Ciresa M. (2007) E-Commerce Gesetz, 2 nd edition, Wien: LexisNexis Verlag.<br />
Simitis, S. (2003) Kommentar zum Bundesdatenschutzgesetz, 5 th edition, Baden-Baden: Nomos<br />
Verlagsgesellschaft.<br />
Streinz, R. (2008) Europarecht, 8 th edition, Heidelberg: C. F. Müller Verlag.<br />
Westphal, D. (2009) ‘Grundlagen und Bausteine des europäischen Datenschutzrechts’, in Bauer, L. and Reimer,<br />
S. (ed.) Handbuch Datenschutzrecht, Wien: facultas.wuv, pp. 53 - 94.<br />
309
Examining Influences on eGovernment Growth in the<br />
Transition Economies of Central and Eastern Europe:<br />
Evidence from Panel Data<br />
Princely Ifinedo<br />
Cape Breton University, Sydney, Nova Scotia, Canada<br />
princely_ifinedo@cbu.ca<br />
Abstract: This research examines the impact or influence of six (6) relevant factors on E-gov growth in Transition<br />
Economies of Central and Eastern Europe (TECEE). A 5-year panel data of sixteen (16) TECEE categorized as<br />
Leaders and Followers was used for data analysis in conjunction with the Ordinary Least Squares (OLS) technique.<br />
To test the influence of the selected factors on E-gov growth in the region, six hypotheses were developed<br />
accordingly. The results supported four (4) hypotheses indicating that E-gov growth in TECEE is positively influenced<br />
by such factors as national wealth i.e. GDP per capita, democratic/political rights, quality human capital resources,<br />
and government efficiency. The data did not confirm the significance of technological infrastructure and rule of law on<br />
the growth of E-gov in the region. The implications of the findings for research and policy making are discussed.<br />
Keywords: Transition Economies of Central and Eastern Europe (TECEE), eGovernment, new growth theory,<br />
regional development theory, regional eGovernment divide, contextual factors<br />
1. Introduction<br />
Electronic government (E-gov) is described by the World Bank as the use of information and<br />
communication technologies (ICT) including the Internet to transform governance (InfoDev, 2004).<br />
Essentially, E-gov allows government’s services to be more effective and accessible to citizens<br />
(Fountain, 2001; Moon, 2002; West, 2004). Empirical data from international agencies, consulting<br />
organizations, and research shows that E-gov has become a global phenomenon with nearly all<br />
governments around the world adopting it to promote citizen engagement and empowerment (Accenture<br />
2001, West, 2007; UN Public Administration Programme, 2010). Although E-gov is popular around the<br />
globe, there are parts of the world where slow progress have been reported (Norris, 2001, Gascó, 2005;<br />
Siau & Long, 2006; Singh et al., 2007; Azad et al., 2010). In fact, evidence indicates that more<br />
economically endowed countries occupy the upper echelons of innovators or adopters of advanced E-gov<br />
initiatives (West, 2007; Azad et al., 2010; UN Public Administration Programme, 2010).<br />
Norris (2001) asserted that the emerging digital divide (in this case, E-gov divide) has three distinct<br />
aspects: the social digital divide, the democratic digital divide, and the global digital divide. Gascó (2005)<br />
noted that the regional digital divide is a variation of the global digital divide in the sense that it signifies<br />
the differences that exist in E-gov initiatives between countries from the same geographical region. For<br />
instance, while the E-gov index (i.e. an indicator of a country’s EGovernment adoption) for Eastern<br />
<strong>European</strong> countries averaged 0.5449 in 2010, Hungary and Belarus had 0.6315 and 0.4900 respectively<br />
(UN Public Administration Programme, 2010) to indicate the existence of regional differences. In view of<br />
the disparities that exist at regional levels, it is argued that more attention needs to be paid to<br />
understanding E-gov issues at the regional level to enrich insight.<br />
Very little has been written about the factors impacting the growth or development of E-gov in Transition<br />
Economies of Central and Eastern Europe (TECEE). Two considerations informed the choice of TECEE<br />
for examination in this study. First, TECEE share a common political and cultural history (Ifinedo &<br />
Davidrajuh, 2005) as most countries in the region only recently metamorphosed from centrally planned<br />
systems to free market democracies. Thus, it is pertinent to continue monitoring progress in TECEE<br />
especially with regard to ICT use for development and governance (Levada, 2004; Alexander, 2004; EU<br />
Regional Policy; 2009). Second, researchers such as Roztocki and Weistroffer (2008) indicated a lack of<br />
adequate research related to information systems and technologies (IS/IT) issues in TECEE; they called<br />
on researchers to focus on such issues in that part of Europe. As E-gov initiatives aim at reforming and<br />
improving administrative services and citizen empowerment, research such as this current one could<br />
provide a lens through which efficiency in governance through IS/IT use is viewed.<br />
The academic literature on cross-national E-gov growth in TECEE is sparse, perhaps due to the relative<br />
novelty of the subject (Katchanovski & La Porte, 2005). Moreover, research done in this area has used<br />
global E-gov data rather than focus on particular regions on the world (Azad et al., 2010; Kovačić, 2005;<br />
310
Princely Ifinedo<br />
Katchanovski & La Porte, 2005; Singh et al., 2007; Siau & Long, 2006; Moon et al., 2005). By not<br />
focusing on specific regions of the world, it is possible that a deeper understanding of the factors<br />
impacting E-gov growth in differing parts of the world is underreported. To that end, this current research<br />
effort is designed to investigate factors that influence E-gov growth in TECEE. This study draws from the<br />
new growth and regional development theories. Published data from reliable sources such as the United<br />
Nations (UN) and the World Bank for selected TECEE over a 5-year period is used for analysis.<br />
2. Background information<br />
2.1 eGovernment: Focus<br />
The research’s focus is on the aspect of E-gov measures dealing with the extent to which each TECEE<br />
has advanced with respect to using ICT in governance, over the years. The UN indicator for this aspect of<br />
E-gov measurement is captured by the Web measure/online service index, which consists of a four-stage<br />
growth model (UN Public Administration Programme, 2010) that compares with similar frameworks in the<br />
literature (e.g. Layne & Lee, 2001; Srivastava & Teo, 2004a). Figure 1 and Table 1 illustrate each stage<br />
in the UN model. In brief, the UN's model indicates that countries that have advanced to higher levels of<br />
the model are the ones with relatively high Web measure/online service index scores.<br />
2.2 Transition economies: Definition and categorizations<br />
Transition economy (TE) refers to an economy that is changing from a centrally planned economy to a<br />
market economy (IMF, 2000; Samoilenko & Osei-Bryson; 2008). The characteristics of TEs include rapid<br />
economic liberalization, legal and institutional reforms, restructuring and privatization, and<br />
macroeconomic stabilization (IMF, 2000). Two groups of TECEE can be found in Europe. The group of<br />
eight countries that joined the EU on 1 May 2004 (i.e. Czech Republic, Estonia, Hungary, Latvia,<br />
Lithuania, Poland, Slovakia, and Slovenia) is in fact considered as having completed the transition<br />
process. The second group comprises such countries as Romania, Russia, Moldova, Croatia, Bulgaria,<br />
Belarus, Ukraine, and Georgia that are still transiting. The latter eight were selected from the list of<br />
TECEE in IMF (2000) for illustration purposes. It is suggested that the former and latter groups can be<br />
categorized Leaders and Followers, respectively (Samoilenko & Osei-Bryson, 2008; EU Legislation,<br />
2010; World Bank, 2010). Both groups differ significantly with respect to economic prosperity and ICT use<br />
for development (Samoilenko & Osei-Bryson; 2008; WEF, 2010). For instance, a Levene's test for<br />
equality of variances between the 16 TECEE in this research showed that the two groups’ E-gov (Web<br />
measure/online services index) differ significantly (F = 3.82, p < 0.000, df = 70.4). Thus, this result<br />
showed that the level of advancement regarding the use of ICT in governance differ significantly between<br />
Leaders and Followers TECEE. Table 2 highlights the national wealth and E-gov indicators for the<br />
selected TECEE.<br />
Figure 1: The UN's four stages of online services growth<br />
3. Theoretical foundation and hypotheses<br />
This research drew from the new growth theory and the regional development theory. The new growth<br />
theory is an economic theory that seeks to provide reasons for technological progress, creativity and<br />
diffusion of knowledge (Romer, 1994); its basic proposition is that continuous technological progress and<br />
advancement results when the combined effects of relevant exogenous factors are relatively high. On the<br />
other hand, the regional development theory seeks to explain differing growth rates across regions; the<br />
role of “space” in shaping regional development is underscored (Richardson, 1973; Dawkins, 2003). In<br />
311
Princely Ifinedo<br />
other words, the “space” in which a country exists in or occupies is a determining factor with regard to its<br />
capability to utilize technological innovations such as E-gov initiatives or tools for advancement.<br />
Table 1: The description of the UN's online services stages<br />
Table 2: Selected indicators for countries in the TECEE region<br />
312
3.1 Hypotheses formulation<br />
3.1.1 Economic factor<br />
Princely Ifinedo<br />
A study of the diffusion of technological innovations such as the Internet, e-commerce, and E-gov found<br />
that economic wealth strongly predicts the adoption of such innovations across countries (Norris, 2001;<br />
Moon et al., 2005; Singh et al., 2007). This is because more affluent countries have financial resources to<br />
invest in the implementation of such innovations while countries lacking in such resources usually<br />
experience greater difficulties in allocating needed resources for such initiatives, perhaps because of<br />
other pressing priorities. While studies by Azad at al. (2010) did not find support for a relationship<br />
between wealth and E-gov diffusion; several other researchers including Moon et al. (2005), Singh et al.<br />
(2007), and West (2007) confirmed that national wealth (GDP per capita) and E-gov diffusion are<br />
correlated. Thus, it is predicted that:<br />
H1: National wealth (GDP per capita) levels will positively influence E-gov growth in TECEE<br />
3.1.2 Technological factor<br />
Moon et al. (2005) showed that the more technologically advanced (i.e. a higher level of technological<br />
infrastructure) a country is, the more likely it is for the country to advance its E-gov agenda. Prior studies<br />
have shown that the spread of technological innovations across countries is contingent upon the<br />
availability of enabling ICT infrastructure (e.g. Norris, 2001; West, 2007; Shirazi et al., 2009). Likewise,<br />
Singh et al. (2007) and Azad et al. (2010) showed that the availability of ICT infrastructure positively<br />
influences E-gov maturity across nations. Thus, it is predicted that:<br />
H2: Technological infrastructure will positively influence E-gov growth in TECEE<br />
3.1.3 Social factor<br />
It has been suggested that one of the reasons why digital divide exists around the world is that some<br />
countries suffer from illiteracy and poor educational attainment (Kiiski & Pohjola, 2002; Moon et al., 2005;<br />
Shirazi et al., 2009). Illiteracy tends to hinder the growth of an information society at a fundamental level<br />
(Norris, 2001; WEF, 2010). The UN human capital index, which encompasses average years of schooling<br />
(across the three main levels) in populations, as well as literacy rates, captures this social measure<br />
across countries. Moon et al. (2005) and Singh et al. (2007) found the human capital index is positively<br />
related to E-gov growth and maturity across countries. Thus, it is predicted that:<br />
H3: Human capital index will positively influence E-gov growth in TECEE<br />
3.1.4 Political/democratic factor<br />
E-gov aims at fundamentally improving the efficiency of public administration (Fountain, 2001; Moon,<br />
2002; West, 2004; InfoDev, 2004). Thus, E-gov projects are being adopted by governments to increase<br />
productivity, improve decision-making, reduce costs, increase revenues and integrate services (e.g.<br />
Grönlund, 2001; Srivastava & Teo, 2004b). While some researchers (Davis, 1999; West, 2004; Fountain,<br />
2001) predicted that the utilization of ICT tools will revolutionize the efficiency of governance in the long<br />
run. Others (e.g. Kraemer & Dedrick, 1997) however do not share this viewpoint. The latter researchers<br />
asserted that ICT often improves technical efficiency and not organizational efficiency. Arguments have<br />
also been put forward noting that an ineffective government is not likely to use E-gov beyond basic<br />
information publishing, i.e. mainly for propaganda purposes (Alexander, 2004; Singh et al., 2007).<br />
Indeed, Srivastava and Teo (2004b) revealed that there is a significant association between E-gov<br />
development and government efficiency. Thus, it is predicted that:<br />
H4a: Government efficiency will positively influence E-gov growth in TECEE<br />
Another political issue that influences the diffusion of innovations such as e-commerce and E-gov is a<br />
country’s “rule of law” (Shih et al., 2005; Oxley & Yeung, 2001). Rule of law is developed in the context of<br />
the institutional environment that establishes the basis for exchanges. According to Shih et al. (2005,<br />
p.58), “it includes sound political institutions, an impartial court system, legal protection of property rights”,<br />
as well as the extent to which citizens have confidence in the legitimacy of these institutions and accept<br />
their authority. Shih et al. (2005) found that the relationship between the technological readiness of a<br />
313
Princely Ifinedo<br />
country and its e-commerce activities is moderated by “rule of law”. Accordingly, it is expected that E-gov<br />
growth in a country will be influenced by the prevailing rule of law in its context. Thus, it is predicted that:<br />
H4b: Rule of law will positively influence E-gov growth in TECEE<br />
Political rights are simply rights and freedoms protecting an individual from the state (Freedom House,<br />
2010); such rights are pertinent for good governance. Martin and Feldman (1998) argued that countries<br />
with favorable political climates are better served with respect to enhancing democratic values and<br />
promoting the dissemination of information. Research has shown that countries with higher levels of<br />
political rights often reap the benefits of technological innovations such as E-gov as opposed countries<br />
lagging behind in such values (Katchanovski & La Porte, 2005; Shirazi et al., 2009; Kovačić, 2005; Azad<br />
et al. 2010). In particular, Katchanovski & La Porte (2005) found that political rights have significant effect<br />
on E-gov development. Thus, it is predicted that:<br />
H4c: Political rights will positively influence E-gov growth in TECEE<br />
4. Research method<br />
4.1 Data sources<br />
As noted above, this study’s dependent variable (E-gov) was represented by the Web measures/online<br />
services index, which was obtained from the UN's Global EGovernment Reports (UN Public<br />
Administration Programme, 2010). The UN EGovernment Reports have been widely used by other<br />
researchers investigating similar issues (e.g. Moon et al., 2005; Kovačić, 2005; Azad et al., 2010). In<br />
deriving the index score, the UN agency aggregated scores for the online services, in each country, on<br />
the model’s stages presented in Figure 1 and Table 1.<br />
Each country’s technological infrastructure level was assessed using a weighted index comprised of<br />
Internet users/1000 persons, PCs/1000 persons, telephone lines/1000 persons, online populations,<br />
mobile phones/100 persons, and TVs/1000 persons (UN Public Administration Programme, 2010). Other<br />
researchers have represented technological infrastructure with these items (e.g. Singh et al., 2007). The<br />
human capital index was obtained from the UN Public Administration Programme (2010); it is derived<br />
from measures related to the educational attainment and literacy levels across countries. The variables of<br />
Rule of Law and Government Efficiency were obtained from Kauffman et al. (2009). The scores for<br />
Political Rights were taken from Freedom House (2010). The rating scale developed by Freedom House<br />
ranged from 1 to 7 with 1 representing the maximum value for the measure. This item was rescaled for<br />
this study to indicate 7 as the maximum value for rights or liberties. The GDP per capita was obtained<br />
from the World Bank’s Development Index (World Bank, 2010).<br />
4.2 Analytic procedures and the estimation model<br />
This current study used a 5-year data for periods: 2003-5, 2008, and 2010 for both Leaders and<br />
Followers TECEE that was collected over 8 years. As such, the research used panel data (also known as<br />
longitudinal time-series data) to capture E-gov growth, over time. The advantage of using a panel data is<br />
that greater variations with respect to changes in variables are captured; a single year study may not<br />
reflect such changes. For the data set of 16 countries, 80 points or observations were obtained. The<br />
ordinary least squares (OLS) regression multivariate technique was used to test the model.<br />
Multicollinearity was assessed and this does not appear to present any major problems for the study.<br />
Problems with homoskedasticity could arise from distributions that are not normal; to that end, effort was<br />
made to transform variables requiring normalization. Thus, the GDP per capita variable was transformed<br />
and normalized with a logarithmic function, i.e. In. The regression model for the study is represented as<br />
follows:<br />
Yit= α +β1log(Ait)+β2Bit+β3Cit+β4Dit+β5Dit+β6Dit + eit<br />
Where the subscript “i” is the country, “t” is the year, α is the unknown intercept, e is the error term, A1 =<br />
GDP per capita; B = Technological infrastructure; C = Human capital index; D1 = Government efficiency;<br />
D2 = Rule of law; D3= Political rights<br />
314
4.3 Results<br />
Princely Ifinedo<br />
The regression results of the research conceptualization are provided in Table 3. As predicted, the result<br />
showed that national wealth (GDP per capita) significantly influences E-gov growth in TECEE, over time<br />
(β = 1.84). The hypothesis indicating that human capital index positively influences E-gov growth was<br />
supported as well (β = 1.55). The data analysis confirmed the positive association between government<br />
efficiency and E-gov growth (β = 0.092). Support is provided for the prediction suggesting that Political<br />
Rights is positively related to E-gov growth in TECEE (β = 0.023). The theorized model did not provide<br />
evidence in support of the positive influences of Technological infrastructure and Rule of law on E-gov<br />
growth in TECEE.<br />
Table 3: The regression results for the research model<br />
5. Discussions and conclusion<br />
This study focuses on E-gov growth in TECEE. The literature on E-gov issues with perspectives from the<br />
TECEE is rare. This current research used relevant theoretical frameworks to investigate the influence of<br />
social, political, economic, and technological factors on E-gov growth in TECEE. The data analysis,<br />
facilitated by a panel data over a five-period for 16 countries categorized into two main groups, permitted<br />
greater insight. All the research’ variables accounted for 72% of the variation in the research model to<br />
indicate that conceptualization is of interest. The analysis showed that National wealth positively<br />
influences E-gov growth. This is not surprising as the deployment of E-gov initiatives require the<br />
availability of substantial financial capital (Singh et al., 2007; UN Public Administration Programme,<br />
2010). The data is suggesting that wealthier TECEE with higher financial resource levels might have<br />
allocated adequate financial resources to their E-gov schemes, which relatively poorer countries in the<br />
region cannot afford to make. The relevance of wealth for E-gov growth is consistent with results in Siau<br />
and Long (2006), Katchanovski and La Porte (2005), Norris (2001), Gascó (2005) and Kovačić (2005);<br />
however, it is unsupported by Azad et al. (2010) who found no association between wealth and E-gov<br />
diffusion.<br />
As predicted, the data confirmed that a country’s human capital resources strongly influence its ability or<br />
inability to benefit from innovations such as E-gov. Over the years, countries with higher human capital<br />
315
Princely Ifinedo<br />
development indexes (Leaders TECEE) tend to do better than counterparts (Followers TECEE) with<br />
respect to instituting higher levels of E-gov initiatives. Consistent with the new growth theory, countries<br />
with greater pools of knowledge are more likely to appreciate the ways in which E-gov can be used to<br />
serve their well being. Put differently, low levels of skills and knowledge may not augur well for E-gov<br />
growth. Educated and knowledgeable individuals easily adjust to the diffusion of new ideas as such<br />
enlightened people tend to have reduced opposition to social changes associated with adoption of<br />
innovation (Romer, 1994; Robinson & Crenshaw, 2002). The finding underscoring the importance of<br />
quality human capital resources in the diffusion of ICT-enabled initiatives supports results in prior studies<br />
(e.g. Kiiski & Pohjola, 2002). This finding lends credence to the viewpoint indicating that human capital<br />
resources is pertinent to E-gov growth across countries (Moon et al., 2005; Singh et al., 2007). The data<br />
analysis confirmed that E-gov growth in TECEE is strongly impacted where overall government efficiency<br />
is available. In this regard, higher levels of E-gov growth over the years in Leaders TECEE might have<br />
resulted from such governments realizing how E-gov could be used to enhance their overall efficiency.<br />
The fact that countries in the region with better government efficiencies were the ones with more<br />
favorable E-gov outcomes bears out the foregoing statement. This study’s finding in this aspect lends<br />
support to the result in Srivastava and Teo (2004b) indicating that there is an association between<br />
government efficiency and E-gov development across nations.<br />
The current research found that the Political rights dimension was significantly related to E-gov growth,<br />
thus supporting the view espoused by Kovačić (2005, p. 29) who asserted that “the government of a<br />
more democratic country appears to be more enthusiastic to pursue an eGovernment initiative than an<br />
authoritarian government” (See also Wong & Welch, 2004; Alexander, 2004). In the context of this<br />
study’s data, Leaders TECEE with relatively better Political rights for their citizens had higher E-gov<br />
development ratings than Followers TECEE lagging behind on this item. With respect to the unconfirmed<br />
hypotheses, the results were unexpected as they seem to highlight counter-intuitive reasoning.<br />
Regarding Technological infrastructure, the data could be indicating that ICT infrastructure across the<br />
region might have converged to the point where no marked differences exist between Leaders and<br />
Followers TECEE. Growth theories tend to point toward convergence in the long run (Mankiw et al.,<br />
1992). Similarly, Rule of law across TECEE was not found to have a significant association with the<br />
dependent variable. Prior studies have shown that political or democratic factors tend to have less<br />
influence on E-gov maturity or growth. For example, West (2007), Azad et al. (2010), and Moon et al.<br />
(2005) also reported weak association between selected political or democratic measures and E-gov<br />
diffusion and growth.<br />
5.1 Implications, limitations, and future research<br />
This research has implications for both research and policy making. To some degree, this study has<br />
answered the call for research to focus on IS/IT issues in Central and Eastern Europe. The scan of the<br />
extant literature shows that no previous E-gov study has examined the influence of relevant contextual<br />
factors on E-gov growth in TECEE. This study’s findings and conclusion add to the body of knowledge on<br />
E-gov studies with a perspective from emerging economies given that progress in such parts of the world<br />
have been reported to be slow in comparison to achievements in advanced countries. As this current<br />
study provides preliminary insight from Central and Eastern Europe, its findings could be compared with<br />
similar studies from other comparable regions of the world. In that regard, it would be interesting to know<br />
whether the same four (4) factors identified here as being relevant to E-gov growth in TECEE compare<br />
with insights from elsewhere. Theory development stands to benefit from such comparative analysis.<br />
Unlike previous studies that used case studies, literature reviews, and conceptual methodologies to<br />
discuss E-gov issues across the world, this current research utilized cross-country empirical data to<br />
enrich knowledge. Moreover, empirical studies readily lend themselves to validation. Further to this, the<br />
use of longitudinal or time-series data to discuss E-gov growth in TECEE is welcoming to the literature as<br />
it permits a rich understanding of issue under focus. Other IS researchers investigating similar issues<br />
could be enticed to use an approach similar to the one used here or build upon this study’s research<br />
framework.<br />
The attention of policy makers in the region is drawn to factors that could help them understand why<br />
some countries appear to be outperforming others with respect to E-gov growth. To that end, this present<br />
study is suggesting that enhancements to E-gov activities would benefit if more attention was paid to<br />
issues related to the availability of financial resources, government efficiency, political rights, and<br />
educational attainment in lagging TECEE. Additionally, the information provided herein could benefit<br />
administrators and policy makers that might have expended time and energies on a vast array of<br />
contextual factors in understanding factors influencing or hindering E-gov growth in TECEE and in<br />
316
Princely Ifinedo<br />
comparable regions. It is safe to suggest that E-gov policies, initiatives, and directives in Leaders TECEE<br />
could be used, to some degree, as benchmarks for efforts in Followers TECEE as attempts are made to<br />
narrow the gap between both groups. This research has its share of limitations. First, the study relied on<br />
secondary data sources; as such, it is difficult to ascertain with certainty the reliability and validity of items<br />
used in composing the various measures. Second, some of the items obtained were not consistent over<br />
years; this might have negatively impacted the data analysis. Third, in choosing the 8 Followers TECEE,<br />
the UN Public Administration Programme's (2010) E-gov scores were used to guide the selection. To that<br />
end, care was exercised in selecting countries with scores at all levels, i.e. above and below scores for<br />
the region’s average, as well as scores close to the average. Notwithstanding, selection bias cannot be<br />
ruled out. Other relevant factors such as cultural norms and values, political actors' actions, citizens’<br />
awareness were not included in this study; this might be limiting to insight.<br />
Future studies should endeavor to work with a more comprehensive framework to include national culture<br />
and other contextual factors not considered in this study. If possible, all Followers TECEE should be<br />
included in future analysis. Case studies should be considered to permit the emergence of rich qualitative<br />
data to compliment secondary data measures. This study was limited to a five-year observation period; it<br />
is advised that as more data become available, a much longer observation period should be considered<br />
to enhance insight.<br />
6. Appendix 1: The correlation matrix (N=80)<br />
**. Correlation is significant at the 0.01 level (2-tailed). *. Correlation is significant at the 0.05 level (2tailed).<br />
317
Princely Ifinedo<br />
Legend: Goveff = Government effeciency; Rule = Rule of law; Web = Web measures/online services<br />
index (dependent variable); Tech = Technological infrastructure; Human = Human development index;<br />
GDP = GDP per capita; PR = Political rights<br />
References<br />
Alexander, M. (2004). The Internet and Democratization: The Development of Russian Internet Policy.<br />
Demokratizatsiya, 12, 4, 607-627.<br />
Accenture (2001). eGovernment Leadership Rhetoric vs Reality - Closing the Gap. Retrieved May 2, 2009 from<br />
http://www.epractice.eu/files/media/media_846.pdf<br />
Azad, B., Faraj, S. & Goh J. F. (2010). What Shapes Global Diffusion of eGovernment: Comparing the Influence of<br />
National Governance Institutions. Journal of Global Information Management, 18, 2, 85-104.<br />
Ifinedo, P. & Davidrajuh, R. (2005). Digital Divide in Europe: Assessing and Comparing the E-readiness of a<br />
Developed and an Emerging Economy in the Nordic Region. Electronic Government: An International Journal,<br />
2, 2, 111-133.<br />
Dawkins, C. J. (2003). Regional Development Theory: Conceptual Foundations, Classic Works, and Recent<br />
Developments. Journal of Planning Literature, 18, 2, 131-172.<br />
EU Legislation (2010). Enlargement 2004 and 2007. Retrieved October 4, 2010 from<br />
http://europa.eu/legislation_summaries/enlargement/2004_and_2007_enlargement/index_en.htm<br />
EU Regional Policy (2009). Working towards a New Europe: The Role and Achievements of Europe's Regional<br />
Policy, 2004-2009. Retrieved October 4, 2010 from ASDFTUIOP<br />
Fountain, J. E. 2001. Building the Virtual State: Information Technology and Institutional Change. Washington, D.C.:<br />
The Brookings Institution.<br />
Freedom House (2010). Freedom in the World. Retrieved September 14, 2010 from<br />
http://www.freedomhouse.org/template.cfm?page=15<br />
Gascó, M. (2005). Exploring the EGovernment Gap in South America. Intl Journal of Public Administration, 28(7&8),<br />
683–701.<br />
Grönlund, Å. (2001). Electronic Government: Design, Applications, and Management. Hershey, PA: IDEA Group<br />
Publishing.<br />
InfoDev (Information for Development Programme) (2004). EGovernment handbook for developing countries.<br />
Retrieved May 6, 2006 from http://www.infodev.org<br />
IMF (2000). Transition Economies: An IMF Perspective on Progress and Prospects. Retrieved July 27, 2010 from<br />
http://www.imf.org/external/np/exr/ib/2000/110300.htm#I.<br />
Islam, R. (2008). Does more Transparency go along with Better Governance? Economics and Politics, 18, 2, 121-<br />
167.<br />
Katchanovski, I. & La Porte, T. (2005). Cyberdemocracy or Potemkin E-Villages? Electronic Governments in OECD<br />
and Post-Communist Countries. International Journal of Public Administration, 28, 7 & 8, 665-681.<br />
Kaufmann, D., Kraay, A. & Mastruzzi, M. (2009).Governance Matters VIII. Aggregate and Individual Governance<br />
Indicators1996–2008. Policy Research Working Paper (The World Bank). Retrieved Sept 30, 2010 from<br />
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1424591<br />
Kiiski, S. & Pohjola, M. (2002). Cross Country Diffusion of the Internet. Information Economics and Policy, 14, 2, 297-<br />
310.<br />
Kovačić, Z. (2005). A Brave New eWorld? An Exploratory Analysis of Worldwide eGovernment Readiness, Level of<br />
Democracy, Corruption and Globalization. International Journal of Electronic Government Research, 1, 3, 15-<br />
32.<br />
Kraemer, K. & Dedrick, J. (1997). Computing and Public Organizations. Journal of Public Administration Research<br />
and Theory, 7, 89–112.<br />
Layne, K. & Lee, J. (2001). Developing Fully Functional eGovernment: A Four Stage Model. Government Information<br />
Quarterly, 18, 2, 122-136.<br />
Levada, Y. (2004). What The Polls Tell Us? Journal of Democracy, 15, 3, 43-52.<br />
Martin, R. & Feldman, E. (1998). Access to Information in Developing Countries. Transparency International Working<br />
Paper. Retrieved March 26, 2010 from http://www.transparency.org/publications/<br />
Mankiw, N. G., Romer, D. & Weil, D.N. (1992). A Contribution to the Empirics of Economic Growth. Quarterly Journal<br />
of Economics, 107, 2, 407–437.<br />
Moon, J. M. (2002). The Evolution of EGovernment among Municipalities: Rhetoric or Reality? Public Administration<br />
Review, 62(4), 424-433.<br />
Moon, M. J., Welch, E. W. & Wong, W. (2005). What Drives Global E-governance? An Exploratory Study at a Macro<br />
level. In Proceedings of the 38 th . Hawaii International <strong>Conference</strong> on System Sciences.<br />
Norris, P. (2001). Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide. New York:<br />
Cambridge University Press.<br />
Oxley, J. E. and Yeung, B. (2001). E-commerce Readiness: Institutional Environment and International<br />
Competitiveness. Journal of International Business Studies, 32, 4, 705-723.<br />
Robison, K. K. & Crenshaw, E.M. (2002). Post-industrial Transformations and Cyber-space: A Cross-national<br />
Analysis of Internet Development. Social Science Research , 31, 334–363.<br />
Romer, R. M. (1994). The Origins of Endogenous Growth. Journal of Economic Perspectives, 8, 1, 3–22.<br />
Roztocki, N. & Weistroffer, H. R. (2008). Information Technology in Transition Economies, Journal of Global<br />
Information Technology Management, 11, 4, 2-9.<br />
318
Princely Ifinedo<br />
Samoilenko, S. & Osei-Bryson, K.M. (2008). Determining Strategies for Telecoms to Improve Efficiency in the<br />
Production of Revenues: An Empirical Investigation in the Context of Transition Economies. Journal of Global<br />
Information Technology Management, 11, 7, 56-75.<br />
Shih, C-F., Dedrick, J. & Kraemer, K. L. (2005). Rule of Law and the International Diffusion of E-commerce.<br />
Communications of the ACM, 48, 11, 57-62.<br />
Shirazi, F., Gholami, R. & Higon, D. A. (2009). The Impact of Information and Communication Technology (ICT),<br />
Education and Regulation on Economic Freedom in Islamic Middle Eastern Countries. Information &<br />
Management, 46, 8, 426–433.<br />
Siau, K. & Long, Y. (2006). Using Social Development Lenses to Understand EGovernment Development. Journal of<br />
Global Information Management, 14, 1, 47-62.<br />
Singh, H., Das, A. & Joseph, D. (2007). Country-Level Determinants of EGovernment Maturity. Communications of<br />
the Association for Information Systems, 40, 632-648.<br />
Srivastava, S. C., & Teo, T. S. H. (2004a). A Framework for Electronic Government: Evolution, Enablers and<br />
Resource Drainers. In Proceedings the 8 th . Pacific Asia <strong>Conference</strong> on Information Systems (PACIS2004),<br />
Shanghai, China.<br />
Srivastava, S. C., & Teo, T. S. H. (2004b). EGovernment Payoffs: Evidence from Cross-Country Data. Journal of<br />
Global Information Management, 15, 4, 20-40.<br />
The Heritage Foundation (2010). Index of Economic Freedom. Retrieved October 2, 2010 from<br />
http://www.heritage.org/<br />
Transparency International (2010). Corruption Perceptions index (CPI). Retrieved October 15, 2010 from<br />
http://www.transparency.org/policy_research/surveys_indices/cpi/2009.<br />
UN Public Administration Programme (2010). United Nations EGovernment Global Reports. Retrieved August 12,<br />
2010 from http://www2.unpan.org/egovkb/global_reports/10report.htm.<br />
WEF (World Economic Forum) (2010). The Global Information Technology Report 2009-2010. Retrieved October 6,<br />
2010 from<br />
http://www.weforum.org/en/initiatives/gcp/Global%20Information%20Technology%20Report/index.htm.<br />
West, D. M. (2004). EGovernment and The Transformation of Service Delivery and Citizen Attitudes. Public<br />
Administration Review, 64, 1, 15-27.<br />
West, D. (2007). Global Perspectives on EGovernment. Retrieved September 2, 2010 from<br />
http://www.umass.edu/digitalcenter/events/pdfs/West_GlobalPerspectives.pdf<br />
Wong, W. & Welch, E. (2004). Does EGovernment Promote Accountability? A Comparative Analysis of Website<br />
Openness and Government Accountability. Governance: An International Journal of Policy, Administration, and<br />
Institutions, 17, 2, 275-297.<br />
World Bank (2010). Countries & Regions. Retrieved October 3, 2010 from http://web.worldbank.org/.<br />
319
Management of Latvian Government Communications<br />
During an Economic Crisis: The Role of Information<br />
Strategies in the Public Sector<br />
Aleksis Jarockis<br />
University of Latvia, Latvia<br />
aleksis.jarockis@gmail.com<br />
Abstract: The focus on this paper is on an analysis of the management of Latvian government and public sector<br />
communications, offering a more detailed review of the importance of communications policies and practices in the<br />
process of overcoming an economic crisis. Effective crisis communications, indeed, are one of the most important<br />
components in overcoming a crisis. During a crisis, an open and empathetic style of communication – one which<br />
engenders public trust – is most effective when officials try to galvanise the population in terms of doing something<br />
positive or refraining from doing something that is harmful. Although trust is imperative in a crisis, public suspicions<br />
about scientific and government experts have increased for a variety of reasons. These include the increased<br />
availability of sources of conflicting information, a reduction in the use of scientific reasoning in decision making, as<br />
well as political infighting. Trust and credibility, when demonstrated through empathy and caring, competence and<br />
expertise, honesty and openness, and dedication and commitment – these are truly essential elements of persuasive<br />
communication.<br />
Keywords: crisis communication, economic crisis, government communication, public sector, Latvia<br />
1. Introduction<br />
There were very rapid changes in Latvia's economic situation in mid-2008. These led to changes in the<br />
political and media agenda. Political parties and the government were forced to change the logic of their<br />
agenda, moving from symbolic elements to fundamentally important processes such as budget<br />
consolidation, changes in laws, etc.<br />
Rapid economic growth in Latvia up until 2008 led to improved standards of living, but the growth was<br />
mostly based on private consumption, as well as on investments in real estate and other sectors of nonexportable<br />
goods and services.<br />
Late in 2008, the Latvian Finance Ministry announced that the 2008 national budget would have to be<br />
amended so as to ensure a subsidy. At the same time, however, the global economic crisis and domestic<br />
financial difficulties in Latvia led to a situation in which the government was forced to take over one of the<br />
privately owned systemic banks of the country – the Parex Bank, so as to save it from bankruptcy. In<br />
December, the government announced that it was seeking loans from the International Monetary Fund,<br />
the <strong>European</strong> Commission, and the World Bank for a total of EUR 7.5 billion.<br />
In parallel to the economic crisis, there was increasing distrust among the public at large in terms of what<br />
Parliament (the Saeima) and the government were doing. In July 2008, only 18% of respondents in one<br />
survey said that the country was moving in the right direction. In September 2009, only 5% said so.<br />
Eurobarometer results in 2008 and 2009 showed that there was a great level of distrust in Latvia in terms<br />
of the government and the national parliament. It is important to note that this level of distrust was higher<br />
in Latvia than anywhere else among the <strong>European</strong> Union’s 27 member states. The vast majority of<br />
respondents in Latvia (92%) expressed full distrust in the Saeima, and only 6% said that they trusted it<br />
(EC, Eurobarometer 72).<br />
It was during the 9 th session of the Saeima that public trust in Parliament’s work diminished quite<br />
convincingly. Immediately after the 2006 election of the 9 th Saeima, 33% of respondents in a survey<br />
expressed trust in the legislature, while, as noted, four years later the same was said only by 6% of<br />
respondents (Diena.lv, 26 Sept 2009).<br />
The overall situation in Latvia is that people have had to deal with very rapid changes in the economy, in<br />
politics, and in everyday life. The fact is that over the course of two years, the government took a number<br />
of decisions which had a very direct effect on every member of society. This meant that citizens were<br />
forced to adapt very quickly to entirely new circumstances. This also applied to the agenda and<br />
operations of the mass media, because the media focus a great deal of attention to crises while providing<br />
information to the public and defending public views about these matters.<br />
320
Aleksis Jarockis<br />
It is of key importance for the media to shape their agendas independently, correlating these with the<br />
many different agendas which exist in society, as opposed to reframing frames which emerge from the<br />
context of the political agenda.<br />
2. The importance of communications under crisis conditions<br />
Even though there has been a vast amount of research in the area of communications, management<br />
crisis communications are an area in which there has been comparatively little scholarly examination.<br />
Crises are unique events which shake up the ordinary activities of countries or organisations. They<br />
involve an element of surprise, because crises tend to be unexpected. In some cases, a crisis can be<br />
forecast, but very seldom is it the case that the prognosis can be so precise that information about the<br />
threat of a crisis makes it possible to avoid it completely. At the foundation of crises are the threats which<br />
they create. These are dependent on the intensity, type and scope of the relevant crisis.<br />
Crises create serious threats against fundamental structures and values, as well as norms in the social<br />
system which are subject to the effects of time. Because this creates pressures and an inability to<br />
forecast events, prerequisites emerge for the taking of critically important decisions. Crises, in other<br />
words, as seen as sets of events which lead to the taking of urgent and, frequently, unpopular decisions.<br />
From the perspective of decision making, there is no other alternative but for (formal or informal) leaders<br />
to make sure that the relevant system (organisation, government) returns to normalcy (Boin and Overdijk,<br />
2004: 26).<br />
For that reason, the concept of a crisis speaks to a situation in which decisions must be taken quickly,<br />
during a limited time frame, and with a level of information that is either minimal or, quite oppositely,<br />
excessive. There must be assumptions in this process for which there is not enough time to examine or<br />
analyse them with any detail. The lack of time will also have an effect on communications and on the<br />
quality of what the relevant organisation (government) does in response to the crisis.<br />
The concept of a crisis is brought to bear in various spheres of psychological, social, economic and<br />
political complications in the lives of individuals and in societies at large. The concept of a crisis was<br />
studied in much depth in the 1930s as a part of cultural theory. During crises, the need for and<br />
effectiveness of communications will be related to psychological processes that are faced by individuals<br />
during a time of crisis. Crises create a lack of clarity, and that breaks down the individual’s ideas about<br />
the existing period in time. The individual must face changes in realities in terms of values, as well as the<br />
fears which the threats create in relation to the individual’s expectations: “When an individual finds that<br />
expectations are not satisfied or traumatic events occur, it is increasingly complicated to implement<br />
effective communications” (Ulmer, 2007: 21).<br />
A financial crisis is the result of inadequate policies related to monetary policy and management of<br />
unclear financial resources. It has to do with the flow of money and means that the distribution and<br />
availability of money, as well as other issues related to finances, can no longer function effectively, thus<br />
endangering the relevant financial system. If there are unsuccessful attempts to address the problems,<br />
the financial crisis can turn into a sectoral (economic) crisis (Eichengreen and Portes, 1995: 12).<br />
An economic crisis can lead to a political crisis – one in which the system of governance becomes<br />
ineffective in addressing issues related to the national economy which is, after all, its responsibility. There<br />
can also be a social crisis – one in which a government can no longer control the situation under which<br />
the economic crisis has eliminated the ability of the relevant society to function adequately whilst at the<br />
same time, endangering education, medicine, and the fundamental rights of individuals (Eichengreen and<br />
Portes, 1995: 15).<br />
When the origins of an economic crisis are at a foreseeable distance from the specific system that is to<br />
be studied, the origins of the crisis can be explained via attribution theory, which says that people make<br />
judgments about the causes of events. The theory is usually applied to unexpected events with<br />
unexpected consequences. “Attribution is the perception of causality or of the perceived causes of a<br />
specific event. Individuals attribute a concrete cause to an event in which they themselves have taken<br />
part, as well as to events in which they have simply been observers. The attribution of the cause of a<br />
specific aspect of the existing situation describes the attitudes of individuals (i.e., whether the individuals<br />
who were involved in a specific event in the past could have been able to control the causes)” (Coombs,<br />
2009: 265).<br />
321
Aleksis Jarockis<br />
The maintenance of the trustworthiness and legitimacy of a democratic system in the eyes of the public<br />
will be the main prerequisite for a government’s ability to handle a crisis successfully. Crisis managers<br />
begin to address the situation at different levels of trust which can increase or decrease during the crisis<br />
itself. That is why an exchange of information between crisis managers and their target audiences is very<br />
important. Channels for information exchange and communications often are subject to great risk during<br />
a crisis period. Evaluations of the existing situation and of strategies that are adequate in response to the<br />
situation can have a deleterious effect in terms of changing the flow of information. A mandatory<br />
prerequisite for responses to a crisis will be an adequate exchange of information among the major<br />
actors in the situation – decision makers, advisors, the mass media, and the public at large. From a<br />
strategic perspective, that will depend on the main actors, their areas of responsibility, and their identified<br />
roles (Stern and Hansen, 2001: 233).<br />
One of the most important components in crisis management is the management and strategy of crisis<br />
communications. This is an area of corporate communications in the field of public relations, and the job<br />
is to establish contacts with groups that are affected by the crisis and with the public at large. The goals<br />
in this are:<br />
To overcome the crisis as effectively as possible and with the involvement of the affected groups;<br />
To minimise the harm which the crisis causes on the reputation and future activities of the<br />
organisation (government);<br />
To ensure, therefore, public opinion in the wake of the crisis which is as positive as possible for the<br />
organisation (government).<br />
In other words, one goal in crisis management is “damage control,” which is aimed at protecting the<br />
organisation (government) from drastically negative changes in terms of the components of the<br />
environment in which it exists. The fact is, however, that if all of the relevant activities are focused<br />
exclusively on damage control, that may not be enough to ensure that the organisation (government) can<br />
preserve positive relations in important areas (Coombs, 2007: 124).<br />
Theoretical approaches toward crisis communications are analysed so as to explain what happens during<br />
crises, what decisions should be taken in response, what should be done in response, and how various<br />
aspects of a crisis are interrelated. Marra (1992), for instance, proposes that organisations (governments)<br />
use relevant theories to draft a public relations model for crisis events that would allow crisis managers to<br />
identify the changing variables which are appropriate for a crisis communications plan, as well as those<br />
which would cause failures if they are not included in such a plan. The scholar argues that such<br />
knowledge would allow public relations people to know in advance of a crisis what would be effective and<br />
what would not be effective.<br />
Crises are also a very decisive test for the sustainability of political governments in countries. They<br />
challenge the governing elite or the upper reaches of the relevant country’s Civil Service in terms of<br />
overcoming acute threats against the legitimacy of the political system. Accordingly, crises are often of<br />
critical importance in terms of the reputation of the relevant decision makers (heads of government,<br />
government ministers) in terms of their future career or, even, their political interests. Decision makers<br />
are concerned about the government’s reputation and existence, and so the things that they do are often<br />
dependent on their ability to overcome the crisis. In the government sector, a failure to deal with a crisis<br />
typically leads to a reassessment of power relations, and that endangers the future of the power elite.<br />
Furthermore, the emergence of a crisis can cause doubts about the quality of governance, because<br />
crises raise questions about the effectiveness or lack thereof in terms of how government institutions and<br />
bureaucrats have tried to prevent the things that are happening (Horsley and Baker, 2002: 413-415).<br />
For these reasons, political considerations vis-a-vis the management of a crisis and the relevant<br />
communications can take priority over technical considerations or the advice of professionals. Best<br />
practice in the taking of decisions which are linked to objective rationality and which relate to decision<br />
makers who have as much information and time as possible and who are completely convinced that they<br />
are doing the right thing – such best practice is not possible in a crisis situation. Indeed, crises are the<br />
direct opposite of objective rationality, because they typically involve threats, a lack of clarity, hurriedness<br />
and, often enough, surprises.<br />
Horsley and Baker have proposed a synthesis model for crisis communications in the public sector. They<br />
argue that crisis communications relate to the internal and external environment of the relevant<br />
organisation. For that reason, crisis communications plans are based on an analysis of the origins of<br />
322
Aleksis Jarockis<br />
crises. If the identified goals are to be achieved and the activities of the process are to be successful,<br />
there must be a proactive approach to determining the public agenda. When it comes to overcoming a<br />
crisis, the actors which seek to ensure strategic communication of their messages will use the media in<br />
pursuit of their own political goals. In order to achieve those goals and to enhance their popularity,<br />
political actors – governments, political parties, parliamentary factions, interest groups, and social<br />
movements – will fight for favourable attention from the mass media. Governments are privileged in this<br />
regard, because they are the leading decision makers with a role that has been legitimised during the<br />
most recent election. The government’s advantages in public communications are also based on the<br />
human and financial resources that are available to it.<br />
The mass media have a very important role during a crisis, because they provide information to the public<br />
and seek to defend it. Thus the media warn and inform the public about what is happening, focusing<br />
public attention on processes that could endanger individual groups or the public at large. When<br />
informing the public about a crisis and its development, the media also encounter a complete lack of<br />
information and many different questions.<br />
The things which the mass media do in terms of crisis communications processes will have both positive<br />
and negative consequences. The media need to inform the public quickly about that which is happening<br />
in the relevant organisation or country. This allows people to know that an emergency situation has<br />
emerged. If the information, however, is incomplete, the work of the media can have negative effects.<br />
When the media disseminate negative information, people may feel more threatened than the actual<br />
situation would otherwise ensure. This can create public panic and provoke inadequate reactions to what<br />
is happening. In those cases, in turn, where crisis managers avoid the dissemination of more extensive<br />
public information about what’s happening, the effects of media operations are different – the media<br />
focus public attention on that which is happening, also serving as “watchdogs” on behalf of the public<br />
(Horsley and Baker, 2002: 26).<br />
3. The Latvian government’s communications strategies within the public<br />
sector: A case study<br />
An important prerequisite for the development of any system of national governance is the ability of the<br />
government and the governing system to work effectively with society. The planning, co-ordination and<br />
implementation of communications and public participation are inviolable components in policy planning.<br />
It is the duty of governing systems, therefore, to listen to the views of the public and of the nongovernmental<br />
sector, also providing timely public information about policy planning documents, legal acts<br />
and services. Dialogue with the public must be ongoing, open, understandable and trustworthy.<br />
Until April 14, 2010, the Latvian government’s communications processes were defined in a document<br />
that was called “Basic Aspects of the Government’s Communications Policies, 2008-2013.” The<br />
document states that government communications are based on administrative or national governance<br />
communications (CMofLV, 2008: 4). Communications, in turn, are defined as an inviolable component of<br />
government policy planning, dialogue with society, efforts to promote public participation, and<br />
implementation of the culture of client services at all levels of governance.<br />
The aforementioned document on policy positions for 2008-2013 has been repealed. In April 2010, the<br />
Cabinet of Ministers declared that it, along with several other documents, were out of date, instructing<br />
ministries to look at ways of optimising the document and drafting a new one (Latvijas Vēstnesis, 2010:<br />
61).<br />
The government’s strategic policy planning document, moreover, states that the government must ensure<br />
public support and participation in efforts to overcome the crisis. This is to be done by working together<br />
with the government’s social partners and by providing public information about the decisions that are<br />
taken (CMofLV, 2010).<br />
In an effort to prevent the country’s insolvency, the government had to draft and approve decisions<br />
beginning in 2008 which had a very serious effect on the public. Because of a lack of time, there was<br />
insufficient public involvement and information in this regard. Decisions about the availability of health<br />
care, education, social supports and pensions, about changes in taxes and employment opportunities,<br />
etc., affected the everyday lives of all of Latvia’s residents, but the system of public governance proved<br />
unable to offer clear and unequivocal information about the government’s decisions and their effects.<br />
323
Aleksis Jarockis<br />
In order to carry out a more wholesome analysis of public administration (government) communication<br />
management in economic crisis conditions, I propose an analysis of announcements of government<br />
leaders (from late 2008 till late 2010). Rapid changes in the economic and financial situation in the state<br />
forced the government and parliament to change communication messages ensuring overcoming<br />
economic difficulties and their communication.<br />
From a qualitative analysis of government’s official announcements (press releases) during the said<br />
period it can be concluded that in 68% of cases the following frames of basic factors which caused the<br />
economic crisis and changes in the economy have been mentioned: complicated global development,<br />
imbalances on global financial markets, global economic processes, global banking crisis, global financial<br />
crisis, consequences of the global economic crisis.<br />
The above mentioned frames show that responsible officials shift responsibility for the existing situation to<br />
others rather that recognize their own faults thus causing uncertainty. All these interacting and nonlinearly<br />
related factor frames show lack of political responsibility for recognizing unperformed tasks. The<br />
frame of run from political responsibility was given in official announcements which can be explained as a<br />
contextual frame of the economic crisis in the state.<br />
Having analysed communication messages of government leaders, framing economic crisis<br />
management, it can be concluded that they are linked with the decisions made by the government.<br />
Having summarized the frames of adopted decisions, it can be concluded that politicians and Latvian<br />
government did not have a decision-making strategy according to which actions had to be made in order<br />
to avoid changes in the economy in general. Politicians fumbled about and reacted with their decisions to<br />
the consequences of the irritant, rather than tried to avoid escalation of the changes. Thus the<br />
government was forced to react often to the media agenda subordinating its own agenda.<br />
Unfortunately frames of government decisions did not respond to the changes caused by the crisis in the<br />
public administration in order to transfer from an optimal “rest time” model to a deliberative model for the<br />
crisis period. Actions or even inactivity of the government were oriented only towards minimal or<br />
secondary changes which in order to maintain normal administration had to be done irrespective of how<br />
“rich time” came.<br />
Frames of government decisions were very general which cause mistrust in the society which was also<br />
greatly intensified by the media by framing government’s decisions. Media frames were oriented towards<br />
sensations thus maintaining tension in the society. The media tried to avoid evaluation of the wording,<br />
however it was indirectly achieved by the frames imposed by experts focusing on more detailed outline.<br />
The main shortcoming of government leaders in framing their decisions was the lack of explanations of<br />
actual facts. Frames of government changes were targeted towards a very narrow audience – often it<br />
was the public administration itself and the media. The public administration paid its attention to the facts<br />
that influenced most directly changes in the public administration and its existence, however they lacked<br />
orientation towards all taxpayers which were affected most directly by the economic crisis and changes.<br />
Frames focused on increasing self-sufficiency syndrome, because mainly taxpayers were not to be<br />
blamed for ineffectiveness of the bureaucratic public administration and it had to be reduced.<br />
Absence of detailed change frames or their lack does not provide the society with a wholesome view on<br />
the economic crisis, because the public communication lacks an important element to explain changes<br />
objectively or in an understandable way. Without such framing the view on interconnections in the<br />
economy is completely destroyed in the public space.<br />
Active and regular discussions on the crisis-related topics in the public space started in the second half of<br />
June 2008 and were actively maintained till the end of 2010. The crisis topics were also included in the<br />
media agenda. Economic crisis frames of the government have been hypertrophied which causes worries<br />
and feeling of danger in the society thus opening a new discourse of situation evaluation which<br />
dramatically overwhelms the rational discourse.<br />
It is also important in this regard that in his annual report to the Saeima about the achievements and<br />
plans of the Cabinet of Ministers, Prime Minister stated that “dialogue with the public and social partners,<br />
information about the country’s economic situation and relevant government decisions, as well as<br />
324
Aleksis Jarockis<br />
explanations about planned and approved decisions are one of the most important prerequisites for<br />
overcoming the crisis.” (CMofLV, 2010).<br />
Data about the way in which public government communications policies were co-ordinated in 2009 show<br />
that only five of the country’s government ministries (five of them) had sectoral communications<br />
strategies, while 72% (12) did not. At the same time, however, ten of the ministries had plans to draft and<br />
confirm communications strategies in accordance with the aforementioned policy document for 2008-<br />
2013.<br />
The most dramatic situation existed in other institutions of public governance, not ministries. Only 33% of<br />
them had communications strategies, while 67% did not. Most of the public governance institutions (34)<br />
had planned to prepare a communications strategy in 2010. Another 14 had no plans in this regard at all,<br />
while a few others planned to prepare their strategies only after the relevant government ministry had<br />
drafted and approved a communications strategy. At this writing, more up-to-date information about the<br />
implementation of communications policies in public governance in 2010 is not available.<br />
Because of reforms in the system of national governance and the cutting of costs in this regard, the<br />
resources that are available for the communications processes of institutions of national governance<br />
have shrunk substantially. Several sectors have centralised their communications functions at the<br />
ministerial level, as opposed to individual functions for the various institutions that are subordinated to<br />
them. This means that the communications units of government ministries ensure communications about<br />
entire sectors. Several ministries have communications units which also ensure the functions of the<br />
relevant ministry’s press secretary. A survey conducted by the National Chancery found that the number<br />
of people involved in ministerial communications declined by one-third. As of April 14, 2010, ministries<br />
employed 67 communications specialists, as opposed to 96 specialists who did the work in 2007.<br />
Another key aspect in analysing the importance of communications in the public sector is public trust in<br />
the government and Parliament. Several scholars have looked at the foundations of public trust. The<br />
Swedish researcher Ylva Noren, for instance, has concluded that trust in a government is based on<br />
public satisfaction about the relevant country’s financial situation and legal system, as well as open and<br />
thorough communications between the government (parliament) and the country’s residents (2000: 11).<br />
Communications are of decisive importance in overcoming a crisis and increasing political trust. Trust, in<br />
turn, is closely related to the establishment of different kinds of links among a country’s residents. Trust is<br />
needed if there are to be positive linkages between the needs of residents on the one hand and the<br />
responsiveness of the political elite on the other.<br />
Studies in Latvia show that when it comes to budget cuts during the economic crisis, most people in<br />
Latvia support limited government. This desire is not based on liberal beliefs. Instead, the issue has to do<br />
with universal distrust in government institutions. As soon as the question is about government financing<br />
in specific areas such as the economy, health care, education, etc., approximately the same majority<br />
says that there is a need for even greater spending.<br />
The level of responsibility in national governance (or the lack thereof) can be clearly seen in the area of<br />
public trust in government. Ever since the restoration of independent statehood, it has to be said, trust in<br />
the system of governance in Latvia has been low, and at this writing, it has sunk to a critical level.<br />
Statistics show that people in Latvia distrust the governing system more than people in any other country<br />
of the <strong>European</strong> Union – 88% distrust the Cabinet of Ministers, 92% distrust the Saeima, and fully 95%<br />
distrust the country’s political parties (EC, Eurobarometer, 2009).<br />
These data confirm public opinion about the work of the Cabinet of Ministers, the Civil Service and the<br />
country’s local government in terms of overcoming the economic crisis, among other issues. As far as<br />
people are concerned, this work is not in line with public expectations or with public understanding about<br />
the responsible handling of the relevant duties. The trust which people have or do not have in the<br />
executive branch of the government also has to do with the attitudes which politicians have demonstrated<br />
vis-a-vis the system of public governance. Politicians blame the system for failures and the inability to<br />
implement specific policies, and this enhances distrust in the system of governance, as well as in<br />
politicians (Rozenvalds and Ijabs, 2009: 81). As is seen in this paper, the government has not even<br />
prepared strategic documents related to communications policies.<br />
325
4. Conclusions<br />
Aleksis Jarockis<br />
In summarising the importance of communications for systems of national governance, we can conclude<br />
that communications are among the most important elements of the overall system. A prerequisite for the<br />
successful development of a governance system will always be effective co-operation between the<br />
government and the system of governance with the public at large. The planning, co-ordination and<br />
implementation of communications and public participation are an inviolable component of policy<br />
planning in any country. For that reason, it is the duty of the system of national governance to listen to<br />
what members of the public and the interest groups which represent them have to say. The system must<br />
also ensure timely public information about those issues that are current, thus promoting the<br />
establishment of a constant, open, understandable and trustworthy dialogue.<br />
The data of this survey show that the system of governance in Latvia understands the importance of<br />
communications, but ever since the beginning of the economic crisis, the government has not done<br />
anything to prepare a crisis communications strategy or plan. Even more, the government has no<br />
communications policy documents to regulate this sphere. Certain institutions of public governance, too,<br />
have no crisis communications strategies. During the economic crisis, the communications units of<br />
governance institutions have been shrunk, and the system of national governance has rejected the<br />
principle of long-term strategic planning in favour of a situative, ad hoc approach to communications. In<br />
other words, the economic crisis has laid bare the problems which the public sector has in terms of longterm<br />
policy planning.<br />
Governmental communications and the media have constructed incomplete frames related to the<br />
economic situation. They tend to be contradictory, and this makes public agenda-setting more difficult.<br />
The frames related to government decisions and activities have been unclear and generalised in the<br />
public arena, even though people expect clear (albeit perhaps negative) prognoses and concrete<br />
information about what the government will do if any of the possible crisis scenarios come to pass. This<br />
problem has been criticised harshly in the media, but the communications between the government and<br />
state administration and the people of Latvia have not improved. Besides, the media base their<br />
characterisations and analysis of the situation largely on the governmental resources which they<br />
themselves have criticised, reframing the proposed frames and often hypertrophying them, too. Thus the<br />
people of Latvia increasingly feel concerned and scared about the future.<br />
Analysis of the frames of the government during the 2008 – 2010 financial and economic crisis shows<br />
several risks and problems in terms of setting agendas. The media focus on governmental resources<br />
and sources of information do not make it possible to create an agenda that is in line with the public<br />
agenda, even though the frames do simulate reflection of the public opinion.<br />
The absence of a crisis communications policy and the situative approach which exists in this regard<br />
could, in fact, lead to another crisis in Latvia – even lower trust in the government, Parliament and the<br />
entire system of public governance. This will certainly make it more difficult to overcome the economic<br />
crisis.<br />
Here we are looking at an unusual and very dangerous tendency – enormous distrust in the executive<br />
branch of government and the increasingly common view that the system of public governance is<br />
ineffective and incompetent. This dangerous tendency can seriously endanger the implementation of<br />
policies irrespective of their level of quality and the things which are done in regard to the policies. If<br />
people refuse to accept the policies and the relevant obligations, that will mean the need for greater<br />
controls on the part of the system of public governance. This creates greater distrust and an out-ofcontrol<br />
spiral of greater and ever greater controls in the system, and the system of public governance and<br />
the politicians who are a part of it must take the first step in breaking this system down.<br />
The low level of trust indirectly points to the belief among residents that they cannot trust politicians. The<br />
things which have happened in Latvia’s political system, true, have done very little to encourage<br />
government officials and bureaucrats to act in a responsible way.<br />
Because trust in government institutions in Latvia is at a very low level at this time, more open debates<br />
about the country’s further developmental goals might help in enhancing public understanding and<br />
326
Aleksis Jarockis<br />
support in this process. The most important first step in this regard is to set priorities and to link them to<br />
documents of a strategic nature.<br />
References<br />
‘9 th Saeima Has Lowest Public Trust’, Diena.lv (26 Sept 2009), [Online], Available: http://diena.lv/lat/politics/hot/defacto-9-saeimai-vismazaka-sabiedribas-uzticiba<br />
[24 Nov 2010].<br />
Boin, A. and Overdijk, W. (2004) Crisis simulations: exploring tomorrow’s vulnerabilities and threats, [Online],<br />
Available: http://sag.sagepub.com/cgi/reprint/35/3/378 [20 Dec 2010].<br />
Cabinet of Ministers of the Republic of Latvia, (2010) Instruction No. 209, ‘On policy planning documents and Cabinet<br />
of Ministers instructions that are out-of-date’, Latvijas Vēstnesis, 16 April, p. 61.<br />
Cabinet of Ministers of the Republic of Latvia (CMofLV), (2010) Prime Minister Valdis Dombrovskis’ annual report to<br />
the Saeima on the achievements and plans of the Cabinet of Ministers, [Online], Available:<br />
http://titania.saeima.lv/LIVS/SaeimaLIVS_LmP.nsf/0/959e61e9f7420735c22576d900482c8a/$FILE/MP%20atsk<br />
aite%20Saeimai%202009-2010.doc, 1 March, [27 Dec 2010].<br />
Coombs, W. (2007) Ongoing crisis communication: Planning, managing, and responding, London: Sage<br />
Publications.<br />
Coombs, W. (2009) Impact of past crises on current crises: Communication insights from situational crisis<br />
communications theory, [Online], Available: http://job.sagepub.com/cgi/reprint/41/3/265 [24 Nov 2010].<br />
Eichengreen, B. and Portes, R. (1995) Crisis? What crisis? Orderly workouts for sovereign debtors, London: Centre<br />
for Economic Policy Research.<br />
<strong>European</strong> Commission (EC), (2009) Eurobarometer 72, [Online], Available:<br />
http://ec.europa.eu/public_opinion/archives/eb/eb72/eb72_lv_lv_nat.pdf [24 Nov 2010].<br />
Horsley, J. and Baker, R. (2002) ‘Toward a synthesis model for crisis communication in the public sector’, Journal of<br />
Business and Technical Communication, vol. 16, no. 4, August, pp. 413-415.<br />
Noren, Y. (2000) Explaining variations in political trust in Sweden: Lessons learned through theories and data,<br />
Denmark: University of Copenhagen.<br />
Rozenvalds, J. and Ijabs, I. (eds.) (2009) Latvia. Human development report, 2008/2009: Accountability and<br />
responsibility. Rīga: Institute for Advanced and Political Research.<br />
Stern, E. and Hansen, D. (2001) Crisis management in Estonia: Case studies and comparative perspectives,<br />
Stockholm: Försvarshögskolan.<br />
Ulmer, R. (2007) Effective communication: Moving from crisis to opportunity, London: Sage Publications.<br />
327
Business/IT Alignment as Enabler for eGovernment in Syria<br />
Raed Kanaan and Kamal Atieh<br />
Arab Academy for Banking and Financial Sciences, Jordan<br />
raedkk@yahoo.com<br />
K-atieh@scs-net.org<br />
Abstract: Critical success/failure factors (CSFs) to eGovernment implementation and the reasons behind such<br />
failure or success, have been the focus of research in many developed countries and some developing countries.<br />
The Syrian Arab Republic has not, until now, been the context for such studies. The purpose of this paper is to<br />
investigate the effect of Business/IT (BIT) alignment on the success of eGovernment implementation in developing<br />
countries and the pertinent factors that affecting this alignment. This paper, therefore, studies the multiple factors on<br />
BIT alignment such as people process and organizational factors. The authors will discuss all possible factors that<br />
affect the BIT alignment in developing countries in general and in Syria in particular. Knowing that eGovernment<br />
project needs all government existed resources (IT, financial and human) in order to be able to take benefits from all<br />
resources to improve an organization work, this infer the existence of BIT alignment. However, in order to build and<br />
implement the best eGovernment strategy the gap between business and IT teams seems to be one of the most<br />
important factors in the eGovernment implementation. Therefore, bridging this gap may help in avoiding the failure of<br />
eGovernment project in developing countries in general and in Syria in particular. This paper draws upon qualitative<br />
research that was undertaken by the authors to investigate the effect of technical and non-technical alignment on<br />
eGovernment success in Syria and all factors affecting this alignment. The data, primarily collected via 20 semistructured<br />
interviews with representatives of major Syrian eGovernment implementation stakeholder groups, was<br />
analyzed. This paper enunciates the significance and the need of BIT alignment as the most important factor to<br />
eGovernment success, especially in the first phase in eGovernment project.<br />
Keywords: information technology, eGovernment, critical success/failure factors, business and IT alignment<br />
1. Research motivation and objectives<br />
Information and communication technology (ICT) revolution increases day by day. This revolution offers<br />
new opportunities for organizations’ decision makers to take benefits from new forms of their resources.<br />
And their success or failure depends not only on one factor but also on reaching objectives within the<br />
planned time and cost.<br />
Ndou (2004) confirms that ”recognizing the power of ICTs, many developing countries, assisted by<br />
international organizations for development, have started building and encouraging e-strategies and<br />
initiatives to address a wide range of economic, social, technological, infrastructural, legal and<br />
educational issues”. It is true that the use of ICTs in the developing countries is at its infant stage. UN<br />
(2008) confirms that all countries try to build their strategy toward EGovernment by increasing their<br />
readiness in different domains in order to provide better public services knowing that the majority of<br />
eGovernment projects failed (Kumar, 2007).<br />
The eGovernment system needs all types of resources such as financial, human, and technical resources<br />
from different departments and different organizations in different forms regardless the computerization<br />
process in each department.<br />
Eid (2009) states that, any eGovernment project depends on ICT in general. The relation with ICT was<br />
understood in most developing countries as spreading more computers in their organizations (Ndou,<br />
2004). If the organizations departments understood the relationship with ICT well, they can provide the<br />
right information to the right people at the right time to both government organizations and citizens.<br />
Many governments try to offer services to their citizens by developing eGovernment projects, but they fail<br />
in their objectives especially in developing countries regardless high spending on eGovernment projects<br />
(Kumar, 2003). The problem is the lack of accepted and satisfactory services to citizens because of<br />
several factors.<br />
The gap between business and IT strategies/people appears as one of the eGovernment challenges in<br />
order to get success. Therefore, BIT alignment assessment is one of the most interesting topics in the IS<br />
research fields, many unlimited efforts in both practical and academic domains. Practical people in<br />
EGovernment project try to do the alignment to improve their success with help from researchers to<br />
introduce new models and frameworks to achieve alignment in general and some specific domains<br />
(Chan, 2007).<br />
328
Raed Kanaan and Kamal Atieh<br />
In spite of the existence of many IS literatures discussing the eGovernment critical success factors<br />
(CSFs) (Prananto, 2007), there are a few empirical researches discussing the CSF/CFF of eGovernment<br />
projects implementation in developing countries. This was reflected in low contributions to international<br />
conferences and journals. Therefore, academic and practical researches are very important in<br />
eGovernment field, noting that the research in eGovernment systems is a relatively new area driven by<br />
the IT and business industries and affected by the BIT alignment.<br />
While carrying out the research, we discussed the following points:<br />
eGovernment projects and their success and failure factors,<br />
The role of BIT alignment in eGovernment project success,<br />
And, the factors affecting this alignment and their effect on eGovernment project.<br />
This research is based on qualitative research taking the eGovernment project in Syria as a case study.<br />
The researchers know from their experience the important role of BIT alignment on the success of<br />
eGovernment.<br />
In this research, the next section presents a background about the research then discusses the research<br />
methodology which was used to have a comprehensive framework and details all the framework parts. In<br />
the last section, the researchers state the conclusion, research contribution and future study.<br />
2. Background<br />
The letter “E” is very common these days; the researcher deals with e-commerce, e-business,<br />
eGovernment, eGovernance…etc. it was known because of the important use of information technology<br />
and especially the widespread use of internet (Eid, 2009).<br />
In studying the relationship between the eGovernment and information technology, the researcher finds<br />
two points of view. The first shows the importance of information technology in order to implement<br />
eGovernment project, while the second considers that eGovernment as new wave of information age<br />
(West, 2004). Regardless the two points of view, the eGovernment is the second form of the government<br />
in any country, which tends to offer qualified secure services to its all citizens trying to build the trust in<br />
these services. Therefore, the “E” form of government must respect this rule in the same time with cost<br />
and effort reduction, efficiency, transparency and simplicity increasing via electronic channels in any time<br />
and place (Reffat, 2006).<br />
Therefore, any country in the world needs the new form of government because of its benefits, in both<br />
developed and developing countries, at least because it tends to have cost reduction (Abuali, 2010).<br />
Regardless eGovernment definition, strategy and its relationship with information system from both<br />
technological and management sides is not the same in all countries but, on the contrary, the researcher<br />
cannot find it the same in any two countries since it has cultural aspects.<br />
Regardless the objectives of any eGovernment project, it has a percentage of success and failure<br />
depending on its objective and the measuring method. There are several studies for measuring the<br />
eGovernment in-group of countries or discussing the eGovernment project in a specific country.<br />
Some eGovernment teams concentrate on a part of eGovernment project, such as the relationship with<br />
citizens, other government organizations, business enterprise and government employees which form the<br />
four categories of eGovernment in general; and in some projects they mix between eGovernment and ecommerce.<br />
Noting that the general mission of eGovernment is to facilitate the complementary use of information<br />
systems in government, it comprises both operational and strategic use (Kim, 2006). The researcher<br />
finds four categories of eGovernment stated in majority of literatures, such as G2E, G2B, G2C and G2G.<br />
This research focuses on G2G directly as it could be considered as the backbone of any eGovernment<br />
project. G2G concerns the interactions between government agencies at different levels in different<br />
locations as well as governments of other countries (Ndou, 2004). G2G task is to do the communication<br />
and cooperation among the government agencies to share resources, skills and capabilities in order to<br />
enhance the efficiency and effectiveness of the processes in the government (Valentina, 2004). The G2G<br />
relationship includes the government internal systems and functions. This relationship is most complex<br />
between the eGovernment categories relationship because it depends on data sharing and interaction<br />
329
Raed Kanaan and Kamal Atieh<br />
between government organizations, employees, departments, agencies, ministries, and even other<br />
governments.<br />
Realini (2004) sees that G2G is an emerging area of research. This might be responsible for the lack of<br />
models concerning the adoption of eGovernment G2G in general and those convenient to developing<br />
countries in specific, knowing that existing models are designed without consideration for the peculiar<br />
nature of the public sector (Ezz, 2005). In addition, none of the existing models is designed to suit the<br />
Middle East countries such as Syria, which raise the importance of having a model or framework for Syria<br />
or for Middle East countries.<br />
Eid (2009) focuses on the role of information technologies as enablers of eGovernment project which any<br />
government creates to take more benefits in multiple areas, and that the government must study all<br />
success and failure factors affecting the eGovernment project from different sides: social, organizational<br />
and political.<br />
The success of eGovernment could be seen from three perspectives: citizens, business and government<br />
(Wang, 2010); and every eGovernment project requires five kinds of skills to success: analytical skills,<br />
information management skills, technical skills, communication and presentation skills and project<br />
management skills (Kumar , 2003). Knowing that there are no fix lists of critical success factors for all<br />
eGovernment projects in all countries; especially from social and political point of view.<br />
eGovernment leaders must play dual roles, technical and process engineering, since the government<br />
consists of political, legal, public policy, organizational, technological, and human capital factors, and<br />
knowing that citizens, the end users, are very diverse in their ability to understand government services<br />
and their desire and ability to use self-service computer systems. Therefore, the eGovernment team must<br />
be ready to deal with apparent challenges from previous factors as with other factors from the political,<br />
economical and social environment (ITU, 2008).<br />
OECD (2004), WEST (2004), Ndou (2004), UN (2008), Abuali (2010) and ITU (2008) developed many<br />
challenges and sources of failures facing eGovernment projects in developing countries, like technical,<br />
Social, national and organizational. The direct dependence on ICT makes it play the main role of<br />
eGovernment success or failure; the success or failure not only on the technical side but also on all other<br />
sides.<br />
The existed gap between IT and business teams will prevent the planners and decision makers from<br />
building a comprehensive strategy of eGovernment project. The eGovernment team needs the<br />
information at the right time in order to be useful in their plan and operation, which means the need to the<br />
right access to multiple forms of data, information and knowledge in convenient forms. This is not the<br />
case of many developing countries where the IT is needed but seems as a barrier for business people.<br />
Therefore, bridging the gap between business and IT people is more than a need, which will lead to<br />
organizations outcomes and performance improvement (Tallon, 1999).<br />
According to Pollalis (2003), the integration between organization business and IT strategies is very<br />
important which imply bridging the gap between business and IT people. The alignment is not a simple<br />
procedure, but it needs to define alignment mechanisms, which will help in facing the alignment<br />
challenges (Venkatraman et al., 1993).<br />
Thus, the BIT alignment is fundamental to eGovernment teams. Bridging the gap between business and<br />
IT teams seems to be the main task of the eGovernment project leader, and in order to achieve that, it is<br />
very important to have a framework, which help in BIT alignment in all phases of eGovernment project.<br />
However, in this research we propose the BIT alignment which helps in analyzing and selecting the right<br />
answer (means in the right form and in the right time for the right people), for eGovernment applications<br />
in Government-to-Government (G2G) category of eGovernment environment.<br />
3. Research methodology<br />
Taking in consideration the research objectives, we followed a qualitative research methodology.<br />
Qualitative research is used to answer questions with a “how” or a “what” (Yin, 2003). Our research role<br />
tries to answer questions about the eGovernment success/failure factors especially the role of BIT<br />
alignment on multiple factors affecting this alignment. Taking the case study of Syria, we studied many<br />
330
Raed Kanaan and Kamal Atieh<br />
related documents and did double round interviews with many participants from different sectors like<br />
public sector organizations, eGovernment developers, employees, citizens, etc.<br />
Table (1) lists information about the participants of this research. The participants have enough<br />
experience, C-level with experience of ten years at least, and the age average is 39 year.<br />
Table 1: Participant’s information<br />
No Organization Name Classification No of participants<br />
A EGovernment Team Public sector 5<br />
B Ministry of Communication Public sector 2<br />
C Ministry of Interior Public sector 3<br />
D Banking sector Public sector 2<br />
E GSM provider Private sector 2<br />
F Universities <strong>Academic</strong> field 3<br />
G Focus Group Multi field 3<br />
Total 20<br />
We adopted a methodology with the following steps:<br />
Defining the purpose and objectives of the research and discovering the obstacles, benefits,<br />
suggestions and recommendations.<br />
Doing a literature review.<br />
Adopting the case study of Syria.<br />
Studying many documents about Syrian eGovernment strategy and related documents (14<br />
documents such as strategies, plans, newspaper clippings, schedules, presentations and reports)<br />
besides browsing articles and websites, and visited so many organizations that have good<br />
experience in information system and have successful projects on the organizational level.<br />
Doing semi structured interviews with different participants. Two rounds of interview sessions in order<br />
to gather data and information, asked a set of interview questions resulting in more flexibility and<br />
ability to extract detailed information from the participants<br />
Analyzing data such as data examination, categorization and tabulation.<br />
The focus of the questions and analysis was the role of BIT alignment and its effects on EGovernment<br />
success and the factors affecting this alignment.<br />
4. eGovernment success/failure factors<br />
The building of eGovernment depends on the ICT as main enabler of eGovernment, which needs an<br />
important improvement regarding all related requirements with good relationship with private sector in<br />
both strategically and operational sides. One of the IT managers in a ministry commented on these<br />
issues: "With some experiences in public sector to move in working from traditional ways to automated<br />
ways, taking benefits from ICT as enabler of those projects as steps towards eGovernment.”.<br />
Accordingly to a respondent: "eGovernment will enhance the use of ICT within organizations; employees<br />
will learn new skills to deal with this technology. In addition, the citizens by that time will be familiar<br />
enough to use this technology”, of course, this will need a strong support from the government from<br />
financial point of view.<br />
In Syria, there is a big interest from political leaders in the development of an eGovernment system for<br />
multiple reasons like to reform the public sector, to reduce costs, and to provide high quality services to<br />
citizens making the resistance for change more negligible. Moreover, the success in the eGovernment<br />
project needs a study of all eGovernment barriers which are not the same in all countries. One of the<br />
independent experts commented: “In spite of the existence of political support, so many projects start but<br />
without being finished since there is no projects management or follow up, and this is the case of<br />
eGovernment project."<br />
The main problem in the strategy is the focus on the technological side more than others, which is clear<br />
in the related documents since the eGovernment team write the strategy from technical background.<br />
Many interviewees mentioned this problem, one expert said, “The main problem in Syrian government<br />
331
Raed Kanaan and Kamal Atieh<br />
organizations is that they see their projects as technical projects, without any mention to other sides<br />
which lead to failure, but with eGovernment project the alignment between technical and other sides is<br />
very important to success”. However, it differs from one to another, especially for eGovernment team<br />
members, one of them said: “In Syrian environment, the IT sector is more advanced than other sectors,<br />
like this, the IT sector must go ahead without waiting the others and must lead them”.<br />
The action plan will include many projects that help to prove the eGovernment plan success in providing<br />
some urgent services with all services requirement, which must planned from technical and non-technical<br />
points of view, confirming that the eGovernment project is based on ICT. One IT manager stated, “You<br />
can’t offer any service without ICT, and to proof the new services the eGovernment team must select the<br />
most appropriate services to offer.”<br />
The participants agree on the positive role of BIT alignment on the eGovernment project success in Syria,<br />
one senior manager said, “Since the eGovernment project is based on ICT, we must group the business<br />
and IT people in work groups to success”.<br />
5. Business/IT alignment<br />
All participants agree on the main role of IT in eGovernment success with mentioning the need to BIT<br />
alignment, but some of them focus on the need to way that measure the alignment level and its benefits.<br />
One senior manager states, “We know the need to IT strategy in our organization, but we don’t know how<br />
we can control it, since we aren’t IT”, like that the CEOs will not know the benefits of IT directly as<br />
tangible benefits. This narrow point of view was clearer by an independent expert, who considers the BIT<br />
alignment as more than necessary to solve this problem and will help all people to know the benefits of<br />
the others and the IT department will be seen as profit center. One senior manager explained the benefits<br />
from the BIT alignment process saying: “the B IT strategy alignment benefits are the differentiation, cost,<br />
innovation, growth and alliance advantage”.<br />
In spite of that, all people agree with the alignment, but in practice they work to, so, it is very important to<br />
know multiple behaviors related to the alignment process. There are many behaviors forms of alignment<br />
process. One expert justifies: “People declaration about alignment is not enough, we need to have it to<br />
appear in their behavior in practice”. The alignment process starts from the beginning of the project when<br />
the eGovernment team defines the strategy and put the plan, so BIT integrated planning is important<br />
which must be as result of the alignment. One eGovernment team said, “In order to get the BIT<br />
alignment, we must plan to have high BIT collaboration as factor of success”, which must be planned<br />
before the beginning of the project to have the desired results.<br />
The BIT alignment is important to eGovernment project success, but it is not an entertainment. One<br />
expert focuses on BIT alignment challenges by saying:”we must be on the right way, our objective is the<br />
eGovernment success and not the alignments itself, there are many challenges facing the alignment such<br />
as the IT enablement of business through collaboration, communication and involvement in strategy<br />
development”.<br />
6. Business/IT alignment factors<br />
Almost, all participants agree on people, process and organization role in building successful BIT strategy<br />
in non-ended eGovernment project. The integration of BIT strategies requires effective BIT teams’<br />
communication. One eGovernment team members focused on this point “the key factor of the BIT<br />
alignment is the effective communication”, the effective communication will result in continuous<br />
improvement of active relationship management from BIT teams appearing as a culture in the<br />
organizations.<br />
Many participants discuss the BIT alignment enablers. One of them said, “The alignment is between BIT<br />
teams, therefore the main element of its success is the business and IT teams “. The BIT teams will<br />
understand the alignment between them as way to cooperate in order to have on objective, it is the<br />
project success. The success or the failure is related to all teams and not to IT or business team. The BIT<br />
alignment requires the full understanding of other teams by any team and considers the project as a<br />
shared project between all. One participant said, “The alignment could be happened without the support<br />
of top management to BIT teams”. The alignment will lead IT involvement in eGovernment strategy<br />
development since the ICT is the backbone of the eGovernment project and in the same time, its success<br />
depends on IT understanding of business requirements. According to one participant, “the problem of<br />
eGovernment project in developing countries like Syria is that we need everything to be done in one<br />
332
Raed Kanaan and Kamal Atieh<br />
project and to plan everything from the beginning, therefore we do not start, never”. The nature of<br />
eGovernment project differs from other projects, the strategy must adopt a plan based on dividing the<br />
project to sub projects and prioritize them in way that ensures their success.<br />
Process, people and organizational factors were seen from many experts as enablers and barriers<br />
depending on their role played by the BIT teams.<br />
The role of people is more than clear since they are the main elements of such alignment. One expert<br />
focuses on the decision makers’ capabilities and behaviors, he said “the alignment procedures start by<br />
decisions makers, we could consider that, BIT decisions makers’ capabilities and management skills as<br />
our first interest, besides meeting of the minds between them and continuous communication”. So many<br />
participants see the role of people in the strategy building, one of them said, “The alignment is very<br />
important in eGovernment strategy building, which need the involvement of BIT decision makers in the<br />
strategy formulation”. The people tasks differ in eGovernment project from different project, since this<br />
project is agile and need continuous follow up and evaluation, similarly, it depends on the cooperation<br />
between all government organizations. The communication skills of people who are in the EGovernment<br />
differ from other projects like those that they must communicate with people from outside the<br />
organization.<br />
The role of organizational factors was seen as they help in facilitating the BIT alignment. Before starting<br />
the eGovernment project, the government must do some preparations, such as changing the<br />
organizational structure of government organization and build a new culture of cooperation between all<br />
organization department and inter-organizations. One participant mentioned, “The cooperation between<br />
organizations is not a decision to be taken only, we must work for it”. Restricting the organizations include<br />
many steps such as having the CIOs in all organizations, move the technology departments in the<br />
organizations in order to have information system departments which have development and<br />
management sections and not only computerization and networking. The new form of IT department will<br />
change it to be as profit center and not cost center in the organization. One senior manager said, “The<br />
good structuring of IT department internally and in the organization will lead to good understanding from<br />
the business people, especially from top management who will support the IT department “, some<br />
organizations found new ways to increase profits by the use of IT.<br />
The process role was ignored in Syrian organizations, in spite of the confirmation from all participants on<br />
its importance. The process consistency and clarity is very important and they must ensure the<br />
integration to achieve the BIT strategies, consequently the eGovernment strategy. One senior manager<br />
clarified the specifications of the process, he said, “Since the project is continuous, the process design<br />
must agile and long term focusing and help the BIT alignment“. The process must relate to eGovernment<br />
strategy and ensure the BIT alignment in the simplest way.<br />
The BIT alignment in eGovernment project differs from other projects. It takes many aspects from the<br />
project itself. It is a long time operation on all levels (strategically, tactical and operational). One<br />
participant said, “The BIT alignment level reflects the success of eGovernment project and measure the<br />
value added by the cooperation between BIT teams”.<br />
7. Conclusion<br />
This research focuses on G2G category of eGovernment, and the factors affect eGovernment adoption in<br />
this area. This research presents the BIT alignment role in eGovernment project and the multiple factors<br />
affecting this alignment, based on qualitative research methodology.<br />
The research results showed that eGovernment is based on ICT but not only an IT project. In general, in<br />
countries like Syria, there is a gap between IT and business strategies/people which could be considered<br />
one of the challenges facing the eGovernment project. Therefore, studying the BIT alignment and its<br />
dependent factors is very important in order to bridge the gap between them. Many factors affect the<br />
alignment such as people, process and organizational groups of factors including so many sub-factors,<br />
which differ from country to others. The eGovernment adoption is long and hard project which needs all<br />
government resources. BIT alignment between IT and business strategies/teams must be considered and<br />
planned from the beginning.<br />
Future researches are very important to find multiple other factors in order to bridge the gap between<br />
business and IT strategies and teams of eGovernment project. Validating the effect of those factors in<br />
333
Raed Kanaan and Kamal Atieh<br />
many countries is very important to enhance the research results and suit them in all levels of<br />
eGovernment project.<br />
References<br />
Abuali A. (2010). Factors and Rules Effecting in eGovernment, © EuroJournals Publishing,<br />
http://www.eurojournals.com/ejsr.htm.<br />
Chan, E. and Reich, Y. (2007). IT alignment: what have we learned? Journal of Information Technology. 22, 297—<br />
315.<br />
Eid, E and Abd El-Razek , M (2009). eGovernment Theory & Implementation Case Study Egyptian EGovernment<br />
Model. The International <strong>Conference</strong> on Administration and Business. ICEA - FAA 2009, University of<br />
Bucharest.<br />
Ezz, I. and Themistocleous, M.(2005). Investigating the Barriers to G2G Adoption. eGovernment Workshop ’05<br />
(eGOV05), September 13 2005, Brunel University, West London UB8 3PH, UK.<br />
ITU (2008). Electronic Government for Developing Countries.<br />
Kim, V.A. (2006). eGovernment: Five Key Challenges for Management, Electronic Journal of EGovernment, Volume<br />
4 Issue 1.<br />
Kumar , R (2007). Making eGovernment Projects in Developing Countries More Successful and Sustainable: Some<br />
Case Studies from India. CPRsouth 2007: Research for Improving ICT governance in the Asia-Pacific.<br />
Philippines.<br />
Ndou, V. (2004). eGovernment for Developing Countries: Opportunities and Challenges, The Electronic Journal on<br />
Information Systems in Developing Countries.<br />
OECD (2004). The eGovernment Imperative, France.<br />
Pollalis, Y. A., (2003). Patterns of co-alignment in information-intensive organizations: business<br />
performance through integration strategies, International Journal of Information Management, pp. 469-492.<br />
Prananto, A. and McKemmish, S. (2007). Critical Success Factors for the Establishment of eGovernment: A Critical<br />
Analysis of the Indonesian Cabinet Secretariat’s Legal Document Retrieval System (LDRS) Project. Swinburne<br />
University of Technology, Australia.<br />
Realini, A. F. (2004). G2G EGovernment: The Big Challenge for Europe, Master Thesis, Department of Informatics,<br />
University of Zurich, 15 September 2004.<br />
Reffat, R. (2006). Developing a Successful eGovernment, NSW 2006 University of Sydney, Australia.<br />
Tallon, P. and Kraemer, K. L., (1999). A Process-oriented Assessment of the Alignment of Information Systems and<br />
Business Strategy: Implications for IT Business Value, University of California, Irvine, Center for Research on<br />
Information Technology and Organizations.<br />
UN (2008). eGovernment Survey. New York , USA.<br />
Valentina, N. (2004). E – Government for Developing Countries: Opportunities and Challenges, The Electrical<br />
Journal on Information Systems in Developing Countries, EJISDC.<br />
Venkatraman, N, Henderson, J. C., and Oldach, S. (1993). Continuous Strategic Alignment: Exploiting Information<br />
Technology Capabilities for Competitive Success, <strong>European</strong> Management Journal, 1993, pp. 139-149.<br />
Wagner, C., Cheung, K., Fion, L., and Rachael, P. (2003). Enhancing eGovernment in Developing Countries:<br />
Managing Knowledge through Virtual Communities.<br />
Wang, H. (2010). Perspectives, skills and challenges for developing a successful eGovernment . IEEE, ISBN 978-1-<br />
4244-6931-4.<br />
West, D.M. (2004). eGovernment and the transformation of service delivery and citizen attitudes, public<br />
administration review.<br />
Yin, R.K., (2003). A Case study research: design and methods. 3rd edition, Thousand Oaks, Calif.: Sage<br />
Publications.<br />
334
Does eTaxation Reduce Taxation Compliance Costs<br />
Maja Klun<br />
University of Ljubljana, Slovenia<br />
maja.klun@fu.uni-lj.si<br />
Abstract: Improving government performance is one of the key elements of public sector reform. Introducing<br />
eGovernment is one element in improving performance. There are several discussions about the issue of cost<br />
effectiveness of eGovernment. The paper discusses whether eTaxation decreases taxation compliance costs. It was<br />
found that different research comes to different conclusions and therefore one could not conclude that that eTaxation<br />
reduces compliance costs. Nevertheless some other non-financial positive effects have been observed by different<br />
researchers, such as accuracy, logic controls, and better compliance.<br />
Keywords: compliance costs of taxation, eTaxation, Slovenia<br />
1. Definition of compliance costs<br />
According to Sandford et al. (1989), tax compliance costs are generally defined as costs incurred by<br />
taxpayers in meeting the tax requirements imposed on them by the law and revenue authorities, over and<br />
above the actual payment of taxes, and over and above any distortion costs inherent in the nature of the<br />
taxes. The measurement of tax compliance costs became an important research subject in the most<br />
developed countries more than twenty years ago (e.g. Australia, Canada, the Netherlands, United<br />
Kingdom, United States), in countries in transition at the beginning of 2000 (Slovenia, Croatia, Czech<br />
Republic), and also in other countries in Asia (Singapore, Malaysia, Hong Kong, India), Africa (Tanzania,<br />
Ethiopia) and South America (Brazil)(see Evans, 2003). The research results on tax compliance costs<br />
(i.e. Sandford et al., 1989; Allers, 1994; Evans et al., 1998; Tran-Nam et al., 2000; Ariff, 2001; Chittenden<br />
et al., 2003, Vitek et al., 2003; Klun and Blažić, 2005, Das-Gupta, 2003; OECD, 2001; and others)<br />
indicate that tax compliance costs are regressive (the larger burden is on smaller taxpayers) and<br />
substantial (up to 2.5% of GDP) (see Evans, 2003) and therefore a significant part of tax-related costs.<br />
The simplification of legislation and tax procedures has become an important element in policies to<br />
reduce administrative burdens and costs. One common tool is offering electronic services and one-stop<br />
shop services. According to OECD (2007) a tool should decrease compliance and administrative costs.<br />
According to the <strong>European</strong> Commission’s eGovernment portal, new technology can radically improve the<br />
efficiency and effectiveness of public services. Initiatives in the i2010 eGovernment action plan are<br />
intended to expand e-services, cut back on red tape and increase the satisfaction of all users. Increased<br />
ICT investment is also used as a tool to achieve greater efficiency and effectiveness. It is interesting that<br />
empirical studies have not persuasively established a correlation between ICT investments and<br />
corresponding improvements in organizational performance and productivity in general. Some studies<br />
report no relationship, some provide evidence that a correlation does exist, and in a few studies a<br />
negative relationship between enterprise performance and ICT investment was observed. ICT makes<br />
compliance costs ‘lower’ in regard to time consumption and monetary expenses, but ICT itself is not<br />
cheap. The use of ICT for some services and compliance procedures needs a high level of resources and<br />
not only initially, since support costs are also high. Moreover, ICT investment cannot be treated as a<br />
long-term once-only investment since constant changes in the information technology world demand<br />
constant upgrading, adaptation and development.<br />
Throughout eGovernment development, taxation services have been one of the most popular areas for<br />
change, since they are an important financial source for the government, are often already computerized<br />
in the back-office and therefore easier to implement online on the front-office side. With the current<br />
widespread availability of IT they were also instantly available to the users. At the same time online<br />
personal income tax services gained much of the publicity. It is also one of the more frequently used<br />
government services by citizens (most of the services are used only a few times in a lifetime, such as a<br />
building permit, change of address, a marriage certificate, etc.). Even the eEurope measurement reports<br />
indicate that year-by-year the services included in the income generating cluster (income and corporate<br />
tax, social contributions for employees, VAT, customs declaration) were and remained the most<br />
developed. Coverage on the supply side in the area of online personal income tax is therefore now quite<br />
good.<br />
The personal income tax online service was one of the first online services fully available online to<br />
Slovenian citizens. It was the result of developments that began in 2003 with the implementation of the<br />
335
Maja Klun<br />
eTaxation portal, soon after the main eGovernment portal. The tax administration estimated that 10% of<br />
taxpayers would file personal income tax returns online. The estimates have not been realized, since only<br />
2.8% of personal income taxpayers filed their tax returns electronically in 2006, while in 2008 a pre-filled<br />
tax return was introduced with the online service only used for special cases. The proportion of<br />
businesses and self-employed taxpayers was higher and become the only way of tax filling from 2009<br />
according to law change in 2007, when it become obligatory.<br />
The use of electronic filling or use of different software increased in several countries (i.e. in U.S. the<br />
proportion of self-prepared tax returns without software is dropped between 1993 and 2003 from about<br />
41% to 13% (Guyton et al., 2005); in Germany the number of electronic declarations increased to 8.2<br />
million, which is over 300 times more than ten years ago (Bavarian State Office for Taxation 2009)). The<br />
research question is whether the use of IT really decreases costs of compliance. According to Schaupp<br />
and Carter (2009), effort expectancy, performance expectancy, social influence, perceived risk, and<br />
optimism bias all have a significant impact on the intention to e-file.<br />
2. Overview of the research about compliance costs and eTaxation<br />
2.1 Slovenia<br />
The research into compliance costs for personal income taxpayers was carried out during 2007. The<br />
sample of 600 potential personal taxpayers was selected at random from the telephone directory. The<br />
letter enclosed with the questionnaires sent by mail includes information that the questionnaire could be<br />
completed online, since they are prepared electronically. A total of 481 taxpayers completed the<br />
questionnaire. We compared estimated compliance costs for personal income taxpayers that use online<br />
filling-in with those who use the traditional method. The share of taxpayers that returned the<br />
questionnaire and used e-filing of tax return was 26.9%. Using the chi-square test one can assume that<br />
there are statistically significant differences in the decision to use e-filing, depending on age, income<br />
level, education level and sex. The answers indicated that taxpayers aged 25 to 45 (30.7%) were the<br />
most common users of e-filing. If one compares the use of e-filing among taxpayers with different<br />
incomes, results showed that the higher proportion was for those with the highest income (34.1%). Men<br />
(35.6%) used online filing more often than woman. Online filing was more frequent among taxpayers with<br />
higher education qualifications (33.2%). It was found that average compliance costs per taxpayer did not<br />
differ significantly. Taxpayers that did not use online service had compliance costs that were on average<br />
€ 0.087 higher than for others. The Pearson correlation coefficient was also low (0.002) with high risk (2tailed<br />
significance=0.975). When all compliance costs parameters were compared (time spent by<br />
taxpayers, their family and their friends, consultancy costs and other expenditures) there were differences<br />
between both groups. It is interesting that the two groups of taxpayers on average needed practically the<br />
same time to file their tax returns (the difference could be measured only in seconds). The time spent by<br />
family and friends was higher for taxpayers who used e-filing, on average by 10 minutes. Correlation<br />
tests also showed that e-filing influenced the time spent by family members. In both groups only a very<br />
small portion of taxpayers used help from tax advisers and the costs spent on advisers are equal. The<br />
main difference appeared when other cash expenditure was compared. All taxpayers using e-filing stated<br />
that they did not have any monetary expenses. On the other hand 74.2% of taxpayers that used<br />
traditional methods had additional expenses. On average they spent € 7.00, mostly for copying and<br />
sending tax returns. The correlation between the decision to use online filing of tax return and cash<br />
expenditure was relatively high (Pearson’s correlation=0.620, p
2.2 Other countries<br />
Maja Klun<br />
In U.S.A. the IRS budget was nearly $10 billion (€ 7.3 billion) in the 2002 fiscal year, but the compliance<br />
costs of citizens far exceed the budget of the IRS. In 1993, 41 percent of taxpayers prepared their own<br />
tax returns without software and only 8 percent prepared their own returns on a computer. The tax<br />
software share tripled in a decade to 25 percent in 2003, while paid preparer use – the most common<br />
preparation method – rose to 62 percent. Paid preparers in most cases used computers (97%), while the<br />
percentage was lower for taxpayers (66%). Returns filed electronically quadrupled over ten years from<br />
12% to 48% in 2003. The proportion of individual tax returns filed electronically for the 2004 tax year was<br />
about 54% (Toder, 2005). In the research by Guyton et al. (2003) the average time burden is higher<br />
among taxpayers who use software (40.1 hours) or a paid professional (26.1 hours) than it is among<br />
taxpayers who prepare their return independently (18.2 hours). These results are likely due to differences<br />
in the average complexity of tax returns. Compliance costs of personal income taxpayers are the highest<br />
for taxpayers who use a paid professional ($244 or €178) than software users or self-preparers ($47 and<br />
$20 (€34 and €15), respectively). The research also stresses that average return complexity prepared by<br />
a paid professional or with tax software tended to be greater. A further explanation provided is that<br />
software users spend more time because of other benefits from software (i.e. better ability to do tax<br />
planning). Further research by Guyton et al. (2005) found out that “each group of taxpayers on average<br />
selects the preparation method that costs the least for them. For example, software costs more than selfpreparation<br />
for current self preparers, but costs less than self-preparation for current software users”.<br />
Taxpayers want to minimize their costs taking into account the value of their time.<br />
Research into compliance costs of taxation in Canada (Vaillancourt & Clemens, 2008) in 2005 estimated<br />
the costs between $16.2 billion and $25.0 billion (€12 billion and €18 billion) for personal income taxes,<br />
business taxes, and property taxes. Estimates for personal income tax were divided into the time<br />
required ($2.4 billion, which is app. €1.7 billion), the costs associated with tax preparers ($400.2 million to<br />
$1.3 billion - €293.2 million to €0.95 billion), and the costs of tax preparation software ($68.2 million to<br />
$163.6 million - €50 million to €119.9 million). Using IT in tax preparation therefore increased compliance<br />
costs for taxpayers. At the same time it was stressed that some advantages of software use were not<br />
included (i.e. increased accuracy of tax returns). The relationship between compliance costs and<br />
software usage has already been analyzed in previous research by Vaillancourt (1989), who found no<br />
significant evidence for a cost reduction resulting from the use of electronic tools. No significant<br />
relationship between the business compliance burden and an electronic data interchange with the tax or<br />
social insurance authorities was confirmed in Germany (Eichfelder & Schorn, 2011). In the research by<br />
Hansford et al. (2003) in the UK, estimates showed that businesses using a computer system for tax<br />
administration bore higher compliance costs.<br />
Some other research indicated positive effects of IT use on compliance costs. In 2004-05, Australians<br />
spent over 1.2 million Australian dollars (€0.9 million) managing their tax affairs, mainly because 74% of<br />
taxpayers need professional help. Estimates indicated that pre-filled electronic individual tax returns<br />
would reduce these costs for the 9 million Australians using e-tax or filing electronically via a tax agent<br />
(Sampson, 2007). According to Verwaal and Donkers (2001) international firms in the EU use IT for<br />
customs procedures. They stressed that the “integration of the information system can reduce the labour<br />
time needed to produce the required information. Furthermore, external integration by electronic data<br />
interchange between buyers, suppliers and customs authorities may reduce customs-related transaction<br />
costs”. They also pointed out the advantage of the reduced probability of mistakes.<br />
Fu et al. (2006) stated that “electronic filing of personal income taxes has the potential of improving the<br />
overall process of tax filing for the individual filer while at the same time reducing the cost to both<br />
taxpayers and tax collection agencies”. Kopczuk and Pop-Eleches (2007) found that electronic filing<br />
stimulates non-filers since participation in the Earned Income Tax Credit in the US is significantly<br />
correlated with e-filing and potentially reduces compliance costs.<br />
3. Conclusion<br />
ETaxation is one of the first and most commonly used electronic services by governments. Performance<br />
issues are often given as the main reason for implementing e-services. ETaxation offers several<br />
advantages, such as better data collection, better control, logic control of the system, quicker processing<br />
of data, better accuracy etc. The overview of research in the field indicates that a decrease in the<br />
compliance costs or even administrative costs of taxation is not a definite positive effect of eTaxation.<br />
Since different research has provided different results, from positive to negative and with no effect of<br />
337
Maja Klun<br />
eTaxation on compliance costs, it is difficult to confirm any of the presented effects. The research is in<br />
most cases partial and focused on separate issues of compliance costs. There is no research testing the<br />
positive and negative effects of eTaxation at the same time, and this is one of the limitations of the<br />
present research. Even if this were investigated, it would be difficult to compare the financial and nonfinancial<br />
pro and cons of eTaxation in arriving at a definite result.<br />
References<br />
Allers, A. (1994) Administrative and Compliance Costs of Taxation and Public Transfers in the Netherlands.<br />
Gronningen: Rijksuniversiteit.<br />
Ariff, M. (2001) Compliance Cost Research in Selected Asian Economies. V C. Evans, J. Pope, & J. Hasseldine, Tax<br />
Compliance Costs: A Festschrift for Cedric Sandford (str. 249-268). Sydney.<br />
Bavarian State Office for Taxation (eds.), (2009) Statistische Auswertungen zur elektronischen Steuererklärung.<br />
Munich: Bavarian State Office for Taxation.<br />
Chittenden, F., Kauser, S., & Poutziouris, P. (2003) »Tax Regulation and Small Business in teh USA, UK, Australia<br />
and New Zealand«, International Small Business Journal, Vol. 21, No.1, pp 93-115.<br />
Das-Gupta, A. (2003) The Income Tax Compliance Cost of Corporations in India, 2000-01. (online)<br />
http://papers.ssrn.com/sol3/papers.cfm?abstract_id=466041.<br />
Eichfelder, S., & Schorn, M. (2011) Tax compliance costs: A business administration perspective. FinanzArchiv .<br />
<strong>European</strong> Commission (2006) First progress report on the strategy for the simplification of the regulatory<br />
environment. Brussels: COM 690.<br />
Evans, C. (2003) » Studying the Studies: An overview of recent research into taxation operating costs«, eJournal of<br />
Tax research , Vol. 1, pp. 64-92.<br />
Evans, C., Ritchie, K., Tran-Nam, B., & Walpole, M. (1998) »Taxation Compliance Costs: Some Recent Empirical<br />
Work and International Comparisons«, Australian Tax Forum , Vol. 14, pp 93-122.<br />
Fu, J., Farn, C., & Chao, W. (2006) »Acceptance of electronic tax filing«, Information & Management, Vol.43, pp 109-<br />
126.<br />
Guyton, J. L., Korobow, A. K., Lee, P. S., & Toder, E. J. (2005) »The effects of tax software and paid preparers on<br />
compliance costs«, National Tax Journal , Vol. 58, No. 3, pp 439-449.<br />
Guyton, J. L., O'Hare, J. F., Stavrianos, M. P., & Toder, E. J. (2003) Estimating the Compliance Cost of the U.S.<br />
Individual Income Tax, National Tax Association Spring Symposium (str. 1-29). Washington: NTA.<br />
Hansford, A., Hasseldine, J., & Howorth, C. (2003) »Factors affecting the costs of UK VAT compliance costs of UK<br />
VAT compliance costs for small and medium-sized enterprises«, Government and Policy , Vol. 21, No. 4, pp<br />
479-492.<br />
Klun, M. (2009) »Pre-filled Income Tax Returns: Reducing Compliance Costs for Personal Income Taxpayers«,<br />
Financial Theory nad Practice , Vol. 33, No. 2, pp 219-233.<br />
Klun, M., & Blažić, H. (2005) »Tax compliance costs for companies in Slovenia and Croatia«, Finanzarchiv , Vol. 61,<br />
No. 3, pp 418-437.<br />
Kopczuk, W., & Pop-Eleches, C. (2005) Electronic Filing, Tax Preparers, and Participation in the Earned Income Tax<br />
Credit. Cambridge: NBER.<br />
Lešič, T. (2010) The impact of eTax system on the operation of the Tax Administration of the Republic of Slovenia .<br />
Maribor: University of Maribor.<br />
OECD. (2001) Business’ Views on Red Tape, Administrative and Regulatory Burdens on Small and Medium Sized<br />
Enterprises . Paris: OECD.<br />
OECD. (January 2007) Cutting Red Tape: National Strategies. Policy Brief.<br />
Sampson, A. (12. May 2007) Pre-filled tax returns still need checking. Business Day.<br />
Sandford, C. T., Godwin, M., & Hardwick, P. (1989) Administrative and Compliance Costs of Taxation. Bath: Fiscal<br />
Publications.<br />
Schaupp, L. C., & Carter, L. D. (2009) »Antecedents to e-File Adoption: The U.S. Citizen's Perspective«, eJournal of<br />
Tax Research ,Vol. 7, No. 2, pp 158-170.<br />
Tax Administration of teh Republic of Slovenia (eds.). (2010) Annual report. Ljubljana: Tax Administration of teh<br />
Republic of Slovenia.<br />
Toder, E. J. (9. May 2005) Changes in Tax Preparation methods, 1993-2003. Tax Notes .<br />
Tran-Nam, B., Evans, C., Ritchie, K., & Walpole, M. (2000) »Tax Compliance Costs:Research Methodology and<br />
Empirical Evidence from Australia«, National Tax Journal , Vol. 3, pp 229-252.<br />
Vaillancourt, F. (1989) The administrative and compliance costs of the personal income tax and payroll tax system in<br />
Canada. Toronto: Canadian Tax Foundation.<br />
Vaillancourt, F., & Clemens, J. (2008) Compliance and Administrative Costs of Taxation in Canada. V J. Clemens<br />
(ed), The Impact and Cost of Taxation in Canada: The Case for a Flat Tax Reform (pp 55-102). Fraisr Institute.<br />
Verwaal, E., & Donkers, B. (2001) Customs-related Transaction Costs, Firm Size and International Trade Intensity.<br />
Rotterdam: ERIM.<br />
Vitek, L., Pavel, J., & Pubal, K. (2003) Effectiveness of the Czech Tax System – Administrative and Compliance<br />
Costs Measurement. Prague: IIPF Congress.<br />
338
International Assistance Relationship to eGovernment<br />
Development and Benchmarking<br />
Endrit Kromidha<br />
Royal Holloway University of London, UK<br />
Endrit.Kromidha.2009@live.rhul.ac.uk<br />
Abstract: Purpose – The changes that happen as a result of international interventions in eGovernment initiatives<br />
present not only a number of challenges but also an interesting area of study. In this context, this paper analyzes the<br />
relationship between eGovernment and international assistance in a group of developing countries. International<br />
organisations could have multiple involvements as donors, implementers and evaluators of eGovernment. This leads<br />
to complex eGovernment mechanisms and situations, when international assistance is related to public<br />
administration reforms. The aim in this paper is also to critically analyze benchmarking as an evaluation tool in<br />
international eGovernment assistance. Research approach and design – This is a comparative and longitudinal<br />
study of eGovernment development processes in Albania, Bosnia and Herzegovina, Croatia, Former Yugoslav<br />
Republic of Macedonia, Montenegro and Serbia. In this context, the simple eGovernment strategy- implementation -<br />
evaluation cycle is used from a neoinstitutionalist perspective as a framework for the analysis. Quantitative data such<br />
as the eGovernment benchmarking index and the amount of international assistance are combined with qualitative<br />
information from reports and legal documents to analyze the relationship between international assistance and<br />
eGovernment development. Findings – This study shows a positive relationship between international eGovernment<br />
assistance and eGovernment development reflected on benchmarking indexes in the event when the same donor<br />
(the United Nations in this case), is involved in both processes. The research also suggests that the effect of<br />
international assistance on eGovernment is generally positive in less developed countries. The discussion on<br />
benchmarking reveals some important issues related to the role of international organisations as both eGovernment<br />
assistance donors and performance evaluators. Limitations – The study is focusing on international assistance from<br />
only one donor in only one area, that of eGovernment strategy making. A comparison of other factors and actors<br />
could contribute to analyze not only the correlation but also the effectiveness of international assistance on<br />
eGovernment. A comparative analysis of different eGovernment benchmarking methods and actors could be the<br />
subject of future studies related to international eGovernment assistance. Original value – This is an original effort to<br />
identify the relationships that exist between international assistance and eGovernment development. Taking a<br />
neoinstitutionalist approach this study shares some theoretical insights on the evolution of internationally assisted<br />
eGovernment initiatives and benchmarking into institutions. A converging point between the two is the donorbenchmarker<br />
institutional duality. The critical analysis of eGovernment benchmarking is based more on the<br />
involvement of actors rather than on its methodology as in many other studies. Finally, this research points out the<br />
complexity of internationally assisted eGovernment reforms in developing countries and gives some suggestions for<br />
future studies in this field.<br />
Keywords: eGovernment, international assistance, benchmarking, neoinstitutionalism, donor-benchmarker duality<br />
1. Internationally assisted eGovernment initiatives as institutions<br />
Significant work is done recently in the context of companies to analyse how people interact with<br />
technology (Geels, Schot 2007, Orlikowski 2008, Harrison, Koppel & Bar-Lev 2007, Orlikowski 1992,<br />
Walsham, Waema 1994, Poel 2003). There is an ongoing debate whether action and structure need to<br />
be considered separately or together (Kallinikos 2004). The debates and fast developments in this field<br />
evidence a persisting problem with the theoretical framing of socio-technical dynamics as evidenced very<br />
early on (Archer 1982, Orlikowski, Robey 1991). Although many conceptual implications can be derived<br />
from these studies about the use of technology in the public sector, even in eGovernment studies the lack<br />
of theoretical frameworks remain a persistent problem (Heeks, Bailur 2007). Because of their complexity,<br />
the choice of research approaches and methods becomes of great importance at this point.<br />
Starting with international assistance, eGovernment, and benchmarking, a theoretical framework or<br />
model should be able to describe the dynamics between the different types of organisations involved.<br />
The focus in this study is not only on the human-technology micro interactions, but more on the macro<br />
development of systems, policies, organisational changes and their environment. In early new<br />
institutionalist research it is noted that ‘organisations are structured by phenomena in their environments’<br />
as well as ‘by technical and exchange interdependencies’ (Meyer, Rowan 1977) resorting to isomorphism<br />
or in other words ‘becoming similar’ explanation. This initial idea of organisational institutionalisation of<br />
technology was not new (Hawley 1950, Thompson 1967, Aiken, Hage 1968). However is was DiMaggio<br />
and Powel (1983) who tried to explain isomorphism in the new institutionalism by three types of forces:<br />
coercive based on pressures, normative based on rules and mimetic based on similarities. In this early<br />
context, the new institutionalism deals with the idea of rules that influence the way organisations are<br />
339
Endrit Kromidha<br />
transformed and become similar to each-other, even when they develop in different ways (Meyer, Rowan<br />
1977, DiMaggio, Powell 1983, March, Olsen 1989, North 1990, Zucker 1977, Scott 1995). The theory<br />
tries to explain how institutions evolve thus influencing organisations and society as a whole. More recent<br />
studies on technology and institutions (Orlikowski, Barley 2001, Baptista (John), Newell & Currie 2010,<br />
Colyvas 2007) and specifically on eGovernment institutionalisation (Fountain 2001, Madon et al. 2009)<br />
increasingly take an system approach, suggesting a balanced view of socio-technical or techno-social<br />
relationships. In this context, this paper follows the route suggested by Orlikowski and Barley (2001) for<br />
developing more powerful explanations of how technological systems and institutions evolve in an<br />
environment of political and human factors. Therefore, in this study, international eGovernment<br />
assistance is considered not only as an instrument, but also as an institutional actor.<br />
Like a long term business contract and its outcomes can lead to the development of institutions between<br />
companies doing business together, so are considered internationally assisted eGovernment initiatives<br />
for donors and governments in this study. By default assistance is given and received based on certain<br />
needs (Burnside, Dollar 2000, Alesina, Dollar 2000, Collier, Dollar 2002), aiming at some positive results<br />
for both the donor and recipient (Crawford 2001). In this context it is argued that ‘there is no intrinsic<br />
difference between behavioural regularities and institutions’ (Diermeier, Krehbiel 2003). When<br />
international assistance as well as its benchmarking is routinised, standardised and formalised by<br />
international organisations and recipients, they become institutions that influence all parties involved.<br />
International assistance on eGovernment is not sufficiently covered by the literature and this paper<br />
contributes to filling this gap. The evidence in the following part highlights some similarities in the<br />
development of national eGovernment and ICT (Information and Communication Technology) strategies<br />
from international assistance in different countries. Even more interesting is the eGovernment evaluation<br />
and its relationship to international assistance from a single benchmarking report’s perspective. Analysing<br />
and some comparative evidence and a providing critical analysis, this study tries to share some light on<br />
the complexity of this field of study.<br />
2. Methodology and findings from a neoinstitutionalist perspective<br />
Following the previous part on the theoretical conceptualisation of internationally assisted eGovernment<br />
initiatives as institutions and looking at the policy development framework (Stone, Maxwell & Keating<br />
2001), it is possible to assume that their development happens in stages. The Strategy-Implementation-<br />
Evaluation eGovernment cycle can be used to “qualify” and lead the analysis of quantified eGovernment<br />
development given by benchmarking.<br />
Figure 1: Strategy - implementation - evaluation cycle<br />
340
Endrit Kromidha<br />
In the case of international assistance on national eGovernment and ICT strategies, it is assumed that<br />
some international ideas, experiences and practices including benchmarking itself are combined with<br />
national policies and characteristics. The connected ‘institutional’ mechanisms of assistance and<br />
benchmarking are related to both the donor and the recipient country. This study attempts to give a<br />
simple quantified view and a critical analysis of this institutionalising relationship. Rather than simply<br />
defining a relationship between international assistance and eGovernment, the use of the strategyimplementation-evaluation<br />
cycle in this study suggests a shift of focus towards these three different<br />
stages of institutional expansion.<br />
This study starts with an empirical analysis of data and benchmarking to then dynamically move towards<br />
an interpretivist perspective, often used in information systems research (Walsham 1995, 2006). This<br />
approach tries to capture some of the institutional dynamics of international eGovernment assistance<br />
based on the strategy-implementation-evaluation cycle. International assistance on eGovernment and<br />
ICT strategies is often an evolving process of change. Designing strategies is only the first step towards<br />
fully functional and sustainable eGovernment solutions in the following six Western Balkan countries<br />
considered in this study:<br />
AL - Albania<br />
BH - Bosnia and Herzegovina<br />
CR - Croatia<br />
MN - Montenegro<br />
MC - Former Yugoslav Republic of Macedonia<br />
SR - Serbia<br />
Most of the countries are considered as developing transition economies (UNCTAD 2010). The purpose<br />
of the international public sector involvement in these countries is to develop democratic governance<br />
systems (UNDP Europe and CIS 2010). In order to understand the role international assistance on<br />
eGovernment and ICT national strategies, implementation and evaluation, first it is necessary to compare<br />
the six countries based on the Global UN eGovernment Survey benchmarking index (UNPAN 2003-<br />
2010). The survey is a consistent benchmarking database on eGovernment, allowing comparisons for the<br />
period 2003-2010, based on three main index components: Web Measurement, Telecommunications and<br />
Human Capital with 1/3 weight each. United Nations’ organisations are the source of both international<br />
assistance (UNDP) and benchmarking (UNPAN). In this study this situation is assumed to increase the<br />
credibility of findings and analysis by means of data consistency and triangulation of information focus on<br />
a single international organisation to have a sound basis for comparison. The results for the six western<br />
Balkan countries based on the United Nations eGovernment Development Knowledge Base (UNPAN<br />
2003-2010) are given in the following table:<br />
Table 1: eGovernment Index 2003-2010 for six Western Balkan countries<br />
Change Change 2004<br />
Country 2003 2004 2005 2008 2010 2004 -2010 – 2010 in %<br />
AL 0.3110 0.3400 0.3732 0.4670 0.4519 0.1119 0.3291<br />
BH 0.3090 0.3790 0.4019 0.4509 0.4698 0.0908 0.2396<br />
CR 0.5310 0.5227 0.5480 0.5650 0.5858 0.0631 0.1207<br />
MC 0.3620 0.3699 0.4633 0.4866 0.5261 0.1562 0.4223<br />
MN N/A 0.4282 0.4282 0.4282 0.5101 0.0819 0.1913<br />
SR 0.3710 0.3871 0.1960 0.4828 0.4585 0.0714 0.1844<br />
Source: UNPAN<br />
The information summarised in this table shows that the countries with the lowest level of eGovernment<br />
index in 2003, BH, AL and to a certain extent MC experienced the highest increase until 2010, with MC<br />
and then AL being first with 42% and 33% increase respectively. Countries like CR that started at a high<br />
level of eGovernment index in 2003 experienced a low increase until 2010 of only 12%. The object of this<br />
study however is to analyze how international assistance on ICT and eGovernment strategies is related<br />
to the eGovernment index change for the period from 2004 when most of this assistance was given to<br />
2010. The amounts of international assistance given for this purpose, summarised in the table below,<br />
were adjusted according to the population in each country. A standard unit for the comparison of all<br />
countries in this case is ‘USD assistance / capita’ in total for the period:<br />
341
Endrit Kromidha<br />
Table 2: International assistance on national eGovernment and ICT strategies<br />
Country Donor Period Amount Population in<br />
2004<br />
USD assistance<br />
/ capita<br />
AL UNDP AL From 2003 $217,654 3,100,000 0.0702<br />
BH UNDP BH From 2004 $250,000 3,780,000 0.0661<br />
MC UNDP MK From 2005 $138,928 2,030,000 0.0684<br />
SR UNDP SR From 2005 $10,000 7,460,000 0.0013<br />
Source: UNDP, World Bank<br />
The population figures in 2004 (World Bank 2010) were used because this is the year in which most of<br />
this assistance for the development of strategies was given/received. Croatia and Montenegro are not<br />
included in the table because they didn’t receive any international assistance from UNDP or any other<br />
donor for their eGovernment and ICT national strategies. Their USD assistance / capita index is obviously<br />
It is clear from the table that the countries with the lowest level of eGovernment index in 2003-2005<br />
received most of the support, Albania being in the first place with 0.0702 USD assistance / capita. The<br />
chart represents the relationship between the international assistance for the development of national ICT<br />
strategies and the UN eGovernment index change in 2004-2010:<br />
Figure 2: International assistance and eGovernment index change<br />
Looking at the chart, it is clear that the improvement in the ICT sectors and eGovernment for the period<br />
2004-2010 has been bigger for the three countries, AL, BH and MC that received the highest international<br />
assistance per capita for their national strategies. According to the data and the trend-line in this chart,<br />
there is a positive relationship between international assistance per capita given in 2004 and change in<br />
percentage on eGovernment index until 2010. Reports on respective countries reveal that assistance on<br />
ICT and eGovernment strategies in these three countries was supported by other projects as well<br />
(UNDP). This shows a pattern in the donors’ behaviour to support and follow-up previous projects,<br />
especially those focused on strategies, with other ones to help their implementation. It is during this<br />
process of continuous support, long-term joint interest and isomorphic sustainable development where<br />
internationally assisted eGovernment initiatives are transformed from instruments into institutions.<br />
Although a positive change might be a very good indicator for the donor to show the effectiveness of its<br />
assistance, the receiving country is interested on the final result of that assistance compared to other<br />
countries. This is related to the implementation stage in the institutional evolution of internationally<br />
342
Endrit Kromidha<br />
assisted eGovernment initiatives. In this context, comparing the eGovernment indexes for 2010 for the six<br />
countries in the Western Balkans, we get a different picture, as shown in the following chart:<br />
Figure 3: International assistance in 2004 and the eGovernment index in 2010<br />
In this chart the fixed 2010 eGovernment index values are considered and not the change as in the<br />
previous one. The results presented here are to some extent controversial to the previous one. It is clear<br />
that the countries that received very little (SR) or no international assistance at all (CR and MN) to<br />
develop and implement eGovernment and ICT strategies, are in similar or higher position (CR) than those<br />
that received most of it (AL, BH and MC). The eGovernment index development between 2004-2010 for<br />
each of the countries in the following chart gives a better picture of this situation.<br />
Figure 4: Comparison of countries based on the EGovernment index level 2004 - 2010<br />
By simply looking at this chart it is evident that all countries that received international assistance to<br />
develop their national eGovernment and ICT strategies around 2004 experienced a quicker growth in<br />
their eGovernment index around 2005, but after that, their incremental increase was smaller compared to<br />
the countries that didn’t receive any assistance. It is easy to notice on the other hand that CR or MN have<br />
343
Endrit Kromidha<br />
a steady or increasing marginal change in their eGovernment indexes up to 2010, although they didn’t<br />
receive any assistance for their strategies. These results suggest that in the context of ICT and<br />
eGovernment, development is easier with a higher involvement of the recipient countries. However, it can<br />
be noticed that almost all countries (maybe except Serbia due to political instability and issues with<br />
Kosovo in the meantime) present a very similar increasing trend, regardless of receiving international<br />
assistance on eGovernment and ICT strategies or not. This could suggest that international assistance<br />
has a week influence in this sector. Furthermore the institution of international partnership between the<br />
donor and the recipient of eGovernment assistance is not strongly related to the amount and scope of<br />
this assistance.<br />
The critical approach of the quantitative data analysed here could suggests that benchmarking as the<br />
evaluation stage of eGovernment could be a self assessment tool for the evaluating organisation itself if<br />
involved in the two previous stages of strategy and implementation. In this process when benchmarking<br />
becomes a trend, creates continuity and introduces some isomorphic characteristics, it turns from an<br />
evaluation instrument into an institution. The advance of this institution influences both the donor and the<br />
recipient, potentially leading to the consequent stage of strategic reformulation.<br />
3. A critical analysis of eGovernment assistance and benchmarking<br />
An important element at this point is to understand the “Why?” of the situation shown by the data.<br />
According to a constructivist approach of institutionalisation, the strategy-implementation-evaluation cycle<br />
is assumed to be a normal process intended to benefit both the donor and the receiving party suggesting<br />
‘institutionalisation as the normalisation of policy paradigms’ (Hay 2006). EGovernment benchmarking as<br />
a developing institution has become an increasing trend from the late 90s, sometime considered also as<br />
‘a booming business’ (Bannister 2007). However, as Bannister (2007) points out, due to its problems with<br />
standardisation, purpose and the distortion effects, ‘benchmarks are not a reliable tool for measuring real<br />
eGovernment progress’. Contributing to this discussion and following the previous session with the data,<br />
there are some important issues that should be considered carefully before deriving any conclusion in<br />
this study.<br />
The starting point: Comparing countries with each other requires having a standard or common starting<br />
point. While the international assistance was adjusted according to the population in each country, the<br />
eGovernment index was not modified. For different reasons, countries like Croatia for example had a<br />
starting point far above all other region countries compared here. Assuming that Croatia is not developing<br />
fast enough now compared to the other countries is not entirely correct, since we don’t know what will be<br />
the development of the other countries when they reach the starting level of Croatia in 2004.<br />
The marginal change: The simple difference between the eGovernment index in 2010 and the one in<br />
2004 shows that the change is marginal, meaning that the more developed a country is, the smaller its<br />
incremental development (AL, BH, MC in Figure 6). Already developed countries that have reached a<br />
high development level do no experience the same growth compared to more developing countries.<br />
Because of this reason, it could be not entirely correct to assume that the least developed countries<br />
considered here in terms of ICT and eGovernment development are doing better than more developed<br />
countries when receiving international assistance.<br />
Donor-benchmarker duality: The scope of this study was not only to compare some countries, but also<br />
to analyse the role of that one actor, the United Nations, that is directly involved in the strategy,<br />
implementation and evaluation/benchmarking stages. Careful consideration is needed when the same<br />
organisation that is evaluating eGovernment is also supporting it for some countries through international<br />
assistance while leaving other countries to use their own resources. This situation could have an<br />
important role on the strategic implications and planning of national policies. Normally a country would be<br />
inclined to accept international assistance on strategic sectors such as ICT and eGovernment from such<br />
organisations. In the context of this study, it was not possible to find any case of such international<br />
assistance from donors being refused. The reason could be simply the fact that the donor has a strong<br />
international position also as the evaluator. Who would know better what is needed to rate higher in the<br />
next evaluation if not the evaluator itself? In the worst case a government might have to pay for this<br />
assistance. Again, the same private companies such as Capgemini or Ernst and Young that prepare the<br />
benchmarking (Bannister 2007) could be among the first to contact for premium expertise. It is necessary<br />
to highlight however that the interest and motives of UN and other international organisations giving<br />
assistance are different from those of the companies that benefit directly from the benchmarkingconsultancy<br />
combination.<br />
344
Endrit Kromidha<br />
Regardless of the criticism on international eGovernment assistance and its evaluation, this study has<br />
shown that improvements are being made. International donors are realizing the importance of evaluation<br />
and assessment on assistance, especially on democracy and government assistance (Crawford, Kearton<br />
2002), however they need to be careful on their involvement. As a final remark, regardless of its<br />
challenges, international assistance given for the development and implementation of eGovernment and<br />
ICT strategies could be considered more as a success rather than as a failure.<br />
4. Limitations<br />
The use of neoinstitutionalism as a theoretical approach to explain some of the main issues in this study<br />
is only an exploratory one based on an attempt to combine quantitative and qualitative data analysis. A<br />
more detailed analysis could contribute to neoinstitutionalism focusing more on the issues of power,<br />
without excluding here the potential of other theoretical and methodological approaches such as the<br />
Actor Network Theory to provide a different explanation of international eGovernment assistance<br />
networks and dynamics.<br />
This study is limited to a few countries and one donor, analyzing only the eGovernment and ICT strategy<br />
assistance. Other international donors and organisations might show different characteristics in the<br />
strategy – implementation – evaluation cycle, especially in the absence of the donor-benchmarker duality.<br />
The donors’ interaction with each other, especially when they share common objectives and goals is<br />
something that deserves some more attention in future research.<br />
5. Conclusions<br />
This study suggests that international assistance on ICT and eGovernment strategy development could<br />
have a limited but positive impact on overall eGovernment levels based on their positive relationship<br />
identified here. This could be especially true in less developed countries, similar to the ones studied in<br />
this research. At the same time, the research identifies some important problems that need to be<br />
addressed carefully before driving any results on international eGovernment assistance efficiency such<br />
as the starting inequalities between countries compared and the involvement of organisations and donors<br />
in different stages of the strategy – implementation – evaluation cycle. In this study, using both<br />
quantitative and qualitative data, critically analysing benchmarking and trying to explain phenomena<br />
through a theoretical framework was indeed challenging. However, this might be the only way to analyse<br />
complex situations of international assistance throughout the strategy, implementation and evaluation<br />
stages especially in fast developing sectors such as ICT and eGovernment.<br />
Long term development remains one of the biggest challenges, both for the international assistance<br />
donors and the recipient countries in all stages of ICT and eGovernment development from strategy to<br />
evaluation. It is generally implied that countries receiving international assistance have, at a certain point<br />
to develop their own capabilities. The ICT and eGovernment national strategies are only the first step<br />
towards long lasting reforms.<br />
From a neoinstitutionalist perspective, internationally assisted eGovernment initiatives in one hand and<br />
benchmarking on the other can be transformed from instruments into institutions. For this to occur, a<br />
process of trend creation, continuous support, long-term joint interests and isomorphic changes is<br />
needed. The donor-benchmarker duality critically analyzed in this study suggests that these two<br />
institutions are inter-related and could develop jointly. A major role in this case is played by international<br />
organizations with multifaceted involvement in the strategy-implementation-evaluation cycle of<br />
institutional development.<br />
References<br />
Aiken, M. & Hage, J. 1968, "Organizational Interdependence and Intra-Organizational Structure", American<br />
Sociological Review, vol. 33, no. 6, pp. pp. 912-930.<br />
Alesina, A. & Dollar, D. 2000, Who Gives Foreign Aid to Whom and Why?, Boston.<br />
Archer, M.S. 1982, "Morphogenesis versus Structuration: On Combining Structure and Action", The British journal of<br />
sociology, vol. 33, no. 4, pp. 455-483.<br />
Bannister, F. 2007, "The curse of the benchmark: an assessment of the validity and value of eGovernment<br />
comparisons", International Review of Administrative Sciences, vol. 73, no. 2, pp. 171.<br />
Baptista (John), J., Newell, S. & Currie, W. 2010, "Paradoxical effects of institutionalisation on the strategic<br />
awareness of technology in organisations", The Journal of Strategic Information Systems, vol. 19, no. 3, pp.<br />
171-183.<br />
345
Endrit Kromidha<br />
Burnside, C. & Dollar, D. 2000, "Aid, Policies, and Growth", The American Economic Review, vol. 90, no. 4, pp. 847-<br />
868.<br />
Collier, P. & Dollar, D. 2002, "Aid allocation and poverty reduction", <strong>European</strong> Economic Review, vol. 46, no. 8, pp.<br />
1475-1500.<br />
Colyvas, J.A. 2007, "From divergent meanings to common practices: The early institutionalization of technology<br />
transfer in the life sciences at Stanford University", Research Policy, vol. 36, no. 4, pp. 456-476.<br />
Crawford, G. & Kearton, I. 2002, "Evaluating democracy and governance assistance", Centre for Development<br />
Studies, University of Leeds.<br />
Crawford, G. 2001, Foreign aid and political reform: a comparative analysis of democracy assistance and political<br />
conditionality, Palgrave Macmillan.<br />
Diermeier, D. & Krehbiel, K. 2003, "Institutionalism as a Methodology", Journal of Theoretical Politics, vol. 15, no. 2,<br />
pp. 123.<br />
DiMaggio, P.J. & Powell, W.W. 1983, "The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality<br />
in Organizational Fields", American Sociological Review, vol. 48, no. 2, pp. 147-160.<br />
Fountain, J.E. 2001, Building the virtual state: Information technology and institutional change, Brookings Inst Pr.<br />
Geels, F.W. & Schot, J. 2007, "Typology of sociotechnical transition pathways", Research policy, vol. 36, no. 3, pp.<br />
399-417.<br />
Harrison, M.I., Koppel, R. & Bar-Lev, S. 2007, "Unintended consequences of information technologies in health care-<br />
-an interactive sociotechnical analysis", Journal of the American Medical Informatics Association, vol. 14, no. 5,<br />
pp. 542-549.<br />
Hawley, A.H. 1950, Human ecology: A theory of community structure.<br />
Hay, C. 2006, "Constructivist institutionalism", The Oxford Handbook of Political Institutions, pp. 56–74.<br />
Heeks, R. & Bailur, S. 2007, "Analyzing eGovernment research: Perspectives, philosophies, theories, methods, and<br />
practice", Government Information Quarterly, vol. 24, no. 2, pp. 243-265.<br />
Kallinikos, J. 2004, "Deconstructing information packages: Organizational and behavioural implications of ERP<br />
systems", Information technology & people, vol. 17, no. 1, pp. 8-30.<br />
Madon, S., Reinhard, N., Roode, D. & Walsham, G. 2009, "Digital inclusion projects in developing countries:<br />
Processes of institutionalization", Information technology for development, vol. 15, no. 2, pp. 95-107.<br />
March, J.G. & Olsen, J.P. 1989, Rediscovering institutions: The organizational basis of politics, Free Pr.<br />
Meyer, J.W. & Rowan, B. 1977, "Institutionalized Organizations: Formal Structure as Myth and Ceremony", The<br />
American Journal of Sociology, vol. 83, no. 2, pp. pp. 340-363.<br />
North, D.C. 1990, Institutions, institutional change, and economic performance, Cambridge Univ Pr.<br />
Orlikowski, W.J. 2008, "Using technology and constituting structures: A practice lens for studying technology in<br />
organizations", Resources, Co-Evolution and Artifacts, , pp. 255-305.<br />
Orlikowski, W.J. & Robey, D. 1991, "Information technology and the structuring of organizations", Working paper<br />
(Sloan School of Management); 3284-91., .<br />
Orlikowski, W.J. 1992, "The Duality of Technology: Rethinking the Concept of Technology in Organizations",<br />
Organization Science, vol. 3, no. 3, Focused Issue: Management of Technology, pp. 398-427.<br />
Orlikowski, W.J. & Barley, S.R. 2001, "Technology and Institutions: What Can Research on Information Technology<br />
and Research on Organizations Learn from Each Other?", MIS Quarterly, vol. 25, no. 2, pp. pp. 145-165.<br />
Poel, I.v.d. 2003, "The transformation of technological regimes", Research Policy, vol. 32, no. 1, pp. 49-68.<br />
Scott, W.R. 1995, "Institutions and organizations. Foundations for organizational science", London: A Sage<br />
Publication Series, .<br />
Stone, D., Maxwell, S. & Keating, M. 2001, "Bridging research and policy", Background paper presented for An<br />
International Workshop Funded by the UK Department for International Development, Radcliffe House, Warwick<br />
University.<br />
Thompson, J.D. 1967, "Organizations in action: Social science bases of administration", .<br />
UNCTAD 2010, Information Economy Report, United Nations, New York and Geneva.<br />
UNDP Europe and CIS 2010, United Nations Development Programme - Democratic Governmance [Homepage of<br />
United Nations Development Programme], [Online]. Available: http://europeandcis.undp.org/ [2010, November] .<br />
UNPAN 2003-2010, United Nations EGovernment Development Knowledge Base, United Nations Public<br />
Administration Networks, New York and Geneva.<br />
Walsham, G. 2006, "Doing interpretive research", <strong>European</strong> Journal of Information Systems, vol. 15, no. 3, pp. 320-<br />
330.<br />
Walsham, G. 1995, "Interpretive case studies in IS research: nature and method", <strong>European</strong> journal of information<br />
systems, vol. 4, no. 2, pp. 74-81.<br />
Walsham, G. & Waema, T. 1994, "Information systems strategy and implementation: a case study of a building<br />
society", ACM Transactions on Information Systems (TOIS), vol. 12, no. 2, pp. 150-173.<br />
World Bank 2010, World Population statistics. Available: http://datafinder.worldbank.org/population-total [2010].<br />
Zucker, L.G. 1977, "The Role of Institutionalization in Cultural Persistence", American Sociological Review, vol. 42,<br />
no. 5, pp. pp. 726-743.<br />
346
Challenges to the Design and use of Stages-of-Growth<br />
Models in eGovernment<br />
Devender Maheshwari, Anne Fleur van Veenstra and Marijn Janssen<br />
Delft University of Technology, Delft, The Netherlands<br />
D.Maheshwari@tudelft.nl<br />
A.F.E.vanVeenstra@tudelft.nl<br />
M.F.W.H.A.Janssen@tudelft.nl<br />
Abstract: In the past decade stages-of-growth models have gained considerable attention in eGovernment research<br />
and practice. Stage models often regard eGovernment development as a progressive accumulation of steps.<br />
Although stage models have advantages as they give direction to development and help to outline the desired<br />
outcomes, they provide limited help at the organizational level and attract much criticism. This paper investigates and<br />
compares a number of stages-of-growth models to identify challenges to the design and use of these models in<br />
eGovernment. Based on existing literature and by analyzing stages-of-growth models, challenges are identified and<br />
discussed to give better insight into the design, use, and application of these models both for research and practice.<br />
We found that many of the stage models propose a linear sequence of activities, and only provide help at the early<br />
stages of development. Although conceptually appealing, most stage models are hard to translate to the situation of<br />
individual organization. Stages-of-growth-models do not have any standardized design and development structure as<br />
the majority of models evolved from an effort to achieve specific objectives of an organization, business or<br />
researcher. Measuring and benchmarking the stages models is a multifaceted exercise as the models not only differ<br />
in scope and dimensions, but also give scant attention to the back-office stages-of-growth.<br />
Keywords: eGovernment, stages-of-growth models, benchmarking, measurement, stages<br />
1. Introduction<br />
eGovernment development started in the mid-1990s when organizations realized the significance of<br />
information technology (IT) for their performance and began to use IT to excel in their administrative<br />
processes (Siau and Long 2004; Siau and Long 2005). At the same time, stage models describing<br />
eGovernment development gained attention and they are used by many government organizations all<br />
over the world (Layne and Lee 2001; Moon 2002; Reddick 2004; Siau and Long 2005; Klievink and<br />
Janssen 2008; Lee 2010). The development of stage models by different organizations and governments<br />
has resulted in a wide variety of models, varying in their scope and focus. Currently, however, the stage<br />
models are increasingly criticized for their design, operation, implementation, measurement and<br />
benchmarking methods (Janssen, Rotthier et al. 2004; Kaplan and Norton 2004; Bannister 2007;<br />
Coursey and Norris 2008; Janssen 2010). After having been applied for over a decade, these authors<br />
also discuss a range of problems related to the application of stage models in eGovernment. Thus, the<br />
development and application of stage models faces several challenges. Furthermore, the wide variety of<br />
stage models present also leads to questions on which stage model is applicable in a specific situation.<br />
The development and use of stage models depends on the benefits that are realized and any adverse<br />
effects that might exist. Although benefits of stages-of-growth-models are highlighted by many, providing<br />
an insight into the challenges and disadvantages of these stage models is likely to give policy and<br />
decisions makers the opportunity to better exploit the advantages and overcome these challenges.<br />
Therefore, in this paper we analyse the characteristics of existing stages-of-growth-models and identify<br />
challenges to the design and use of the stage models. In section 2 we give an overview of the most<br />
commonly used stage models in literature by discussing their characteristics, differences, and the<br />
criticism that they have attracted. Then, in section 3 we identify challenges to the design and use of stage<br />
models based on the characteristics and comparison of stages-of-growth models, followed by a<br />
discussion of these characteristics and challenges in section 4. Finally, in section 5 we present our<br />
conclusions and recommendations for future research.<br />
2. Background of stages-of-growth models in eGovernment<br />
2.1 Origins and application<br />
eGovernment aims to implement electronic services for citizens and businesses, as well as digitizing<br />
processes and applications in governments across the globe. After the emergence of eGovernment,<br />
researchers as well as public and private sector organizations started to draw frameworks to fulfil the<br />
objectives of eGovernment initiatives. Stage models were introduced in eGovernment to describe<br />
347
Devender Maheshwari et al.<br />
eGovernment development (descriptive) and guide eGovernment implementation (prescriptive). Many<br />
different stage models have been developed by governments, private organizations, and by researchers.<br />
In 2000, the Gartner group presented a stage model defining the roadmap to achieve objectives of<br />
eGovernment (Baum and Di Maio 2000). In 2001 four more stage models were developed (Hiller and<br />
Bélanger 2001; Layne and Lee 2001; UN 2001; Wescott 2001), followed by another one in 2002 (Moon<br />
2002). Since then, many more stage models have been proposed, tested and implemented by various<br />
researchers and organizations. Most of the eGovernment stage models focus on the front-office as<br />
starting point to satisfy the needs of citizens and businesses, (see for, example (Baum and Di Maio 2000;<br />
Hiller and Bélanger 2001; Kaplan and Norton 2001; Layne and Lee 2001; Moon 2002).<br />
Applications of eGovernment stages-of-growth are many, e.g. publishing, interaction, integration, political<br />
participation, and transformation (see Table 1); whereas the applications for using the stages-of-growth<br />
models are based on the design and implementation objectives of eGovernment. An advantage of<br />
applying stage models to the implementation of eGovernment is the reduction of complexity. Depending<br />
on the scope of the implementation and on its complexity, similar blocks are combined and renamed as<br />
stages, and used to implement eGovernment step-by-step in a customized manner. Layne and Lee<br />
(2001) state that the unmanageable and chaotic challenges of eGovernment implementation can be<br />
resolved to some extend by defining a stages-of-growth model.<br />
Stage models illustrate the growth and maturity of eGovernment that helps organizations to determine the<br />
current status and provides guidelines for further developments. Stage models can be used to determine<br />
the maturity level of eGovernment within a stage or on the preferred roadmap. The term maturity<br />
describes the current state of a given level in a continuous process (Andersen and Henriksen, 2006).<br />
Furthermore, the stage models can also be used for measuring and benchmarking. In order for this to be<br />
effective, the stage models need to be aligned, structured and designed comprising balanced front-office,<br />
back-office, and political participation stages. Stage models are flexible and can be designed for<br />
achieving the objectives of policy makers. Hence, the designers can develop software applications to<br />
implement the stages as per the policies. Whereas the designers only implement policies, the policy<br />
makers and strategy developers can also indirectly inherit the consequences and re-define the policies<br />
based on design constraints.<br />
2.2 Comparing stages-of-growth models in eGovernment<br />
A number of eGovernment stage models is listed in Table 1. We conducted a comprehensive literature<br />
review and selected some of the most common stage models from literature using scientific search<br />
engines (e.g. Google scholar and Scopus), by looking at well-known eGovernment journals, and through<br />
snowballing (by following cross referencing). Furthermore, the selection of models is limited to the<br />
maximum number of six stages. The stages-of-growth models listed in Table 1 are developed both by<br />
researchers (Hiller and Bélanger 2001; Layne and Lee 2001; Wescott 2001; Moon 2002; West 2004;<br />
Siau and Long 2005; Andersen and Henriksen 2006; Klievink and Janssen 2008), as well as by public<br />
and private organizations e.g. (Research, Deloitte et al. 2000; UN 2001; Accenture 2003; UN 2003;<br />
Global 2005; UN 2008; Leveraging 2010). Assessment and comparison of stages-of-growth is a complex<br />
endeavour because stages that have similar names, in fact, have different definitions and explanations.<br />
Table 1 shows the comparison of different stage-of-growth models, by comparing the order and topic of<br />
their stages.<br />
Stage models define stages in series starting from the very initial stage progressing stepwise to the final<br />
stage e.g. (Baum and Di Maio 2000; Howard 2001; Accenture 2003; Siau and Long 2005; and UN 2008<br />
etc.). For example, Moon (2002) describes the minimum or initial stage as one-way communication,<br />
which increases gradually step-by-step to two-way communication, service and financial transaction,<br />
integration, and political participation. Although the stages are defined in series, the stages themselves<br />
are different. Table 1 clearly shows that majority of stage models start with a front-office based first stage,<br />
for example, often the stage models have information provisioning on government websites as a first<br />
stage. The later stages aim for different levels of maturity, although some of the more advanced stages<br />
are recurrent, but in a different sequence. For example, integration is defined as the second stage by<br />
Klievink (2008); as the fourth stage by Moon (2002); and as the sixth stage by Baum and Di Maio (2000).<br />
The stage models listed in Table 1 also show that the back-office stages are mostly in the later stages as<br />
most stage models predominantly focus on the front-office.<br />
348
Table 1: Overview of stage models in eGovernment<br />
No.<br />
1<br />
2<br />
3<br />
4<br />
5<br />
6<br />
7<br />
8<br />
Stage<br />
Model<br />
Gartner<br />
Group<br />
(2000)<br />
Deloitte<br />
Research<br />
(2000)<br />
Layne<br />
and Lee<br />
(2001)<br />
Hiller and<br />
Belanger<br />
(2001)<br />
UN<br />
(2001)<br />
Wescott<br />
(2001)<br />
Howard<br />
(2001)<br />
Moon<br />
(2002)<br />
9 Accenture<br />
(2003)<br />
10<br />
11<br />
12<br />
13<br />
14<br />
15<br />
16<br />
UN<br />
(2003)<br />
West<br />
(2004)<br />
Siau and<br />
Long<br />
(2005)<br />
UN<br />
(2005)<br />
Anderson<br />
and<br />
Henriksen<br />
(2006)<br />
UN<br />
(2008)<br />
Klievink<br />
and<br />
Janssen<br />
(2009)<br />
Devender Maheshwari et al.<br />
Stage 1 Stage 2 Stage 3 Stage 4 Stage 5 Stage 6<br />
Web presence Interaction Transaction Transformation<br />
Info publishing<br />
and<br />
dissemination<br />
Two way<br />
transaction<br />
Catalogue Transaction<br />
Info<br />
dissemination<br />
and catalogue<br />
Emerging<br />
presence<br />
Email and<br />
internal<br />
network<br />
Two-way<br />
communication<br />
Enhanced<br />
presence<br />
Interorganization<br />
and public<br />
access to<br />
information<br />
Multi-purpose<br />
portals<br />
Vertical<br />
integration<br />
Service and<br />
financial<br />
transaction<br />
Interactive<br />
presence<br />
Two-way<br />
communication<br />
Publish Interaction Transact<br />
One-way<br />
communication<br />
Online<br />
presence<br />
Emerging<br />
presence and<br />
enhanced<br />
presence<br />
Billboard stage<br />
Two way<br />
communication<br />
Basic capability<br />
Interactive<br />
presence<br />
Partial service<br />
delivery stage<br />
Service and<br />
financial<br />
transaction<br />
Service<br />
availability<br />
Transactional<br />
presence<br />
Portal stage<br />
Portal<br />
personalization<br />
Horizontal<br />
integration<br />
Vertical and<br />
horizontal<br />
integration<br />
Transactional<br />
presence<br />
Allowing<br />
exchange of<br />
value<br />
Integration<br />
Mature<br />
delivery<br />
Networked<br />
presence<br />
Interactive<br />
democracy<br />
Clustering of<br />
common<br />
services<br />
Political<br />
participation<br />
Seamless<br />
presence<br />
Joined-up<br />
government<br />
Political<br />
participation<br />
Service<br />
transformation<br />
E-participation<br />
index<br />
Web presence Interaction Transaction Transformation E-democracy<br />
Emerging<br />
presence and<br />
enhanced<br />
presence<br />
Interactive<br />
presence<br />
Transactional<br />
presence<br />
Networked<br />
presence<br />
Cultivation Extension Maturity Revolution<br />
Emerging<br />
presence and<br />
enhanced<br />
presence<br />
Stove-piped<br />
applications<br />
Interactive<br />
presence<br />
Integrated<br />
organization<br />
Transactional<br />
presence<br />
Nationwide<br />
portals<br />
349<br />
Connected<br />
Interorganizational<br />
integrations<br />
E-participation<br />
index<br />
E-participation<br />
index<br />
Demanddriven,<br />
joined-up<br />
government<br />
Full<br />
integration<br />
and<br />
enterprise<br />
transaction<br />
Digital<br />
democracy
Devender Maheshwari et al.<br />
Not only do these models have a different placement of the respective stages, also the number of stages<br />
differs. For example, Howard (2001) distinguishes three different stages, West (2004) four, UN (2005)<br />
five, and Deloitte Research (2000) six stages. Furthermore, some stages such as multi-purpose portals,<br />
portal personalization, nationwide portals, mature delivery, and portal stage are a combination of frontoffice<br />
transactions and back-office integration. The stage models also seem to be designed and<br />
implemented based on biased criteria to fulfil objectives that vary across organizations and governments.<br />
Many of the growth stage models actually do not explicitly describe and discuss the important back-office<br />
attributes such as inter-operability, policies and regulations, and unified standards.<br />
3. Typical challenges of stage models<br />
Based on the overview of stages-of-growth models, a number of challenges for developing and using<br />
stage models is derived. Some of the challenges are based on the criticism given to stage models by<br />
other authors (Janssen, Rotthier et al. 2004; Bannister 2007; Coursey and Norris 2008; Janssen 2010),<br />
and some of the challenges are derived by the comparison of the different stage models in the previous<br />
section. Bannister (2007) pointed out that the outcomes of ill-designed stage models risk distorting the<br />
policies of the governments. Therefore, it is important to have an understanding of the challenges that are<br />
related to deploying stage models. Understanding the problems of eGovernment stage models is vital for<br />
improving current stage models to become less complex, better structured, more easily implementable,<br />
and more sophisticated. A short description of the identified challenges is given in Table 2. Hereafter we<br />
discuss each challenge and how it is derived.<br />
Table 2: Overview of challenges of stage models<br />
No. Type of challenges Short Description<br />
1 Bias (non-empirical) Existence of bias and lack of theory-based developments<br />
2 Lack of explanation Unclear design, development, and implementation approaches<br />
3 Number of stages Unclear how the number of stages in a stage model is decided upon<br />
4 Linear implementation Shortage of future predictions, and due to step-by-step linear implementation<br />
5 Common frameworks<br />
6 Concatenation<br />
Difficulties to assess and compare the stages-of-growth models due to the<br />
difference in structure and scope<br />
Maturity of stage models cannot be determined if the growth stages are<br />
overlapping<br />
7 Economical Adverse effects of high costs and low return on investment (ROI)<br />
8 Inter-connection Interruptions and time delays in the transition from one stage to succeeding stage<br />
9<br />
Measuring and<br />
benchmarking<br />
10 Meta-synthesis<br />
11<br />
Time and growth<br />
relationship<br />
Stage models do not describe assessment and evaluation methods, and existing<br />
evaluation methods are based on end results and rarely measure back-office<br />
Integrative review of different eGovernment stage models may increase the<br />
overall complexity<br />
Stage models can take indefinite time to achieve desired maturity level as the<br />
model do not define any time frame for growth<br />
Bias (non-empirical) The mature stages of the majority of eGovernment stage models are yet not fully<br />
reached by most of the organizations (Klievink and Janssen 2008). It can, thus, be concluded that<br />
majority of stage models is not based on empirical grounds and remains speculative and based on<br />
presumptions (Coursey and Norris 2008). Many of the stage models (e.g. Hiller and Bélanger 2001;<br />
Layne and Lee 2001; Wescott 2001; Moon 2002; West 2004; Siau and Long 2005; and Andersen and<br />
Henriksen 2006 etc.) discussed in this paper are not based on theoretical foundations and do not provide<br />
any structure or guidelines of theory development for strategy and policy makers.<br />
Lack of Explanation Not one model explains how to achieve the highest maturity level. Thus, the lack of<br />
explanation of how to achieve the next growth stage does not provide enough information for<br />
governments to achieve the desired maturity level. Klievink and Janssen (2008) criticize existing stage<br />
models on the basis of these being derived based on past performance of eGovernment organizations<br />
and rarely providing any information related to the future predictions.<br />
350
Devender Maheshwari et al.<br />
Number of Stages Stage models often have a different number of stages, some have as many as up to<br />
ten different stages (Zarei, Ghapanchi et al. 2008), and others as little as two stages (Reddick 2004).<br />
Stages are placed into separate similar blocks of growth processes for better performance and<br />
effectiveness of eGovernment. However, the varying number of stages makes eGovernment growth and<br />
maturity assessment and benchmarking complex. So far, there has been little discussion about the<br />
criteria for choosing a number of stages.<br />
Linear Implementation Stage models are normally deployed in linearly concatenated steps progressing<br />
from first stage to the final stage (Coursey and Norris 2008). According to Coursey and Norris (2008)<br />
eGovernment progression is non-linear, whereas the stage models are based on linear implementation of<br />
stages starting from the basic level.<br />
Common Framework Depending on the organizational manifestos some public organizations focus on<br />
customer-oriented service delivery, others focus on effective internal processes and ICT systems (Jansen<br />
2005). The stage models listed in Table 1 do not have a common scope and order of stages. Some<br />
models define back-end integration in the initial stages while others define them in the later stages,<br />
whereas none of these stage models is applicable for both local and national governments. EGovernment<br />
growth stage models do not have a generic common framework, making measuring and benchmarking,<br />
as well as comparing such models very difficult.<br />
Concatenation Each stage is dependent on the previous stage and should not be implemented unless<br />
the desired maturity level of previous stage is achieved. This means that the linearly concatenated stages<br />
should not overlap with each other as they are not implemented simultaneously. Therefore, if a stage<br />
overlaps with preceding and/or succeeding stages in linear progressive fashion, the status of current<br />
growth stage cannot be determined.<br />
Economical Stages-of-growth models are also referred to as maturity models. Therefore, public<br />
organizations can use stage models for measuring and benchmarking purposes. Bannister (2007)<br />
highlighted that the benchmarking costs for widespread areas like eGovernment might be exorbitant if the<br />
benchmarking parameters are not carefully chosen, whereas the misinterpretation of such benchmarks<br />
can also result in economic problems (e.g. ROI) and wrong decision-making.<br />
Inter-connection: Stage models comprising a number of stages hardly allow any inter-connection<br />
(smooth transition from one stage to another) within stages for continuum of eGovernment development.<br />
Growth of the stage models experiences time delays and interruptions during inter-connection. Stages-ofgrowth<br />
models do not define a threshold maturity level so that the overlapping, interruptions, and the time<br />
delays can be avoided. For example, a service can only be offered once the ICT infrastructure is in place<br />
and fulfills minimum technical requirements to provide services. In this case, the implementation of next<br />
stage already starts if the minimum threshold maturity level is achieved.<br />
Measuring and Benchmarking: Through measuring and benchmarking, government organizations<br />
determine the current status, advantages and disadvantages, and further growth and progress of the<br />
level of eGovernment. Stage models shown in Table 1 vary in structures, dimensions, and scope,<br />
therefore, the measurement methods can also vary for different types of models. Stage models do not<br />
explain evaluation methods, and often the evaluation is based on the end results. Growth stages for<br />
back-end are rarely measured (Janssen 2010) because the existing evaluation approaches<br />
predominantly focus on the front-end. EGovernment measures are mostly qualitative and lack<br />
quantitative measures.<br />
Meta-Synthesis This is one approach for theory development by integrative review of existing stage<br />
models. It is, however, subjective to selecting particular stage models since the models themselves are<br />
biased and developed to achieve specific objectives as discussed in section 2. According to Siau and<br />
Long (2005) the advances and evolution of stage models increase the complexity and the desired level of<br />
integration of ICT-systems. Hence, meta-synthesis of existing different stage models is a complex<br />
endeavor. Furthermore, the meta-synthesis approaches do not deal with futuristic predictions and may<br />
result in less effective stage model.<br />
Time and growth relationship Stages-of-growth models comprise a number of stages (0,1,2,3..n) and<br />
stages are implemented in concatenated linear fashion. Each stage achieves the minimum required<br />
maturity level before the stage models progresses to the next stage. The growth of linear stage models<br />
351
Devender Maheshwari et al.<br />
can be measured at different instants of time (t) to determine the maturity level of the current stage as<br />
well as the model itself so that the stages can be plotted against the time. This type of time and growth<br />
relationship may face problems, i.e. stages might not reach the highest desired maturity level, stages<br />
might overlap when the next stage start before the current stage reaches the desired maturity, and the<br />
growth might be discrete with steady states where no progress can be observed due to the time delay<br />
between different maturity growth stages. Finally, benchmarking the overall growth of the stage models is<br />
not possible because the stage models designed for similar objectives do not adopt standard time frames<br />
(comprising of n number of stages) to reach the maximum maturity.<br />
4. Discussion<br />
A wide variety of stage models exists in literature, but it is difficult to determine which model is the best<br />
model in which situation. By looking at the number of citations in indexes as Google Scholar and Google<br />
the model of Layne and Lee (2001) is the most cited model. Their model is also criticized very often. It<br />
seems that no model has ever been accepted and recognized as a standard benchmark. The design<br />
methodology, objectives, and outcomes vary greatly from model to model. Growth stage models have<br />
traditionally been designed and implemented according to the objectives of the particular organizations,<br />
governments or individual researchers. Stage models that are effective in one organization can be<br />
ineffective in another organization. As it is dependent on the specific situation, none of the stage models<br />
can be regarded as the best model, but policy makers wanting to use these models, need to look<br />
carefully which model suits best their environment.<br />
Stages within stage models can be generally classified into three categories: front-end, back-end and eparticipation.<br />
As discussed earlier, the proportional weight of the stages in a model lacks the balance<br />
between these three classification categories. Stage models bear certain characteristics based on the<br />
desired objectives, applications, and processes. A model requires trade-offs like the level of abstraction,<br />
implementation help, time and growth, costs and achievements, and ease of understanding. There<br />
always exists a trade-off between different stages and the balance of stages. Some eGovernment<br />
applications need more attention on the front-end, while others need more focus on the back-end or on eparticipation.<br />
Although limited attention is given to the trade-offs; they can be really useful in reengineering<br />
the existing stage models to overcome disadvantages. Stage growth models supporting such<br />
kind of flexible design methods with different trade-offs can be adopted by more private as well as public<br />
organizations. Thus, a common standardized framework can be formed that is more of less acceptable in<br />
different eGovernment scenarios and applications for different types local, national and international<br />
public organizations.<br />
eGovernment growth stage models can be vulnerable if there are no measurement and evaluation<br />
methods to identify the current status of an organization. There is a lack of instruments to monitor the<br />
growth of the stage models. Almost none of the stage models include measurement methods (qualitative<br />
and/or quantitative) to evaluate and assess the maturity level of different stages and the model itself.<br />
Furthermore, the evaluation gets more difficult when it becomes impossible to measure the growth during<br />
overlapping time between various stages. This may support the argument that the stage models do not<br />
have linear growth, while the stages could start growing parallel to each other at different times. Back-end<br />
measurements, which make up a major part of the overall measurements, have been widely ignored,<br />
since the major focus of the growth stage models has been on the front-end.<br />
5. Conclusion<br />
This paper aims to explore the challenges of existing eGovernment growth stage models to advance the<br />
use of these models in practice. Stage models have gained considerable attention in eGovernment and<br />
are widely applied as they give direction to development and help to outline desired outcomes.<br />
Furthermore, stages-of-growth models can be useful for benchmarking, when characteristics and criteria<br />
of steps are clearly defined. We compared a number of stage models by outlining their respective stages.<br />
Our comparison shows that stage models differ greatly in the number of stages and their proposed<br />
course of action. On the basis of literature and by comparing the stage models we derived eleven<br />
challenges to the development and use of these models. We found that the majority of the stage models<br />
predominantly focuses on front-office and largely ignores back-office developments. Another matter is<br />
that stages are implemented in concatenated linear fashion, but depending on the preceding stages to<br />
reach full maturity can lead to indefinite delay due to technical and political issues.<br />
Currently, eGovernment stage models are not empirically derived, but instead, based on predictions for<br />
the future, whereas empirical approaches are necessary to advance the accuracy of these stage models.<br />
352
Devender Maheshwari et al.<br />
eGovernment is a broad area and successful outcomes of a particular past event do not necessarily<br />
represent various pertaining aspects of eGovernment. Furthermore, differences in structure, scope, and<br />
design criteria of stage models limit the possibilities for comparison and benchmarking. Also, there are no<br />
measurement and evaluation methods to monitor the current status and growth of stage models. Stage<br />
models need to describe measurement instruments to evaluate the maturity level of each stage and the<br />
overall model. And finally, whereas stage models are designed for policy makers, they provide little help<br />
for business process reengineering, infrastructure development and IT decision-making.<br />
References<br />
Accenture (2003). "EGovernment Leadership: Engaging the Customer." New York, Accenture.<br />
Andersen, K. V. and H. Z. Henriksen (2006). "EGovernment maturity models: Extension of the Layne and Lee<br />
model." Government Information Quarterly 23(2): 236-248.<br />
Bannister, F. (2007). "The curse of the benchmark: an assessment of the validity and value of eGovernment<br />
comparisons." International Review of Administrative Sciences 73(2): 171-188.<br />
Baum, C. and A. Di Maio (2000). "Gartner’s four phases of eGovernment model." Stamford, Ct., Gartner Group 21:<br />
12-6113.<br />
Coursey, D. and D. Norris (2008). "Models of eGovernment: Are they correct? An empirical assessment." Public<br />
Administration Review 68(3): 523-536.<br />
Global, E. (2005). "Government Readiness Report 2005: From EGovernment to E-Inclusion." ONU. United Nations.<br />
Hiller, J. S. and F. Bélanger (2001). Privacy Strategies for Electronic Government. EGovernment 2001. M. A.<br />
Abramson and G. E. Means. Lanham, Maryland, Rowman & Littlefield Publishers: 162-198.<br />
Howard, M. (2001). "eGovernment Across the Globe: How Will" e" Change Government?" Government Finance<br />
Review 17(4): 6-9.<br />
Jansen, A. (2005). "Assessing EGovernment progress–why and what." NOKOBIT: 82-8033.<br />
Janssen, D., S. Rotthier, et al. (2004). "If you measure it they will score: An assessment of international<br />
eGovernment benchmarking." Information Polity 9(3): 121-130.<br />
Janssen, M. (2010). "Measuring and Benchmarking the Back-end of EGovernment: A Participative Self-assessment<br />
Approach." Electronic Government: 156-167.<br />
Kaplan, R. and D. Norton (2001). "Transforming the Balanced Scorecard from Performance Measurement to<br />
Strategic Management: Part I." Accounting Horizons 15(1).<br />
Kaplan, R. and D. Norton (2004). Strategy maps: Converting intangible assets into tangible outcomes, Harvard<br />
Business Press.<br />
Klievink, B. and M. Janssen (2008). Stage models for creating joined-up government: from local to nation-wide<br />
integration, Digital Government Society of North America.<br />
Layne, K. and J. Lee (2001). "Developing fully functional EGovernment: A four stage model." Government<br />
Information Quarterly 18(2): 122-136.<br />
Lee, J. (2010). "10 year retrospect on stage models of eGovernment: A qualitative meta-synthesis." Government<br />
Information Quarterly.<br />
Leveraging, E. (2010). "United Nations EGovernment Survey 2010."<br />
Moon, M. (2002). "The Evolution of E Government among Municipalities: Rhetoric or Reality?" Public administration<br />
review 62(4): 424-433.<br />
Reddick, C. (2004). "A two-stage model of eGovernment growth: Theories and empirical evidence for US cities."<br />
Government Information Quarterly 21(1): 51-64.<br />
Research, D., Deloitte, et al. (2000). At the Dawn of eGovernment: The Citizen as Customer, Deloitte Consulting.<br />
Siau, K. and Y. Long (2004). Factors impacting eGovernment development.<br />
Siau, K. and Y. Long (2005). "Synthesizing eGovernment stage models- a meta-synthesis based on metaethnography<br />
approach." Industrial Management & Data Systems 105(3): 443-458.<br />
UN (2003). "UN Global EGovernment Survey 2003. ."<br />
UN, E. (2001). "Government Report(2001)“Benchmarking EGovernment: A Global Perspective-Assessing the UN<br />
membestates”." UN Publication,[online] http://www. upan1. org/egovernment2. asp.<br />
UN, O. (2008). "Government Survey 2008: from eGovernment to Connected Governance." United Nations. New<br />
York.<br />
Wescott, C. (2001). "EGovernment in the Asia-Pacific Region." Asian Journal of Political Science 9(2): 1-24.<br />
West, D. (2004). "E Government and the Transformation of Service Delivery and Citizen Attitudes." Public<br />
administration review 64(1): 15-27.<br />
Zarei, B., A. Ghapanchi, et al. (2008). "Toward national eGovernment development models for developing countries:<br />
A nine-stage model." The International Information & Library Review 40(3): 199-207.<br />
353
Developing Measures for Benchmarking the Interoperability<br />
of Public Organizations<br />
Devender Maheshwari, Anne Fleur van Veenstra and Marijn Janssen<br />
Delft University of Technology, Delft, The Netherlands<br />
D.Maheshwari@tudelft.nl<br />
A.F.E.vanVeenstra@tudelft.nl<br />
M.F.W.H.A.Janssen@tudelft.nl<br />
Abstract: Public organizations increasingly collaborate with each other by forming public service networks for<br />
realizing joined-up service delivery to facilitate their clients, citizens and businesses. In such networks, similar data is<br />
collected, stored, and maintained recursively and repeatedly among governmental agencies. Many managers and<br />
decision-makers in organizations are aware of the need for interoperability, but they are unaware of their<br />
interoperability maturity level. Although some maturity models exist, they do not define procedures to measure and<br />
benchmark interoperability. There is a lack of measures for benchmarking interoperability and measuring is<br />
complicated as interoperability is a multifaceted concept, covering many interdependent aspects. This paper aims to<br />
develop a set of measures for benchmarking interoperability in public organizations to enable them to avoid<br />
repeatedly gathering already existing data. Firstly, based on a literature review we define measures for<br />
benchmarking interoperability. Secondly, we present a measurement model for interoperability between<br />
organizational divisions as well as for the overarching interoperability of organization. Measures of benchmarking will<br />
not only help public organizations ascertaining their position of interoperability maturity, but will also allow them to<br />
compare their status with other organizations in service networks as well as assist them to provide effective and<br />
efficient services.<br />
Keywords: eGovernment, interoperability, measurement, benchmarking, public service organizations<br />
1. Introduction<br />
The field of electronic government (eGovernment) predominantly focuses on the introduction of<br />
information and communication technology (ICT) in the front-office, and it requires online access and<br />
availability of public resources desired by citizens, employees, businesses, and government<br />
organizations (e.g. Breen 2000; Layne and Lee 2001; Moon 2002; Lee 2010; and Leveraging 2010 etc.).<br />
In order to make governments and governance more efficient, transparent, effective, and accountable,<br />
the central focus of eGovernment initiatives shifts to the back-office processes, procedures and services.<br />
This requires that disparate systems need to work together. Hence, one of the central challenges faced<br />
by public service organizations (PSOs) today is achieving interoperability.<br />
Scholl and Klischewki (2007) argue that achieving interoperability in PSOs is challenging and evaluation<br />
of interoperability is also underdeveloped and needs to be properly investigated. In literature,<br />
interoperability is usually defined from a technical perspective, for example as the “technical capability for<br />
eGovernment interoperation” (Scholl and Klischewski 2007,p. 901), and the “ability of different types of<br />
computers, networks, operating systems, and applications to work together effectively, without prior<br />
communication, to exchange information in a useful and meaningful manner” Moen (2000). IEEE<br />
definition of interoperability given as the ability of two or more systems or components to exchange<br />
information and to use the information that has been exchanged (IEEE 1990). Scholl and Klischewski<br />
(2007) identify nine different constraints that influence interoperability of PSOs: 1) constitutional, 2)<br />
jurisdictional, 3) collaborative, 4) organizational, 5) informational, 6) managerial, 7) technological, 8) cost,<br />
and 9) performance.<br />
A number of eGovernment models mention interaction and integration as essential components (Baum<br />
and Di Maio 2000; Breen 2000; Hiller and Belanger 2001; Layne and Lee 2001). Although there is an<br />
informal agreement between all concerned parties that eGovernment interoperability is not only a<br />
technical subject, but it also applies to organizational aspects (Goldkuhl 2009), in extant literature it is<br />
predominantly regarded as a technical matter. Technical aspects of interoperability are discussed in<br />
detail by several authors and organizations having a major focus on information systems, e.g. (DoD<br />
1998; Clark and Jones 1999; NATO 2003; Tolk and Muguira 2003; ATHENA 2004; Turnitsa 2005). The<br />
level of interoperability is relative and difficult to determine since it depends on the needs and desires of<br />
services, processes, and procedures that an organization has to offer to meet the objectives.<br />
Interoperability can be between two individual systems, between entire sets of systems within<br />
organization, and within the multiple systems in different public service organizations. In this paper, we<br />
354
Devender Maheshwari et al.<br />
consider a single organization with multiple systems. Our focus is to highlight the organizational as well<br />
as technical aspects and measures that influence the overarching interoperability in organization.<br />
The goal of this paper is to investigate the eGovernment interoperability models and develop a set of<br />
measures for benchmarking. In this explorative paper we identify measures of benchmarking<br />
interoperability in PSOs, investigating both technical as well as organizational aspects. Section 2 gives a<br />
brief description of the existing interoperability measurement and benchmarking practices in PSOs and<br />
related approaches. In section 3 we propose an instrument for benchmarking interoperability of PSOs,<br />
which is subsequently used in a case study. Finally, we present conclusions and recommendation for<br />
future research in section 4.<br />
2. Literature review<br />
2.1 Interoperability in public service organizations<br />
eGovernment interoperability maturity is often referred to as a technological issue. For example, (Moen<br />
2000; Scholl and Klischewski 2007) discuss the Z39.50 middleware standard with four interoperability<br />
levels: syntactic, functional, semantic, and user task. Others consider interoperability to be a combination<br />
of organizational as well as technical issues, (e.g. Janssen and Scholl 2007) described four<br />
interoperability architecture layers: pragmatic, syntax, semantic, and technical. These layers were<br />
previously referred to as standardisation requirements of interoperability with a brief explanation of the<br />
pragmatic level (Papazouglou 2006). PSOs across the globe use different interoperability models with<br />
different levels. An overview of various models including their levels of interoperability maturity is shown<br />
in Table 1.<br />
Table 1: Models of interoperability maturity<br />
No. Model Year Author Level - 0 Level - 1 Level - 2 Level - 3 Level - 4 Level - 5 Level - 6<br />
1 LISI 1998 DoD<br />
2 OIM 1999<br />
3 NMI 2003 NATO<br />
4 LCIM 2003<br />
Clark, T. and<br />
R. Jones<br />
Tolk, A. and<br />
J. Muguira<br />
Isolated<br />
systems<br />
Connected<br />
systems<br />
Functional<br />
distributed<br />
Domain<br />
integrated<br />
Enterprise<br />
universal<br />
Independent Ad-hoc Collaborative Integrated Unified<br />
System<br />
specific data<br />
Unstructured<br />
data<br />
Documented<br />
data<br />
Structured Seamless Seamless<br />
data data sharing information<br />
Aligned static Aligned Harmonized<br />
data dynamic data data<br />
5 EIF 2004 IDABC Organizational Semantics Technical<br />
6 EIMM 2004 ATHENA Performed Modeled Integrated Interoperable Optimizing<br />
7 LCIM 2005 Turnitsa CD No - Interop: Technical Pragmatic Semantic Syntatical Dynamic Conceptual<br />
8 ALI<br />
Janssen, M.<br />
2007<br />
and H. Scholl<br />
Pragmatic Syntax Semantic Technical<br />
9 EIF 2.0 2008 IDABC<br />
(Proposed)<br />
Organizational Semantics Technical Political Legal<br />
10 MLIDG 2009 Gottschalk, P<br />
Computer<br />
Interop:<br />
Process<br />
interop:<br />
Knowledge<br />
interop:<br />
Value interop: Goal interop:<br />
As shown in Table 1, early interoperability models lacked organizational (non-technical) aspects, and<br />
technicalities of information systems were the centre of attention. The US Department of Defence (DoD<br />
1998) developed an interoperability model called Levels of Information Systems Interoperability (LISI)<br />
including five levels: isolated systems, connected systems, functional distributed, domain integrated, and<br />
enterprise universal (DoD 1998). Clark and Jones (1999) developed the Organizational Interoperability<br />
Maturity (OIM) model including five levels: Independent, ad-hoc, collaborated, integrated, and unified.<br />
Whereas the LISI model predominately focuses on the technical aspects of information systems<br />
interoperability, the OIM model is an extension of LISI model including the modes and ability of<br />
interoperation between organizations (Clark and Jones 1999; Guédria, Naudet et al. 2010). Other models<br />
shown in Table 1 were developed by government organizations, e.g. the North Atlantic Treaty<br />
Organization (NATO 2003) interoperability model NC3TA Reference Model for Interoperability (NMI)<br />
(NATO 2003), the <strong>European</strong> Interoperability Framework (EIF) set up by Interoperable Delivery of<br />
<strong>European</strong> eGovernment Services to public Administrations, Businesses and Citizens (IDABC 2004) as<br />
well as an extension of this model (IDABC 2008), the <strong>European</strong> Interoperability Maturity Model (EIMM) by<br />
Advanced Technologies for interoperability of Heterogeneous Enterprise Networks and their Applications<br />
355
Devender Maheshwari et al.<br />
(ATHENA 2004); and also by individual researchers, e.g. Levels of Conceptual Interoperability Model<br />
(LCIM) (Tolk and Muguira 2003), which was reproduced by (Turnitsa 2005) with seven different<br />
conceptual levels, Architecture Layers of Interoperability (ALI) by (Janssen and Scholl 2007), and<br />
Maturity Levels for Interoperability in Digital Government (MLIDG) by (Gottschalk 2009). The models<br />
clearly lack to define the measures as well as the procedures to measure interoperability. The<br />
interdependence of sequentially layered divisions is a multifaceted concept and complex to measure.<br />
2.2 Overview of major related approaches<br />
As interoperability is only one of the issues governments around the world are trying to measure, this<br />
section gives a short introduction to related approaches that are utilized by various governments and<br />
private sector organization for design, development, implementation and measurement.<br />
Stage models Stage models are commonly used in the field of eGovernment; in which each stage is<br />
defined as a state on the roadmap, interconnecting these states in a systematic order to accomplish the<br />
desired objectives. Stage models are utilized for multiple purposes, i.e. growth and development,<br />
maturity, policy designing, measurements, and benchmarking. Existing stage models in eGovernment are<br />
a set up by researchers, e.g. (Hiller and Belanger 2001; Layne and Lee 2001; Moon 2002; Andersen and<br />
Henriksen 2006; Klievink and Janssen 2008) or developed by public, private, and semi-public<br />
organizations, e.g. (Baum and Di Maio 2000; Hunter and Jupp 2002; Global 2005; UN 2008; Leveraging<br />
2010). Despite the overwhelming acceptance of stage models in eGovernment, some authors (Bannister<br />
2007; Janssen 2010; Maheshwari, Veenstra et al. 2011) have described them as predominantly frontoffice<br />
focused and ill-structured, specifically in relation to interoperability.<br />
Capacity Maturity Model (CMM) The concept of CMM was first described by Humphrey (1988). He<br />
describes that the CMM maturity framework regulates each stage to provide the foundation for<br />
improvements undertaken in the next stage. It was later published in a report in February 1993 as the<br />
Capability Maturity Model SM for Software Version 1.1 (Paulk, Weber et al. 1993) and as a book in 1995<br />
(Paulk, Curtis et al. 2002). CMM helps organizations to select appropriate strategies by determining the<br />
current process maturity and critical issues for software process improvements. For continuous process<br />
improvements, the evolutionary path steps are organized into five maturity levels in CMM framework,<br />
respectively: 1) initial, 2) repeatable, 3) defined, 4) managed, and 5) optimizing (Paulk, Curtis et al. 2002).<br />
Balanced Scorecard (BSC) The BSC method is a multi-perspective approach for the balance of<br />
premeditated goals and their translation into computable objectives. The basic framework of the BSC<br />
approach was based on cause-and-effect relationships of four perspectives, i.e. finance, customers,<br />
internal process and, learning and development (Kaplan and Norton 2004). The BSC approach was<br />
initially implemented by profit-based organizations, but later it was also applied in PSOs. Originally, the<br />
focus of BSC is on the financial perspective at the top of the hierarchy, while PSOs do not necessarily<br />
have financial success as their primary objective (Kaplan and Norton 2001; Tolk, Turnitsa et al. 2006;<br />
Guédria, Naudet et al. 2010).<br />
<strong>European</strong> Foundation for Quality Management (EFQM) Model The EFQM model is a framework for<br />
organizational management systems, promoted by the <strong>European</strong> Foundation for Quality Management<br />
(www.efqm.org). The model is designed for helping organizations in their drive towards being more<br />
competitive, effective, and efficient. The EFQM model has nine criteria, including five ‘enablers’ (i.e.<br />
leadership, people management, policy management, resources and processes) and four ‘results’ (i.e.<br />
people satisfaction, customer satisfaction, impact on society and business results). The enablers include<br />
processes, structure and means of the organization, while the results criteria cover the characteristics of<br />
performance (Nabitz and Klazinga 1999; EFQM 2003).<br />
Extended Enterprise Architecture Maturity Model (E2AMM) E2AMM is a maturity model that provides<br />
a path towards improvement of enterprise architecture and procedures within an organization. The model<br />
has six levels, i.e.: level 0: no extended enterprise architecture, level 1: initial, level 2: under<br />
development, level 3: defined, level 4: managed, and level 5: optimized. The E2AMM model requires<br />
iterative efforts to accomplish the desired objectives and missions of an organization. E2AMM model<br />
guides the operating disciplines to effectively and efficiently organize and engage the technology entities<br />
and business components (Schekkerman 2006).<br />
356
3. Measuring interoperability<br />
Devender Maheshwari et al.<br />
The literature review of interoperability models and related approaches in section 2 makes clear that<br />
interoperability of PSOs is complex to measure and benchmark, as it covers a wide range of diverse<br />
areas and dimensions. Furthermore, the levels shown in Table 1 are mostly interrelated and<br />
interdependent. Implementing these levels in the ordered form starting at level 0 can be abysmal as<br />
some models have technical interoperability as their first level while others consider it to be the last level.<br />
Most of the interoperability models lack a clear explanation of various organizational and architectural<br />
aspects that influence the maturity of interoperability in PSO’s. While the maturity of technical levels is<br />
concrete and can be achieved by utilizing state-of-art technological method and techniques, the maturity<br />
of organizational levels (e.g. pragmatic, governance, business process, judicial, political, and organization<br />
etc.) is much more vague (Janssen and Scholl 2007).<br />
Related measurement and benchmarking approaches, as discussed in section 2.2, provide insight for<br />
developing a measurement model that fulfils the overarching objectives. These approaches are<br />
developed by different organizations as well as individual researchers for predefined objectives. The<br />
majority of these approaches is used in PSOs as well as in private organizations. Stage models face<br />
similar problems as mentioned above, while the quality models (BCS and EFQM) only focus on quality<br />
aspects. The CMM model is famous for software-based solutions for software process assessment,<br />
improvement and evaluation. Finally, EAMM is purely based on organizational aspects and lacks<br />
technical aspects. All of the approaches discussed in section 2.2 lack a balance of organizational and<br />
technical aspects, and not one of them caters for financial constraints. Moreover, none of the<br />
interoperability maturity models provide any measures for benchmarking and implementing the<br />
interoperability levels. Furthermore, the majority of interoperability models still remains conceptual and<br />
needs to give more attention to unexplored aspects. In this paper we propose a maturity model without<br />
an ordering format of levels and we define the related measures for benchmarking.<br />
3.1 Proposed instrument<br />
The instrument proposed in this paper is adapted from the interoperability architecture layers (technical,<br />
syntactical, semantic and pragmatic) proposed by (Janssen and Scholl 2007). The layers carefully<br />
address the organizational as well as technical aspects of interoperability. They split the pragmatic layer<br />
into: 1) organizational level and 2) business process level. The instrument is valid for inter-connecting<br />
various components of a single public service organization as well as different organizations, but for<br />
reasons of simplicity we limit our scope to one organization.<br />
Pragmatic Level: LCIM model explains pragmatic interoperability as the awareness level of procedures<br />
and processes between the interoperating systems. Highest maturity at this level is achieved when<br />
exchange of information is clear, transparent, and truly interpretable by the sender as well as the receiver<br />
(Tolk, Turnitsa et al. 2006). This level also includes the sender’s intension of information exchange, and<br />
contemplates contextual, personal, and psychological factors for differentiating different type of<br />
communication (Picot, Reichwald et al. 2008). The pragmatic level helps PSOs to identify limitations to<br />
avoid the adverse effects by analysing the maturity of organizational aspects and provides the guideline<br />
to the right path for improving organizational aspects (Janssen and Scholl 2007). The pragmatic level<br />
deals with various organizational and architectural aspects of PSOs; therefore we split this level into<br />
further sub-levels: organization, business process, judicial, governance and financial (see Figure 1).<br />
Figure 1: Instrument for measuring and benchmarking interoperability<br />
Organization: This sub-level deals with procedures, contracts, processes, services, and agreements<br />
within organizations that affect the exchange of information between back-office systems. Organization<br />
357
Devender Maheshwari et al.<br />
level helps PSOs with the development of a functional infrastructure for information systems<br />
interoperation. Components of level surround several organizational issues e.g. uninterrupted progress,<br />
horizontal implementation, reliance, collaboration, friendliness, readiness, business process reengineering<br />
(BPR), relationships, and coordination. (Feenstra, Janssen et al. 2006).<br />
Business process: PSOs aim to deliver better services by improving their processes; whereas the<br />
intricacies in business processes not only impact the service provision, but also complicate the<br />
information interpretation and understanding. This level deals with the alignment of business processes<br />
and procedures, value creation, monitoring and controlling activities, long-term and short-term process<br />
triggered integration, and continuously tracking and managing responsibilities, etc. Collaboration and<br />
interaction between different information systems require clear, explicable, and lucid orchestration of<br />
business processes.<br />
Judicial: This level contains laws and regulations, constitutional and legal restraints, and organizational<br />
safety and security issues. Unfortunately, judicial issues related to interoperability are sparsely discussed<br />
(e.g. ATHENA 2004; IDABC 2004; Turnitsa 2005; Janssen and Scholl 2007; Scholl and Klischewski<br />
2007; Cimander and Kubicek 2009). Goldkuhl (2009,p-4) defined the judicial interoperability layer as<br />
“congruence between different laws and regulations”. We extend the scope of the judicial maturity level<br />
by adding all concrete inflexible rules, regulations, laws, restraints, and issues that affect the interaction<br />
of information systems in PSOs.<br />
Governance: Pragmatic governance is characterized by the efficient and effective interoperation<br />
between organizational mechanisms, provided these mechanisms steer the organizations in the right<br />
direction (Janssen and Scholl 2007). According to Janssen and Joha (2007) “governance mechanisms<br />
determine how communication, responsibilities, and decision-making structures are formalized”(Janssen<br />
and Joha 2007, p.2307). Maturity of this level depends on the political and jurisdictional regulations,<br />
official communication mechanisms, and execution of assigned responsibilities.<br />
Financial: This maturity level concerns the economic issues that limit the overarching scope of<br />
interoperability in PSOs.<br />
As the explanation of semantic, syntactical, and technical levels is already well defined by many<br />
organizations as well as individual authors (e.g. IDABC 2004; Turnitsa 2005; Janssen and Scholl 2007;<br />
IDABC 2008; Maheshwari, Veenstra et al. 2011), we do not explain these issues further here. Although<br />
the concepts of these levels are well-understood, unfortunately, there are no explicit measures for<br />
benchmarking interoperability. Therefore, we adapt the already existing concepts of these technical levels<br />
for developing measures for benchmarking interoperability.<br />
3.2 Measures of benchmarking interoperability<br />
The measures for benchmarking interoperability are developed based on the instrument shown in Figure<br />
1, and on the literature review of section 2. The instrument that is developed comprises four maturity level<br />
that are divided into sub-levels. The pragmatic level comprises five sub-levels that were described in the<br />
previous section. The measures for each sub-level of the pragmatic level are: 1) organizational (context<br />
and demarcation, collaboration and interaction, standards and policies, enterprise architecture (EA), and<br />
environment and ethics); 2) business process (processes and procedures alignment, and service level<br />
agreements (SLAs)); 3) judicial (laws and regulations, constitutional and legal restraints, and<br />
organizational safety and security); 4) governance (political and jurisdictional regulations, formal<br />
communication and responsibilities); and 5) economical (Return on Investment(ROI)). The semantic level<br />
comprises three measures (definitions, classifications and relationships among systems). The syntactic<br />
level makes sure that the data follow similar standards and structures (Janssen and Scholl 2007) and<br />
comprises three maturity measures: solicitation, presentation, and translation. Finally, the technical level<br />
deals with physical infrastructure for communication and information exchange, transportation of data,<br />
and different types of information and communication protocols. The technical level is further divided into<br />
two sub-levels: 1) physical (infrastructure, and telecommunication standards); and 2) information (Quality<br />
of Service (QoS), and protocols). Table 2 shows the maturity levels and their respective measures with a<br />
brief description of the concepts of the measures.<br />
358
Devender Maheshwari et al.<br />
Table 2: Levels of interoperability and overview of measurement elements<br />
Pragmatic Measures Description<br />
Context and Level of to-the-point clearness and distinctiveness of the definitions,<br />
demarcations<br />
goals, objectives, challenges, and expectations of the PSOs.<br />
Collaboration and Interactive, willing-full, and collaborative working relationships<br />
interaction<br />
among all quarters in PSOs.<br />
Organizational standards and policies for horizontal implementation,<br />
Organizational<br />
Standards and policies reliance, uninterrupted progress, and BPR across different<br />
departments, sections and divisions.<br />
EA portrays the adverse effects of unprecedented nuts and bolts of<br />
Enterprise architecture any organization at low level that effect the information exchange in<br />
an organization.<br />
Environment and ethics<br />
Internal rivalries, monopolies, and un-willingness of the stakeholders<br />
in PSOs.<br />
Business<br />
Processes and<br />
procedures alignment<br />
Smooth business transitions, control and monitor, integration, valuecreation,<br />
and management and tracking of relative activities in<br />
PSOs.<br />
Process<br />
Service level agreements<br />
(SLAs)<br />
SLAs assure the quality of service (QoS) and trigger the concerned<br />
stake-holders to abide minimum requirements of information<br />
exchange and interoperation.<br />
Laws and regulations Correspondence between different laws and regulations in PSOs.<br />
Judicial<br />
Constitutional and legal<br />
restraints<br />
constitutional and legal limitations, correspondence restrictions, and<br />
compatibility issues concerning information exchange and<br />
interoperation in PSOs.<br />
Organizational safety and Privacy, discretion, security limitation boundaries, and compliance of<br />
security<br />
information exchange.<br />
Political and jurisdictional Avoiding imbalance and ill-use of power and prevention from wrong<br />
regulations<br />
decision making.<br />
Governance<br />
Formal communication<br />
Cooperation and understanding among different concerned<br />
quarters.<br />
Responsibilities Smooth execution of tasks by assigning right-job-for-right-person.<br />
Economical<br />
Return on investment<br />
(ROI)<br />
Effects of economic constraints on maturity of interoperability.<br />
Semantic Measures Description<br />
Definitions<br />
Describing the actual concepts that underpin the real meaning and<br />
avoid misconceptions.<br />
Semantic Classifications<br />
categorical classification of information data to enable sender and<br />
receiver (vice versa) to recognize the message.<br />
Relationships among Understanding and cooperation among system for improved quality<br />
systems<br />
of service (QoS).<br />
Syntactical Measures Description<br />
Solicitation<br />
Format of information for encoding and decoding the exchanged<br />
information.<br />
Syntactical Presentation<br />
Structure of information for encoding and decoding the exchanged<br />
information<br />
Translation<br />
Translation of exchanged information for proper interpretation of<br />
different formats of data.<br />
Technical Measures Description<br />
Physical<br />
Infrastructure<br />
Telecommunication<br />
standards<br />
Physical infrastructure for reliable information exchange and<br />
communication.<br />
Communication medium, equipment, hardware, and software<br />
Quality of service(QoS) Timestamps, sessions, and accessibility<br />
Information<br />
Protocols<br />
Routing, transport, data management, security, and quality protocols<br />
etc.<br />
4. An illustrative case study for the pragmatic level<br />
To illustrate the pragmatic level of the interoperability benchmark, we invited experts from the Dutch<br />
Inland Revenue Service to participate in a survey. We focused on the pragmatic level as the other levels<br />
of benchmarking interoperability are already well defined. The Dutch Inland Revenue Service is one of<br />
the largest public organizations that employs more than 3000 staff involved in ICT. In this illustrative and<br />
explorative case study, we asked experts in Dutch tax organization to fill out a questionnaire on<br />
organizational issues related to EA and interoperability. This survey was part of a session on EA in which<br />
359
Devender Maheshwari et al.<br />
we eleven participants took part, from which five persons filled out the questionnaire . The participants<br />
were encouraged to reflect on the measures and provide suggestions for improvements. The questions<br />
were put together to measure organizational aspects influencing the overarching EA and interoperability<br />
by categorically specifying the maturity value of each measure of the pragmatic level from 1 (low) to 5<br />
(high). Table 3 shows the list of twenty questions related to interoperability out of a total of 96 questions<br />
that were included in the survey.<br />
Table 3: Questions related to the measures developed for the pragmatic layer<br />
Table 3 shows the average and the standard deviation calculated for each question. The resultant<br />
average values for each measure show the maturity level, where the standard deviation shows the level<br />
of consensus or disagreement among the participant’s perceptions on these measures. Table 3 shows<br />
that different questions related to the same measure might have different outcomes. For example,<br />
question 4 has a relatively low average value compared to the questions 1, 2 and 3. Whereas the vision<br />
on interoperability is clear, there is a lack of organizational principles guiding the implementation of<br />
interoperability. The discussion with the five participants showed that there was space for further<br />
refinement and extension of the questions asked as shown in Table 3 and that measuring interoperability<br />
and covering all levels requires a large amount of questions. It is, however, questionable if it is desired or<br />
feasible to have hundreds of questions for measuring all levels and details of interoperability. Hence, our<br />
further research concentrates on better understanding the level of abstraction that is required to measure<br />
interoperability at a satisfactory level. The elements of Table 3 provide a starting point for this.<br />
360
Devender Maheshwari et al.<br />
The results of the illustrative case study show that although the level of interoperability can be measured,<br />
interpreting and understanding the measures remains difficult. This is explained by the high standard<br />
deviations of some responses, which means that the persons have limited agreement about the answer.<br />
Furthermore, we found that there were discussions about the outcomes on some questions. For example<br />
Q19 shows that there is cooperation among stakeholders, however, this does not mean that the<br />
cooperation is smoothly. This finding is confirmed in the literature. Benchmarking is a difficult<br />
phenomenon since a wrong interpretation can result as a disguise rather than blessing (Bannister 2007).<br />
Furthermore, benchmarking measures for interoperability are difficult to select as they vary in scope,<br />
based on desired objectives of PSOs. Hence, a trade-off between completeness and level of abstraction<br />
(how much detail is measured) is present. As the measures of the pragmatic level were identified after<br />
the survey was sent out, this illustrative case study only focuses on part of the pragmatic. The illustrative<br />
case study shows that the measurements that identified, provide further insight into interoperability<br />
benchmarking. Therefore, the measures will be extended in further research.<br />
5. Conclusion and future work<br />
Interoperability measuring and benchmarking remains a challenging subject for public organizations. It is<br />
often defined as a merely technical problem, even though organizational aspects of interoperability have<br />
proven to be equally important. Based on a division between technical, syntactical, semantic and<br />
pragmatic interoperability, we developed a list of measures for benchmarking interoperability on the<br />
pragmatic level. These measures were applied in an illustrative case study to evaluate whether they<br />
provide greater insight into pragmatic operability in organizations. Furthermore, we developed an<br />
instrument for determining overall interoperability of organizations. We found that the measures for<br />
benchmarking interoperability on the pragmatic level were seen as useful, although a trade-off between<br />
the scope and abstraction level was identified. Further research will look closer into the application of the<br />
interoperability measures and the benchmarking instrument. This paper is a first step toward further<br />
expansion of the measures for benchmarking interoperability. We intend to carry out an extensive case<br />
study in future. Furthermore, this study should include more respondents to evaluate further the<br />
measures proposed in this paper.<br />
References<br />
Andersen, K. and H. Henriksen (2006). "EGovernment maturity models: Extension of the Layne and Lee model."<br />
Government Information Quarterly 23(2): 236-248.<br />
ATHENA, C. (2004). "Enterprise interoperability maturity model (EIMM) " ATHENA IP (Advanced Technologies for<br />
interoperability of Heterogeneous Enterprise Networks and their Applications Integrated Project) IST-507849<br />
accessed from: modelbased.net/aif/methodology/eimm.htm.<br />
Bannister, F. (2007). "The curse of the benchmark: an assessment of the validity and value of eGovernment<br />
comparisons." International Review of Administrative Sciences 73(2): 171-188.<br />
Baum, C. and A. Di Maio (2000). "Gartner’s four phases of eGovernment model." Stamford, Ct., Gartner Group 21:<br />
12-6113.<br />
Breen, J. (2000). "At the dawn of eGovernment: the citizen as customer." Government Finance Review 16(5): 15-20.<br />
Cimander, R. and H. Kubicek (2009). "Organizational interoperability and organizing for interoperability in<br />
eGovernment." Second <strong>European</strong> Summit on Interoperability in the iGovernment held in Rome: 109–122.<br />
Clark, T. and R. Jones (1999). Organisational interoperability maturity model for C2.<br />
DoD, W., DC. (1998). "C4ISR Architectures Working Group report. Levels of Information Systems Interoperability<br />
(LISI) " February ,1998<br />
EFQM (2003). " EFQM Model for Business Excellence." <strong>European</strong> Foundation for Quality Management, Brussels,<br />
2003.<br />
Feenstra, R. W., M. Janssen, et al. (2006). Designing a Service Composition Framework to Support Multi Actor<br />
Network. Proceedings of Euro mGov 2006: The Second <strong>European</strong> <strong>Conference</strong> on Mobile Government. I.<br />
Kushchu, C. Borucki and G. Fitzpatrick. Brighton, UK, Mobile Government Consortium International LLC: 103-<br />
112.<br />
Global, E. (2005). "Government Readiness Report 2005: From EGovernment to E-Inclusion." ONU. United Nations.<br />
Goldkuhl, G. (2009). "The challenges of Interoperability in EGovernment: Towards a conceptual refinement."<br />
Statistics: 10-10.<br />
Gottschalk, P. (2009). "Maturity levels for interoperability in digital government " Government Information Quarterly<br />
26(1): 75-81.<br />
Guédria, W., Y. Naudet, et al. (2010). Interoperability Maturity Models–Survey and Comparison–, Springer.<br />
Hiller, J. and F. Belanger (2001). "Privacy strategies for electronic government." EGovernment: 162-198.<br />
Humphrey, W. (1988). "Managing the software process."<br />
Hunter, D. and V. Jupp (2002). "EGovernment Leadership—Realizing the Vision." Accenture Report.<br />
IDABC, E. (2004). "<strong>European</strong> Interoperability Framework for Pan-<strong>European</strong> EGovernment Services." <strong>European</strong><br />
Communities.<br />
361
Devender Maheshwari et al.<br />
IDABC, E. (2008). "Draft document as basic of EIF version 2.0." <strong>European</strong> Communities: accessed on 02-01-2011 at<br />
http://ec.europa.eu/idabc/servlets/Docb0db.pdf?id=31597.<br />
IEEE (1990). IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries, New York:<br />
IEEE, 1990.<br />
Janssen, M. (2010). "Measuring and Benchmarking the Back-end of EGovernment: A Participative Self-assessment<br />
Approach." Electronic Government: 156-167.<br />
Janssen, M. and A. Joha (2007). "Understanding IT governance for the operation of shared services in public service<br />
networks." International Journal of Networking and Virtual Organisations 4(1): 20-34.<br />
Janssen, M. and H. Scholl (2007). Interoperability for electronic governance, ACM.<br />
Kaplan, R. and D. Norton (2001). "Transforming the Balanced Scorecard from Performance Measurement to<br />
Strategic Management: Part I." Accounting Horizons 15(1).<br />
Kaplan, R. and D. Norton (2004). Strategy maps: Converting intangible assets into tangible outcomes, Harvard<br />
Business Press.<br />
Klievink, B. and M. Janssen (2008). "Improving Government service delivery with private sector intermediaries."<br />
<strong>European</strong> Journal of ePractice 5.<br />
Layne, K. and J. Lee (2001). "Developing fully functional EGovernment: A four stage model." Government<br />
Information Quarterly 18(2): 122-136.<br />
Lee, J. (2010). "10 year retrospect on stage models of eGovernment: A qualitative meta-synthesis." Government<br />
Information Quarterly.<br />
Leveraging, E. (2010). "United Nations EGovernment Survey 2010."<br />
Maheshwari, D., A. F. v. Veenstra, et al. (2011). "Advancing the Use of Stages-of-Growth-Models in eGovernment by<br />
Identifying Trade-offs." 16-17 June, ECEG Ljubljani, Slovenia.<br />
Moon, M. (2002). "The Evolution of E Government among Municipalities: Rhetoric or Reality?" Public administration<br />
review 62(4): 424-433.<br />
Nabitz, U. and N. Klazinga (1999). "EFQM approach and the Dutch Quality Award." International Journal of Health<br />
Care Quality Assurance 12(2): 65-71.<br />
NATO (2003). "NATO C3 Technical Architecture (NC3TA)." 34 (ADatP-34) March 2003, NATO standard website:<br />
http://www.nato.int/docu/standard.htm.<br />
Papazouglou, M. (2006). E-Business Organisational & Technical Foundations, Wiley-India.<br />
Paulk, M., B. Curtis, et al. (2002). "Capability maturity model, version 1.1." Software, IEEE 10(4): 18-27.<br />
Paulk, M., C. Weber, et al. (1993). "Key Practices of the Capability Maturity Model SM, Version 1.1." Software<br />
Engineering Institute, CMU/SEI-93-TR-25.<br />
Picot, A., R. Reichwald, et al. (2008). Information, organization and management, Springer Verlag.<br />
Schekkerman, J. (2006). Extended Enterprise Architecture Maturity Model (E2AMM) Version 2.0.<br />
Scholl, H. and R. Klischewski (2007). "EGovernment integration and interoperability: framing the research agenda."<br />
International Journal of Public Administration 30(8): 889-920.<br />
Tolk, A. and J. Muguira (2003). The levels of conceptual interoperability model, Citeseer.<br />
Tolk, A., C. Turnitsa, et al. (2006). "Composable M&S web services for net-centric applications." The Journal of<br />
Defense Modeling and Simulation: Applications, Methodology, Technology 3(1): 27.<br />
Turnitsa, C. (2005). Extending the levels of conceptual interoperability model.<br />
UN, O. (2008). "Government Survey 2008: from eGovernment to Connected Governance." United Nations. New<br />
York.<br />
362
786<br />
Barriers to Developing eGovernment Projects in Developing<br />
Countries<br />
Zaigham Mahmood<br />
University of Derby, UK<br />
z.mahmood@derby.ac.uk<br />
Abstract: eGovernment is about transforming the way a government interacts with its citizens and harnessing the<br />
information and technology revolution to improve the efficiency of the government. It is the use of information and<br />
communications technologies (ICTs) to operate more effectively and transparently to strengthen support to public<br />
policies and involve the citizens in decision making processes. eGovernment is not a one-off process or a single<br />
event: its implementation is a staged and iterative process that requires a clear vision and long term strategy. If<br />
implemented appropriately, eGovernment offers numerous benefits including: 1) cost reduction, efficiency gains and<br />
improved quality of service delivery; 2) transparency and accountability; 3) development of a networked digital<br />
community and a true information society; 4) better and efficient decision making on the part of government leaders<br />
and 5) citizens’ participation through e-democracy. Whereas, developed economies of the world are well advanced in<br />
the process of achieving vertical and horizontal full integration within the eGovernment provision, many developing<br />
countries are only at the initial stages of such developments and are finding it difficult to progress to the next stages<br />
to achieve full eGovernment. Difficulties are due to the fact that eGovernment is a huge undertaking and there are<br />
numerous inherent issues and barriers to successful development and implementation which include: 1) lack of clear<br />
vision and commitment from political leadership; 2) inappropriate assessment of eReadiness of the nation; 3) lack of<br />
ICT infrastructure and provision; 4) unavailability of ICT equipment and citizens’ limited access to such technology<br />
and 5) citizens’ inability to make full use of ICT usually due to lack of e-literacy and the digital divide that normally<br />
exist in most developing countries. This paper discusses such limitations and barriers and presents a way forward by<br />
suggesting that governments need to ensure that: 1) they have a clear vision, strategy and commitment; 2) they<br />
understand the complexity of the undertaking and the level of investment required; 3) they develop workable and<br />
transparent policies and structures and 4) they also consider human factors including people’s preferences and ways<br />
of actions. The aim of this paper is to provide some useful practical guidance so that the eGovernment projects have<br />
a better chance of being more successful.<br />
Keywords: eGovernment, eReadiness, barriers, issues, developing countriest<br />
1. Introduction<br />
eGovernment is a multi- and interdisciplinary field. It is about harnessing the information revolution to<br />
improve the efficiency of a government. According to the <strong>European</strong> Commission (2003), EGovernment is<br />
the use of information and communications technology (ICT) in public administrations combined with<br />
organizational change and new skills in order to improve public services and democratic processes and<br />
strengthen support to public policies. InfoDev (2002) define it as the use of ICT to transform government<br />
by making it more accessible, effective and accountable. The World Bank (Kannan, 2009) provides a<br />
much more succinct definition suggesting that eGovernment refers to utilising ICT for changing and<br />
improving the relationship between governments, citizens, businesses and other government entities.<br />
The aim is to enhance the transparency of government operations and enrich the lives of its citizens. It<br />
provides a citizen centred vision of a government that facilitates effective governance, better<br />
management and efficient services through the use of ICT.<br />
In this context, world governments are mobilizing huge amounts of resources to develop, implement and<br />
promote the use of eGovernment. Depending on the clarity of governments’ vision and availability of<br />
resources, world governments are at different stages of eGovernment developments. It should be noted<br />
that eGovernment is not a single event that immediately and forever alters the universe of government. It<br />
is a staged and iterative process. Provision of eGovernment is a complex undertaking and it takes years<br />
of implementation effort. Numerous models for eGovernment development have been suggested by<br />
researchers e.g. Gartner (2000), Howard (2001), Chandler and Emanuels (2002), Hiller and Belanger<br />
(2002), Layne and Lee (2001), Moon (2002), Alpar (2005), Andersen and Henriksen (2006). Based on<br />
these, Mahmood (2009a) suggests a five-step model with the following stages:<br />
Informational: this is the first stage, often termed as G2C (government-to-customer) integration which<br />
refers to the provision of one way information via one or more government portals. The aim is to<br />
provide static information with respect to services and make announcements. The C2G (customer-togovernment)<br />
interaction is missing at stage.<br />
Interactive: this is the next stage in the process that provides a two-way interaction (G2C and C2G)<br />
for the provision of further information. Here, a certain amount of interaction is available e.g. citizens<br />
363
Zaigham Mahmood<br />
can make enquiries through the use of e-mail and engage in discussion through the use of bulletin<br />
boards etc.<br />
Transactional: this stage is the real beginning of effective eGovernment where transactions can take<br />
place via the telephone and other Internet technologies. At this stage, citizens can make online<br />
payments of bills and purchase goods via the Internet. This is where citizens can engage in ecommerce<br />
(and e-business) activities. The relevant terms include: G2B (government-to-business),<br />
B2B (business-to-business), B2C (business-to-customer), C2B (customer-to-business).<br />
Integrated: this is the next stage where G2G (government-to-government) interaction takes place<br />
(along with G2C, C2G and B2B). It refers to aligning the horizontal integration of government services<br />
within departments as well as implementing vertical integration so that there is a complete network<br />
where two-way communications and transactions takes place between and across government<br />
divisions (as well as between the government departments and the governed).<br />
Participative: this is final stage which provides the highest level of interaction. Here, citizens can<br />
participate in the provision and affairs of the government to further affect the government decisions<br />
and processes. A term commonly used, in this context, is e-democracy.<br />
Whereas, developed economies such as those in Europe and the US are well advanced in the process of<br />
achieving vertical and horizontal integrating with respect to eGovernment projects and are, therefore, at<br />
Integrated and Participative stages, many developing countries are at the first three stages of such<br />
developments and are finding it somewhat difficult to progress to the next stages of eGovernment.<br />
Difficulties are due to the fact that eGovernment projects are huge undertakings and there are numerous<br />
inherent issues and barriers to successful implementation.<br />
Successful development of eGovernment requires robust ICT infrastructure to be in place, serious<br />
commitment from political leadership and investment of huge amounts of time and money resources as<br />
well as provision of education to citizens. It is also imperative that relevant technologies are easily<br />
available to citizens and they have full access to their capabilities.<br />
In this paper, we first discuss, in some detail, the issues and barriers to successful development and<br />
implementation of eGovernment projects in the context of developing nations, and then present<br />
suggestions for a way forward. The aim is to provide some useful practical guidance so that the<br />
eGovernment projects have a better chance of being more successful.<br />
2. Barriers to developing eGovernment<br />
Barriers to developing eGovernment projects can be categorised as belonging to the following varieties:<br />
cultural, political, institutional, external, human, financial and citizens concerns (Kannan, 2009). In the<br />
case of developing countries, the issues and limitations are many. These generally include the following:<br />
Lack of commitment from political leadership: unfortunately, this is generally the case in developing<br />
countries<br />
Inappropriate assessment of eReadiness: often due to the fact that the inherent complexity is not well<br />
understood<br />
Lack of ICT infrastructure and provision: often because of limited financial resources as well as due<br />
to lack of understanding and commitment<br />
Citizens’ limited access to ICT: usually due to the digital divide but also due to the general lack of ICT<br />
provision<br />
Citizens’ inability to make full use of ICT: usually due to lack of awareness and education and fear of<br />
embracing the new technologies.<br />
Government’s lack of full support to e-business community and certain highly embedded cultural aspects<br />
are also important limiting factors. EGovernment in the developing world must also accommodate certain<br />
conditions, needs and obstacles, that are unique to such societies, including a continuing oral tradition,<br />
corruption at the government level as well as in the society, lack of clear legal frameworks and weak<br />
educational systems.<br />
InfoDev (2002) mentions 17 challenges with respect to eGovernment development. Some of these, more<br />
relevant to developing countries, include: 1) developing infrastructure; 2) establishing policies - public and<br />
legal; 3) developing e-literacy programmes; 4) marketing of innovation and 5) gaining citizen’s trust. The<br />
last two points are particularly interesting. Lack of proper marketing of innovation is due to lack of<br />
364
Zaigham Mahmood<br />
commitment and responsibility on the part of the government officials and a lack of citizen’s trust is often<br />
due to corruption in government circles (and perhaps also within the society).<br />
Ndou (2004) mentions a number of similar challenges facing the developing countries, in particular:<br />
ICT infrastructure – referring to a lack of eReadiness and computer literacy in the society as well as<br />
unavailability of ICT equipment<br />
Policy issues – referring to inappropriate legislation with respect to legal and data protection<br />
regulations<br />
Human capital development – referring to a lack of opportunity for sustained learning and acquiring<br />
skills<br />
Change management – referring to the masses’ resistance to change to adopt new attitudes due to<br />
the way the society normally operates<br />
Strategy (vision, mission) – referring to insufficient political commitment<br />
Leadership role and strategy – referring to a lack of motivation, commitment and long term strategy.<br />
This also suggests that developing countries must pursue a more active role in the formulation of national<br />
policies and strategies to promote the information economy, to develop opportunities for long-life learning<br />
and to show the required commitment and political will to reap the benefits in terms of economic and<br />
social growth and development that come as a result of successful implementation of eGovernment.<br />
Ndou (2004) has no doubt that eGovernment is often limited and largely hampered by the existence of<br />
many political, social and economic hindrances.<br />
One primary reason for inherent issues has been described as due to a mismatch between the existing<br />
reality and the future desired system. According to Heeks (2003), there are three types of such gaps:<br />
Technology vs. Human Factors gaps: this refers to the difference between the existing technology<br />
(hardware) and the reality of the social context by way of the culture, people attitudes etc (soft).<br />
Private-Public gaps: this refers to the way the private and public sectors operate. There is usually a<br />
big difference, mainly due to the digital-cultural-affluence divide.<br />
Country-sensitive gaps: this refers to the difference in the way the developed and developing<br />
countries approach in organising a system. Often the developing countries copy the approaches<br />
taken by developed countries disregarding the differences in context.<br />
An investigation conducted by Heeks (2003) suggested that implementations of eGovernment in<br />
developing countries failed in case of 35% of projects in the sense of total failure when the projects were<br />
abandoned and roughly half of the projects were judged as partial failures. Although, situation has<br />
improved, failure rates or number of unsuccessful or abandoned projects is still unacceptably high.<br />
The following sections provide guidance with a view to suggesting solutions to some of the issues<br />
mentioned above.<br />
3. Guidance on implementation of eGovernment<br />
In view of the issues and barriers outlined in the previous section, it is clear that appropriate technology<br />
infrastructure needs to be put in place and adequate marketing of the innovation is carried out. It is also<br />
imperative that the following human factors are taken into account:<br />
Peoples’ attitudes and fears towards new technologies, their existing educational level, the level of<br />
their willingness to embrace new products and procedures based on their preferences and cultural<br />
backgrounds.<br />
Digital-educational-affluence divide that often exists in developing countries. If ignored then<br />
acceptance of new innovation by educated, e-literate and affluent sectors of the society will results in<br />
the gap getting even wider.<br />
eGovernment also implies fundamental knowledge redistribution and requires a careful rethinking of the<br />
management of project know-how, domain expertise, information resources and knowledge bases. At the<br />
same time, the specific problems of public administration, governance and document management<br />
system also need to be taken into account. This suggests that knowledge management, in all its aspects,<br />
is an area not to be ignored.<br />
365
Zaigham Mahmood<br />
It is important that a proper assessment of the country’s eReadiness is carried out, before agreeing a<br />
strategy. Once a strategy is devised, the process of implementation can begin. A review of e-assessment<br />
approaches can be found in Mahmood (2009b). At a very basic level, therefore, it is important that the<br />
framework for the adoption of eGovernment includes the following steps in the same order (Siemens,<br />
2008; Mahmood, 2009b):<br />
eReadiness assessment – of the current situation, existing infrastructure, available skills and the<br />
existing processes.<br />
Strategy – based on the assessment reports for the overall project specification, roadmap for<br />
eGovernment implementation and projects’ management.<br />
Processes – required for the fulfilment of the project goals and monitoring of activities.<br />
If implemented correctly, considering the factors as mentioned above, the benefits to be achieved are the<br />
same as those in developed countries. These include (Ndou, 2004):<br />
Cost reduction, efficiency gains and improved quality of service delivery<br />
Transparency and accountability<br />
Development of a networked digital community and a true information society<br />
Better and efficient decision making on the part of government leaders<br />
Citizens’ participation through e-democracy.<br />
The following sections discuss some of the important factors that are important for successful<br />
development of eGovernment projects.<br />
3.1 Developing Infrastructure<br />
Developing even a basic infrastructure for the entire nation, to take advantage of the latest ICTs, is a<br />
complex undertaking. It takes a considerable amount of time, financial resources as well as a long-term<br />
commitment. It requires a policy decision and sensible workable strategy and implementation plan. If a<br />
country is limited in the financial resources required, which is often the case for developing countries, the<br />
task at hand becomes even more difficult. In practice, therefore, implementation is carried out in stages.<br />
Often, certain areas are chosen (initially big cities) to pilot the scheme and then the areas extended<br />
slowly over a period of time – to cover the entire country in the fullness of time. This is sensible and<br />
workable strategy as there is a good chance that the citizens in the pilot areas are more affluent and<br />
better e-literate than their countrymen in other areas.<br />
It should be noted that infrastructure is not just laying the cables; it also includes provision of business<br />
opportunities for the marketing of ICT tools and technologies (e.g. computing equipment, telephones,<br />
modems, software) so that citizens can have access to these. With this in place, other related businesses<br />
will also begin to appear to provide related services (e.g. internet service providers, software and<br />
hardware vendors).<br />
3.2 Policies and controls<br />
When the infrastructure exists, it is imperative that the civil and legislative policies are also in place,<br />
especially in relation to the following:<br />
Data transmission protocols<br />
Data protection and data privacy legislation<br />
Legislation to protect citizen’s rights in connection with all aspects of the new innovation.<br />
This, again, is not easy. Although, this does not necessarily require investment of money, it does require<br />
a commitment on the part of political leaders as well as a clear foresight to ensure that the resulting<br />
policies are appropriate and workable. In doing so, the government must take a holistic view so that the<br />
focus is not just on technology but also on human and social aspects. The idea is to protect citizens as<br />
much as smooth introduction of technology. Transparency of such regulations is also important. It is<br />
imperative that such policies are seen to be working – rather than just being in the rule books. A useful<br />
side effect of this is that the citizens will feel secure and be more willing to embrace the innovation; this<br />
being the ultimate goal of implementation of eGovernment. It is noticed that policies are often not seen to<br />
be working in developing countries and therefore the political leaders need to be extra committed that<br />
best practices, as suggested by other successful nations, are transparently adhered to.<br />
366
3.3 Training of the masses<br />
Zaigham Mahmood<br />
In developing countries, opportunities are often lacking, whether these are in relation to business,<br />
education or training. If the government is investing in the ICT infrastructure and developing correct<br />
policies then it is imperative that citizens are appropriately empowered to take advantage of the new<br />
opportunities. In this context, relevant training and increase in e-literacy is of paramount importance. This<br />
may mean providing training opportunities during evenings and weekends and through local schools and<br />
other similar organisations. This may also mean setting up a new breed of training places just for this<br />
purpose and ensuring that the expertise is readily available in case people have difficulties or issues.<br />
This also requires a sensible long-term plan and a phased approach: piloting the scheme in a few<br />
geographical areas to begin with and then extending it to other regions over a period of time. There is<br />
often a fear when venturing into new technological areas, so one aspect of such training must be to alley<br />
such fears otherwise citizens will remain reluctant to embrace the innovation.<br />
3.4 Transparency of functions<br />
Transparency must be a primary guiding principle behind all such development. In developing countries,<br />
there is often a lack of vision and commitment on the part of government officials which causes mistrust<br />
within the government departments and between the government and the governed. Policies need to be<br />
seen to be working and working equally and fairly for all sections of the society. Transparency of<br />
whatever the government does is much more important for developing nations than it is for the<br />
developed. Strategy should be to start small, have it seen to be working efficiently and effectively and<br />
then build on it to develop further. Marketing of the new approaches must be with honesty that people<br />
can see. Officials and government departments must lead by example.<br />
This also requires an understanding and admittance of the fact that there may well be a trust deficit;<br />
otherwise, the efforts will not bear the fruits expected of such developments.<br />
4. Conclusion<br />
eGovernment is the use of ICT for the government to operate more effectively and the use of same<br />
technologies by the citizens to participate in government’s decision making processes. It is a huge<br />
undertaking that requires a long term planning and commitment of effort and resources. Whereas,<br />
developed countries are being successful in implementing eGovernment, developing countries face many<br />
barriers and limitations. Such difficulties are, generally, due to the following reasons:<br />
Lack of clear vision and commitment from political leadership<br />
Inappropriate assessment of eReadiness of the nation<br />
Lack of ICT infrastructure and provision<br />
Unavailability of ICT equipment and citizens’ limited access to technology<br />
Lack of e-literacy of the masses<br />
Digital and economic divide that normally exists in developing countries.<br />
The solution is to ensure that: 1) a proper eReadiness assessment is conducted; 2) a workable strategy<br />
is devised; and 3) appropriate process are designed and implemented. It is important that human factors,<br />
a nation’s cultural values and people’s attitudes to new technologies are taken into account. Commitment<br />
of political leaders and a clean vision with respect to eGovernment development is a pre-requisite. Case<br />
studies from other nations and elements of good practices must also be studied. It should be noted that<br />
eGovernment is a staged process and it should be implemented in an iterative manner.<br />
This paper has discussed the issues and barriers to successful development and implementation of<br />
eGovernment projects in the context of developing nations. It also provides some useful guidance so that<br />
eGovernment developments have a better chance of being more successful.<br />
References<br />
Alpar, P. and Olbrich, S. (2005) ‘Legal Requirements and Modelling of Processes in EGovernment’, Electronic<br />
Journal of EGovernment, Vol 3, Issue 3, pp 107-116<br />
Andersen, K. V. and Henriksen, H. Z. (2006) ‘EGovernment Maturity Models: Extension of the Layne and Lee Model’,<br />
Government Information Quarterly, Vol 23, No 2, pp 236-248<br />
Baum, C. and Di Mayo, A. (2000) ‘Gartner’s Four Phases of EGovernment Model’, Gartner Group, Research Note<br />
367
Zaigham Mahmood<br />
Chandler, S. and Emanuels, S. (2002) ‘Transformation not Automation’, Proc. <strong>European</strong> Conf on EGovernment,<br />
Oxford, UK<br />
<strong>European</strong> Commission (2003) ‘The Role of EGovernment for Europe’s Future’, <strong>European</strong> Economic and Social<br />
Committee Report, <strong>European</strong> Parliament, Brussels<br />
Heeks (2003) ‘Most EGovernment-for-Development Projects Fail: How can risks be reduced?’, iGovernment Working<br />
Paper Series, Paper no 14, IDPM, University of Manchester, UK<br />
Hiller, J. S. and Belanger, F. (2001) ‘Privacy Strategies for Electronic Government’, The Price Waterhouse<br />
Endowment for the Business of Government, Virginia, US<br />
Howard, M. (2001) ‘EGovernment Across the Globe: How will ‘e’ Change Government’, Government Finance<br />
Review, 17(4), pp 6-9<br />
InforDev (2002) ‘The EGovernment Handbook for Developing Countries’, Centre for Democracy and Technology,<br />
Washington D.C., Nov 2002<br />
Kannan, R. K. (2009) ‘Making Sense of EGovernment Implementation in Jordan: A Qualitative Investigation’, PhD<br />
Thesis, De Montford University, UK, April 2009<br />
Layne, K. and Lee, J. (2001) ‘Developing Fully Functional EGovernment: A Four Stage Model’, Government<br />
Information Quarterly, 18, pp 122-136<br />
Moon, M. J. (2002) ‘The Evolution of EGovernment among Municipalities: Rhetoric or Reality?’, Public Admin<br />
Review, Vol 62, No 4, pp 424-433<br />
Mahmood, Z. (2009a) ‘EGovernment: Stage Models for Successful Development’, Proc 13 th Int. IBIMA Int.<br />
<strong>Conference</strong>, Morocco, Marrakech, Nov 2009<br />
Mahmood, Z. (2009b) ‘EGovernment: EReadiness Factors and Implementation Strategy’, Proc 13 th Int. IBIMA conf.,<br />
Marrakech, Morocco, Nov 2009<br />
Ndou, V. D. (2004) ‘EGovernment for Developing Countries: Opportunities and Challenges’, Electronic Journal on<br />
Information Systems in Developing Countries, 18.1, pp 1-24<br />
Siemens, A. G. (2008) ‘EGovernment Framework – Building Blocks of EGovernment’, Siemens AG<br />
368
Digital Inclusion: A Target not Always Desirable<br />
Fausto Marcantoni and Alberto Polzonetti<br />
School of Science and Technology, University of Camerino, Camerino, Italy<br />
fausto.marcantoni@unicam.it<br />
alberto.polzonetti@unicam.it<br />
Abstract. Activities directed at "including" more people in the use of digital technology are predicated on the<br />
assumption that such inclusion is invariably a good thing. It appears so, when judged solely by immediate<br />
practical convenience. However, if we also judge in terms of human rights, whether digital inclusion is good or<br />
bad depends on what kind of digital world we are to be included in. If we wish to work toward digital inclusion as a<br />
goal, it behooves us to make sure it is the good kind. In this paper after introducing the problem, we analyzed the<br />
threats faced by the surfers. In this context, we examined the challenges of human rights in society and we have<br />
provided some final evaluations that justify our title.<br />
Keywords: digital divide, digital inclusion, information society<br />
1. Introduction<br />
In the social sciences, inclusion refers to a process, de facto and/or de jure, of including people in a<br />
given social structure, most often, in society at large. Conversely, social exclusion describes ‘‘the<br />
inability of our society to keep all groups and individuals within reach of what we expect as a<br />
society…[or] to realize their full potential’’.(Power and Wilson,2000). Although an echo of a pure<br />
economic theory can be traced in EU policies on e-inclusion (e.g., the emphasis accorded to the need<br />
to promote ‘‘active’’ living), it is indisputable that the EU approach to e-inclusion is based on a<br />
different vision. Ethics are an integral part of the EU concept of e-inclusion: ‘‘e-Inclusion is necessary<br />
for social justice, ensuring equity in the knowledge society’’. (<strong>European</strong> Commission A. (2007)).<br />
On 11–13 June 2006, the <strong>European</strong> Commission, together with the Latvian government and the<br />
Austrian Presidency of the EU, organized a high-level conference on the theme ‘‘ICT for an inclusive<br />
society’’ in Riga. The conference included an informal meeting of Ministers ,where Ministers of the EU<br />
Member States and accession and candidate countries, <strong>European</strong> Free Trade Area (EFTA) countries<br />
and other countries adopted a Declaration on e-inclusion, commonly known as the ‘‘Riga Declaration’’<br />
The Riga Declaration explicitly calls for increasing ethical awareness:<br />
Particular attention must be paid to further improve user motivation towards ICT use, as well as<br />
trust and confidence through better security and privacy protection. Furthermore, greater gender<br />
balance in the information society remains a key objective.<br />
Realizing increased quality of life, autonomy and safety, while respecting privacy and ethical<br />
requirements.<br />
The centrality of ethical issues in e-inclusion has been further reasserted by the Communication on<br />
Ageing well in the Information Society. (<strong>European</strong> Commission B (2007))<br />
Solutions can only bring benefits if users have access to basic ICT facilities, have the appropriate<br />
education and motivation, and ethical and psychological issues are properly addressed. There is no<br />
specific reference point for ethics in ICT for ageing, for example, in safeguarding human dignity and<br />
autonomy where solutions require a degree of monitoring and intervention.<br />
The concept is also affirmed in the associated Commission Staff Working Paper (<strong>European</strong><br />
Commission. C 2007) . With the emergence of ICT and ageing new ethical questions are being<br />
raised. These questions find their origin in the vulnerability of the user, the changing characteristics of<br />
the user population (e.g. more people surviving at high age but also the trend towards more educated<br />
and empowered users), economic constraints such as public budgets that are at tension with serving<br />
all fully in health and social care and the constant renewal of science and technology.<br />
Still more specifically, the recent Communication ‘‘<strong>European</strong> i2010 initiative on e-Inclusion” says that<br />
‘‘It is also important to raise awareness of the risks involved in processing personal data through ICT<br />
networks and educate users in this field, e.g. risks of identity theft, discriminatory profiling or<br />
369
Fausto Marcantoni and Alberto Polzonetti<br />
continuous surveillance.’’ Yet until the Seventh Framework Program, there have been few systematic,<br />
coordinated initiatives on ethics and e-inclusion.<br />
2. Threats<br />
Digital information and communication technology offers the possibility of a new world of freedom. It<br />
also offers possibilities of surveillance and control which dictatorships of the past could only struggle<br />
to establish. The battle to decide between these possibilities is being fought now. Activities directed at<br />
"including" more people in the use of digital technology are predicated on the assumption that such<br />
inclusion is invariably a good thing. It appears so, when judged solely by immediate practical<br />
convenience. However, if we judge also in terms of human rights, the question of whether digital<br />
inclusion is good or bad depends on what kind of digital world we are to be included in. If we wish to<br />
work toward digital inclusion as a goal, it behooves us to make sure it is the good kind. The digital<br />
world today faces six major threats to users' freedom: surveillance, censorship, proprietary software,<br />
restricted formats, copyright enforcement. A program to promote "digital inclusion" must take account<br />
of these threats, so as to avoid exposing its intended beneficiaries to them.<br />
2.1 Surveillance and censorship<br />
In general, the various texts relating Information Society refer in euphoric terms to the potential<br />
benefits of ICTs and the new opportunities they open up, but fail to address the threats and<br />
challenges they can bring with them. These are particularly apparent with regard to the right to<br />
privacy. It is true that ICTs can and should be used to protect the right to privacy, but they also<br />
provide unprecedented possibilities for massive violations of this right. Contrary to the Summit, the<br />
International Symposium considered the following issues: The use of increasingly invasive means of<br />
surveillance and of interception of communications, of intrusive profiling and identification, and of<br />
biometric identification technology, the development of communication technologies with built-in<br />
surveillance capacities, the collection and misuse of genetic data, genetic testing, the growing<br />
invasion of privacy at the workplace, and the weakening of data protection regimes give rise to<br />
serious concerns from the point of view of respect for human rights (Statement on Human<br />
Rights,2005). The Statement adopted by the International Symposium emphasized that "[n]ew means<br />
must be developed to protect the human right to privacy, such as the right to know about one's<br />
personal data held by public and private institutions and to have them deleted where not strictly<br />
necessary for a legitimate purpose in a democratic society” The Symposium also stated that "the<br />
development, transfer and use of technology permitting illegitimate invasion of privacy must be<br />
controlled and curbed.”<br />
The digital divide is no more than a symptom of a far more serious and deep-seated evil, i.e. the<br />
unequal distribution of wealth among and within countries, the growing gap between the rich and the<br />
poor. Any serious effort to heal, remedy or alleviate this state of affairs must obviously address the<br />
disease and not simply the symptom. ICTs are not the panacea. It is certainly naive to believe that<br />
giving people in poor countries mobile phones or Internet connections will in itself eradicate or reduce<br />
poverty. Is it necessary to recall that for the Internet one needs electricity and that the use of the<br />
Internet is difficult for people who are illiterate? It is true that there is a boom in cellular phones in<br />
many countries of the South; however it is essentially concentrated in the cities. This certainly serves<br />
the interests of the producers of cellular phones, but does it serve the interests of the poor in the<br />
South and will it reduce poverty? Are costly cellular phones or Internet connections priorities for<br />
people who lack nutrition, water and health? ICTs should not be seen as ends in themselves. Any<br />
serious policy of ICT development must be part and parcel of a global policy of human and<br />
sustainable development and poverty reduction.<br />
When the topic of Internet censorship is mentioned, people are likely to think of China, but many<br />
supposedly freedom-respecting countries have imposed censorship. Denmark's government has<br />
blocked access to a secret list of web pages. Australia's government wants to do likewise, but has<br />
met strong resistance, so instead it has forbidden links to a long list of URLs. Australia now says it will<br />
censor access to a secret list of foreign sites starting this year. (Electronic Frontiers Australia,2009).<br />
Censorship of the contents of web sites is also a threat. India just announced a broad plan of<br />
censorship that would effectively abolish freedom of the press on the Internet (The times of<br />
India,2009).Some <strong>European</strong> countries censor particular political views on the Internet. In the United<br />
370
Fausto Marcantoni and Alberto Polzonetti<br />
States, people have been imprisoned as "terrorists" for running a web site which discussed actions<br />
taken against experiments on animals.<br />
Censorship is nothing new. What is new is the ease and effectiveness of censorship on electronic<br />
communication and publication (even where a few wizards have ways to bypass it). China in 1960<br />
achieved effective censorship by cutting its population off from the world, but that held back the<br />
country's development, which was painful for the regime as well as for the population. Today China<br />
uses digital technology to achieve effective political censorship without cutting itself off in other ways.<br />
(Network World, 2009)<br />
2.2 Proprietary Software And Restricted Formats<br />
In order for computer users to have freedom in their own computing activities, they must have control<br />
over the software they use. This means it must be free software. A program is free/libre if it gives the<br />
user these four essential freedoms: (GNU,2009)<br />
- The freedom to run the program, for any purpose (freedom 0).<br />
- The freedom to study how the program works, and change it to make it do what you wish<br />
(freedom 1). Access to the source code is a precondition for this.<br />
- The freedom to redistribute copies so you can help your neighbor (freedom 2).<br />
- The freedom to distribute copies of your modified versions to others (freedom 3). By doing this<br />
you can give the whole community a chance to benefit from your changes. Access to the<br />
source code is a precondition for this.<br />
When software is free, the users control what it does. A non-free or proprietary program is under the<br />
control of its developer, an functions as an instrument to give the developer control over the users. It<br />
may be convenient or it may not, but in either case it imposes on its users a social system that keeps<br />
them divided and helpless. Avoiding this injustice and giving users control over their computing<br />
requires the four freedoms. Freedoms 0 and 1 give you control over your own computing, and<br />
freedom 3 enables users to work together to jointly control their computing, while freedom 2 means<br />
users are not kept divided.<br />
Many argue that free/libre software is impossible on theoretical economic grounds. Some of them<br />
misinterpret free/libre software as "gratis software"; others understand the term correctly, but either<br />
way they claim that business will never want to develop such software. Combining this with a<br />
theoretical premise 'Such as "Useful software can only be developed by paying programmers," they<br />
conclude that free software could never exist. This argument is typically presented elliptically in the<br />
form of a question such as, "How can programmers make a living if software is free?" Both premises,<br />
as well as the conclusion, contradict well-known facts; perhaps the elliptical questions are meant to<br />
obscure the premises so people will not compare them with the facts.<br />
Restricted file formats impose private control over communication and publication Those who control<br />
the formats control, in a general sense, society's use of information, since it can't be distributed or<br />
read/viewed without their permission. For instance, text files are often distributed in the secret<br />
Microsoft Word format, which other developers have only imperfectly been able to decode and<br />
implement. This practice is comparable to publishing books in a secret alphabet which only officially<br />
approved scribes know how to read.<br />
A restricted format is a trap; any and all use of the format has the effect of pushing computer users<br />
into the trap. Inclusion in dependence on these formats is not a step forward.<br />
2.3 Copyright and sharing<br />
The biggest conflict over freedom in the Internet is the War on Sharing: the attempt by the publishing<br />
industry to prevent Internet users from enjoying the capability to copy and share information.<br />
Copyright was established in the age of the printing press as an industrial regulation on the business<br />
of writing and publishing. The aim was to encourage the publication of a diversity of written works.<br />
The means used was to require publishers to get the author's permission to publish recent writings.<br />
This enabled authors to get income from publishers, which facilitated and encouraged writing. The<br />
general reading public received the benefit of this, while losing little: copyright restricted only<br />
371
Fausto Marcantoni and Alberto Polzonetti<br />
publication, not the things an ordinary reader could do, so it was easy to enforce and met with little<br />
opposition. That made copyright arguably a beneficial system for the public, and therefore legitimate.<br />
One obstacle stands in the way of this utopia: copyright. Readers and listeners who make use of their<br />
new ability to copy and share published information are technically copyright infringers. The same law<br />
which formerly acted as a beneficial industrial regulation on publishers has now become a restriction<br />
on the public it was meant to benefit.<br />
In a democracy, a law that prohibits a popular and useful activity is usually soon relaxed. Not so<br />
where corporations have more political power than the public. The entertainment companies' lobby is<br />
determined to prevent the public from taking advantage of the power of their computers, and has<br />
found copyright a suitable tool. Under their influence, rather than relaxing copyright rules to permit<br />
productive and free use of the Internet, governments have made it stricter than ever, forbidding the<br />
act of sharing<br />
3. New economy motivations<br />
In common parlance, the .new economy. is defined as the transformation of the economy from one<br />
based on agriculture and manufacturing into one based on services and high-technology skills<br />
(Greenspan 2000). Information technology enables firms and governments to push the limits of<br />
economic efficiency. Developed countries are faced with a shortage of skilled labor and are, therefore,<br />
trying to attract qualified labor from developing. countries. This has a dual effect for the developing<br />
nations: the flow of remittances into the country increases, but they lose qualified workers for their<br />
own national development (United Nations 2000). Human talent becomes just another one of the<br />
commodified natural resources exported for consumption in the developed world. For workers<br />
worldwide, this practice leads to a decline in job security and solidarity because individuals must now<br />
compete in a global labor force. Long-term employment in one company becomes increasingly rare. It<br />
signals a cultural change where loyalty to institutions and places becomes a liability. Those who do<br />
manage to obtain longevity are seen as either having a lack of initiative or as simply being<br />
incompetent.<br />
This loss of solidarity and collective reference is also seen in the management ranks where the focus<br />
is on short-term financials. This leads to a reign of flexibility with recruitment on temporary contracts,<br />
repeated downsizing, and competition within firms by profit centers. Managers are individually<br />
monitored and controlled with practices such as pay-for-performance, individual objective setting,<br />
bonuses, and incentive based on individual merit. Managers act more like independent proprietors,<br />
often abdicating their social responsibility to their subordinates. Therefore, it is not surprising that talk<br />
of trust, knowledge sharing, communities of practice, and corporate culture are prevalent because the<br />
organization is stripping its workers. commitment through short-term employment. In a world of<br />
downsizing, anxiety, and demoralization, there is a strong need on the part of management to give a<br />
discourse of continuity to workers (Bourdieu 1998).<br />
Information technologies have allowed for enormous flexibility in several key dimensions. Economic<br />
capital flows from place to place electronically. Intellectual capital is captured and distributed in much<br />
the same fashion. Virtual teams are assembled when and where specific skill sets are required. When<br />
the task is accomplished, the team is dismantled. Temporary or full-time workers move on to new<br />
tasks, new settings, new teams. Management becomes increasingly virtual in a world of increasingly<br />
virtual organizational and social arrangements. In this new economy, the traditional employment<br />
covenant has been discarded (Truex et al. 1995). Skill sets change rapidly and the employee must<br />
take responsibility for gaining these skills and keeping them current. Retraining is akin to school<br />
exams within the enterprise where employees have to prove their mastery of new skills and<br />
competencies. Insecurity and a sense of unworthiness are being reinforced because the aptitudes<br />
that served workers well in the past are now being evalued and replaced with often short-lived<br />
knowledge-based skills. Such messages coupled with the structural violence of knowing that the<br />
people next door as well as people on the other side of the globe can take one’s job are perquisites<br />
for creating a submissive and exploitable workforce (Bourdieu 1998).<br />
In short, the new economy is fueled and driven by information and communications technologies.<br />
Thus it has become a matter of faith that everyone must be technology literate, web connected, and<br />
willing to change at Internet speeds. How are we to make sense of all this?<br />
372
Fausto Marcantoni and Alberto Polzonetti<br />
4. Challenges to human rights in information society<br />
Information technology presents opportunity and risk to people in the information society. New<br />
challenges to human rights have been emerged in the information age. These new challenges include<br />
but not limited to the commercialization of the Internet, invasion of the personal privacy, the growth of<br />
law enforcement authority, and the globalization of decision-making authority. Equally important are<br />
limitations, surveillance and censorship by the State or private parties, especially in the post-<br />
September 11th, 2001.<br />
Central to these challenges is the exclusion of most people in developing countries from the<br />
advantages of advances in digital information, the commoditization of information and knowledge, and<br />
the growing concentration of ownership and control of the means of producing and disseminating<br />
information and knowledge. The massive disparities in access to information and to the means of<br />
communication, known as “the digital divide,” are a result of the unequal distribution of wealth among<br />
and within countries. The digital divide results in unequal access to information and to the means of<br />
communication and information, thus producing massive exclusion. All avenues must be explored to<br />
ensure to all equal and affordable access to information, means of communication, and the necessary<br />
technology and infrastructure.<br />
Concentration of ownership in the hands of a few major corporations limits the opportunities for<br />
information and communications technologies to adequately reflect the pluralism of perspectives and<br />
diversity of cultures The Information and Communication Society will not contribute to human<br />
development and human rights unless and until access to information is considered a public good to<br />
be protected by the State and promoted by the market.<br />
The Commercialization of the Internet. The graphical interface of the internet has made it easier for<br />
many individuals, organizations and nations to take advantage of global networks, to establish an<br />
online presence, interaction, use and to exchange information and ideas in the global information<br />
society. Information society for all and all have benefited from it.<br />
First, commercialization of the Internet also poses the threat to the rights which would otherwise be<br />
protected in the physical reality. Individuals have forced to pay for services that might otherwise be<br />
routinely provided free. A critical example is the confidentiality of correspondence. By tradition,<br />
communication services have assured the privacy of personal correspondence and personal<br />
communication. But these rights are not protected in the cyber environment records of<br />
communications and the transactions are valuable for marketing purposes.<br />
Secondly, commercialization of the Internet may pose a threat to the freedom of expression. And<br />
finally, the threat is the use of the Copyright Management Systems to track the interests of Internet<br />
users. Figure presents internet users by region<br />
373
Fausto Marcantoni and Alberto Polzonetti<br />
The Growth of Law Enforcement Authority. An increased concern about cyber crime, computer<br />
crimes and internet crimes (i.e., child pornography on the Internet, women and children trafficking)<br />
have led to calls for government intervenes and attempts to censorship the use of the Internet. While<br />
there is a need to protect people’s security and safety and investigate and prosecute criminal<br />
behaviors. But unrestricted government authority or power and control coupled poses threats to the<br />
rights and freedoms of citizens in the information society. Because the Internet has no boundaries,<br />
government censorship and surveillance not only affect the citizens’ rights of one society, but<br />
threatens the freedoms and rights of people on the globe.<br />
Globalization of Decision Making. In information society economy has become globalized.<br />
International organizations, such as the World Trade Organization and the World Intellectual Property<br />
Organization have gained greater prominence in setting public policy for the digital age. This poses<br />
challenges to human dignity, as these international organizations tend to emphasize commercial<br />
interests and do not generally recognize the broader values of the local cultural, social, political, or<br />
artistic activities, Individuals may threats their rights may not be recognized by the international<br />
organizations.<br />
Personal Privacy. It is fundamental to an understanding of the Information Society to recognize that<br />
information is power. Control of personal information and the deprivation of the right of privacy are<br />
ways of exercising power over individuals. The protection of personal information and privacy is<br />
central to the autonomy of the individual and for the respect of human rights. The development,<br />
transfer, and use of technology permitting illegitimate invasion of privacy must be controlled and<br />
curbed. Anonymity and protection of privacy and free expression enable individuals to receive<br />
information and ideas without the requirement of routine tracking and surveillance (Rotenberg,2007).<br />
Free Expression. Free expression is not possible without the protection of private life Full respect for<br />
freedom of expression and information by State and non- State actors is an essential precondition for<br />
the building of a free and inclusive Information and Communication Society. There must be no<br />
censorship and no arbitrary controls or constraints imposed on participants in the information process,<br />
that is, on the content of information, its transmission, or its dissemination. Pluralism of sources of<br />
information and media must be safeguarded and promoted. The trend to provide public access to the<br />
information produced or maintained by governments and protected under “freedom of information”<br />
legislation should be extended to all countries that do not have such legislation, ensuring that<br />
government-controlled information is timely, complete, and accessible in a format and language the<br />
public can understand. Freedom of expression should be protected through the Internet in the same<br />
way it is protected offline and Internet service providers should be guided by this freedom rather than<br />
by codes of conduct that are not based on human rights (Rotenberg, 2007).<br />
374
Fausto Marcantoni and Alberto Polzonetti<br />
The Right to Education. Connectivity to the net and Access to information stimulate wider<br />
dissemination of information regarding social, economic, and cultural aspects of life. E-learning has a<br />
potential for promoting democratic citizenship through education and enhancing the level of people’s<br />
knowledge on the globe.<br />
The Right to Free Election. E-voting should respect the principles of democratic elections. ICTs<br />
have the potential to strengthen representative democracy by making it easier to hold elections.<br />
Citizen’s consultations are accessible to all citizens.<br />
The Right to Assembly. The right of assembly is related to the right of free election. Free assembly<br />
is a crucial factor in a democratic society. All groups should have the freedom to participate in a<br />
cyberassociation.<br />
The Right of Cultural and Linguistic Diversity. Language is very important tool in every day<br />
interaction as well as for F2F cyber interaction. Internet has a heterogeneous population, cultural<br />
understanding and competitiveness has become critical issue over the net. In information society<br />
plurality of identities, including cultural diversity has increasingly regarded as an asset and a<br />
fundamental value to be defended and promoted. Fostering diversity is crucial to respecting cultural<br />
rights, promoting tolerance and fighting discrimination. The preservation and promotion of cultural and<br />
linguistic diversity and interaction must be a character of a flourishing Information Society. Figure<br />
presents top ten languages used on the net.<br />
5. Conclusion<br />
In the age of information where information is the corner stone of all types of human activities. A rapid<br />
development in technologies, (i.e., the commercialization of the Internet, and the increase of<br />
globalization) Has affected human life on all levels. On one hand Light side of such developments<br />
enhance and support the protection and building of a global human rights. Availability of information,<br />
public awareness and borderless global society, connectivity and interdependence among other<br />
characteristics of information society all contribute toward a global physical and virtual system of<br />
human rights. On the other hand the dark side of this development (i.e. threats to human rights in<br />
general and personal privacy and freedom of expression in specific). All efforts should be directed<br />
toward the protection of human rights on the global level. In the area of privacy protection, the primary<br />
goal should be to ensure adoption and enforcement of “Fair Information Practices” that are the basis<br />
for privacy protection around these world. It is appropriate to encourage adoption of “Privacy<br />
Enhancing Technologies,” after assessing its adaptability and legality with human rights. Encryption<br />
can be used both to protect the privacy of personal communication and to compel the disclosure of<br />
identity. Also it is important to minimize government censorship and unlawful police surveillance that<br />
takes place around the globe. The right of all should be protected against unlawful intrusions into<br />
private life.<br />
Free exchange of information should be protected and maintain the openness of the Internet. The<br />
Internet continues to offer extraordinary opportunities to expand human knowledge, to strengthen<br />
human understanding, and to promote cooperation across borders. Efforts by government to restrict<br />
access to information on the Internet or to limit the distribution of information on the Internet,<br />
particularly information that is political, cultural or artistic should be opposed.<br />
Organization should promote open, non-proprietary standards that enable competition and discourage<br />
the development of “bottlenecks” in the communications infrastructure. Organizations should<br />
discourage the adoption of network-based techniques that “filter” information, which is more<br />
accurately described as “digital censorship.” While individual users may choose to use software that<br />
limits access to certain information, the use of these techniques at the network level is a direct threat<br />
to freedom of expression in the digital world.<br />
The growth of the Internet has a witnessed the growth of a new type of Non Governmental<br />
Organizations (NGOs) can be named cyber NGOs or (CNGOs). These CNGOs are easily identified<br />
by their “.org” suffix. They are independent of the government (.gov) and business organizations<br />
(.com). They focus on the social issues arising from the impact of information technology, such as<br />
privacy and free expression, but they also use the Internet for public education, organizing, and public<br />
action. Typically, they maintain a web site, publish an electronic newsletter, organize public<br />
campaigns, issue reports, and host conferences. Theses CNGOs forms a collective action against the<br />
375
Fausto Marcantoni and Alberto Polzonetti<br />
violation of human rights on the globe and arising public awareness of regarding social and political<br />
issues (Rotenberg, 2007).<br />
References<br />
Bourdieu, P. Acts of Resistance: Against the Tyranny of the Market, New York: Norton, 1998<br />
Electronic Frontiers Australia,2009 The EFA home page. [online] Available from: <<br />
http://www.efa.org.au/2009/12/17/flltering-comint-to-australian-in-2010/ > [Accessed December 18 2010].<br />
<strong>European</strong> Commission A. (2007). <strong>European</strong> i2010 initiative on e-Inclusion: ‘‘To be part of the information<br />
society’’. Communication from the Commission to the <strong>European</strong> Parliament, the Council, the <strong>European</strong><br />
Economic and Social Committee and the Committee of the Regions. COM(2007) 694 final. Brussels, 8 Nov<br />
2007.<br />
<strong>European</strong> Commission.B (2007). Ageing well in the information society, action plan on information and<br />
communication technologies and ageing, an i2010 initiative. Communication from the Commission to the<br />
<strong>European</strong> Parliament, the Council, the <strong>European</strong> Economic and Social Committee and the Committee of the<br />
Regions. COM(2007) 332 final. Brussels, 14 June 2007.<br />
<strong>European</strong> Commission. C (2007). The <strong>European</strong> research area: New perspectives. Green paper. COM(2007)<br />
161 final. Brussels, 4 Apr 2007[online]. Available from :<br />
http://ec.europa.eu/research/era/pdf/era_gp_final_en.pdf. [Accessed June 14 2010].<br />
GNU,2009 The Free Software Definition,[online] Available from: < http://www.gnu.org/philosophy/free-sw.html ><br />
[Accessed December 18 2010].<br />
Greenspan, A. .Structural Change in the New Economy,. paper delivered at the National Governors. Association,<br />
92nd Annual Meeting, State College, Pennsylvania, July 11, 2000.<br />
Network World, 2009 [online] Available from: < http://www.networkworld.com/news/2009/052909-20-years-aftertiananmen-china.html><br />
[Accessed December 18 2010].<br />
Power, A., & Wilson, W. J. (2000). Social exclusion and the future of cities. London: Centre for Analysis of Social<br />
Exclusion, London School of Economics.<br />
Rotenberg, M. (2007). Protecting Human Dignity in the Digital Age. [online] Available from < http://www.epic.org ><br />
Accessed December 12,2010]<br />
Statement on Human Rights, Human Dignity and the Information Society, International Symposium on the<br />
Information Society, Human Dignity and Human Rights Palais des Nations, Geneva, 3-4 November 2003<br />
The times of India,2009, [online] Available from http://timesofindia.indiatimes.com/lndia/Govt-gearing-up-to-gagnews-websites/articleshow/4562292.cms<br />
[Accessed December 18 2010]<br />
Truex, D. P., Caldow, J., and Shank, M. Reshaping the IS Culture: Understanding Organizational Culture in High-<br />
Performance Information Systems Organizations, Chicago: Society for Information Management and IBM<br />
Working Group on Reshaping IS Culture, Working Group Report, 1995.<br />
United Nations. Development and International Cooperation in the 21st Century: The Role of Information<br />
Technology in the Context of a Knowledge-based Global Economy, United Nations, May 18, 2000.<br />
376
Multi-Level Interoperability for ICT-Enabled Governance: A<br />
Framework for Assessing Value Drivers and Implications for<br />
<strong>European</strong> Policies<br />
Gianluca Misuraca 1 , Giuseppe Alfano 2 and Gianluigi Viscusi 3<br />
1<br />
<strong>European</strong> Commission, Joint Research Centre, Institute for Prospective<br />
Technological Studies, Seville, Spain<br />
2<br />
University of Udine, Italy<br />
3<br />
University of Milano-Bicocca, Milan, Italy<br />
gianluca.misuraca@ec.europa.eu<br />
giuseppe.alfano@uniud.it<br />
viscusi@disco.unimib.it<br />
Abstract: In the context of <strong>European</strong> policy and strategy for e-Government, Information and Communication<br />
Technologies (ICTs) are seen not only as a means to improve public services, but a way to facilitate multi-level<br />
governance. As a consequence, interoperability is predominantly seen as an instrument for enabling cross-border<br />
collaboration between public administrations within and between different Member States. Many initiatives and<br />
projects have been promoted and carried out during the last decade resulting in a growing number of potentially<br />
reusable best practices and benchmarks. Nevertheless, the complexity and volume of resulting project outcomes<br />
represent a challenge for effective exploitation of the results in other initiatives and intervention contexts.<br />
Furthermore, despite the recognition of interoperability as a multi-faceted concept (i.e. technological, organizational,<br />
and semantic), it seems to be mainly the technological aspects of interoperability that emerge from the available<br />
project results. This paper proposes an interpretative framework which aims to provide a systemic perspective and<br />
an instrument to elicit the links between interoperability and governance, outlining the various challenges that this<br />
poses. It considers state-of-the-art contributions at both academic and practitioner level. In particular, it discusses the<br />
multiple dimensions of interoperability and the value drivers underpinning the conceptual and measurement<br />
framework proposed. It also looks at how this framework could be applied to the evaluation of two case studies at<br />
cross-border, and national-city level in Europe. The paper concludes with the main findings of this exploratory<br />
analysis, outlining indications for future research on interoperability as a key driver for ICT-enabled governance.<br />
Interoperability is found to play a strategic role in the delivery of e-Government services to local and national<br />
communities within the EU. Moreover, its significance is expected to increase over the next few years, especially in<br />
terms of how it supports emerging city governance models and acts as the backbone of communications at a pan-<br />
<strong>European</strong>, national and local level.<br />
Keywords: interoperability, eGovernance, information systems, Europe, policy, value<br />
1. Introduction<br />
The interpretative framework for ICT-enabled governance proposed in this paper resulted from<br />
exploratory research conducted by the Information Society Unit of the Institute for Prospective<br />
Technological Studies (IPTS) of the <strong>European</strong> Commission's Joint Research Centre, on emerging ICTenabled<br />
governance models in EU cities (EXPGOV) (Misuraca 2010a). This research aimed to better<br />
understand the interplay between ICTs and governance processes at city level and formulate an<br />
interdisciplinary framework to assess the various dynamics emerging from the application of ICT-enabled<br />
service innovations in <strong>European</strong> cities. The proposed framework aims to provide a systemic perspective<br />
and an instrument to elicit the links between interoperability and governance, outlining the various<br />
challenges that this poses, especially from a <strong>European</strong> perspective, in order to link local to pan-<strong>European</strong><br />
perspectives. It is feasible to say that local authorities should be considered a fundamental part in this<br />
multi-level or - as it is often called in official documents – “pan-<strong>European</strong>” governance, which consists of<br />
increasing networking between local and national administrations across the <strong>European</strong> Union and of the<br />
emergence of a new and more integrated “<strong>European</strong> public space”. <strong>European</strong> strategy related to the<br />
harmonization of policy-making in the field of e-government among the Member States is not a “lawmaking<br />
system”. On the contrary, it is based, as Criado states, on “‘soft’ institutional mechanisms of<br />
coordination, which consist of spreading best practices, benchmarking, defining common policy<br />
objectives and common technological, semantic and organizational standards. While vertical<br />
mechanisms are based on adaptive pressure and coercion, horizontal mechanisms indicate policy<br />
framing, mutual adjustment and policy learning” (Criado 2009, p. 301). In this sense, local e-government<br />
initiatives and experiences play an important role in this process of “soft <strong>European</strong>ization”. This paper<br />
looks at the state of the art in e-government, which has to deal with a cross-border <strong>European</strong> project and<br />
a local experience. It discusses the multiple dimensions of interoperability within the EU, the value drivers<br />
377
Misuraca Gianluca et al.<br />
underpinning the conceptual and measurement framework proposed, and how this could be applied to<br />
the evaluation of ICT-enabled governance systems in two case studies at cross-border and national-city<br />
level in Europe.<br />
The paper concludes by presenting the main findings of this exploratory analysis, and outlines policy<br />
challenges and indications for future research on interoperability as a key driver for ICT-enabled<br />
governance.<br />
2. Background and motivations<br />
Interoperability plays a strategic role in the delivery of e-Government services to local and national<br />
communities within the EU. In terms of technical definition, an interoperability platform is a solution that<br />
enables two or more software applications to exchange data and achieve a common objective, even if the<br />
two applications were not originally intended to cooperate. However, interoperability can take place at<br />
different governance levels; i.e. from the exchange of simple data items, to structured documents (e.g., a<br />
purchase order), to business process cooperation where different organizations are enabled by<br />
interoperable software applications to achieve a common objective (Gottschalk 2009). According to the<br />
<strong>European</strong> Interoperability Framework (EIF) and the UNDP e-Government Interoperability Study Group<br />
(UNDP 2007), there are three layers of interoperability: technological interoperability (hardware and<br />
software issues), semantic interoperability (meaning interpretation issues) and organizational<br />
interoperability (cooperation issues).<br />
These three layers are interdependent. For instance, the user interface and interaction methods (for civil<br />
servants and end users) require solutions that cut across the three layers. They also have an inherent<br />
progression, in terms of the achievable interoperability scope. Interoperability initiatives should consider<br />
the actual administrative needs and available resources according to the defined objectives. Therefore<br />
Interoperability has no value per se; its value depends on the context of cooperation among<br />
organizational units and the benefits produced in terms of public value (Misuraca and Zambrano 2009).<br />
Public value refers to the value created by government through services, law regulations and other<br />
actions (Moore 1995). The close relationship between the concept of public value and e-Government was<br />
first noted by Kearns (2004). From this perspective, the use of ICTs to improve government and<br />
governance is also a means to improve the production of public value. Thus, an e-Government system<br />
resulting from a process of technological and organisational innovation can be indirectly evaluated by<br />
considering the possible increase of public value deriving from the adoption of that system. In general, a<br />
public value-based evaluation must be performed by considering the value that citizens perceive in their<br />
interactions with Public Administration (Alford 2002; Bannister 2002). Since the interactions between<br />
stakeholders and Public Administration can concern both stakeholders as users (mostly citizens) and<br />
stakeholders as operators of Public Administration (mostly private organizations and suppliers), public<br />
value can be measured both from an external point of view (stakeholders as users) and from an internal<br />
point of view (stakeholders as operators). In the first case, the policies for e-Government can be<br />
evaluated with respect to the quality of the services delivered. In the latter case, they can be evaluated<br />
with respect to their ability to improve the system of local government. All these results can be achieved<br />
only by means of a governance framework that considers the various relations and effects (not only from<br />
a technical perspective) in a 'dynamic' manner, and maintains the aggregations (for example, at city or<br />
community level) stable in time. Thus, in our research, we define governance as the process of decisionmaking<br />
and the process by which decisions are implemented, monitored and evaluated. These changes<br />
in decision-making are strongly conditioned by historical transformations in society’s underlying values<br />
and organisational models and can be analysed from several research perspectives (Misuraca 2010b). In<br />
particular, ICTs are important tools to support the transformation of governance processes through<br />
eGovernance. Here, we define eGovernance as the field of activity where policy design, decision-making,<br />
co-ordination, arbitration, networking and regulation, with ICTs, but also of ICTs, take place (Misuraca<br />
2010b). eGovernance can therefore be considered as a broad framework to capture the co-evolution of<br />
ICTs' various stakeholders with the political institutions, at local, national and global level. eGovernance<br />
can also be regarded as a multidimensional construct that encompasses ICT research, at the<br />
intersections with social, economic, political, and organizational science research, and addresses the<br />
investigation of the missions of government in relation to the interests of society (Misuraca 2010a).<br />
3. An interpretative framework<br />
ICT applications that support the transformation of governance processes and innovative forms of local<br />
service delivery have been developed in pioneering experiments and pilot projects in several large and<br />
378
Misuraca Gianluca et al.<br />
medium-sized cities all over the EU. In particular, as mentioned above, we will look at a study conducted<br />
by the Information Society Unit of the Institute for Perspective Technological Studies (IPTS) of the<br />
<strong>European</strong> Commission’s Joint Research Centre, namely the Exploratory Research on emerging ICTenabled<br />
governance models in EU cities (EXPGOV). Making reference to recent work in the area of<br />
social studies, public policies and ICT (see e.g. Viscusi et al. 2010), the EXPGOV theoretical framework<br />
argues for the adoption of a wide definition of e-Government as a system of ICT-enabled innovation<br />
policies for public administration and related governmental functions. From this point of view, ICTenabled<br />
projects – and the implementation of interoperability systems are included as part of this<br />
category – can be considered high-level, context-sensitive interventions that aim to introduce and<br />
facilitate gradual changes. In this connection the EXPGOV project has identified three main value drivers<br />
that constitute the basis of a theoretical framework for ICT-enabled governance at the local level:<br />
Performance: effectiveness and efficiency (enabling optimal use of resources for citizens and tax<br />
payers in the service delivery); and also, indirectly, responsiveness (serving all citizens in a<br />
consistent and predictable way).<br />
Openness: access to information as a proxy for participation (enabling the empowerment of citizens<br />
so that they can legally control service delivery to their advantage) and transparency (bringing<br />
visibility to citizens of the service workflow by means of automated service delivery); and<br />
accountability (creating standards against which the individuals providing a service and the service<br />
delivery can be held accountable), that also serves the goal of ensuring consensus orientation<br />
(following democratic practices).<br />
Inclusion: equity and inclusiveness (referring to citizens receiving a service on an equal basis and<br />
providing services to disadvantaged and minority groups), which implicitly ensures respect for the<br />
rule of law (ensuring that laws and regulations governing the service are applied impartially).<br />
These value drivers represent the principles and the expected outcomes of the e-Government initiatives,<br />
experiments and pilot projects taking place at different governance levels. Though it has been recognized<br />
that interoperability plays a key role in ICT-enabled governance, there has been little research into the<br />
non-technical dimensions of this phenomenon, or into the relation between interoperability and<br />
governance processes. Furthermore, there are few instruments which allow the systemic perspective<br />
needed by scholars and public administration managers to face up to the challenges of these multiple<br />
facets of interoperability. At the moment, a silo representation of interoperability tends to prevail. For this<br />
reason in this paper we discuss a conceptual model built on the analysis of state-of-the-art research and<br />
literature on ICT-enabled governance, and also the authors’ previous experiences in the implementation<br />
of concrete projects.<br />
The conceptual model represented in Figure 1 aims to support the elicitation of different configurations of<br />
Interoperable governance systems on the basis of the relationships between the following factors:<br />
Governance model characteristics (i.e. cultural administrative tradition and socio-economic<br />
characteristics of the intervention context),<br />
Value drivers (i.e. performance, openness, inclusion).<br />
This conceptual model aims to provide an interpretative instrument to deal with the multiple facets and<br />
layers of ICT-enabled interoperability and governance. In particular, the role played by interoperability<br />
and its impact on the value drivers, in turn influenced by governance model characteristics and related<br />
dimensions (see Figure 1), can be evaluated in terms of quality dimensions associated with the<br />
considered value drivers. Thus, for each driver we provide a set of quality dimensions, which enable a<br />
better interpretation of the type of contribution offered by interoperability initiatives. The relevance of a<br />
systemic perspective on quality assessment to support the strategic planning of e-Government initiatives<br />
has been discussed in Viscusi, G. et al. (2010), who also propose a quality framework. This framework<br />
has been applied to eGovernance issues in Misuraca, G and Viscusi G. (2011) and Misuraca, G., Alfano,<br />
G. and Viscusi, G. (2011 forhcoming). In this paper, we apply some of the dimensions of this framework<br />
to the elicitation of interoperability targets and goals for each considered value driver (see Table 1).<br />
In the following section, we apply the conceptual framework to two <strong>European</strong> case studies at different<br />
governance levels: one is a cross-border pan-<strong>European</strong> project and the other, a city government<br />
initiative.<br />
379
Figure 1: The conceptual model<br />
Misuraca Gianluca et al.<br />
Governance models’ Valuedrivers<br />
characteristics<br />
Cultural administrative<br />
tradition<br />
Table 1: Drivers, quality dimensions and related levels of application<br />
4. A pan-<strong>European</strong> case study: STORK<br />
Influence<br />
Performance<br />
Openness<br />
Socio-economic<br />
characteristics Inclusion<br />
Interoperabilitysystems<br />
Value driver Dimension Qualitylevel<br />
Performance<br />
Efficiency Service<br />
Effectiveness Organization<br />
Openness Transparency Service<br />
Organization<br />
Accountability Organization<br />
Legal<br />
Accessibility Organization<br />
Technology<br />
Information<br />
Inclusion Accessibility Service<br />
Technology<br />
Information<br />
STORK (Secure idenTity acrOss boRders linKed) is a large-scale project involving 17 EU countries, with<br />
backing from the <strong>European</strong> Commission. The STORK project deals with the use of electronic identities in<br />
a cross-border context and it has established a number of pilot projects to test the mutual recognition of<br />
eIDs by public authorities in different <strong>European</strong> Union member states (Tauber, A. and Rössler, T., 2010)).<br />
STORK is working on an EU-wide interoperable solution to provide mutual recognition of eID and eIDbased<br />
services such as authentication, which will enable citizens and businesses to use their national<br />
eIDs in any Member State involved in the project.<br />
380
Misuraca Gianluca et al.<br />
The six STORK pilots (’Cross-border authentication platform for electronic services’, ’Safer Chat’,<br />
’Student Mobility’, ’Electronic Delivery’, ’Change of Address’ and ’ECAS Integration’) are testing common<br />
eID specifications for several applications that have a substantial impact on e-Government across<br />
Europe. In particular, the technologies and services developed and tested by the STORK project are<br />
expected to be key enablers of interoperable electronic identification management (eIDM) for access to<br />
eGovernment services across Europe. The STORK electronic identity project has gone live with a pilot<br />
initiative, which demonstrates how <strong>European</strong> Union citizens can use their national eIDs to receive<br />
electronic documents securely from eDelivery portals of any participating EU Member State. The crossborder<br />
eDelivery pilot demonstrates how citizens of Slovenia, for example, can register at Austria’s<br />
eDelivery portal. Using their existing national eID cards, citizens are able to receive and pick up electronic<br />
documents by accessing the Austrian eDelivery portal. In addition, citizens may also receive eDeliveries<br />
from senders in other Member States through the Austrian portal. Currently, Austria, Estonia, Finland,<br />
Luxembourg and Slovenia are participating in the cross-border eDelivery pilot.<br />
The STORK project is expected to be a best practice or benchmark for further cross-border initiatives<br />
dealing with the exchange of sensitive information and documents. Indeed, the main outputs of projects<br />
like STORK are expected to be functional documents for ICT-applications integrated in a cross-border<br />
platform.. In summary, the final outcomes of projects like STORK tend to focus mainly on the<br />
technological facets of interoperability initiatives. In fact, however, the main challenge is to elicit the<br />
multiple dimensions of interoperability, and the value drivers that underpin ICT-enabled governance<br />
systems. In Error! Reference source not found., we apply the interpretative model discussed in<br />
Section 3 to the STORK project.<br />
Table 2: Governance value drivers, quality dimensions, and type of interoperability<br />
Value driver Quality dimension/level Type of interoperability (enabling layer)<br />
Openness Accountability/Legal Organizational<br />
Accountability/Organization<br />
Transparency/Organization<br />
Accessibility/Service Semantic<br />
Accessibility/Legal<br />
Accessibility/Technological<br />
As shown in Table 2, the main challenge for cross-border initiatives dealing with the exchange of<br />
sensitive information and documents is related to the fitness or alignment of the openness value driver<br />
(as the strategic and political guiding principle) and the different cultural administrative traditions at<br />
operational and procedural level. In the STORK project, the alignment has been reached by dealing first<br />
with the legal and organizational issues, and then with the service and related technological issues.<br />
In terms of quality elicitation, the implementation of the openness value driver focused first on<br />
accountability at legal (who is the guarantor of information flow? how can rules and laws from different<br />
legal frameworks be aligned?) and organizational level (how can the administrative process be<br />
coordinated in order to make transparent the service provision and the local responsibilities?). As a<br />
consequence, accessibility was also a relevant quality dimension which could improve the abovementioned<br />
accountability and transparency levels: e.g. accessibility to citizens of services (in terms of<br />
language and appropriateness for the e-readiness level of constituencies); accessibility at legal level to<br />
public administration employees and managers (in terms of understanding laws and rules from foreign<br />
legal frameworks); accessibility at technological level (in terms of cooperative information system<br />
architectures, allowing multichannel provision of services at front-office level).<br />
Thus, the application of the interpretative model discussed in Section 3 shows that organizational and<br />
semantic interoperability are the main focus for projects like STORK and should be addressed in parallel<br />
to technological interoperability issues. Furthermore, the model allows us to elicit the critical quality<br />
dimensions to be considered and the level at which they have an impact. This again highlights the need<br />
for a multi-level analysis when conceptualizing and implementing such a broad and ambitious<br />
interoperability initiative at pan-<strong>European</strong> level.<br />
5. A city case study: VENIS<br />
VENIS (Venezia Informatica Sistemi S.p.A.) is an ICT company owned by the local authorities and the<br />
public utilities of the City of Venice. It has a wide spectrum of objectives concerning the design,<br />
381
Misuraca Gianluca et al.<br />
implementation, management and maintenance of the information systems, the software, the<br />
technological infrastructures and the telecommunication networks used by the majority of the local<br />
authorities and the public utilities of Venice. Venis states on its internet page that the ‘innovation of the<br />
City’ is the brief it has been given by the local authorities.<br />
The local government is the biggest shareholder in Venis (75.1%), followed by ACTV S.p.A – a local<br />
transport company (14.9%), the municipal Casinò of Venice and Veritas S.p.A a local public utility (5%<br />
each). Moreover in the future shares will be issued to other important institutions of the City of Venice,<br />
such as, for example, the “Fondazione Musei Civici” – the municipal cultural foundation that manages<br />
and promotes the museum system of Venice. This broad sharing of ownership of VENIS amongst<br />
Venetian public institutions aims to secure wide product diversification, with economies of scales.<br />
Furthermore, it contributes to fostering interoperability between the information systems of local<br />
authorities - the backbone for enabling an ICT-enabled governance system for the City of Venice.<br />
Although it is owned by local institutions, VENIS has considerable managerial autonomy in the industrial,<br />
commercial, and financial operations covered by its statutory purpose. It is fair to say that the projects<br />
managed by VENIS are not focused on the technological needs of a given institution but on the urban<br />
systems as a whole. In 2009 and 2010, two of the main projects VENIS dealt with were the construction<br />
of an urban fibre-optic network and the design of “Venice Connected”, the official city website for tourism<br />
that aims to develop a sustainable tourist flow into Venice. The fibre-optic network provides a high<br />
transmission capacity (10 Gigabits) and connects not only municipal offices but also the whole University<br />
system of the City (University of Venice Ca’ Foscari, IUAV). Moreover, the urban fibre-optic network<br />
constitutes the backbone for 120 free WiFI hotspots that provide high-speed access to the Internet in the<br />
whole urban area to citizens and tourists. The website “Venice Connected” is defined as an<br />
“interoperable platform” (Figure 2) for the online booking and sales of the City’s tourist services<br />
(transport, museums, etc,). It helps visitors to reserve the services they are interested in and, at the same<br />
time, it helps the City to organize services according to the actual number of visitors expected. Venice<br />
Connected allows the purchase with a single payment transaction of various tourist services from<br />
different providers. Tourists get a single booking number which they can use to access all the most<br />
important services in Venice (from transport to museums). The website aims to encourage tourists to<br />
reserve services before they arrive in the city through a differentiated pricing policy. The lowest prices<br />
are applied if you book online and the website explains the different prices, depending on the season. It<br />
thus contributes to guiding the flow of tourists and limiting the number of unsustainable peaks of too<br />
many tourists in the City.<br />
Figure 2: The interoperable system of Venice Connected (www.venis.it)<br />
382
Misuraca Gianluca et al.<br />
As shown in Figure 2, the technological infrastructure shared amongst different Venetian local authorities<br />
and public utilities fosters the development of interoperability projects for the urban system. Another<br />
important project in this sense is the “imob” smart-card that, in the near future, will contain all the<br />
information and the codes for access to mobility services in the city (e.g. public transport, parking spaces,<br />
car-sharing, bike-sharing, and others). In this regard, the high-speed network and interoperability<br />
between the information systems of local institutions and public utilities are important enablers for<br />
technological and organizational innovation in the City’s public services.<br />
In summary, the case of VENIS is important as it highlight how far the aforementioned technological,<br />
semantic and organizational levels of interoperability can be connected and interdependent. The<br />
development of interoperable systems amongst public authorities in this case is conditioned by an<br />
institutional and organizational structure that is peculiar to Venice. This structure enables city policies and<br />
city governance models that are strictly dependent on the technological infrastructure and the<br />
interoperable systems – as seen in the example of tourism policies and coordination between tourism<br />
services in the city (Venice connected). In this sense, it can be argued that the ICT-enabled governance<br />
system of Venice is characterized by the presence of a single organization, which is owned by the local<br />
authorities, and is focused on the technological development of the urban area. In the Table 3, we<br />
applied the conceptual model proposed in this paper in order to understand the specificity of the<br />
interoperability system in this city.<br />
Table 3: Governance value drivers, quality dimensions, and type of interoperability<br />
Value driver Quality dimension/level Type of interoperability (enabling layer)<br />
Performance<br />
Efficiency/Service<br />
Technical /Semantic<br />
Effectiveness/Organization<br />
Inclusion Accessibility/Service Technical<br />
Accessibility/Legal<br />
Accessibility/Technological<br />
Indeed, the aforementioned interoperable applications and projects are interconnected with a significant<br />
change in policy strategies, in stakeholder relationships and in organizational structures (Alfano, 2011). In<br />
this case, Performance and Inclusion (see Table 3) are the two main value drivers as the improvement of<br />
the urban system via ICT and interoperability infrastructures and policies both set out to improve public<br />
services and provide wide and ubiquitous accessibility.<br />
Thus, the application of the interpretative model shows that technical and semantic interoperability are<br />
the main concerns in the Venice case; whereas, organizational and semantic interoperability were more<br />
relevant in the cross-border pan-<strong>European</strong> case described in Section 4.<br />
6. Conclusions and future work<br />
The paper has proposed and discussed an interpretative framework for interoperability in ICT-enabled<br />
governance. This framework aims to provide a systemic perspective and an instrument to elicit the links<br />
between interoperability and governance, outlining the various challenges that this poses. In this<br />
connection, the paper has discussed the multiple dimensions of interoperability and the value drivers<br />
underpinning the conceptual framework proposed together with its application in evaluating more<br />
specifically the ICT-enabled governance systems in two case studies at cross-border and city level in<br />
Europe. The application of the framework showed how at both cross-border and city level different<br />
cultural administrative traditions and objectives influence the critical governance value drivers and<br />
characteristics of interoperability systems deployed. Different governance levels of focus and objectives<br />
influence different value drivers at cross-border (openness) and city level (performance/inclusion)<br />
enabled by different types of interoperability, i.e. organizational/semantic at cross-border level and<br />
technical/semantic at city level. It is worth noting how semantic interoperability is relevant for service layer<br />
at both levels of investigation: accessibility/service (cross-border level) and efficiency/service (city level).<br />
The results of this preliminary analysis of the application of the interpretative framework provide insights<br />
for further analysis and research on how the design and reuse of interoperability initiatives should be<br />
implemented. As shown in the two examples analysed, technical interoperability seems to be more<br />
appropriate for local initiatives focused on elementary services (such as payments, booking services,<br />
etc.); whereas organizational interoperability is a critical factor in cross-border initiatives, where the<br />
383
Misuraca Gianluca et al.<br />
alignment of legal framework constraints and administrative requirements are the key to an effective<br />
(and reusable) outcome of the initiative.<br />
In both case, however, semantic interoperability plays a intermediate role as a representational tool which<br />
enables both the correct translation of organizational and legal requirements (at cross-border level) and<br />
the efficiency of the technical infrastructure (at city level).<br />
However the sample of application of the framework does not yet allow more than a classification of the<br />
initiatives and the elicitation of the relevant type of interoperability to be considered by policy makers<br />
when planning interoperability initiatives. In future work, we aim to further refine and apply the quality<br />
dimensions of the conceptual framework proposed to rank and also benchmark the type of barriers to<br />
interoperability initiatives. This should allow us to reach higher granularity in the analysis of the<br />
application of the interpretative framework. Finally, we will extend the analyses in order to have a wider<br />
set of case studies for comparison of experiences at the same and different levels of policy design and<br />
implementation.<br />
Disclaimer: The views expressed in this paper are purely those of the authors and may not in any<br />
circumstances be regarded as stating an official position of the <strong>European</strong> Commission.<br />
Acknowledgments<br />
This article is inspired by and in part drawn from the Exploratory Research on emerging ICT-enabled<br />
governance models in <strong>European</strong> cities (EXPGOV) conducted by Gianluca Misuraca as part of his work<br />
for the Information Society Unit of the Institute for Prospective Technological Studies (IPTS) of the<br />
<strong>European</strong> Commission's Joint Research Centre, in collaboration with EUROCITIES.<br />
(See http://is.jrc.es/pages/EAP/EXPGOV.html ).<br />
References<br />
Alfano, G. (2011 forthcoming) “Adapting bureaucracy to the Internet. The case of Venice Local Government”,<br />
Information Polity.<br />
Alford, J. (2002) "Defining the client in the Public Sector: a social-exchange perspective," Public Administration<br />
Review,Vol. 62, Issue 3, pp 337-346.<br />
Bannister, F. (2003) "Citizen Centricity: A Model of IS Value in Public Administration," Electronic Journal of<br />
Information Systems Evaluation, vol. 3:2.<br />
Batini, C., Viscusi, G., Cherubini, D., (2008), “eG4M: The Planning Methodology”, QD Research Report, University of<br />
Milan Bicocca, DISCO, Starrylink Ed.<br />
Bloisi, D., Iocchi, L., (2009) ARGOS – A Video Surveillance System for Boat Traffic Monitoring in Venice,<br />
International Journal of Pattern Recognition and Artificial Intelligence<br />
Castelnovo, W., Simonetta, M. (2008) “A Public Value Evaluation of e-Government Policies.” The Electronic Journal<br />
Information Systems Evaluation Volume 11 Issue 2, pp. 61 - 72, available online at www.ejise.com<br />
Criado, J. I., (2009) <strong>European</strong>ization of eGovernment policy. Institutional mechanisms and implications for public<br />
sector innovation. Information Polity, 14, pp 299 – 314.<br />
<strong>European</strong> Commission, (2006), Interoperability for Pan-<strong>European</strong> e-Government Services, COM 45 final of 13th<br />
February 2006.<br />
Gottschalk, P. (2009) "Maturity levels for interoperability in digital government," Government Information Quarterly,<br />
Volume 26, Number 1, pp 75-81.<br />
Kearns, I. (2004) "Public value and e-government", Institute for Public Policy Research, London UK, from<br />
http://www.ippr.org.uk/.<br />
Misuraca, G., and Zambrano R., (2009), UNDP Primer on eGovernance for Public Administration Reform (UNDP<br />
New York, Working Documents - Unpublished)<br />
Misuraca, G., and Viscusi, G. (2010) " eGovernance for Development: lessons learned and strategic principles for<br />
designing an operational roadmap " International Journal of Electronic Governance (IJEG), Vol. 3, pp 118 –<br />
133.<br />
Misuraca, G. (2010a). "Concept Paper of the Exploratory Research on emerging ICT-enabled governance models in<br />
EU cities", <strong>European</strong> Commission, Joint Research Centre, Institute for Prospective Technological Studies<br />
(IPTS). Available at: http://is.jrc.ec.europa.eu/pages/EAP/EXPGOV.html<br />
Misuraca, G. (2010b). "Literature Review - Working Paper of the Exploratory Research on emerging ICT-enabled<br />
governance models in EU cities", <strong>European</strong> Commission, Joint Research Centre, Institute for Prospective<br />
Technological Studies (IPTS). Available at: http://is.jrc.ec.europa.eu/pages/EAP/EXPGOV.html<br />
Misuraca, G., Rossel, P., and Glassey, O. (2010) ''Overcoming barriers to innovation in e-Government: the Swiss’<br />
way'', in Nixon, G et alii (eds.) (2009) Understanding eGovernment in Europe: issues and challenges,<br />
Routledge, Taylor and Francis Publisher.<br />
384
Misuraca Gianluca et al.<br />
Misuraca, G., Alfano, G. and Viscusi, G, (2011 forthcoming) ''Interoperability challenges for ICT-enabled governance:<br />
towards a pan-<strong>European</strong> conceptual framework'', in Journal of Theoretical and Applied Electronic Commerce<br />
Research, Special Issue on eGovernment Interoperability, enterprise architecture and strategies.<br />
Moore, M.H. (1995) Creating public value : strategic management in government, Harvard University Press,<br />
Cambridge, Mass.<br />
Tauber, A. and Rössler, T. (2010) "Interoperability Challenges for Pan-<strong>European</strong> Qualified Exchange of Electronic<br />
Documents", In Proceedings of the 10th <strong>European</strong> <strong>Conference</strong> on e-Government, Limerick, Ireland 17-18 June<br />
2010<br />
UNDP " e-Government Interoperability Study Group: Overview and Guide."<br />
Viscusi, G., Batini, C., and Mecella, M. (2010) Information Systems for eGovernment: a quality of service perspective<br />
Springer, Berlin-Heidelberg.<br />
www.venis.it<br />
www.veniceconnected.it<br />
https://www.eid-stork.eu/<br />
385
Strategies for eGovernment Implementation in Developing<br />
Countries: A Case Study of Botswana Government<br />
Racious Moilamashi Moatshe and Zaigham Mahmood<br />
University of Derby, UK<br />
R.Moatshe@derby.ac.uk<br />
Z.Mahmood@derby.ac.uk<br />
Abstract: eGovernment as a multi-dimensional and multi-disciplinary field, its implementation in developing countries<br />
is confronted with many barriers which require winning strategies in order to successfully implement the projects.<br />
Inter alia, the barriers include; weaknesses in governance systems, ineffective political structures, lack of requisite<br />
technical skills, proficiency and implementation capacity, ineffective information provision and access, poor<br />
infrastructure, a non-conducive policy environments and legislation. The fundamental aspect of eGovernment is that<br />
it must deliver public information and services in ways that citizens and businesses want them using internet and<br />
other ICTs as enablers. Thus eGovernment serves as a platform of infrastructure that governments today are<br />
building to transform the way they complete their missions, values and aspirations. This should have direct impact on<br />
the effectiveness of public services and government’s continuous contacts with citizens, especially those living in<br />
remote areas. Winning strategies are therefore needed for successful implementation of eGovernment. The<br />
identification of barriers and determining critical success factors for eGovernment are a crucial part of winning<br />
formulae to eGovernment projects success. A case study of Botswana, a developing country is used as part of an<br />
ongoing broader research, to identify and discuss the barriers and consequently suggests strategies for developing<br />
eGovernment by introducing a new framework called; EGovernment Implementation Critical Success Factor Model<br />
which is intended to guide Botswana government and other developing countries in their eGovernment<br />
implementation pursuit. The new model and discussions thereof are necessary to give a detailed perspective of<br />
requisite factors that enable the successful impementation of eGovernment projects. These factors are classified into<br />
(a) technical and proficient personnel to implement eGovernment, (b) enabling high political leadership involvement,<br />
(c) A conducive legislation and public policy environment, (d) dedicated and sustainable budgetory framework, (e)<br />
equitable provision and access to information, (f) innovative government to foster economic development (g) vision<br />
and strategic decision capability, (h) adequate infrastractural development, and (i) creation of all stakeholders<br />
Inclusive environment. The methodology for the case study comprises of both secondary and primary data sources.<br />
The primary sources covered interviews with general members of the public and project office in Botswana, whilst<br />
secondary sources included, external and internal reports, policy documents and publications by individual<br />
researchers and other research organisations.<br />
Keywords: eGovernment, eCommerce, eBusiness, ICTs, Botswana<br />
1. Defining eGovernment<br />
eGovernment concept originated at the beginning of 21 st century as a copy of eCommerce into public<br />
sector (Spremic, et al (2009). According to (Almarabeh and AbuAli, 2010) the eGovernment idea was<br />
raised by the United States of America vice president (Algore) within his vision of linking the citizens to<br />
the various agencies of government for getting all kinds of government services automated, reduce costs<br />
and improve performance. It allows government departments to integrate services using information and<br />
communication technologies (ICTs) and better services delivery to citizens and empower people through<br />
participation in public decision making (UN, 2005).<br />
2. eGovernment in developing countries<br />
The traditional model of government is ineffective and inefficient and is not working any longer, as the<br />
emerging vast networks in interacting public and private organisations could no longer be served using<br />
the traditional setups of a single administration for single services and specific functions. As a result<br />
eGovernment attracted the attention of political leaders and statesmen around the world (Hwang et al,<br />
1999; Sharifi and Zarei, 2004). In developed countries, the services are offered in a self service mode<br />
through internet portals that become a single point of interaction for the citizens to receive services from a<br />
larger number of departments (Bhatnagar, 2003). For example, in Singapore, Canada, New Zealand,<br />
citizens can pay parking tickets, job seekers can search for employment and public trustees can file an<br />
application for estate administration using opportunities provided by eGovernment (Ngulubane, 2007).<br />
In developing countries, businesses face challenges different from those in developed countries (Molla<br />
and Licker, 2005). The potential for eGovernment in developing countries remains largely unexploited<br />
and compared to the developed, developing countries lack in (1) history and culture; (2) technical<br />
capabilities; (3) Infrastructure; (4) e-citizen development; (5) public service focus (Ndou, 2004; Chen, et<br />
386
Racious Moilamashi Moatshe and Zaigham Mahmood<br />
al, 2006). There is digital divide between developed and developing countries, hence, developing<br />
countries need winning eGovernment strategies to catch up.<br />
A number of authors (Ndou, 2004; Molla and Licker, 2004; Schuppan, 2008; Chen et al, 2006; Heeks,<br />
2003; Sharifi and Zarei, 2004; Akman et al, 2005; InfoDev, 2002; Reffat, 2006; Al-Busaidy &<br />
Weerakkody, 2009; Mahmood, 2011), have outlined the barriers and challenges facing eGovernment<br />
implementation in developing countries as (a) Inadequate ICT infrastructure development; (b) Lack of<br />
supportive legislation and policy environment; (c) Security and protection of privacy; (d) organisational,<br />
managerial skills; (e) lack of monitoring capacity; (f) Lack of transparency and citizens trust; (g)<br />
Information and data challenges; (h) Information technology challenges; (i) Digital divide, accessibility<br />
and e-literacy; (j) E-readiness challenges; (k) Inadequate funding.<br />
3. Botswana Government case study<br />
Botswana, a developing country situated in Southern Africa like any developing country face challenges<br />
which include inter alia; declining rankings in global competitiveness, labour market and public sector<br />
inefficiencies, escalating unemployment and crime, declining quality of life and reduced trust in<br />
government. These challenges compelled government to embark on eGovernment implementation.<br />
Botswana government conducted an e-readiness assessment in 2004 and enacted the National ICT<br />
policy, 2007. This policy set the platform for eGovernment implementation for provision of e-information<br />
and e-services through government web portal by setting targets. The Botswana eGovernment targets<br />
were set guided by the seven pillars of (a) Connecting Communities; (b) Government On-line (GOL); (c)<br />
E- learning/Thuto Net Botswana; (d) E-Health Botswana; (e) Economic Development and Growth of the<br />
ICT Sector; (f) Infrastructure, and (g) Legislation and Policy.<br />
In pursuit of the Botswana case study, as part of an ongoing broader research we carried out<br />
investigations, which methods are presented in the next section.<br />
4. Methodology and approach<br />
In order to identify barriers and challenges facing eGovernment implementation in Botswana and<br />
subsequently develop a model or framework for successful eGovernment implementation, A primary<br />
research was carried in two urban villages and three surrounding sub villages in the capital city southern<br />
part of Botswana within a 100km radius of Gaborone city. A total of 66 ordinary citizens in urban villages<br />
were randomly approached and probed on the level of ICT and internet usage, frequency and type of use<br />
and further to establish awareness and gather citizens initial responses about the eGovernment project.<br />
A further 38 citizens were also randomly approached in Gaborone city. The choice of location was based<br />
on population densities of Botswana, where the majority of the population (over 50%) live in the<br />
southeast and mainly in Gaborone and within a 100km radius of Gaborone, (Botswana Central Statistics<br />
Office, 2001).<br />
Furthermore, reports and publications were perused through (Botswana E-readiness Assessment Report,<br />
2004; Botswana National ICT Policy, 2007; United Nations EGovernment Survey, 2008; Botswana<br />
Budget Speech, 2009; ICT Development in Africa: Botswana Country Presentation; 2009; UNPAN Portal<br />
project: Modernising Botswana government in the Digital Era, 2009; The Botswana Minister of Science<br />
Communication and Technology –MCST Speech, 2010; Bwalya, 2010).<br />
The findings are presented as; (a) citizens’ questionnaire survey results, (b) outcome of discussions with<br />
Botswana eGovernment project office, and (c) observations and analysis made from secondary data<br />
sources.<br />
4.1 Citizens’ questionnaire survey results<br />
Lower levels of ICT are revealed as most people especially in the villages do not have access to internet,<br />
computers, unaware of the eGovernment project, have not accessed the website and those who did<br />
found the website not helpful. People in Gaborone (City) generally are aware about internet but resources<br />
limit access and those aware mostly had secondary and tertiary education and use ICT mostly for their<br />
work especially in the private sector. The three sub villages in south of Botswana did not have any<br />
internet facilities let alone privately run and a few privately run internet cafes’ existed in urban villages<br />
and the broadband speed was cited as a challenge together with the access costs. The investigations<br />
further revealed lack of adequate user engagement and focus, somewhat lack of citizens’ lacked trust<br />
and confidence in eGovernment due to lack of knowledge.<br />
387
Racious Moilamashi Moatshe and Zaigham Mahmood<br />
4.2 Outcome of discussions with eGovernment project office<br />
As aforementioned, eGovernment project team was visited and findings of issues probed are; Unrealistic<br />
and non rational based targeting; (a) Botswana government targets for non mining to be 80% of GDP by<br />
2009 when currently the mining contribution to GDP is approximated at 50%; (b) Development of policy<br />
and legislation dealing with electronic signature not achieved by targeted date of 2005 and 2006, In<br />
August 2010 the legislation had not been developed; (c) Botswana eGovernment targets for a fully<br />
transformed and seamless government by 2016 reflected a serious reality gap challenge.<br />
Poor implementation capacity; Data protection, electronic commerce, privacy, electronic signatures and<br />
freedom of information laws not in place despite targeted for enactment 5years ago.<br />
Inadequate authority and autonomy of the project team; (a) Project office relied wholly on government<br />
officials to drive the intiative to facilitate project implementation, e.g. effecting necessary legislation; (b)<br />
Lack of budget control and unware of the funding source, that is, whether State President Ministry or<br />
Ministry of Communication Science and Technology (MCST).<br />
Lack of Stakeholder inclusion; (a) Lack of government and private sector partnerships for sharing of<br />
resources, resources and co-funding of the eGovernment project; (b) The private sector is considered<br />
key as is mostlly considered more technologically advanced than the public sector.<br />
4.3 Observations and analysis from secondary data sources<br />
The secondary data sources revealed further constraints facing the Botswna eGovernment initiative<br />
which are:<br />
ICT Status; lower levels of ICT usage and penetration, that is, internet user 6%, Broadband 1% and<br />
PC 2-3%).<br />
Speech by Minister of Communications, Science and Technology (MCST) May (2010) highlighted (a)<br />
lack of strategies, and initiatives for citizens safe access to online resources; (b) disparities between<br />
people in urban and rural areas in the provision of ICT services; and need for adaptation of policies<br />
and strategies to help promote ICT in rural areas. Worth noting is that the Botswana eGovernment<br />
project falls under the MCST.<br />
Botswana dropped in ratings, (The United Nations EGovernment Survey, 2008), Botswana<br />
experienced a major drop from 90 th position in 2005 to 119 th in 2008 on web measure index and<br />
connectivity scorecard survey.<br />
Other individual research (Bwalya, 2010) reveal that the majority of the ordinary individuals do not<br />
appreciate the value of eGovernment applications in as far as public service delivery is concerned<br />
and further that few individuals have exploited public services offered mainly through the<br />
eGovernment web portal.<br />
4.4 Summary of findings<br />
The above findings identify (1) design reality gaps [where the eGovernment project is now and where it is<br />
intended to get Botswana to by 2010 and 2016] and inadequate strategic capabilities and decisions<br />
issues (e.g. unrealistic and non rational based targeting and master plan had not yet been developed). It<br />
worth noting that winning strategies and appropriate decisions are a key success factor in implementing<br />
eGovernment (The working group, 2002; Infocomm, 2006); (2) ICT status (e.g. low PC and internet user<br />
penetration and lack of e-human capital as the vast majority of the population is not e-ware and e-ready),<br />
does not support the ambitious eGovernment targets and raises access and connectivity issues.<br />
Infrastructure development is a prior necessity to pursuing eGovernment project. It facilitates the creation,<br />
distribution and manipulation of information (Wesso et al, 2004; Chen et al, 2006); (3) access and<br />
connectivity challenges invariably lead to digital divide and e-illiteracy [rural and urban digital gap], these<br />
disparities between people in urban and rural areas in the provision of ICT services further hinders<br />
equitable provision and access to government information by all citizens; (4) resulting in serious exclusion<br />
and marginalisation of most stakeholders ( that is, Lack of enabling environment for all stakeholder<br />
inclusion). The literature states that achieving participation of citizens and other stakeholders in<br />
eGovernment has become a pivotal criterion (Wimmer, 2002). It is also reported (UN, 2005)<br />
developments in ICTs allows an unprecedented opportunity for countries to leap frog traditional modes of<br />
service delivery and make manifold improvements in process effectiveness and efficiency; (5) thus,<br />
internet and eGovernment are new world’s trade routes and the nation’s ability to leverage on the internet<br />
388
Racious Moilamashi Moatshe and Zaigham Mahmood<br />
will determine its competitive and comparative advantage in the global digital economy (Caldow, 1999;<br />
Moodley, 2001). Hence, establishing eGovernment requires eCommerce, eBusiness, and eGovernment<br />
plans strategic enough to achieve the much need competitiveness (Peters, 2001; Moatshe et al, 2010);<br />
(6) Lack of supportive and enabling laws (e.g. data protection and eCommerce laws) clearly shows lack<br />
of conducive legislation and public policy environment (Raman et al, 2007; Ebrahim and Irani, 2005); (7)<br />
Lack of these laws raises fundamental issues of public trust in government activities inclusiveness of<br />
eGovernment services and has an impact on the public administration transparency, of which Freedom of<br />
Information Act is paramount. This position points to inadequate high political leadership involvement as<br />
revealed that the Botswana eGovernment project is not embraced at the highest political level [not fully<br />
driven from office of the president] (UN, 2008). Undoubtedly, state politics and culture can support or<br />
impede eGovernment (Seifert and McLoughlin 2008; OECD, 2003), thus political leadership and<br />
commitment is a critical success factor for implementing eGovernment project; (8) Citizens survey and<br />
inquiries with the eGovernment project office highlighted challenges of; Lack of eGovernment awareness,<br />
inadequate user engagement, inadequate strategies to manage society’s resistance to change, lack of<br />
common understanding among change agents and project team members, lack of project buy-in by<br />
public sector middle management, inadequate collaboration with the private sector for sharing of skills,<br />
resource and expertise, and citizens inability to access government website. All these show limitations in<br />
the implementation capacity and project management; (9) Lastly, although Botswana has budgeted<br />
approximately GBP 95 Million over 5 years for the project, it may not be enough given the infrastructure<br />
development required and that all finding comes from government, design reality gap will worsen this<br />
position, thus a funding issue.<br />
The above barriers could lead to project failure if not mitigated with appropriate strategies. In light of this,<br />
we have developed a new model presented below.<br />
5. New eGovernment critical success factor model<br />
Figure 1::eGovernment implementation critical success factors model<br />
The new model identifies and establishes the critical success factors impacting on eGovernment<br />
development and is intended to guide Botswana government and other developing countries when<br />
implementing eGovernment projects, herein classified into nine categories:<br />
Technical and Proficient Personnel to implement<br />
The key skills are:<br />
Analytical and Project Management Skills, covering ability to analyse processes, practices, policies and<br />
other factors contributing to eGovernment implementation. project management skills refers to planning,<br />
organising, estimating and allocating resources, negotiation, results measurement, trouble shooting and<br />
progress tracking.<br />
Technical and Information Management Skills, this covers; higher understanding and skills to implement<br />
eGovernment solutions; and information is a valuable public organisational resource and skills required<br />
include information context quality, format, storage, classification, searching, transmission, accessibility,<br />
usability and security<br />
389
Racious Moilamashi Moatshe and Zaigham Mahmood<br />
Communication and Presentation Skills, it covers; on going and adequate training education and<br />
marketing initiatives. The need for ongoing communication of project goals, issues and results, continued<br />
interaction with stakeholders can lead to buy-in and participation. Various types of communication, for<br />
example, emails, bulletins and formal reports on the project need issuing. However, information needs to<br />
be categorized, summarized and presented into briefings that convey crucial facts without over<br />
simplification beyond underlying data (Reffat, 2006).<br />
Enabling High Political Leadership Involvement<br />
eGovernment is at the mercy of the political leadership who govern the state and can decide to /not<br />
finance and implement eGovernment project, fully or partially irrespective of its value to citizens. The<br />
fundamental question now is, how best can the political leadership be compelled to embrace, initiate and<br />
sufficiently finance and fully get involved to make an eGovernment initiative a success? Should there be<br />
an eGovernment Act? to make implementation a legal requirement. Since the political ownership is vital,<br />
in the UK, a minister was entrusted with the implementation responsibility and reported directly to the<br />
Prime Minister (Sigh, 2003)<br />
The political ownership gets reflected when political leadership take the responsibility and find resources<br />
to take the initiative forward. Only such a commitment can bring about the necessary momentum in over<br />
coming inter departmental rivalries and burreaucratic hurdles that are encountered in the implementation<br />
process, (Seifert and McLoughlin, 2008). In Italy, Parliment applied a law (4/2004) which imposed that<br />
impaired people should not be discriminated and must have access to sources supplied using ICT<br />
technologies (Signore et al, 2005).<br />
A Conducive Legislation and Public Policy Environment<br />
Legislation and regulatory issues can impede the uptake of eGovernment (OECD, 2005) and developing<br />
eGovernment services requires a high penetration in homes or presence of a large number of public<br />
kiosks, e.g. handling e-payments and building trust between citizens and government in doing<br />
transactions over long distance requires an enabling legal framework, (Bhatnagar, 2002; Caldow, 1999).<br />
This covers data protection, access to sensitive data, networking of activities and database, electronic<br />
signatures, cyber law, security policy, transparency etc, (Reffat, 2006; OECD, 2005; Wimmer, 2002)<br />
Government must set up law supported structures, maitaining a healthy policy environment to address<br />
security issues, service requirement of eGovernment, eGovernment model. An aware and demanding<br />
citizenry, which understands its rights, willing to express them and to fight for them in case of laxity and<br />
ineffeciency becomes critical. Hence, e-governement can be an instrument for promoting citizens<br />
awareness and publishing performance data and citizens charters, (Bhatnagar, 2002; Hwang et al 2004)<br />
Dedicated and Sustainable Budgetory Framework<br />
Developing countries mostly given lack infrastracture, resources and eGovernment initiative would<br />
compete for limited resources with other national needs (e.g. roads construction, schools etc.) Therefore,<br />
implemention costs inappropriate cost benefit analysis approaches, can constrain or block the flow of<br />
investment at the level necessary to support eGovernment innovation (<strong>European</strong> Commission, 2006).<br />
While planning under a difficult financial climate, governments should seek to invest in sustainable<br />
programs that can produce savings (Almarabeh and Abu Ali, 2010). This can be achieved by: activating<br />
functionalities clearly and try not to add details that will push budget into deficit; develop projects that are<br />
achievable within the resources available; consider the government’s current use of technology and study<br />
past successes and failures; and designate competent officer or organising body to oversee costs.<br />
Funding is really the life blood of eGovernment, in many OECD countries, budgetary arrangements<br />
restricted eGovernment initiatives, funding was done through traditional government silos and ITC<br />
expenditure not recognised as an investment (OECD, 2003). EGovernment requires level of certainity on<br />
future funding of projects and a central funding programme could help faster innovations and allow for<br />
key demonstration projects. Public private partnerships are necessary to share expertise,facilitate<br />
innovating flexible longterm relationships with partners sharing risks and rewards. This help on how to<br />
respond to changing technologies and opportunities (Seifert and McLoughlin, 2008)<br />
Equitable and Access to Information<br />
A mature private sector has enabled business process outsourcing and public-private partnership while a<br />
technologically mediated world made possible self service delivery and government online not ín-line”,<br />
(Sigh, 2003). Why could not government services be accesable 24/7 like the Automatic Teller Machines<br />
390
Racious Moilamashi Moatshe and Zaigham Mahmood<br />
(ATMs)? Citizens and businesses increasingly expect government to perform more like commercial<br />
entities, they want convienent, instant access to public information and services 24hours a day, 7 days a<br />
week.<br />
The eGovernment rethinking transformation of the functioning of the democratic process is all about<br />
enhancing, facilitating convienant and instant access to government information and services by citizens,<br />
businesses, employees, government entities and other agencies (Aicholzer and Schmutzer, 2000; Wong<br />
et al, 2007); Lyane and Lee, 2001; Sharifi and Zarei, 2004)<br />
Government must be prepared to employ technology strategy that include interactive capabilities which<br />
allow citizens to take active real time participatory roles in government on line and unrestricted secure<br />
access to information (24/7) provides opporturnities of real time participation throughout the democratic<br />
process, not simply disseminating stale, inaccurate and irrelevant information (Caldow, 1999)<br />
Information is a competitive tool, knowledge power, and life blood of every nation, hence eGovernment<br />
initiative should be backed by sound policies to improve access to information and online services and<br />
customers and citizens should have a choice in the method of access and interaction. Understanding<br />
customer needs should drive the 24/7 on line information access is critical in the current globalised and<br />
privatised world economy. Existing laws that support equitable flow and access to information are a<br />
necessity, e.g Freedom of Information Act and broader government policy on information sharing.<br />
Through the use of eGovernment (internet) various stakeholders are able to share ideas and information<br />
and inform specific policy outcomes e.g sharing of information between central and local level<br />
government can facilitate environmental policies, sharing information on health sector can improve<br />
resource use and patient care, (OECD, 2003). Within the information and knowledge society, data<br />
information and knowledge objects are the major resources to be elaborated, therefore appropriate<br />
design of the data, information and knowledge object is required, standardization, interoperatability,<br />
comminicability and intergration to distinct IT systems over a corporate semantic web becomes important<br />
(Wimmer, 2002); with the strategies to provide electronic public services through virtual or physical self<br />
service shops, information needs to be transfered adequately so that citizens and businesses are able to<br />
use these facilities in a smart way<br />
Innovative Government to Foster Economic Development<br />
Becoming a competitive eGovernment involves systematic technological transformation of traditional<br />
economic development assets such as great schools, safe streets, a clean environment, quality health<br />
care, viable land use and good governance. How well the technology and/or internet is exploited in each<br />
of those assets is the new differentiation, critical issues are, what is the student-to-pc ratio? Are the<br />
school wired? Can citizens and businesses conduct business with the government online? Is there a<br />
healthy and growing market of high capability, telecommunications, wireless cables to the homes and<br />
businesses? Do transportation systems, law enforcement and hospitals employ the latest technological<br />
advances? Are higher education resources connected to new technologies, re-skilling and producing a<br />
workforce of knowledge workers? Are technology strategies employed in urban planning and help to<br />
alleviate urban sprawl? Are processes in place to continually re-evaluate traditional competitive assets in<br />
a digital society? Are public policies and the legal environment conducive to eCommerce, eBusiness and<br />
eGovernment? (Caldow, 1999). For eGovernment to succeed, implementing goverments need to have a<br />
clear vision and priorities for eGovernment and promote priority economic sectors through the best<br />
selection of projects (The working group, 2002)<br />
Vision and Strategic Decision Capability<br />
Vision and strategic decisions capabilities are critical to; (1) determine goal for pursuing eGovernment;<br />
(2) define and set clear vision, mission and priorities for eGovernment; (3) determine the eGovernment<br />
the nation is ready for; (4) assess the political will to support and lead eGovernment efforts; (5) decide on<br />
the best method of selection of eGovernment projects; (6) Planning and managing eGovernment<br />
projects; (7) decide on change management processes to overcome resistance from within governments<br />
and outside government; (8) determine progress measurement and communication strategies and how to<br />
depict failure; (9) determine relationship level with private sector; (10) determine how can eGovernment<br />
facilitates and improves citizens participation in public affairs, (Almarabeh and AbuAli, 2010;Working<br />
Group 2002).<br />
391
Racious Moilamashi Moatshe and Zaigham Mahmood<br />
For necessary transformation of governments towards a customer- oriented virtual administration,<br />
eGovernment needs proper vision, decisions and strategies(Wimmer, 2002) These must be formulated<br />
into innitiatives, here the financial and operative resources for realising eGovernment initiatives are<br />
allocated and strategic decisions made to implement the strategy.<br />
Strategic vision and decisions determine the extent of partnership with private sector given the private<br />
sector experience in developing IT applications. Partnership could be to find a single partner for the entire<br />
strategy, producing guidelines for design, re-engineer processes, developing software, helping in<br />
procurement and providing training (Bhatnagar, 2002).<br />
Adequate Infrastractural Development<br />
eGovernment can only thrive when the required and necessary information and communication<br />
technology (ICT) infrastracture is available. A developed telecommunications sector with a fast reliable<br />
and security ICT networks to facilitate voice, data and media is critical.<br />
Different access methods such as remote access by Cellular Phones, Satellite Receivers, Kiosks etc,<br />
need to be considered by governments in order that all members of society can be served irrespective of<br />
their physical and financial capabilities (Ndou, 2004), without ICT effective and competitive public sector<br />
is unattainable.<br />
Global market based networks on IT based communication platforms a pre-requisite for successful<br />
implementation of eGovernment (Moatshe et al, 2010).<br />
Enabling Environment for all Stakeholders Inclusion<br />
eGovernment is not about using the internet in performing administrative work, it is also more about reengineering<br />
of administrative processes, re-organising and restructuring of public organization and<br />
shifting focus towards a citizen and customer centred service provision. EGovernment is strongly shaped<br />
and driven by social, cultural and political factors on local, regional and supra-natural levels. It therefore<br />
calls for focus on programmes and policies aimed at the diversification of the ICT base such that those<br />
with low income, women, youth, disabled, disadvantaged and those living in rural areas are<br />
systematically included in the impending benefits of newer technologies (UN, 2005).<br />
It worth recognising that people are not just citizens of government, they are parents, volunteers,<br />
neighbours, business owners and employees, people with shared ethnic backgrounds, consumers,<br />
students, sports enthusiats, senior citizens and children (Caldow, 1999). Inclusion of a community service<br />
in the overall web strategy is the way to go, conducting seminars, educational programs, establishing<br />
outreach to citizens, underserved communities, community groups and non-governmental and civic<br />
organisations are also important aspects to an informed and participative community.<br />
All stakeholders inclusion is key to successful eGovernment initiative. Citizens in their interaction with<br />
government agencies, should have greater awareness of services and priorities, wider choice of access<br />
channels, greater convienance, low costs, flexible and more personalized services as well as greater<br />
participation and openness in the democratic process. Equally, businesses would benefit from quicker<br />
and faster interactions, minimum transaction costs and regulatory burdens, greater benefits such as eprocurement,<br />
better inventory management and shared data management, greater openness and<br />
transparency would benefit the whole economy by attracting Foreign Direct Investments (FDI), (Sigh,<br />
2003; OECD, 2003; Wesso et al 2004; <strong>European</strong> Commission 2006)<br />
6. Conclusion<br />
eGovernment is not an easy initiative and there are no short cuts, hence, the new model identifies and<br />
establishes the critical success factors impacting on eGovernment development. Whilst a number of<br />
studies have invariably outlined the challenges and barriers facing eGovernment in developing countries,<br />
the same studies have not made a significantly strong case to present explicitly factors of (stakeholder<br />
inclusion; equitable provision and access to information; Innovative government to foster economic<br />
development; enabling high political leadership involvement; vision and strategic decision capability) as<br />
critical components of successful eGovernment implementation. The new model though not prescriptive<br />
offers developing countries in pursuit of eGovernment initiatives an implementation framework. The<br />
model hopefully fills the knowledge gap and goes a long way in assisting Botswana and other<br />
governments to better implement eGovernment projects.<br />
392
References<br />
Racious Moilamashi Moatshe and Zaigham Mahmood<br />
Aicholzer, G. and Schmutzer, R. (2000) EGovernment: the hard way from political agendas to service improvements;<br />
the Special <strong>European</strong> Council of Lisboa, 23 and 24 March 2000<br />
Almarabeh, T and Abu Ali (2010); A General Framework for EGovernment; Definition Maturity Challenges,<br />
Opportunities, and Successes; <strong>European</strong> Journal of Scientific Research ISSN 1450-216X, Vol 39, No 1 (2010),<br />
pp 29-42<br />
Bhatnagar, S (2003); Transparency and Corruption; Does EGovernment help? Indian Institution of Management.<br />
Botswana; ICT helps improve lives (2010); Speech by the Botswana Minister of Communication, Science and<br />
Technology, Tuesday, 18 May 2010<br />
Botswana National ICT Policy (2007) Botswana Government policy Document<br />
Botswana E-readiness Assessment (2004): Botswana Government policy Document<br />
Caldow, J (1999), The Quest for Electronic Government: A Defining Vision; Institute for Electronic Government, IBM<br />
Corporation<br />
<strong>European</strong> Commission (2006) Breaking Barriers to EGovernment: Case Study Report; Overcoming Obstacles to<br />
Improving <strong>European</strong> Public Services; Deliverable 2<br />
Hwang, M.S., Tali, C., Shen, J.J. and Chu, Y.P. (2004); Information and Security. International Journal, Vol 15, No 1,<br />
2004, 9-20.<br />
Kereletswe, O.C, (2009) ICT Development in Africa: The Case of Botswana, Botswana Country Presentation: Public<br />
Sector Reforms; Office of the President<br />
Lyane, K. And Lee, (2001), Developing fully functional EGovernment: A four stage model, Journal of Government<br />
Information Quarterly 18, pp 122-136<br />
Mahmood, Z. (2011), Barriers to Developing EGovernment Projects in Developing Countries, Proc 11 th <strong>European</strong><br />
Conf on eGovernment – ECEG-2011, Ljubljana, Slovenia, June 2011<br />
Moatshe, R. M., Mahmood. Z. and Antonopoulos, N. (2010): SDEAT; A Six Dimensional Framework for Assessing Ereadiness<br />
for EGovernment Projects. Proceedings of the 15 th IBIMA <strong>Conference</strong> Cairo, Egypt 6-7 November<br />
2010. www.ibima.org/CA2010/papers/rmsn.html<br />
OECD (2005); EGovernment for Better Government ISBN 92-64-01833-6-OECD.<br />
Reffat, M (2006) Developing a Successful EGovernment: University of Sydney, NSW 2006, Australia<br />
Sharifi, H. and Zarei B (2004): An adaptive approach for implementing eGovernment in I.R. Iran: Journal of<br />
Government Information 30 (2004) 600-619<br />
Seifert, J.W and McLoughlin (2008) State eGovernment Strategies; Identifying Best Practices and Applications<br />
Sign, S.H (2003) Governments in the Digital Era and Human Factors in EGovernment<br />
Signore, O., Chise, F., and Pallotti, M. (2005) EGovernment Challenges and Opportunities: CMG Italy- XIX Annual<br />
<strong>Conference</strong> 7-9 June 2005<br />
Spremic, M., Simurina, J., Jakovic, B. and Ivanov, M. (2009) EGovernment in Transition Economies: World Academy<br />
of Science, Engineering and Technology 53, 2009<br />
The Working Group on EGovernment in the Developing World (2002) Roadmap for EGovernment in the Developing<br />
World (10 Questions EGovernment Leaders should ask themselves): Pacific Council on International Policy.<br />
The World Bank. A Definition of EGovernment [online]. http://www/.worldbank.org/ publicsector/egov/definition.htm<br />
UN (2005). UN Global EGovernment Readiness Report 2005 from EGovernment to E-inclusion.: United Nations<br />
Department of Economic and Social Affairs, Division of Public Administration and Development Management.<br />
New York<br />
UNPAN Portal Project (2009) Modernising Botswana Government in the Digital Era: Botswana Experience, CPS/<br />
UNPAN Workshop Johannesburg, South Africa<br />
Wesso, H., Naidoo, R. and Neville, M. (2004) Technology EGovernment and Economic Development: A Background<br />
Paper to Inform the Strategy of the Centre for E-innovation<br />
Wimmer, M.A. (2002) Towards Knowledge Enhanced EGovernment: Integration as Pivotal Challenge<br />
393
The use of ICT by Government Departments and Parastatals<br />
in South Africa<br />
Matsobane Frans Mosetja<br />
North West University, Mafikeng Campus, South Africa<br />
frans.mosetja@nwu.ac.za<br />
Abstract: There are some success stories in eGovernment in South Africa. The South African Revenue Services<br />
(SARS) e-filling was created in 2003 and proved to be successful. The successful application and conversion from<br />
proprietary software to open source for National Traffic Information Systems (eNaTIS) is another. In a previous<br />
paper, Trusler (2003) argues that EGovernment in South Africa has a particularly important historical and social<br />
context due to the previous dispensation. He noted that as a result, a ten year eGovernment implementation horizon<br />
has been created from tested world-wide practices. From the examples mentioned above it is clear that the plan is<br />
not being realised. The result is that a gap is appearing between what the policy says should be happening and what<br />
is actually happening. This paper examines what has been done and what can be done to increase service delivery<br />
and to encourage citizen participation through an efficient ICT structure. It ends with some guidelines on what could<br />
help the situation.<br />
Keywords: eGovernment, South Africa, SARS e-filing, e-Natis, citizen, policy<br />
1. Introduction<br />
South Africa has a population of over 49 million people scattered across the Country in 9 nine provinces.<br />
Each province is divided into municipalities. Municipality also referred to as Local government is the<br />
sphere of government closest to the people.<br />
All provinces have websites that provide provincial information. Two provinces namely Western Cape and<br />
Gauteng are ahead of the rest. The advantage of these provinces is their developed communication<br />
infrastructure due to them being the economic hubs, (SITA, 2002).<br />
The South African government understands the need to develop an Information Society and harness the<br />
power of ICTs for economic and social development for the benefit of the country and its citizens.<br />
Government understands the need for reform and the transformation of its core activities to make<br />
processes more effective and efficient and more citizen oriented. The need to manage information,<br />
internal functions as well as serving business and citizens is core to their strategy. EGovernment is part<br />
of Public Service transformation guided by the principle of public service for all and Batho Pele, (Farelo<br />
and Morris, 2006).<br />
Currently the government is seeking to achieve three main objectives through its eGovernment initiatives:<br />
increased productivity; lowered costs; and increased citizen convenience. This indicates a strong focus<br />
on service delivery improvement. Achieving eGovernment success also requires active partnerships<br />
between government, citizens and the private sector, (Farelo and Morris, 2006). South Africa's<br />
eGovernment strategy is led by the Centre for Public Service Innovation (CPSI) in partnership with the<br />
Department of Public Service and Administration and the State Information Technology Agency.<br />
2. Success stories<br />
The World Summit on the Information Society (WSIS) plan of action foresees the formation of a peoplecentred,<br />
inclusive and development-oriented Information Society, where everyone can access, utilise and<br />
share information and knowledge. South Africa has made great strides towards meeting the<br />
commitments of the WSIS Declaration of Principles and Plan of Action to which the country is a signatory,<br />
(Farelo and Morris, 2006). Various arms of the South African government have embarked on a number of<br />
eGovernment programmes. Examples of these include inter-alia, the Batho Pele portal, SARS e-filing, the<br />
e-Natis system, electronic processing of grant applications from remote sites, and a large number of<br />
departmental information websites, (Kaisara & Pather, 2009).<br />
Statutory bodies have established to co-ordinate implementation of eGovernment projects. Amongst<br />
these are the State Information Systems Agency (SITA) and Government Information Technology<br />
Officers Council (GITO Council). SITA is responsible for the acquisition, installation, implementation and<br />
maintenance of IT in the public sector. On the other hand the GITO Council, which consists of national<br />
and provincial IT officers, is responsible for consolidating and coordinating IT initiatives in government,<br />
394
Matsobane Frans Mosetja<br />
including eGovernment, to facilitate service delivery Regulatory frameworks have also been developed to<br />
direct the implementation of eGovernment initiatives, (Matavire, 2010).<br />
South Africa Online” website (www.gov.za) shows that some progress is being made. Almost all<br />
individual government departments and municipalities have their own websites. A comprehensive<br />
resource of government documents including White Papers, Green Papers, speeches, annual reports,<br />
legislation, policies and other information is available for download, (Trusler, 2003).<br />
2.1 SARS efiling<br />
Government has since I can remember been critisised for their poor service delivery, lack of performance<br />
and general lack of good process management and governance. With the launch of SARS eFiling in 2003<br />
as a free online replacement process for the manual tax return submissions, the government should be<br />
congratulated for one of their departments which has the most efficient online application. SARS eFiling<br />
is a free service that allows individual taxpayers, tax practitioners and businesses to register for free and<br />
submit tax returns, make payments and perform a number of other interactions with SARS in a secure<br />
online environment. All employees earning more than R60 000 a year must complete their tax returns<br />
and ensure that the IRP5 forms accompany them when submitting the information to SARS. The<br />
employees must be registered with SARS before they can complete their returns. The SARS e-filing<br />
system makes it possible to submit the information electronically.<br />
The system is aimed at removal of the risks and inconvenience normally associated with the traditional<br />
form of manual tax return submission. The eFiling service is on a par with international standards, being<br />
comparable with services offered in the US, Australia, Singapore, Ireland, Chile and France. SARS has<br />
seen eFiling in South Africa grow significantly since it was initiated. For the 2009 tax year, more than 2.7<br />
million individual tax returns were submitted through e-Filing and annually over 7.5 million returns are<br />
submitted by businesses and practitioners.<br />
2.2 eNaTIS<br />
eNaTIS is a system which provides for the registration and licensing of vehicles. It manages and records<br />
applications for and authorisation of driver's and learner's licences. It is also a law enforcement tool used<br />
to ensure that the details of vehicles that are stolen are circulated in order to prevent irregular and<br />
fraudulent re-registration of such vehicles.<br />
eNaTIS is today recognised as the most advanced of its kind on the continent, with, on average, more<br />
than 16 million monthly transactions.<br />
In January 2009, eNaTIS recorded a massive 16 167 279 transactions– by far the most transactions<br />
recorded in a single month since the system’s launch. Compared to January 2008, this represents a yearon-year<br />
increase of 22.56%. The system once again performed flawlessly and users experienced<br />
excellent processing speeds. As was the case in December 2008, two major factors contributed to the<br />
record volumes experienced. At the end of 2008 functionality was enabled to prevent the issuing of a<br />
licence disc to a vehicle if any other vehicle of the owner in question was still unlicensed. The<br />
functionality was introduced to compel owners to also license their other vehicle(s) before obtaining a<br />
licence disc. This contributed to an increase in vehicle licensing volumes as well as related queries and<br />
reports.<br />
eNaTIS has achieved significant improvements to performance, functionality and stability over the past<br />
two years. The system has also accommodated growth of 53% in the country's vehicle population, a 50%<br />
increase in system users and a 90% increase in Department of Transport sites. eNaTIS processes 99,8%<br />
of all transactions in under one minute.<br />
2.3 Electoral voting system<br />
The Independent Electoral Commission (IEC) is a permanent body established in terms of the Electoral<br />
Commission Act of 1996 to promote and safeguard democracy in South Africa. It is a publicly funded<br />
body and is accountable to Parliament, but is independent of government. Elections in South Africa take<br />
place on national, provincial, and local levels. The IEC voting system supported the 48 percent of South<br />
Africa's 18 million registered voters who visited 15 000 voting stations around the country to cast their<br />
ballots in municipal elections.<br />
395
Matsobane Frans Mosetja<br />
The election centre was extraordinary in terms of technological and logistical achievement. It acted as the<br />
hub of activity over the election period. The concept behind the election centre was to establish an<br />
operational centre where the IEC, members of the public, media and politicians could have access to<br />
information as it became available. This required the IEC not only to share its successes but also<br />
problems, (Mutula, 2010).<br />
The IEC relied on large-scale innovative technology to transform the processes and management of the<br />
elections and it succeeded. One of the world's most extensive Geographic Information Systems was used<br />
to accurately map and plan out the voting districts. The GIS produced over 75,000 electronic and color<br />
scale maps which drew the voting districts. The GIS system allowed the IEC to quickly identify and react<br />
to problem areas. For example, aerial photographs were incorporated into the GIS to provide "quick<br />
mapping" for the movement of informal settlements, (Mutula, 2010).<br />
2.4 ePassport<br />
The Department of Home Affairs' turnaround strategy is on track, marking a change in the way the<br />
department does business and delivers services to citizens and residents.<br />
The department acquired a new ePassport production system, which is installed in the government<br />
printing works, with staff already having been trained and working on the new system. The main benefit<br />
of the new system is the reduction in the passport production turnaround time due to the printing systems<br />
ability to print higher volumes. The implementation of online fingerprint verification and subsequent<br />
interface with the passport completion processes further enhanced the turnaround times and issuance<br />
within 10 days.<br />
The fingerprint verification system enables the department to verify fingerprints electronically at local<br />
offices even before applications are sent to the head office in Pretoria. The online verification makes it<br />
possible for counter staff to conduct real-time fingerprint comparison of citizens whose fingerprints were<br />
previously registered on the automated fingerprint identification system. This has lead to further improved<br />
turnaround times in respect of issuing ID documents, temporary identity certificates, emergency and<br />
temporary passports. Previously centralised manual fingerprint verification took an average of seven days<br />
to process.<br />
"We can report that the system is now fully operational in all our permanent offices<br />
nationwide. We are receiving positive feedback both externally and internally. The system<br />
has clearly worked as a management and a service tool", (Mapisa-Nqakula, 2008).<br />
2.5 Track and trace system<br />
Track and Trace system has transformed the way in which the department handled customer enquiries<br />
about progress of their applications. The system allows departmental managers to trace and, if<br />
necessary, speed up the progress of an ID application document from the moment it was lodged until<br />
delivery to the applicant.<br />
Specially developed matrixes allow managers to establish which official had assumed responsibility for<br />
processing at each stage of the application, from acceptance at a home affairs office to transport to<br />
headquarters, verification of the applicant's identity, permission for an ID document to be printed, printing,<br />
return to the issuing office, and handover to the applicant. Citizens can also track the progress of their<br />
application via cellphone or internet.<br />
2.6 Paymaster<br />
The South African Post Office’s Paymaster to the Nation project promises to make life considerably<br />
easier for recipients of pensions, particularly those who live in remote rural areas. Under the scheme,<br />
welfare grants and pensions are paid into a Postbank account that is linked to a smart card containing a<br />
magnetic strip and a chip, which contains the beneficiary’s fingerprints and photo to eliminate fraud,<br />
(Farelo and Morris, 2006)<br />
3. Work in progress<br />
Citizens have rights and duties. For example, the right to actively participate in the government’s<br />
decision-making processes and the duty to pay for services received. The provision of accurate and<br />
verifiable accounts to customers, and the collection of rates, services charges and other taxes is one of<br />
396
Matsobane Frans Mosetja<br />
the critical duties of a government. Accurate and reliable customer data has become the central focus of<br />
most government departments.<br />
4. Water meter project – Mafikeng Local Municipality<br />
The vision of the Mafikeng Local Municipality is to enhance the quality of services offered to its clients<br />
through the use of new technology. This prompted the city administration to embark on a project to verify<br />
its consumer data and water meter registration numbers. The migration of new information system<br />
requires that data from the existing system be in a process that is transparent, error-free, and compatible<br />
with current and future municipal information systems.<br />
The project will allow the municipality to capture a water meter number, its meter reading, its GPS<br />
coordinates as well as the GPS coordinates of its plot. Once the information is captured the municipality<br />
will be able to respond quickly to queries and maintenance issues. At end of the project citizens should<br />
be able to access their information online. Error free accurate, easily accessible information will<br />
encourage members of the community to pay for services received.<br />
4.1 Smartcard ID<br />
The Department of Home Affairs promote the vision on re-defining the relationship between government<br />
and citizens. A smartcard-ID is under development that focuses on the automation of finger prints and the<br />
development of an electronic Population Registry. The smart ID card system is supposed to replace the<br />
current green ID book that South African residents are required to have as proof of identity for various<br />
official institutions, such as banks, government services and to vote. Residents can apply for one from<br />
the age of 16. However, these ID books are often forged or altered.<br />
Through its Home Affairs National Information System (HANIS) project citizens can access birth and<br />
death registration forms online. To the extent that increased transparency, accountability and<br />
predictability (of rules and procedures) are made priorities, eGovernment may offer a weapon against<br />
corruption, (Farelo and Moriss, 2006).<br />
5. Conclusion<br />
eGovernment has already arrived in Africa, though it is essentially an imported concept based on<br />
imported designs. There are growing numbers of eGovernment projects, some of which are contributing<br />
to public sector reform and delivering gains of efficiency and/or effectiveness across a broad agenda,<br />
(Richard Heeks, 2002). For South Africa to achieve the objectives of the Local Government Turnaround<br />
Strategy (LGTAS) of improving service delivery, increasing efficiency, accountability and responsiveness<br />
in government, a citizens-centred integrated ICT system and eGovernment is one of the key interventions<br />
South African local government requires, Minister for Cooperative Governance and Traditional Affairs,<br />
(Sicelo Shiceka, 2010).<br />
Instead of the Presidency simply blurting out buzzwords like ‘community engagement‘, ‘cooperation‘ and<br />
‘working together‘, the state needs to confirm these measures with local authorities and community<br />
residents – get sign-off from all the stakeholders concerned.<br />
The government should introduce Multipurpose Portals Single entry point to enable citizens to transact<br />
with Multiple Government Departments via Gateway and Portals and downscale it municipal level.<br />
Government need to provide more training to the ordinary citizens on how to use these UCTs facilities to<br />
access e-governance service, (Mphidi, 2009). Having witnessed the success of various eGovernment<br />
systems and projects at national and provincial level, the municipalities should follow suit and automate<br />
most of their services and help government achieve the objectives of Batho-Pele.<br />
References<br />
Farelo, M. and Morris, C. (2006). The Status of EGovernment in South Africa.<br />
Heeks, R. (2002). eGovernment in Africa: Promise and practice.<br />
Mapisa-Nqaula N. (2009). Home Affairs Budget Vote 2008/09<br />
Matavire, R, et al. (2010). Challenges of eGovernment Project Implementation in a South African Context<br />
Mphidi, H. (2009). Digital divide and e-governance in South Africa.<br />
Mutula, M. (2010). Challenges and Opportunities of eGovernment in South Africa.<br />
Kaisara, G. and Pather, S. (2009). eGovernment in South Africa: e-service quality access and adoption factors.<br />
SITA. (2002). eGovernment Experience in South Africa.<br />
Trusler, J. (2003). South African EGovernment Policy And Practices: A Framework to Close The Gap.<br />
397
The Workload for the Structural Implementation of<br />
eDemocracy: Local Government Policy Issues Combined<br />
With the Policy Cycle and Styles of Citizenship.<br />
Bert Mulder and Martijn Hartog<br />
eSociety Institute of The Hague University of Applied Sciences, The Netherlands<br />
bertmulder@esocietyinstituut.nl<br />
martijnhartog@esocietyinstituut.nl<br />
Abstract: Today, governmental bodies in many countries acknowledge ICT applications to be powerful tools for<br />
increasing involvement of citizens in public policy-making, and as such a sound investment in better public policy<br />
(OECD 2003: 9). Within the Dutch governmental bodies a study by Prof. Dr. Kickert (2005:10) has shown that these<br />
ICT developments also demand an optimal public service. Furthermore citizens are inclined to participate more often<br />
if governments use digital tools, because of their (usability) speed and comfort (Beffers & Van den Brink, 2007). The<br />
last decade the Dutch governmental bodies have become increasingly aware of the possibilities of ICT applications<br />
and the growing digital behaviour of its citizens. To prepare the next phase of large scale and structural<br />
implementation of eDemocracy, the size and range of that task must be researched. This paper describes research<br />
conducted at the municipality of The Hague (The Netherlands). It was aimed to determine how many political issues<br />
lend itself to e-democratic support. The research then categorized the issues using the policy cycle (agenda-setting,<br />
preparation, determination, execution, monitoring and evaluation) and styles of citizenship (dutiful, pragmatic and<br />
society critic). Some results of the research: During the course of 3 years the city council and its committees treated<br />
1834 issues. Of these, 69% were treated by the city council committees and 31% by the city council itself. 78% of<br />
issues could be categorised within the policy making process. According to the styles of citizenship, citizens are most<br />
likely to participate when issues directly relate to their personal environment (pragmatic), as well as issues<br />
concerning the qualitative functionality of the local government (society critic).<br />
Keywords: eDemocracy, public agenda issues, local policy-making, policy cycle, styles of citizenship, digital<br />
participation<br />
1. Introduction<br />
1.1 Context<br />
This exploratory research grew out of an interest in the future of eDemocracy. The large-scale practical<br />
adoption of eDemocracy that is to be expected creates many questions that are not asked or answered.<br />
Based in The Netherlands, we wanted to inquire what adopting eDemocracy would actually mean when<br />
each and every one of the 430 Dutch municipalities would structurally enrich all their democratic<br />
processes with it. How many democratic issues should be active in a municipality at any one time? Who<br />
would be interested in digital participation on those issues and what type of support would they require?<br />
Should such digital support be consistent over different municipalities, possibly adding to the legitimacy of<br />
government? What is the magnitude of such an endeavour, would it require extra people and would<br />
enough funds be available? The aim of this research is to take a first step towards providing answers to<br />
these questions.<br />
We found a lack of available research that could assist in the predictive planning of eDemocracy. While it<br />
is assumed that eGovernment will see continued development and possibly widespread adoption, current<br />
research focuses on issues such as conceptual context, the process of development, the various tools<br />
available, the transformation of government and the possible effectiveness of such applications. There is<br />
little or no research that prepares government organizations with actual practical and predictive planning.<br />
1.2 eGovernment development<br />
The widespread and global development of eGovernment has been addressed by many institutions,<br />
including the UN, in their reports on the civil society (2001, 2003 & 2005). Several parties describe the<br />
stages of development for eGovernment: Gartner (2000); The United Nations (2001); Layne and Lee<br />
(2001); Janssen en Van Veenstra (2005) & Al Hashim and Darem overview (2008). Those models of<br />
development may have information management (Gartner, UN & IBM) or technical management<br />
(Janssen & Van Veenstra 2005) as their angle, but all models assume growth in use, size and quality of<br />
eGovernment infrastructure and applications, often implicitly. The new research agenda’s described<br />
(Codagnone & Wimmer 2007) identify ‘research into e-participation’ as one of the 13 trends and mentions<br />
398
Bert Mulder and Martijn Hartog<br />
the ‘broad realization of e-participation’ but does not designate the magnitude of the practical application<br />
of eDemocracy as an area of interest.<br />
1.3 eDemocracy: is democratic decision making a constant?<br />
This research adopts a narrow focus and looks at existing policy development processes within current<br />
government: what would it mean when a municipality adopts eDemocracy throughout its existing<br />
processes? The research is exploratory and preliminary in that it seeks to outline the validity of a<br />
viewpoint and an approach. The viewpoint is that most democratic processes exist for a reason, such as<br />
running a city or a state. Performing that task requires a certain number of issues that have to be decided<br />
upon. The question is whether the number of democratic issues in a process such as running a city is a<br />
relative constant. It is an interesting question: when that would be the case, adding eDemocracy might<br />
possibly change the dynamics of the process and the quality of the outcome, but it would not dramatically<br />
increase the number of issues decided upon. The approach that this research tries to develop is using<br />
the entries on the municipal agenda’s to gauge to amount of democratic issues, and use life style<br />
research to gauge possible interest in the population. It is the first in a series that in the coming years<br />
tries to develop a model that may allow municipalities to assess the necessary investment required to<br />
support its core democratic process and answer the question whether democratic decision-making within<br />
a certain context is a constant.<br />
1.4 Research question<br />
But the widespread adoption of e-democratic tools and applications throughout government will require<br />
an extensive effort and investment in time and tools. Our research aims to outline those practical<br />
requirements: what would the broad adoption of eDemocracy mean in the current democratic processes?<br />
Although the exploratory research is simple, the aim is to create a model that allows municipalities to<br />
determine the possible workload of broad digital support for democratic processes. Such a model would<br />
be based on at least two aspects: the number of democratic issues that lend themselves to digital support<br />
and the latent need of citizens to participate in the democratic process. Thus the main question translates<br />
into three sub-questions:<br />
How many democratic issues are active at any one time?<br />
How many issues lend themselves for digital support?<br />
How many citizens would be interested in e-participation?<br />
2. Method<br />
In order to answer these questions, we have utilised the following method;<br />
Inventory democratic issues on the agenda of a large city, in this case The Hague<br />
Categorize them according to the policy cycle<br />
Assess citizen’s possible interest in participation according to lifestyle<br />
Map lifestyles preferences onto democratic issues citizens may wish to participate in<br />
Match citizen’s interests and democratic issues<br />
The study in question was conducted at the municipality of The Hague, one of the four largest<br />
municipalities of The Netherlands with circa 450.000 inhabitants. The city of The Hague was selected<br />
since research shows that larger municipalities are able to reach larger groups of citizens for<br />
participation, due mainly to the fact that they have more possibilities of offering information when<br />
compared to smaller municipalities (Cascadis 2007: 6).<br />
2.1 Inventory of the number of democratic issues<br />
To determine the number of democratic issues treated by municipal governing bodies we created an<br />
inventory of the topics on the agenda and the list of decisions of both the city council and its committees.<br />
To that end we looked at the agenda’s of a three year period of one council (following elections in 2006)<br />
for the city of The Hague (Beleidsakkoord Den Haag 2006-2010, [Policy agreement of The Hague 2006-<br />
2010] 2006).<br />
399
Bert Mulder and Martijn Hartog<br />
2.2 Categorizing issues according to policy cycle<br />
In order to determine what issues would lend themselves to e-democratic support the issues were<br />
categorized according to the phases of a model of the policy cycle. Policymaking can be defined as ‘the<br />
case-to-case determination of guiding and controlling the developments within the society by the<br />
government’ (Bovens, ’t Hart & van Twist 2007: 99). The process of shaping and executing policy implies<br />
a policy making process that is cyclical in character, and indicates policymaking is an ongoing<br />
development process.<br />
For our research we adopted the policy cycle model of Simon (in Edelenbos & Monnikhof 2001: 44),<br />
consisting of six phases: agenda-setting, preparation, determination, execution, evaluation and<br />
monitoring. The characteristics of the phases can be found in table 1.<br />
Table 1: Phases policy cycle<br />
Phase in the cycle<br />
Characteristics<br />
1 Agenda-setting The process in which citizens and /or government policy makers are confronted with<br />
problems that are occurring within the society (Bovens et al 2007).<br />
2 Preparation The collection and analyses of information concerning the specific problem in order<br />
to formulate a recommendation concerning the conducted policy (Bovens et al<br />
2007), as well as finding and proposing workable and affordable solutions for the<br />
problem (Herweijer & Pröpper 2008).<br />
3 Determination Decision making concerning the content of the policy (Bovens et al 2007).<br />
Specifically, the policy must be coherent with the wishes of the society concerning<br />
the problem, including the conditions in which the execution of the policy occurs<br />
should be determined (Pröpper & Steenbeek 1999).<br />
4 Execution This phase concerns the actual execution of the policy (Pröpper & Steenbeek 1999)<br />
by transforming policy proposals into concrete actions (Bovens et al 2007).<br />
5 Evaluation Judging and analysing the content of the policy and its gained results/effect (Bovens<br />
et al 2007).<br />
6 Monitoring Processing the results from the evaluation concerning an eventual continuous follow<br />
up on the policy, otherwise redefining the policy core and the execution of the policy<br />
(Bovens et al 2007).<br />
Each phase within the cycle creates a different context for participation. The influence of citizens depends<br />
on their right/ability to participate and their desire to do so. Local government may choose to only inform<br />
citizens, to let them give advice or involve citizens in the co-production of local policy. Some research<br />
indicates that the effectiveness of policy and its execution is related to the influence citizens have or had<br />
(Peeters 2002). Each of the phases in the cycle provides different opportunities. According to Peeters<br />
(2002) the phase of agenda setting is specifically shaped by social and political issues. In choosing their<br />
political representatives, citizens exercise one means of influencing whether certain issues are treated by<br />
the city council (Herweijer & Pröpper 2008). In some situations citizens have the right to generate “citizen<br />
initiatives” that has legal validity. It may be advantageous for local government to let citizen’s advice or<br />
co-produce within the policy preparation phase. Additionally, it is mandatory by law for the municipality to<br />
offer at least a voting opportunity for citizens to approve certain policy actions (Herweijer & Pröpper<br />
2008). Within the execution phase experienced citizens may participate, because there transparency may<br />
have citizen’s recognize whether governmental action was appropriate. The phases most geared to<br />
contributions by citizens seem to be agenda setting, preparation, execution and evaluation.<br />
2.3 The interest of citizens in participation: Lifestyle analysis of citizenship<br />
The second factor determining the magnitude of adoption of eDemocracy is the interest and motivation of<br />
citizens in participating. In order to determine such interest in participation by citizens we looked at the<br />
method of lifestyle analysis. In 1997 the Dutch research and strategy organization, Motivaction,<br />
developed a Mentality lifestyle model identifying seven lifestyle clusters.<br />
On the basis of that model they went on to further develop the notion of ‘styles of citizenship’ (Motivaction<br />
2001) in which four styles of citizenship are distinguished based upon their research on the mentality and<br />
society norms of citizens:<br />
400
Outsiders/inactive<br />
Dutiful/dependent<br />
Pragmatic/conformist<br />
Society critic/responsible<br />
Bert Mulder and Martijn Hartog<br />
This research, undertaken for the Commissions Toekomst Overheidscommunicatie (Committee of Future<br />
Governmental communication) and the Wetenschappelijke Raad voor het Regeringsbeleid (Scientific<br />
Council for Governmental Policy), is used by many different Dutch government organizations to segment<br />
their clients. In this exploratory research we use this method to determine both what part of the<br />
population might be interested in policy issues, as well as what issues they might be interested in.<br />
The first style, called ‘outsiders’, is characterized as low intensity participants. These types of citizens are<br />
rarely invited to co-produce policy (Motivaction 2001). That is the reason this group ‘outsiders’ is<br />
excluded from this research.<br />
The second style, called ‘dutiful’, is characterized as having a passive attitude towards developments in<br />
society (Motivaction 2001). Although they are involved with activities within their immediate and local<br />
environment, they distance themselves from other forms of involvement. These citizens may be active<br />
within local activities such as volunteering for social organizations. This group is missing key<br />
competencies to keep up to date on developments within society and they have to build on the<br />
experience of local governments.<br />
The third style, called ‘pragmatic’, is a large group in Dutch society. They are not directly involved nor feel<br />
responsible, show a selective reactive attitude and they prefer information in main points which are easy<br />
and straightforward to understand. They expect (local) governmental bodies to perform according to a<br />
predetermined framework and do their work in the background (Motivaction 2001).<br />
The last style, called ‘society critics’, is described as having the most involved and responsible attitude<br />
towards the society. The group is characterized by initiative and participative activities and an open<br />
attitude with interest in the democratic process of (local) government. This group of citizens is particularly<br />
interested in the functioning of government bodies, such as financial prognoses and elected management<br />
functions (Motivaction 2001).<br />
3. Results<br />
3.1 The number of democratic issues<br />
Over a period of three years the city of The Hague had 1834 issues on the agenda’s of both city council<br />
and committees. This follows from a meeting frequency with city council meetings every three weeks and<br />
two committees meetings every week.<br />
Of the 1834 issues counted 31% were treated by the city council and 69% by its committees. If we look at<br />
the issues we notice that 1266 issues were treated by the committees and could be divided into seven<br />
topics, roughly following the structure of working committees displayed in table 2.<br />
Table 2: number of issues and committees<br />
79 accounts / process<br />
132 mobility and environment<br />
254 safety, governance and finances<br />
107 social affairs, employment, economics and international affairs<br />
395 urban development<br />
116 welfare development<br />
183 youth and citizenship<br />
In corporation with the office of the clerk we were categorize 67% of the 1834 issues according to a<br />
phase in the policy cycle. 227 issues were marked a phase ‘0’ because they were identified as internal<br />
and procedural and I) of little interest to those outside the municipal organization and II) the policy making<br />
phases offer no functionality.<br />
401
Bert Mulder and Martijn Hartog<br />
Some issues on the agenda could be categorized in two or more phases at the same time, for example<br />
when they may be interpreted as creating new policy as well as contributing to the effectiveness of<br />
existing policy. That way they would fir the preparation as well as evaluation phases. Such the double or<br />
triple appearances are divided proportionally over their different phases as detailed in table 3.<br />
Table 3: Policy making phases and number of issues<br />
Number of issues according combined phases<br />
Phases # 1/2 2/3 2/5 2/5/6 3/5 4/5 5/6<br />
Agenda-setting (phase 1) 95 58<br />
Preparation (phase2) 597 58 118 16 125<br />
Determination (phase 3) 177 118 2<br />
Execution (phase 4) 20 2<br />
Evaluation (phase 5) 176 16 125 2 1 21<br />
Monitoring (phase 6) 158 125 21<br />
After categorization the differences are clear: most issues that might benefit from citizen’s participation<br />
are found in the preparation, the determination and the evaluation phases.<br />
3.2 Determining citizen interest in policy and preference for issues<br />
Using questionnaires, Motivaction determined how the four different citizenship styles - outsiders, dutiful,<br />
pragmatic and society critic - were present within the population of The Hague. This research does not<br />
only show the number of people characterized by each of the different lifestyles, but it will in fact allow us<br />
to determine which part of the population might be interested in democratic participation and on which<br />
topics.<br />
The research shows a marked difference between the population of The Hague and that of the rest of<br />
The Netherlands in table 4.<br />
Table 4: Styles of citizenship The Hague compared with The Netherlands (Motivaction 2005)<br />
Style of citizenship The Netherlands The Hague Population<br />
Outsiders 36% 32% 144.000<br />
Dutiful 21% 7% 31.500<br />
Pragmatic 24% 35% 157.500<br />
Society critic 19% 26% 117.000<br />
The city of The Hague shows a more prominent group of pragmatic (24%) and society critic citizens<br />
(19%) than other parts of The Netherlands. These groups have an individual attitude, are well informed,<br />
are used to expressing their opinions and stand their ground on such issues. They also want to co-decide<br />
with the (local) government. The pragmatic group has a more distanced attitude and is mostly concerned<br />
with its grounds. The society critic group is politically active and also stands for social ground. The groups<br />
named outsiders and dutiful are relatively outnumbered and represent themselves as family orientated<br />
and less socially concerned. Dutiful take a more docile approach towards the government, while<br />
outsiders stay distanced. Due to the large distance of the ‘outsider’ style to the democratic process, they<br />
are assumed to be fully disinterested and do not play a further role. To determine what part of the<br />
population might be interested in what kind of democratic participation we categorized the democratic<br />
issues on the agenda according to the qualities of the different styles of citizenship. The result may be<br />
seen in the table 5. With both the number of citizens for a lifestyle and democratic issues, we can infer<br />
the number of citizens with a probable interest in those issues.<br />
Table 5: Styles of citizenship and issues<br />
Lifestyle Percentage Population Issues Issues<br />
3 yr 1 yr<br />
Outsiders 32% xxx.xxx x x<br />
Dutiful 7% 31.500 218 73<br />
Pragmatic 35% 157.500 243 81<br />
Society critic 26% 117.700 540 180<br />
Total 450.000 1001 334<br />
402
Bert Mulder and Martijn Hartog<br />
This shows that when a city like The Hague wants to provide digital support for eDemocracy it will mean<br />
providing that support for around 330 policy issues each year. Of the total population of 450.000 people,<br />
around 275.000 citizens would be interested in participating, being a member of either the pragmatic of<br />
the society critic styles of citizenship.<br />
4. Concluding observations and further directions<br />
With this research we address eDemocracy from a different angle. We focus on the broad and structural<br />
support of digital democratic processes in the future. Rather than researching available new technologies<br />
we look at democratic processes in real life: how many democratic issues does it take to run a city and<br />
how many of its citizens would be interested? And as a consequence: what would it take for local<br />
governments to start supporting that in the coming years?<br />
The results of this initial exploratory research show that a Dutch city with a population of around 450.000<br />
inhabitants handles approximately 300 democratic issues per annum. In the case of the broad adoption<br />
of eDemocracy with full digital support for current democratic activities that would mean setting up and<br />
maintaining approximately 300 democratic dialogues online. Such digital support might allow citizens to<br />
inform themselves, reflect on and participate in the democratic process. That reality of maintaining 300<br />
online democratic dialogues could turn out to be quite an effort. In its simplest form it implies the<br />
necessity for supportive document management systems, appropriate meta data and appropriate forms<br />
of presentation. Though simple in concept, in reality each of these aspects is a challenge: we would need<br />
to develop a consistent online representation of political issues, including its financial aspects. These do<br />
not exist today. In its most complex form online case files would be enriched with news and background<br />
information, communities and forums and special applications that solicit advice from interested parties.<br />
In that form such online case files would require constant attention from a new breed of professionals that<br />
is able to inspire, maintain and structure a complex set of interactions on many different levels such that<br />
the contributions of the audience provide a constructive addition to the existing process.<br />
All this would be worth it if enough citizens would be interested. Using lifestyle research as an angle to<br />
gauge possible interest shows that around 275.000 or 60% of this city’s inhabitants might be interested in<br />
participating on some of these issues. They might be interested: it wouldn’t mean they actually would be<br />
interested. This research also revealed a marked difference between the population of The Hague (the<br />
seat of government, parliament and many other international organizations) and the general population,<br />
which might indicate that democratic participation is sensitive in its context and would have to be<br />
determined in each city again. It also provided the initial view of the size and scope of digital support for<br />
democratic processes online.<br />
The aim of our research is the creation of practical support for local governmental bodies, creating a<br />
model allowing municipalities to assess the investment necessary to realize digital support for<br />
eDemocracy. Such a model might balance on two aspects: operational en democratic.<br />
Firstly, since we are interested in questions of implementation we would pay attention to the operational<br />
complexity of implementing online support for democratic issues. Operational complexity may identify<br />
both the technical and procedural effort required to realize digital support for democratic issues. It may<br />
seem odd to have operational issues as a main element in deciding the quality of democratic support, but<br />
creating true digital support for eDemocracy may be technically complex requiring the replacement of<br />
current IT systems and web environments, and might even need preliminary research to create the<br />
solutions necessary. The time and money required by that process determines the pace of adoption of edemocratic<br />
support.<br />
Low operational complexity might consist of issues that may be supported by a small number of existing<br />
documents, delivered from existing information systems. High operational complexity might consist of<br />
issues needing to be supported by live coverage or meetings with meta data, crowd sourcing, intensive<br />
dialogues with the population, e-petitions or even voting. These would require extensive investment in<br />
research and testing before being able to be used routinely.<br />
Secondly, we need to assess the democratic necessity of creating online support for issues. This is<br />
determined by size, procedural constraints and importance for individual citizens or politics. On the one<br />
hand democracy consists of many rather inconsequential issues with relatively low interest and<br />
involvement, while on the other end it has issues which are high visibility, high importance and high<br />
involvement.<br />
403
Bert Mulder and Martijn Hartog<br />
This might lead to a matrix that, when filled, allows us to decide whether and how we may prioritize the<br />
implementation of digital support for eDemocracy.<br />
The figure below displays the matrix.<br />
Figure 1: Matrix to prioritize the implementation of digital support for eDemocracy<br />
The broad and structural implementation of eDemocracy is not a simple matter. Further research will<br />
need to determine what kind of support is suitable for what issue, how e-democratic case files should be<br />
represented online to achieve the most effective participation, how a collaborative decision making<br />
process could be supported for larger audiences and how the financial structure of underlying issues<br />
should be visualized to be understandable. Such research may show the many different tools we may<br />
need to really support eDemocracy on a larger scale and allow government professionals to make a<br />
reasonable decision how to develop the systems and tools needed to realize that.<br />
References<br />
Al-Hashmi, A. & Darem, A.B. (2008) Understanding Phases of EGovernment Project, in: Sahu, G.P. (ed) Emerging<br />
technologies in eGovernment, from http://www.csi-sigegov.org/emerging_pdf/17_152-157.pdf (retrieved, 5 May<br />
2010)<br />
Codagnone, C. & Wimmer, M.A. (2007) Roadmapping eGovernment research, vision and measures towards<br />
innovative governments in 2020, results from the Project egovRTD2020. eGovRTD2020 Project Consortium,<br />
2007, from http://www.egovrtd2020.org/EGOVRTD2020/FinalBook.pdf (retrieved, 5 May 2010)<br />
Bovens, M.A.P., ’t Hart, P. & van Twist, M.J.W. (2007) Openbaar Bestuur: beleid, organisatie en politiek [Public<br />
Management: policy, organisation and politics], Kluwer, Alphen aan den Rijn<br />
Cascadis (2007) Benchmark Nederlandse Gemeenten in de elektronische overheid [Benchmark Dutch Municipalities<br />
as electronic government], Apeldoorn<br />
Derksen, W. & Schaap, L. (2007) Lokaal Bestuur [Local Government], Reed Business, The Hague<br />
Edelenbos, J. & Monnikhof, R. (2001) Lokale interactieve beleidsvorming: een vergelijkend onderzoek naar de<br />
consequenties van interactieve beleidsvomring voor het functioneren van de lokale democratie [Interactive local<br />
policy making: a comparative research for the consequences of interactive policy making in the functionality of<br />
the local democracy], Lemma, Utrecht<br />
Gartner Research (2003) Traditional ROI Measures Will Fail in Government, from<br />
http://www.gartner.com/DisplayDocument?doc_cd=116131 (retrieved, 5 May 2010)<br />
Herweijer, M. & Pröpper, I.M.A.M. (2008) Overheidsbeleid: een inleiding in de beleidswetenschap, burgers in het<br />
beleidsproces [Governmental policy: an introduction in the science of policy, citizens in the policy making<br />
process], Kluwer, Alphen aan den Rijn<br />
404
Bert Mulder and Martijn Hartog<br />
IBM Business Consulting Services (2003) How eGovernment are you? EGovernment in France: State of play and<br />
perspectives, from http://www-935.ibm.com/services/au/igs/pdf/g510-3552-00-esr-eGovernment.pdf (retrieved,<br />
5 May 2010)<br />
Janssen, M. & Van Veenstra, A.F. (2005), ‘Stages of Growth in eGovernment: An Architectural Approach’, The<br />
Electronic Journal of eGovernment, Vol. 3, no. 4, pp. 193-200<br />
Layne, K., & Lee, J. (2001), ‘Developing fully functional EGovernment: A four stage model’, Government Information<br />
Quarterly, vol. 18, pp. 122 -136<br />
Motivaction (2001) Burgerschpasstijlen en overheidscommunicatie, in opdracht van de Commissie Toekomst<br />
Overheidscommunicatie [Styles of citizenship and governmental communication, in assignment of the<br />
Committee of Future Governmental communication], Amsterdam<br />
Motivaction (2005) Gemeente Den Haag: Burgerschapsstijlen in Den Haag [Municipality The Hague: styles of<br />
citizenship within The Hague], Amsterdam<br />
Municipality The Hague (2006) Beleidsakkoord gemeente Den Haag 2006-2010 [Policy agreement of The Hague<br />
2006-2010], The Hague<br />
Peeters, N. (2002) Interne audit en ombudsfunctie in de gemeente: een vergelijking [Internal audit and the function of<br />
the Parliamentary Commissioner in the municipality: a comparison], University of Antwerp, Antwerpen<br />
Pröpper, I. & Steenbeek, D. (1999) De aanpak van interactief beleid: elke situatie is anders [The approach of<br />
interactive policy: every situation is different], Coutinho, Bussum<br />
United Nations Division for Public Economics and Public Administration (2001) Benchmarking Egovernment: A<br />
Global Perspective - Assessing the Progress of the UN Member States, from<br />
http://unpan1.un.org/intradoc/groups/public/documents/ un/unpan021547.pdf (retrieved, 5 May 2010)<br />
Vernieuwingsimpuls dualisme en lokale democratie [Renewal impulse dualism and local democracy] (2006)<br />
Handreiking commissies in het dualistische stelsel [Manual committees in dualistic system], The Hague, from<br />
http://actieprogrammalokaalbestuur.nl/book/export/html/2602 (retrieved, 4 April 2010)<br />
405
Channel Shift - a UK Customer Response<br />
Darren Mundy 1 , Qasim Umer 1 and Alastair Foster 2<br />
1 University of Hull, Scarborough, UK<br />
2 Independent Researcher, UK<br />
d.mundy@hull.ac.uk<br />
q.umer@2008.hull.ac.uk<br />
alifozzy@hotmail.com<br />
Abstract: This paper details the findings from a project carried out on behalf of a group of local councils in the UK to<br />
discover scope for channel shift (i.e. migrating users from mediated to self-help solutions) within local services. The<br />
project consisted of four clear stages: identification of scope from service managers; discovery of case study<br />
examples from councils within the UK; an investigation of customer perspectives on channel shift linked to particular<br />
areas of service; and, finally a framework to establish a business case for introducing new channels to identified<br />
government services. The first stage of the project demonstrated that there is no shortage of ideas in relation to the<br />
potential that individual services have for channel shift. Customer Service Managers identified a range of<br />
independent areas worth exploration from basic reporting linked to customers in the local area, through automation of<br />
benefits services, to online services to support waste and recycling management. Whilst individual areas where<br />
benefit could occur were identified it was also clear that data may not be easily accessible to support a case for the<br />
provision of new channels. The areas highlighted by the initial stage of the project formed the basis for exploration at<br />
the second stage in identifying thirteen case studies linked to channel shift from a range of different levels of<br />
government and a private organisation. A brief description of a couple of these studies is provided in this paper along<br />
with key lessons learnt. The third stage of the project enabled analysis of the customer views towards channel shift.<br />
This stage illustrated a number of critical observations found within local customer groups through a detailed<br />
questionnaire and location based canvassing (n=197 customers). The first observation is that there is a sub-set of<br />
the local customer group who access council services that are not equipped in knowledge, equipment or in terms of<br />
motivation for access to channels other than face-to-face and telephone. Indeed some customers in this group see<br />
channel shift as potentially discriminatory. Secondly, whilst the findings do not establish a substantial demand for<br />
channel shift in relation to council services, many of those questioned recognised that provision of council services<br />
through more cost effective channels was a good thing (for other people), or in the case of web access was<br />
inevitable. Thirdly, it is clear that at present the most valuable service offered on the web by local government is<br />
access to local information. Finally a Business Case Template is presented which is derived from the findings of all of<br />
the stages above. This is designed to enable the evaluation of requests for service channel growth with critical<br />
examination of potential success factors for shift of government services. Overall, local government around the<br />
country is investing in channel shift, it is clear that not all of these ventures are meeting with success, however, if full<br />
consideration is given to the business case for channel shift and time is taken to understand and target customer<br />
groups successful channel shift can be achieved.<br />
Keywords: eGovernment, channel shift, transformational government, citizen requirements, e-services<br />
1. Introduction<br />
With the global economic downturn has come a wave of austerity measures in national and international<br />
public services expenditure. In this context, the UK government has recently announced 7.1% of cuts per<br />
year in funding allocation to regional and local government (Her Majesty’s Government, 2010). This<br />
translates to a loss of 27% of funding over 4 years. Therefore the present focus is to look at ways in<br />
which to increase efficiency in government expenditure. One of the ways that is continually lauded, is to<br />
take advantage of the web in the delivery of public services, primarily because “the cost ... (is)<br />
approximately one-tenth the cost of a contact by telephone” (Socitm Consulting, 2010). However,<br />
managers within government organisations face questions of, whether reduced costs are myth or reality,<br />
and whether or not the addition of web based functionality will work for them.<br />
Channel shift has been defined as “the design and marketing of effective and efficient channels because<br />
they are the most appropriate channel for the type of contact, customer and organisation….” (Simon<br />
Pollock, Head of Customer Services at Surrey County Council, as quoted in Public Networks, 2010).<br />
Channel shift is not simply limited to the transformation of service to take advantage of technology such<br />
as the World Wide Web but instead should involve a comprehensive strategic evaluation of the most<br />
appropriate approaches for the delivery of service. The evaluation of the most appropriate channel can<br />
obviously be quite complex but will generally come down to a balance of metrics such as cost, quality of<br />
service, access and demand.<br />
This paper reports on the findings of a short research consultancy project delivered by academics within<br />
the University of Hull for a partnership of nine UK councils and other public service bodies. The aim of the<br />
406
Darren Mundy et al.<br />
project was to explore moving services from one-to-one or telephone based interaction to self-help web<br />
based channels. This ‘channel shift’ project was designed to consist of four clear stages: identification of<br />
the potential for channel shift from within partner councils; analysis of the impact of channel shift from<br />
within local governance case study scenarios; an investigation of customer perspectives on channel shift<br />
linked to particular areas of service; and, finally a framework to establish a business case for introducing<br />
new channels to identified services within government areas. This papers contribution is in detailing the<br />
outcomes of the four stages and in presenting a new framework for the strategic planning of switching<br />
public modes of access to council services.<br />
2. The project problem and literature review<br />
In July 2010, a short research project (funded by a partnership of nine UK councils) commenced focused<br />
on exploring the potential for the transition of a variety of eGovernment services to self-help web based<br />
channels. Motivation for the project came from questions being asked by managers of customer focused<br />
council services around the benefits/limitations of moving services to the web, and the need to gather an<br />
understanding of best practice in relation to transformation of services. To understand the issues and<br />
provide some answers to the questions being asked it was thought a four stage process would be of<br />
benefit. In the first stage the scope for channel shift would be evaluated from within, therefore time would<br />
be taken to understand a number of internal stakeholder views on the potential for channel shift within<br />
governmental services. This would be followed by a detailed exploration of literature relating to<br />
successful and unsuccessful channel shift in private and public sector environments. This case study<br />
material would provide the partner organisations with an understanding as to what has been successfully<br />
translated in the past and give some examples of best practice. In the third stage of the project, the<br />
research would focus on the customer and trying to understand customer perspectives on channel shift in<br />
relation to governmental services, taking into account the nuances of some customer responses to shifts<br />
of service provision. Finally, from the results of each of the stages, there was a requirement to establish a<br />
mechanism to enable better evaluation of service potential for channel shift. The form of this evaluation<br />
mechanism was established as a business case template for service transition.<br />
Looking towards related research to the project described within this paper we find that the research<br />
essentially can be categorised into three sections. The first section being analysing and understanding<br />
perspectives on channel shift from within government and from citizens. The second being the research<br />
of barriers to shifting services to self-help web content. Finally, the identification of best practice case<br />
examples of shifts of service provision.<br />
As outlined in Transformation Government published in 2005, there is a clear need in governmental<br />
organisations to focus not just on the provision of appropriate channels for delivery but also re-evaluation<br />
of processes to put the customer at the heart of online services (Cabinet Office, 2005). This was followed<br />
by David Varney’s book “Service Transformation – A better service for citizens and businesses, a better<br />
deal for the taxpayer” (Varney, 2006) in 2006 outlining the clear case for the transformation of<br />
government services to take account of other channels of delivery. Since these publications, researchers<br />
such as Pumphrey (Pumphrey, 2006) have concentrated on developing guidance for successful channel<br />
migration. For example, Pumphrey suggests in his paper “golden rules for formulating future channel<br />
strategies in consumer-facing organizations in both commercial and public sectors”. These rules are<br />
developed from Pumphrey’s experience in implementing online services for public private sector<br />
organisations and from identified best practice. Organisations such as Socitm (see<br />
http://www.socitm.gov.uk/) produce a wide range of consultancy papers focused on developing strategies<br />
for channel shift, for example (Socitm Consulting, 2010). In addition governmental guidance in relation to<br />
shifting of governmental services including planning for channel shift (Cabinet Office, 2010) is also<br />
available. These papers, associated events and workshops provide targeted support for government<br />
service managers to understand how channel shift can best work for them.<br />
In relation to the identification of barriers in the shifting of service delivery, Kernaghan (Kernaghan, K,<br />
2005) suggests that there are “four major categories of barriers to integrated service delivery (these) are<br />
political/legal, structural, operational/managerial and cultural ones”. He suggests that successful services<br />
are generally seamless in operation between front and back end systems, helping government leverage<br />
efficiencies and helping customers also gain advantages. There are also papers discussing issues such<br />
as marketing practice of public online services (Apicella and Streatfeild, 2010).<br />
The identification of best practice case examples of shifts of service provision formed part of the research<br />
conducted for this project. This is detailed within section 4 of this report.<br />
407
Darren Mundy et al.<br />
3. Scope for channel shift in local government<br />
To establish an understanding of the potential scope for channel shift within government organisations<br />
the project started with a workshop for customer service managers. The workshop provided an<br />
opportunity to collect qualitative perspectives about which services had the most potential for a shift of<br />
service provision. To begin with the workshop outlined a short explanation of the channel shift project and<br />
some brief case study material related to channel shift. It then moved on to outline some of the issues<br />
needing discussion and identification in relation to the scope for specific services to shift channels.<br />
Following this an activity took place focused on identifying council services that attendees felt were<br />
appropriate for exploration, in relation to, shifting some of the present interaction between customers and<br />
the services to self-help web based channels. Some of the services identified were:<br />
Benefits Services<br />
Leaflet Provision and online information regarding access to services<br />
Licensing and Planning Applications<br />
Parking (including Parking Permits and the Blue Badge process)<br />
Reporting<br />
For each of the services identified by the Customer Services Managers time was taken to outline the<br />
expected benefits and issues associated with adopting them to being provided over other more cost<br />
efficient channels. Further services were explored in relation to the perceived complexity of transactions<br />
conducted and transaction cycles. Finally, the potential impact of transformation of services was<br />
discussed.<br />
The first stage of the project demonstrated that there is no shortage of ideas in relation to the potential<br />
that individual services have for channel shift. Customer Service Managers identified a range of<br />
independent areas worth exploration (as noted above) from basic reporting linked to customers in the<br />
local area, through automation of benefits services, to online services to support waste and recycling<br />
management. Whilst individual areas where benefit could occur were identified it was also clear that data<br />
may not be easily accessible to support a case for the provision of new channels.<br />
4. Case study examples of channel shift success<br />
After analysing the scope for the potential shift of governmental services to self-help services, the<br />
research focus shifted to the identification of case studies linked to the previously identified services. The<br />
case studies were identified through desk research identifying through available literature best practice<br />
examples (and some poor examples) of successful channel migration. Thirteen case studies were<br />
identified through the project; in the paragraphs below we outline three of the identified services and<br />
findings from related case studies.<br />
Reporting services are mainly concerned with citizens informing council operatives regarding poor<br />
services (e.g. damaged roads) or other problems within their neighbourhood (anti-social behaviour).<br />
Waste and environmental services are one of the most important council and getting more significant with<br />
the increasing trend of recycling. Different councils have employed a shift of delivery channel for<br />
reporting. For example, South Tyneside Council shifted its main reporting mechanism to the internet in<br />
2008 (Astun Technology, 2009) (see http://my.southtyneside.info/). This resulted in increases in the<br />
number of transactions (from 203 to 2873) coupled with a reduction in cost (from £2.97 to £1.25). The<br />
council gained 2000 new subscribers to this service in 2009. Subscriptions keep subscribers updated<br />
about the services and anything new going on around them. Another council which has experimented<br />
with electronic reporting are, Tameside Council. In 2008, they started using email related to waste and<br />
recycling (Experian, 2009). Tameside Council also provides a form based system for the customer<br />
registration of council services such as bulky waste collection allowing residents to report anything such<br />
as abandoned cars and fly tipping.<br />
Case studies were also identified relating to the availability of online information instead of print leaflets<br />
(Department for Work and Pensions, 2006)( Kirklees Metropolitan Council, n.d.). For example, Kirklees<br />
Council have adopted a web based multi directional communications system to aid with citizen<br />
interaction. The system uses a low cost SMS service to enable council-citizen and citizen council<br />
messaging. People register with the service and text key words about the information that they want.<br />
Reponses to their information requests are sent to their phones in response. This service has been used<br />
to provide a mechanism for engaging young people with council services providing information about<br />
408
Darren Mundy et al.<br />
events happening in the region and information regarding entitlements to benefits etc... In addition, the<br />
system has also been used to help communication between the council and those in debt arrears from<br />
rental accommodation (with the levels of response from tenants in arrears increasing by 85%) and to<br />
provide a communication system for the deaf community.<br />
Benefits services in the UK include items such as housing benefits, job seekers allowance, free school<br />
meals and clothing grants, etc. Different councils are taking advantage of channel shift in giving benefit<br />
services to citizens in various ways. For example, Tameside Council has introduced a system of online<br />
application for child related benefits (PublicTechnology.net, 2009). The online system focused initially on<br />
providing applicants with an online form for applying for school meals benefits. However, Tameside<br />
quickly realised the linkage between benefits schemes and introduced a mechanism for using single<br />
forms to apply for multiple benefits i.e. many of the individuals who claim for certain benefits are also<br />
entitled to other benefits e.g. in this case school clothing grants. Instant decisions are provided to the<br />
customer on their entitlement, with the web system carrying out the validation of data entered and<br />
checking benefit entitlements. It is estimated the system has reduced the number of transactions for the<br />
service by 40,000 and reduced the majority of transaction costs to 6p. Dundee City Council has also used<br />
a single application form for access to benefit services with integration to back end systems. The system<br />
pre-fills in form information for benefits claimers on an annual basis, without the need to re-visit the<br />
council or re-submit proof of eligibility. Calculations are performed and payments are directly made to the<br />
customers’ account.<br />
The vast majority of case studies identified involved the introduction of targeted systems which have<br />
combined in linking back office to front end services. It is also evident from the material publicly available<br />
on the web that there is a lack of reporting on the fundamental benefits of transformation in the move to<br />
online services. Taking into account documents such as the Channel Strategy Guidance (Cabinet Office,<br />
2010) and Citizen Service Transformation (CSTransform, 2010), it is clear that at the heart of a<br />
successful transformation is an understanding of information such as present channel strategy, cost per<br />
transaction, customer satisfaction and potential scope for savings. Key lessons learnt from the case<br />
studies include:<br />
The need to clearly target the service or part of service for channel shift.<br />
To think clearly about the marketing strategy including segmentation of customer groups.<br />
Take time establishing key performance indicators which can be used to support a case for channel<br />
shift and to evaluate success.<br />
That channel shift can reduce costs and a proportion of customers are willing to move but it will not<br />
replace frontline services.<br />
5. Investigation of customer perspectives on channel shift<br />
The third stage of the project enabled analysis of customer views towards migration of council services to<br />
self-help web based channels. Customer views were captured through the design and use of a multi-part<br />
questionnaire. The multi-part questionnaire essentially covered a range of generic information related to<br />
access to council services, web access and future access; captured information from leisure users about<br />
potential for channel shift; captured information from tourists about potential for channel shift and<br />
captured information from residents about potential for channel shift across a range of services. 197<br />
Individuals were questioned across six town centre locations on three separate days from nine in the<br />
morning until five in the evening. There are limitations of the survey related to location (attracting sub-sets<br />
of council customers), timing (limits sample respondent group reducing the number of employed<br />
individuals surveyed) and to the methods of collection (some individuals will not respond to the survey<br />
method chosen). However, the survey provides a selection of customer responses to service transition.<br />
The main findings from the survey are outlined below, however, access to the full report and findings can<br />
be requested from the author (Mundy and Foster, 2010).<br />
Observation 1: Whilst there may be an economic imperative to switch service provision to web based<br />
self-help services there are some major problems. The results of the survey suggest that there is a subset<br />
of the local customer group who access council services that are not equipped in knowledge,<br />
equipment or in terms of motivation for access to channels other than face-to-face and telephone. 46% of<br />
survey participants reported never having accessed council web pages. A wide range of barriers to<br />
access were stated, however, 69 % of those sampled who had infrequent or no access to council pages<br />
409
Darren Mundy et al.<br />
cited either a lack of a computer, lack of an Internet connection, lack of knowledge, lack of interest or<br />
preference of the personal approach as their main barrier to council web page access.<br />
Observation 2: Whilst the findings do not establish a substantial demand for channel shift in relation to<br />
council services, many of those questioned recognised that provision of council services through more<br />
cost effective channels was a good thing (for other people), or in the case of web access was inevitable.<br />
In terms of the services residents would like to see online, parking attracted the largest interest (17%)<br />
followed by reporting and general information (each attracting 10%). Some citizen : council interactions<br />
(e.g. loss of job, death, disabilities, licensing, parking permits etc) can involve a lot of clarifications,<br />
clearances and paperwork. Although, the channel shifting of these services may be beneficial for some<br />
customers groups there are associated risks, for example, privacy and security (as illustrated by<br />
customer comments, “I don’t like filling in forms online, I feel uncomfortable” and the description of online<br />
services as a “total invasion of privacy”) and fraudulent claims. Government organisations are sometimes<br />
reluctant to deal with these issues in the ways they can be dealt with by private enterprise (e.g. through<br />
customer log-in) because of the associated potential for ‘big brother’ related issues. In addition there are<br />
financial issues regarding the need to properly link front end and back end operations.<br />
Observation 3: It is clear that at present the most valuable service offered on the web by local<br />
government is access to local information. Of the 58% of citizens surveyed who accessed council web<br />
pages 35% suggested their main reason of use was to find out local information (interestingly fo some<br />
this was the telephone number of particular services). Local government procedures and policies relating<br />
to delivered services can sometimes be difficult to gather and understand. Individuals requiring this<br />
information generally have to visit council offices or book appointments with advisors to guide them to<br />
more detailed information about these processes. For example, bus timetables, council tax rates,<br />
recycling information, and helpline and security numbers, etc. Availability of this information online can<br />
reduce these visits substantially.<br />
Observation 4: Some current eGovernment services have not necessarily delivered a standard of service<br />
commensurate with the standard delivered previously. Taking an example, negative views were<br />
expressed regarding the provision of service in place for online planning applications. At present there<br />
are concerns over the reporting of planning permission status using the online system. Customers<br />
enquire about the status of planning applications through the site and sometimes the online system can<br />
present an inaccurate understanding of planning permission status e.g. at the top level of the site it can<br />
state rejection, but only when examined in detail at lower levels might you find that the application had<br />
been accepted on appeal. Of critical importance is, services when delivered through different channels<br />
should take advantage of the channel in order to improve the service. Comments about the provision of<br />
forms to complete and physically take into council facilities don’t promote a reason to ‘Do It Online’.<br />
6. Developing a framework for service assessment<br />
The final stage of the research project involved drawing together the research findings from scoping the<br />
potential for channel shift, investigating successful channel shift case studies and investigating customer<br />
perspective on channel shift. As noted in the introduction research shows that at present approaches to<br />
channel shift within governmental organisations do not generally go through a substantial planning<br />
process. Therefore there is a need to suggest a comprehensive strategy for assessing the potential for<br />
successful channel shift. The final output of this project is in the outlining of a business case template for<br />
channel shift.<br />
The business case template (Mundy and Foster, 2010) involved the analysis of requirements, issues and<br />
concerns extracted from the project’s research findings. Drawn out from this analysis was a range of key<br />
criteria to enable evaluation when judging whether a service is or is not appropriate for channel shift.<br />
These key criteria are detailed in table 1.<br />
Once these key criteria had been identified questions relating to them were categorised and organised<br />
into a business case template document requesting information from the proposer of a channel shift<br />
project. The aim of this was to enable evaluation of the potential impact of new channels so that<br />
decisions can be made about potential success.<br />
410
Table 1: Key criteria<br />
Benefits to the<br />
Customer<br />
Benefits to the Council<br />
Complexity<br />
Cost and Savings<br />
Customer Demand<br />
Service Integration<br />
7. Conclusions and further work<br />
Darren Mundy et al.<br />
The provision of additional channels does not necessarily indicate a benefit to the<br />
customer. Web based access has the potential to streamline processes and provide<br />
other more substantial benefits to the customer rather than the simple creation of an<br />
extra channel. Benefits can lead to shifts in usage when customers realise there are<br />
added benefits to web based service over other forms of access they may perceive to<br />
be easier (e.g. picking up the phone).<br />
Potential benefits to the council from the provision of extra channels should not be<br />
ignored. However, these benefits must be balanced against the other factors given<br />
that members of the public are unlikely to move to a different channel for the sole<br />
benefit of increased council efficiencies. As has been evidenced elsewhere<br />
mechanisms for public change may come in the form of simplified service offerings or<br />
by passing on the cost of channel interaction to the customer.<br />
In simple terms services can be informational, transactional or provide mechanisms<br />
for customer interaction, they also all contain varying degrees of complexity. Even<br />
what may seem the simplest service may relate to a complex system e.g. in relation to<br />
leisure centre bookings an existing culture (i.e. a group always books on Fridays) may<br />
impact on an online booking system. The complexity of the service requires evaluation<br />
of the potential impact on its customer groups. As mentioned previously extra<br />
channels may provide the potential to streamline individual processes. A final thing to<br />
consider in relation to complexity is the service and its relationship to other services,<br />
potentially providing a mechanism to join up services and provide simplified combined<br />
processes for the customer.<br />
Detailed understanding of cost to serve and use of service provides a mechanism to<br />
evaluate the potential impact of extra channel provision. When this is coupled with<br />
projections about growth in web usage over time, this can provide an understanding of<br />
the potential savings from the shift of service.<br />
As evidenced within the case studies and through the primary research, it is important<br />
to understand the customer base for particular services. If the customer base is such<br />
that there is substantial potential for channel shift (and growth in use of service) then<br />
this could represent potential future savings. However, if the customer base has<br />
limited access or knowledge at present then the costs may be far greater than the<br />
benefits.<br />
There is limited benefit to providing additional front end channels if these channels do<br />
not lead to back end savings. Additional front end channels without integration lead to<br />
continued costs as front end service staff are required to pass messages on and<br />
respond in similar ways to present face to face or telephone contact.<br />
The current austerity drives within the public sector are driving a growing imperative to reduce the costs<br />
per transaction in the delivery of government services. With this pressure comes a risk of simply adding<br />
channels without fully considering the financial impact and potential benefits to local customer groups.<br />
From the research conducted for this project come a number of simple steps forward towards the<br />
successful shift of delivery channel.<br />
1. Selecting services which will provide the greatest impact both in terms of finances and customer<br />
service will lead to a growing confidence in local council online services. Once chosen these services<br />
need to be easy to use and add value to the user experience as noted by a number of customers, many<br />
still it easier to pick up the phone than access online services.<br />
2. Understand the cost of service and potential costs of service across different channels.<br />
3. One of the main problems identified within this research is the requirement to understand nuances with<br />
individual systems. The better online services will provide personalised and customised information which<br />
helps the customer deal with this feeling that face-to-face or phone call engagement with service staff will<br />
provide them with more tailored information. Facilities such as online archiving of forms requiring annual<br />
completion and simple collection of only update information are examples of how online systems can be<br />
designed to make particular tasks much easier for the average customer to complete.<br />
4. Taking time to understand different elements of the customer groups which engage with particular<br />
services can lead to more targeted marketing strategies in relation to promote engagement with new<br />
channel services. These strategies may not cost substantial amounts.<br />
411
Darren Mundy et al.<br />
5. Successful channel shift comes through integration of services. Automated channels have the potential<br />
to bring clear efficiencies to process, however, they need to be linked directly to back-end systems. An<br />
absence of integration can lead simply to additional tasks for front end customer service staff to handle.<br />
Follow on work from the work presented within this research paper, will centre around the use of the<br />
developed business case template in practice, to evaluate its potential for providing clarity over the<br />
potential for channel shift success. In addition, more can be learnt from better understanding current<br />
successful case studies of eGovernment channel shift to better understand strategies for success and<br />
failure.<br />
References<br />
Apicella, S and Streatfeild, N. (2010), Direct, database and digital marketing practice in the government sector: Black<br />
hole or parallel universe?, Journal of Direct, Data and Digital Marketing Practice, 11, 302–316<br />
Astun Technology, (2009): GI Data Integration and Publishing - the evolution of a platform,<br />
(Accessed 12.01.11).<br />
Cabinet Office, 2005, “Transformational government enabled by Technology”, Cabinet Office publications, <br />
(accessed 12.01.11)<br />
Cabinet Office, (2010): Channel Strategy Guidance, <br />
(Accessed 12.01.11).<br />
CSTransform, (2010): Citizen Service Transformation: A manifesto for change in the delivery of public services, <<br />
http://www.cstransform.com/white_papers/CitizenServiceTransformationV1.pdf> (Accessed 12.1.11).<br />
Department for Work and Pensions, (2006): Using leaflets to communicate with the public about services and<br />
entitlements, (Accessed<br />
12.01.11).<br />
Experian, (2009): Case study: Connecting with Communities and Customers Online,<br />
(Accessed 12.01.11).<br />
Her Majesty’s Government, (2010), Spending Review Statement, Her Majestys Government, http://www.hmtreasury.gov.uk/spend_sr2010_speech.htm<br />
(Accessed 12.1.11).<br />
Kernaghan, K. (2005):Moving towards the virtual state: integrating services and service channels for citizen-centred<br />
delivery, International Review of Administrative Sciences March 2005 vol. 71 no. 1 119-131<br />
Kirklees Metropolitan Council, (n.d): Text Messaging for Local Authorities,<br />
http://www.kirklees.gov.uk/business/consultations/itex/iTexOverviewAndCaseStudies.pdf (Accessed 12.01.11).<br />
Mundy, D. and Foster, A. (2010): Transforming Government Services: Channel Shifting – An exploration of moving<br />
services from mediated to self-help web based channels, Consultancy report, Available on request from author.<br />
PublicTechnology.net, (2009): Case study: Dundee City Council - Transforming the Free School Meals/School<br />
Clothing Grants Application Process, (Accessed 12.1.11).<br />
Pumphrey, S. (2006): "A vision for channel strategies", info, Vol. 8 Iss: 5, pp.56 - 66<br />
Socitm Consulting, (2010): Putting the web at the heart of your business, Socitm Consulting Report, available with<br />
subscription to Socitm.<br />
Varney, D, (2006): Service Transformation – A better service for citizens and businesses, a better deal for the<br />
taxpayer, Crown Copyright, ISBN: 0-11-840489-X<br />
412
eGovernment in Social and Economic Development: The<br />
Asymmetric Roles of Information, Institutionalization and<br />
Diffusion<br />
Bongani Ngwenya<br />
Solusi University, Zimbabwe<br />
ngwenyab@solusi.ac.zw<br />
nbongani@gmail.com<br />
Abstract: There are documented differences between the success and failure factors in the developed and<br />
developing countries with regard to the adoption and embracement of Openness in eGovernment practice models.<br />
This paper posits that eGovernment constitutes a critical context for social and economic development in both<br />
developed and developing countries. The paper also suggests that eGovernment encompasses more than just<br />
technology, that is, attempts to highlight the social and economic implications of changes that have occurred in<br />
recent years as a result of the transparency and accountability of government and how software usage can influence<br />
digital inclusion, trust and privacy and possible strategies to eliminate the digital divide by encouraging greater public<br />
and commercial use and re-use of government information through putting government data on the Web. In addition<br />
to leveraging economic development, eGovernment also helps to stream line government services to more social<br />
based values of inclusion and citizens participation, accessibility and power relationship ratios. Although<br />
eGovernment is not a new phenomenon in most developed countries such as the US, UK, Japan, most of the<br />
<strong>European</strong> countries and some developing countries in Asia and Africa which have already announced their Open<br />
Government Initiatives and data portals it also leads to greater information asymmetry among citizens and<br />
government and also, institutionalization and diffusion asymmetry of the practice of the current Openness in<br />
eGovernment models within developed and developing countries. Drawing on organizational decision-making<br />
research and following the explorative and grounded based research approach the findings of this research are that<br />
the information asymmetry between citizens and government and asymmetry in institutionalization and diffusion<br />
within developed and developing countries are widely attributed to socio-economic and political variations in<br />
developed and developing countries. Unless these differences are skill fully identified and accommodated as such<br />
into the development and use models, Openness in eGovernment efforts would not help achieve the social and<br />
economic development goals by both developed and developing countries.<br />
Keywords: eGovernment, institutionalization, diffusion, asymmetric roles, social and economic development<br />
1. Introduction<br />
eGovernment is about using the tools and systems made possible by Information and Communication<br />
Technology (ICTs) to provide better public services to citizens and business. ICTs are already widely<br />
used by government bodies, just as in enterprises, but eGovernment involves much more than just the<br />
tools (Ngwenya et al, 2010). Effective eGovernment involves rethinking organizations and processes, and<br />
changing behaviour so that public services are delivered more efficiently to the people who need to use<br />
them. Implemented well, eGovernment enables all citizens, enterprises and organizations to carry out<br />
their business with government more easily, more quickly and at lower cost (Reding, 2006). Differing<br />
characteristics of local environments, both infrastructural and socio-economic, have created a significant<br />
level of variation in the acceptance and growth of eGovernment in different regions of the world. This<br />
paper posits that eGovernment constitutes a critical context for social and economic development in both<br />
developed and developing countries. This paper also suggests that eGovernment encompasses more<br />
than just technology, that is, attempts to highlight the social and economic implications of changes that<br />
have occurred in recent years as a result of the transparency and accountability of government and how<br />
software usage can influence digital inclusion, trust and privacy and possible strategies to eliminate the<br />
digital divide by encouraging greater public and commercial use and re-use of government information<br />
through putting government data on the Web. There are documented differences between the success<br />
and failure factors in the developed and developing countries with regard to the adoption and<br />
embracement of Openness in eGovernment practice models. In addition to leveraging economic<br />
development, eGovernment also helps to stream line government services to more social based values<br />
of inclusion and citizens participation, accessibility and power relationship ratios.<br />
Although eGovernment is not a new phenomenon in most developed countries such as the US, UK,<br />
Japan, most of the <strong>European</strong> countries and some developing countries in Asia and Africa which have<br />
already announced their Open Government Initiatives and data portals it also leads to greater information<br />
asymmetry among citizens and government and also, institutionalization and diffusion asymmetry of the<br />
practice of the current openness in eGovernment models within developed and developing countries.<br />
413
Bongani Ngwenya<br />
Drawing on organizational decision-making research and following the explorative and grounded based<br />
research approach the findings of this research are that the information asymmetry between citizens and<br />
government and asymmetry in institutionalization and diffusion within developed and developing<br />
countries are widely attributed to socio-economic and political variations in developed and developing<br />
countries. Unless these differences are skill fully identified and accommodated as such into the<br />
development and use models, Openness in eGovernment efforts would not help achieve the social and<br />
economic development goals by both developed and developing countries.<br />
The author is proceeding in the following order of consideration, the author first examines some insights<br />
from the literature and conceptual framework. Following the discussion of the conceptual framework, a<br />
discussion of this explorative and grounded based research approach into information asymmetry<br />
between citizens and government and asymmetry in institutionalization and diffusion within developed<br />
and developing countries is done, based on comprehensive literature review and the interpretivist<br />
research conventions used in this study. The research methodology is outlined, followed by the analysis<br />
of the data, and discussion. Finally, the conclusions are drawn and suggestions for further future studies<br />
are made.<br />
2. Insights from the literature and conceptual framework<br />
2.1 The concept of eGovernment<br />
eGovernment involves the use of online information technologies by government agencies to provide<br />
services. eGovernment services are essentially concerned with the delivery of public services to citizens,<br />
employees, businesses, and government organizations through the use of information communication<br />
technology (ICT).Belanger and Hiller (2005) suggest three aspects of eGovernment, that is, Government<br />
to Individuals (G2Is) or Government to consumer (G2C).On the other hand, (Carter 2008) suggests<br />
Government to Business as a Citizen (G2BC) and Government to Business in the Marketplace<br />
(G2BMKT).Government to Individuals(G2Is) or Government to Consumer(G2C) takes public agencies to<br />
provide services to citizens such as issuance of national identity documents, drivers’ licenses, tax return<br />
applications, or obtaining passport via online, etc. Similarly, G2BC is involved with commercial<br />
transactions, such as institutional payment of taxes or fines by the commercial enterprises to public<br />
agencies. G2BMKT is concerned with the business transactions between government and businesses<br />
such as e-procurement, government hiring of contractors, and government acquisition of goods or<br />
services. The term “eGovernment” is a comprehensive term that is sometimes referred to as “on-line<br />
government” or “Internet-based government.” Dawes (2002) gives us a sense of the multidimensionality<br />
of the term when she states that it is “…the use of Internet technology to support government operations,<br />
engage citizens, and provide government services”. The first of these, government operations, primarily<br />
involves management practices that, although critical, are largely invisible to the public.<br />
Implementation of Internet technology in American state governments for example is taking place at a<br />
brisk pace. In his annual review of features available online in American federal and state websites, West<br />
(2007) documents changes that have occurred since he began his review in 2000. In 2000 only two<br />
percent of government sites offered three or more services online; in 2007 that figure was 58 percent. He<br />
notes that almost all sites now provide publications and databases (98 and 84 percent respectively).<br />
Almost half the sites (46 percent in 2007) now comply with the World Wide Web Consortium (W3C)<br />
standards for disability access. This is a phenomenal social development. The most common services<br />
offered by the states include business registration, professional licensing, driver license and license plate<br />
renewal, filing and paying taxes, locating information on sex offenders and missing persons. This reflects<br />
considerable effort towards achieving socio-economic development. Many state legislatures offer bill and<br />
legislation search and live broadcasts of legislative sessions. In addition, many states offer unique<br />
services. For example, in New York and New Jersey, using Privacy Policy links, citizens may request any<br />
site information that is public record. Georgia citizens may search for the lowest gas prices in the state,<br />
and South Carolina legislators provide legislative broadcasts with closed captioning (West, 2007).From<br />
2007, for example 89 percent of government sites allowed the public to e-mail public officials directly<br />
rather than simply e-mailing the webmaster (West, 2007). While state implementation of digital services<br />
and outreach is changing quickly, there is considerable progress to be made. Most sites exceed the<br />
reading level of the average citizen. Many are poorly organized; portal pages make it difficult to navigate<br />
through the sites. Some sites have limited accessibility, while others have no apparent privacy provisions,<br />
leading to more challenges of digital divide.<br />
414
2.2 eGovernment and the digital divide<br />
Bongani Ngwenya<br />
Just because technology is available does not mean it is accessible to all. The term digital divide has<br />
been used since the 1990s to describe patterns of unequal access to ICTs—primarily computers and the<br />
Internet—based on income, ethnicity, geography, age, and other factors, such as lack of skills. The<br />
realization of these goals requires that the digital divide be addressed. Indeed, in a study of eGovernment<br />
use by citizens, the digital divide was found to be more pronounced among government web site visitors<br />
than among internet users in general (Thomas and Streib 2003). A lack of access to the Internet is a<br />
major element of the digital divide. Research consistently identifies ethnicity, income, age and education<br />
as significant predictors of access to technology. According to Wright and Larsen (2001),60 percent of<br />
white households had Internet access, while only 34 percent of African American and 38 percent of<br />
Latino households did. Also, roughly 78 percent of households with income between $50,000 - $75,000<br />
by then had Internet access, while only 40 percent of those with household incomes between $20,000 -<br />
$25,000 had Web access. Thomas and Streib (2003), found that ethnicity, education, income, and age<br />
discriminate Internet users from non-users. They conclude that among Internet users, ethnicity and<br />
education are important predictors of which Internet users will also utilize government Web sites, with<br />
those users more likely to be white and better educated. The perpetuation of digital exclusion in<br />
Zimbabwe and other developing countries for example is contradictory to citizens’ constitutional right to<br />
the access of information as enshrined in their constitutions, notwithstanding the negative impact of<br />
information asymmetry, another critical challenge to eGovernment in social and economic development.<br />
In Zimbabwe there is Access to Information and Protection of Privacy Act (AIPPA). The Act enshrines the<br />
citizens rights to access to information, at the same time gives the government agents authority to pry on<br />
individual citizens use and dissemination of information. The whole thing is politically motivated, and used<br />
to curtail opposition to the ruling party. There is a clear contradiction here.<br />
2.3 Information asymmetry and its problems<br />
The theory of asymmetric information has been lively developed in the field of economic research for the<br />
last two decades. The prominent foundations for this theory were established by George Akerlof (Akerlof,<br />
1970), Michael Spence (Spence, 1973) and Joseph Stiglitz (Rothschild and Stiglitz, 1976). Information<br />
asymmetry occurs when one party has more or better information than the other party; it assumes that at<br />
least one party to a transaction has better relevant information whereas the other(s) do not. This is<br />
typically with governments. Naturally government would have more or better information about itself than<br />
its citizens. Information asymmetry has mass effect on the business networks, for example, supply<br />
chains. Fiala (2005) indicates that information asymmetry is a key source of supply chain inefficiency and<br />
strategic partnerships and information sharing can help to cope with the “bullwhip effect”, caused by the<br />
information asymmetry in supply chains. Mishra et al. (2007) point out that information distortion may<br />
reduce the benefit levels or even stop information sharing in supply chains. There are two typical<br />
problems asymmetric information may trigger, namely, moral hazard and adverse selection. Moral hazard<br />
refers to “situations where one side of the market can't observe the actions of the other. For this reason it<br />
is sometimes called a hidden action problem” (Varian, 2002). In addition, it means the chance, or hazard,<br />
that a party in a transaction with more information about its intentions or actions behaves in a way that a<br />
party with less information would consider inappropriate, or in the extreme, "immoral". An example of<br />
moral hazard is when people are more likely to behave recklessly if insured, either because the insurer<br />
cannot observe this behaviour or cannot effectively retaliate against it, for example by failing to renew the<br />
insurance.<br />
On the other hand adverse selection generally refers to a market process in which bad results occur due<br />
to information asymmetries between buyers and sellers, where the "bad" products or customers are more<br />
likely to be selected and the “good” ones are driven out of the market. It has been discussed extensively<br />
in the fields of economics, insurance, and risk theory. An example of adverse selection in the insurance<br />
market is when people who are of high risk are more likely to buy insurance, because the insurance<br />
company cannot effectively discriminate against them. In some countries, for example, people living with<br />
“HIV, AIDS”. The same premiums are set by the insurer for both groups with high risk and low risk. The<br />
insurance company anticipates or learns that the cost of the combined policy holders exceeds that of the<br />
general population, and sets the higher premiums accordingly. The result is that people with lower risks<br />
tend to go uninsured.<br />
Another famous example is illustrated by (Akerlof, 1970) for the second hand car market, which is<br />
referred to as the "lemon market"-people buying used cars do not know whether they are "lemons" (bad<br />
cars) or "cherries" (good ones), so they are willing to pay an average price that lies in between the<br />
415
Bongani Ngwenya<br />
lemons and cherries. As a result, the same situation as in the insurance market happens here, the<br />
“cherries” will be driven out and “lemons” will dominate the market. The similar findings are also<br />
supported by the recent e-commerce research of Liao and Cheung (2001) that the “poor vendor quality,<br />
especially as regards “lemons”, is identified as a significant disincentive to virtual retailing over the<br />
Internet”. Arrow (1984) equates these two terms, that is, moral hazard and adverse selection with hidden<br />
action and hidden information, respectively. Moral hazard arises when the action undertaken by the agent<br />
is unobservable and has a differential value to the agent as compared to the principal. With the fast<br />
development of information technology (IT), more recently, the theory of asymmetric information has<br />
been expanded in the field of economics of information technology and discussed by various researches,<br />
such as,(Garicano and Kaplan, 2001; Varian, 2002; Varian et al., 2004; Wigand et al., 1997; Stiglitz,<br />
2000; Kauffman and Mohtadi, 2003). In addition to “moral hazard” and “adverse selection” information<br />
asymmetry would also increase costs of acquiring information, such as transaction costs (which raise<br />
more in opaque situations). These could be: search costs; information costs; decision costs; policing<br />
costs; and enforcement costs.<br />
2.4 Information asymmetry problems between business and government<br />
Very little attention has been paid to the asymmetric information issues between profit driven businesses<br />
and public good oriented government. However, the recent movement of the public sector transformation<br />
of forming the so called public-private partnerships (PPP) by many countries in this world, where a<br />
government and a private entity collaboratively undertake traditionally public activity (Naschold and Von<br />
Otter, 1996), has made the boundary between the government and private business become less and<br />
less obvious. In this section the researcher puts his focal point on this transforming regime and discuss<br />
whether asymmetric information problems of moral hazard and adverse selection can also be triggered<br />
during the business and government interaction. One of the most important roles for government in the<br />
G2B relationship is the government control role.<br />
A good example of such control is in Tax and Customs Administration, as it is directly related with the<br />
collection of government revenues. <strong>European</strong> Union (EU) governments for example have been<br />
experiencing severe losses from various tax frauds. According to EU Commission (2006a), estimates of<br />
tax fraud of 2 to 2.5% of Gross Domestic Product (GDP) are mentioned, which is about 200 to 250 billion<br />
Euro per year at EU level and at unprecedented levels in developing countries, especially in Africa. Such<br />
tax fraud is a fitting example and can be interpreted as the moral hazard problem caused by the<br />
asymmetric information. An illustrative example is the value added tax (VAT) collection. Simply two<br />
parties are involved here: a private company who is obliged to declare VAT and pay the tax; and a Tax<br />
office as a government agency who audits the tax report and control the VAT collection. However in the<br />
real world, especially in developing countries the private company always, knows better about its own<br />
operating details and the real value of transactions, whereas the Tax office does not. Private company<br />
has better information than the Tax office and thus has motivation to hide and even falsify certain<br />
information from Tax office to get tax advantages. If such motivation is obvious and easy to achieve<br />
without tax office knowing, or the penalty of defaulting is not severer enough, the private company will<br />
choose to cheat - a moral hazard problem is caused that the tax office receives less VAT than it should<br />
have. The researcher posits that the problem of asymmetry does not only lie with information, in this case<br />
pertaining to eGovernment but also with institutionalization and diffusion of organisational practices, such<br />
as eGovernment.<br />
2.5 Asymmetry in institutionalization and diffusion<br />
In accordance with the existing literature, diffusion is defined as a process by which policy innovations<br />
are communicated in the international system and adopted voluntarily by an increasing number of<br />
countries over time (Elkins and Simmons 2005; Rogers 2003; Dolowitz and Marsh 2000). Diffusion refers<br />
to an international spread of policy innovations driven by information flows rather than by hierarchical or<br />
collective decision-making within international institutions. At the micro-level it is triggered by<br />
mechanisms of social learning, copying or mimetic emulation (Jo¨rgens, 2004; Orenstein,<br />
2003). The essential feature of policy diffusion is that it occurs in the absence of formal or contractual<br />
obligation. Moreover, diffusion is basically a horizontal process whereby individually adopted policies and<br />
programmes add up to a decentralized regulatory structure (Levi-Faur, 2005). Unlike in the case of<br />
multilateral legal treaties, which are negotiated centrally between states and subsequently<br />
416
Bongani Ngwenya<br />
implemented top-down, with diffusion, decision-making procedures are decentralized and remain at the<br />
national level, at its own pace and ability to implement. In the absence of a centralized regulatory regime<br />
with highly visible and explicitly stated aims, international policy diffusion may thus result in a ‘regulatory<br />
revolution by stealth’ (Levi-Faur and Jordana, 2005). While our understanding of diffusion follows the<br />
predominant use of this concept in the recent literature (Elkins and Simmons, 2005;Rogers, 2003;<br />
Howlett, 2000; Bennett 1991a, 1997) it contradicts those approaches that view diffusion as an outcome<br />
rather than a process. A prominent example for this body of literature is Eyestone’s understanding of<br />
diffusion as ‘any pattern of successive adoption of a policy innovation’ (Eyestone, 1977). This<br />
understanding of diffusion as the sum of all domestic adoptions of a policy innovation, regardless of the<br />
particular causal mechanisms through which these adoptions were brought about, certainly is legitimate.<br />
3. Research methodology employed in this study<br />
At an early stage of investigation, the research was exploratory, for which a single country case study<br />
was appropriate (Benbasat et al. 1987 and Galliers 1992). The selection of Zimbabwe`s government<br />
departments, that is, Department of Information; Department of Local Government; Department of<br />
Registry and Zimbabwe Revenue Authority (ZIMRA) constituted this case study in a developing country,<br />
while literature review sufficed to appreciate the same developments in the developed countries, that is,<br />
US and EU. The researcher conducted a purposeful sampling technique, which provided a total of168<br />
households, based on the community members surrounding these government departments, and as<br />
representative of the technologically disadvantaged. These represented the intended beneficiaries of<br />
eGovernment services in Zimbabwe. Very few possessed skills or training in computer technology or had<br />
any knowledge and information about on-line government services and some communities had virtually<br />
no access to computer technology. The author served as volunteer within the community, which<br />
cultivated familiarity and trust necessary to collect data (Rubin and Rubin 1995). Any unintended<br />
influence of the author was minimized as the author was volunteer among several other volunteers who<br />
were not even aware of the research objectives. In addition to 168 households, the author interviewed 8<br />
heads of these selected government departments, 17 Members of Parliament of Zimbabwe, 7 Permanent<br />
Secretaries and 11 Principal Directors of some key ministries in the Zimbabwean government as well, in<br />
this explorative and interpretivist research. The semi-structured interviews lasted between 30 minutes<br />
and 1.5 hours and all of them were recorded. The interviews were transcribed and their contents were<br />
analysed. The processing and analyses of the information had the following stages:<br />
Creation of a content analysis matrix segment<br />
Detailing the Data Collection and Analysis Procedures<br />
Discussion and Summary of Research Findings<br />
Conclusion and Suggestions for Future Studies<br />
3.1 Interview script<br />
The script for the interview had some of the following “grand tour” questions:<br />
Do you have any knowledge and information about eGovernment practices in Zimbabwe?<br />
What is your opinion and understanding of eGovernment practice?<br />
What is the government doing about information asymmetry within its departments?<br />
In your opinion how far is Zimbabwe in terms of Open Government Initiatives and data portals?<br />
What challenges is Zimbabwe facing with regard to adopting and implementing Openness in<br />
eGovernment practices?<br />
What is your assessment of the digital divide levels in Zimbabwe?<br />
What is your assessment of the digital inclusion levels in Zimbabwe?<br />
Are there any plans to expand technology accessibility to rural areas as well?<br />
Do the promoters of technology usage participate readily? Where is there most resistance?<br />
What is your role in the implementation of eGovernment practice?<br />
With increases in internet usage, is there improvement in terms of government service delivery?<br />
With increases in open government data portals and internet usage, is there changes in social<br />
development of communities in the country?<br />
417
Bongani Ngwenya<br />
With increases in open government portals and internet usage, is there changes in economic<br />
development within the country?<br />
What are the areas in which the department has most difficulty in implementing the usage of<br />
technology?<br />
In terms of eGovernment practices, can one say that there is a set of best practices which are<br />
transmitted by people?<br />
With eGovernment data portals usage, have there been changes in the sharing and distribution of<br />
information within the stakeholders in the country?<br />
Is there an Intranet where the processes are managed within the departments?<br />
What kind of innovations have emerged with eGovernment practices?<br />
Does the entire department staff have training?<br />
How is the know-how of employees transmitted? Orally? Written? Have there been changes with<br />
information technology usage?<br />
Is the government department well aware of its clients? How evident is it? How does the department<br />
try to meet the needs of its customers or clients?<br />
Are there partnerships with various organizations? Are they the same as those that existed before<br />
eGovernment practices or improvements were made? What kind of partnerships are these?<br />
Does the department share knowledge and information in the network of openness in eGovernment<br />
organizations? What are the advantages?<br />
Do you consider that eGovernment practice has made processes simpler or more bureaucratic?<br />
4. Detailing the data collection and analysis procedures<br />
The analysis was undertaken in a systematic format that is similar to previous interpretive research<br />
(Brockman et al., 2008). An extensive systematic and interpretive analysis employing categorization,<br />
abstraction, comparison, dimensionalization, integration, iteration, and refutation was conducted<br />
(Spiggle,1994). As interviews were conducted and transcribed notations were made regarding<br />
respondents opinions and perceptions of the effectiveness of eGovernment as a leverage for social and<br />
economic development. This paper posits that eGovernment constitutes a critical context for social and<br />
economic development in both developed and developing countries. However the findings of this study<br />
are that eGovernment also leads to information asymmetry among citizens and government and also,<br />
institutionalization and diffusion asymmetry of the practice of the current Openness in eGovernment<br />
models within developed and developing countries. An interpretive analysis was developed, refined, and<br />
reviewed by the researcher. First, an individual or ideographic understanding of each interview was<br />
sought. Secondly, separate interviews were related to each other as the researcher attempted to grasp,<br />
rather than impose meanings that emerged from the dialogue. In this way, the interpretations sought do<br />
describe common patterns of experience (Thompson et al.,1989). Still further, the researcher formulated<br />
a classification analysis of the data to identify concepts, guided by the literature in what is prevailing in<br />
the developed countries. Next, the researcher elaborated on this analysis by integrating concepts and<br />
bringing into the picture a process analysis that the perceptions of Openness in eGovernment<br />
institutionalization and diffusion asymmetry are subject to change over time. Upon closer inspection of<br />
the eGovernment, digital divide, information asymmetry and institutionalization and diffusion asymmetry<br />
literature and the transcriptions of the 211 interviews, this interpretivist research analysis revealed two<br />
underlying attributes to this “asymmetry challenge” in eGovernment: (1) Socio-Economic Variation and<br />
(2) Political Variation in developed and developing countries. Unless these differences are skill fully<br />
identified and accommodated as such into the development and use models, Openness in eGovernment<br />
efforts would not help achieve the social and economic development goals by both developed and<br />
developing countries.<br />
Figure 1, combines these elements to present potential adoption motivations in a simple matrix diagram.<br />
Developing countries` motivations appear in the left and upper segment; this segment is characterized<br />
by high socio-economic and political variation, and high information, institutionalization and diffusion<br />
asymmetry and hence, high digital divide intensity. Developed countries` motivations appear in the right<br />
segment; this segment is characterized by low socio-economic and political variation, and low<br />
information, institutionalization and diffusion asymmetry and hence, high digital inclusion intensity.<br />
418
Bongani Ngwenya<br />
Figure 1: Motivations for adopting innovation and diffusion<br />
However, connecting this part of the conventional diffusion model with theories of issue interpretation<br />
requires suggested hypotheses, which is not the focus of this paper at this stage. The researcher<br />
suggests future non interpretivist research to consider sighting hypotheses and testing them.<br />
5. Discussion and summary of research findings<br />
This article offers a look at combining rational and social accounts of eGovernment practice<br />
institutionalization and diffusion by asking whether a concern with “asymmetry problems” discussed<br />
before are necessarily influenced by the level of a country`s development. The researcher`s argument is<br />
that the higher the socio-economic and political variation in a country the greater the challenge and<br />
problem of asymmetric information and asymmetry in diffusion of innovation like eGovernment models.<br />
This study`s findings thus suggest that both developed countries based on previous studies and<br />
developing countries based on the results of this interpretivist study are challenged by information<br />
asymmetry problems, digital divide and asymmetry in diffusion. As a result concerns with social and<br />
economic development gains driven by eGovernment practice models are not as period-dependent as<br />
has been argued; rather, they may be more universally shared. On the basis of this study, the researcher<br />
can only suggest as to why this is the case, but it appears possible that aspirations to achieve social and<br />
economic gains may be, to some extent, independent of the diffusion process. For instance, if the<br />
theorization of eGovernment as offering performance benefits of greater social and economic gain<br />
appears compelling to adopting organizations throughout a diffusion process, then one would not expect<br />
to see differences between developed and developing countries in terms of social and economic gains as<br />
a motive for adoption. The findings of this interpretivist research are that the information asymmetry<br />
between citizens and government and asymmetry in institutionalization and diffusion within developed<br />
and developing countries are widely attributed to socio-economic and political variations in developed<br />
and developing countries. These findings prompt rethinking of the classic institutional, and diffusion<br />
theory, to suggest eGovernment models that will suit the socio-economic and political context of<br />
developing countries in particular. Specifically, this study has shown that both developed and developing<br />
countries report having both social and economic motivations for adopting openness in eGovernment,<br />
419
Bongani Ngwenya<br />
albeit for pursuing social gains and economic gains. Overall, the findings support rethinking the<br />
institutional diffusion theory’s dichotomization of social and technical motivations for adopting innovations.<br />
Finally, this study deepens understanding of why the implementation of new practices is frequently<br />
shallow or even nonexistent (Meyer and Rowan, 1977; Westphal and Zajac, 1994)-an area that has<br />
drawn increasing research attention. Developing countries, in this instance, are equally motivated by both<br />
social and economic gains for adopting innovation, however from the information gathered from the<br />
interviews conducted in this study, it became clear that developing countries have concern about their<br />
social, economic and political contexts and that they may not be ready to adopt the current<br />
eGovernment models that are adopted by the rest of the world.<br />
6. Conclusion and suggestions for future studies<br />
In this study the researcher posits that eGovernment constitutes a critical context for social and economic<br />
development in both developed and developing countries. The study also suggests rethinking of the role<br />
of motivations in the diffusion of practices among organization by extending the diffusion of practices and<br />
innovation to eGovernment model. Specifically, this study has shown that both developed and developing<br />
countries report having both social and economic motivations for adopting eGovernment models or<br />
practices, albeit for pursuing social gains and economic gains. Although organisations and managers or<br />
leaders are frequently subject to constraints that limit their ability to be mindful of practices or habits of<br />
thinking that are taken for granted in their institutional environments, the researcher believes that the<br />
extent of mindless imitation has been overstated. This study has taken considerable steps toward<br />
recognizing greater managerial or leadership rationality and agency (Dacin, Goodstein, and Scott, 2002).<br />
For instance in this research, the findings are that the information asymmetry between citizens and<br />
government and asymmetry in institutionalization and diffusion within developed and developing<br />
countries are widely attributed to socio-economic and political variations in developed and developing<br />
countries. Unless these differences are skill fully identified and accommodated as such into the<br />
development and use models, eGovernment practice efforts would not help achieve the social and<br />
economic development goals by both developed and developing countries. These findings prompt<br />
rethinking of the classic institutional, framing and diffusion model, to suggest full grounded theory<br />
research in future, that would develop eGovernment models that suit the social, economic and political<br />
context of developing countries in particular. The findings and conclusions of this interpretivist study could<br />
be strengthened by hypothesizing and testing the assertions on “asymmetry challenges” in the future.<br />
References<br />
Akerlof, G. A 1970, “The market for" lemons": Quality uncertainty and the market mechanism”, The Quarterly Journal<br />
of Economics 84 (3), 488-500.<br />
Arrow, K. J. 1984, The economics of agency. Institute for Mathematical Studies in the Social Sciences, Stanford<br />
University.<br />
Benbasat, I., Goldstein, D.K., and Mead, M 1987,“The Case Research Strategy in Studies of Information Systems,”<br />
MIS Quarterly, 11(3): 369-386.<br />
Bennett, C.J 1991a, “How states utilize foreign evidence”, Journal of Public Policy 11: 31–54.<br />
Bennett, C.J 1997, “Understanding ripple effects: the cross-national adoption of policy instruments for bureaucratic<br />
accountability”, Governance: An International Journal of Policy and Administration 10(3): 213–33.<br />
Dacin, M. T., Goodstein, J., and Scott, W. R 2002, “Institutional theory and institutional change: Introduction to the<br />
research forum”, Academy of Management Journal, vol. 45, pp. 45-56.<br />
Dolowitz, D., and Marsh, D 2000, “Learning from abroad: the role of policy transfer in contemporary policy making,<br />
Governance”, An International Journal of Policy and Administration 13(1), 5–24.<br />
Elkins, Z., and Simmons, B 2005, “On waves, clusters and diffusion: a conceptual Framework”, The Annals of the<br />
American Academy of Political and Social Science 598 (March 2005): 33–51.<br />
Eu Commission (2006a) Eu coherent strategy against fiscal fraud – frequently asked questions.<br />
Available:Http://europa.Eu/rapid/pressreleasesaction.Do?Reference=memo/06/221&format=html&ag<br />
d=0&language=en&guilanguage=en. Brussels.<br />
Eyestone, R 1977, “Confusion, diffusion and innovation”, American Political Science Review 71(2): 441–7.<br />
Fiala, P 2005, “Information sharing in supply chains”, Omega(Oxford) 33 (5), 419-423.<br />
Galliers, R.D 1992, “Choosing Information Systems Research Approaches”, in Robert D. Galliers (ed) Information<br />
Systems Research: Issues, Methods, and Practical Guidelines, Alfred Waller Ltd, Henley on-Thames: 144-162.<br />
Garicano, L., and Kaplan, S. N 2001, “The effects of business-to-business e-commerce on transaction costs”,<br />
Journal of Industrial Economics 49 (4), 463-485.<br />
Howlett, M 2000, “Beyond legalism? Policy ideas, implementation styles and emulation based convergence in<br />
Canadian and U.S. environmental policy”, Journal of Public Policy 20(3): 305–29.<br />
Jo¨rgens, H 2004, “Governance by diffusion – Implementing global norms through cross-national imitation and<br />
learning”, in, W.M. Lafferty (ed.), Governance for Sustainable Development. The Challenge of Adapting Form to<br />
Function, Cheltenham: Edward Elgar Publishing: 246–83.<br />
420
Bongani Ngwenya<br />
Kauffman, R. J., and Mohtadi, H. 2003, “Analyzing interorganizational information sharing strategies in b2b ecommerce<br />
supply chains”, In INFORMS <strong>Conference</strong> on Information Systems and Technology, Atlanta, GA.<br />
Levi-Faur, D 2005, “The global diffusion of regulatory capitalism”, The Annals of the American Academy of Political<br />
and Social Science 598 (March 2005): 12–34.<br />
Levi-Faur, D., and Jordana, J 2005, “Preface: The making of a new regulatory order”, The Annals of the American<br />
Academy of Political and Social Science 598 (March 2005): 6–9.<br />
Liao, Z., and Cheung, M. T 2001, “Internet-based e-shopping and consumer attitudes: An empirical study”,<br />
Information & Management 38 (5), 299-306.<br />
Meyer, J. W., and Rowan, B 1977, “Institutionalized organization: Formal structure as myth and ceremony”, American<br />
Sociological Review, vol. 83, pp. 340-363.<br />
Mishra, B. K., Raghunathan, S. and Yue, X 2007, “Information sharing in supply chains: Incentives for information<br />
distortion”, IIE Transactions 39, 863–877.<br />
Naschold, F., and Von Otter, C 1996, Public sector transformation: Rethinking markets and hierarchies in<br />
government. John Benjamins.<br />
Ngwenya, B., Lubbe, S., and Klopper, R 2010 “Institutionalisation, Framing and Diffusion: The Logic of Openness in<br />
eGovernment and Implementation Decisions (a lesson for developing countries)” 6 th International <strong>Conference</strong><br />
on eGovernment, Cape Peninsula University of Technology, South Africa.<br />
Orenstein, M.A 2003, “Mechanisms of diffusion. An interdisciplinary review”, Paper presented to the American<br />
Political Science Association Annual Meeting, Philadelphia, 28–31 August, 2003.<br />
Perrow, C (3 rd ) 1986, Complex organizations: A critical essay, New York.<br />
Reding, 2006; eGovernment in Europe 2006, eGovernment Action Plan, 2006, viewed on 07 April 2010,<br />
National Electronic Government Strategies in Austria<br />
Birgit Oberer 1 and Alptekin Erkollar 2<br />
1 Kadir Has University, Istanbul, Turkey<br />
2 Halic University, Istanbul, Turkey<br />
birgit.oberer@khas.edu.tr<br />
erkollar@etcop.com<br />
Abstract: One of the most emerging concepts of information technology is the one of electronic government.<br />
Electronic services that are made available by governments to citizens, businesses, and other governments<br />
(international) or governmental authorities (national) are general proof of the changes being made in the public<br />
sector. Intersecting the government, citizen, and business domain, a business model can be defined considering the<br />
government-to-business, government-to-citizen, and government-to-government approaches. Governments around<br />
the world try to follow their, most of the time, ambitious strategies to become, or stay, competitive. In this study<br />
Austrian strategies and projects for electronic government as well as their implementation plans were analysed,<br />
followed by an examination of the electronic services offered by the national governmental authorities in Austria, one<br />
pioneer in electronic government in Europe, leading in the <strong>European</strong> E-Government ranking 2010, and the declared<br />
'<strong>European</strong> champion in eGovernment' for the fourth time in a row. The results revealed that Austria has developed<br />
hybrid electronic government strategies, and has launched projects in that field, in which national governmental<br />
authorities have to participate, in order to offer electronic government services at a high level and in a competitive<br />
international environment. On a whole, offering a one-stop shop gateway to governmental information and<br />
transactions generally offers higher attractiveness for conducting nationwide business and all incentives for electronic<br />
government focus on developing good practices in the area of efficient and effective electronic government.<br />
Nevertheless, national strategies are transformed and implemented in different ways not always following the onestop-shop<br />
approach and contributing to the development of isolated applications instead of integrated ones.<br />
Keywords: electronic government, e-Austria, digital Austria explorer, gateway, one-stop-shop<br />
1. Introduction<br />
Electronic government is an instrument to provide a customer centric, one stop delivery of governmental<br />
services using a variety of channels, such as web portals, call centres, self service functionalities, or<br />
mobile applications. The term customer stands for a citizen, business, as well as a governmental<br />
authority itself. Electronic government portals are powerful tools for administration related reforms, reengineering<br />
and anti-corruption incentives enabling more customer oriented, transparent, effective, and<br />
efficient governmental services. Government to citizens and businesses focuses on easy access, a 'one<br />
window' approach, enhanced quality services, and multichannel service delivery. The 'intra agency' view<br />
focuses on process development and process improvements, whereas the targets for 'inter agency'<br />
activities smooth information flow, enhanced capability for analysis, and enhanced use of multimedia. For<br />
being competitive in global markets and to meet the needs of being competitive in an increasing area of<br />
globalisation, public authorities have to think about how to make their services more competitive. One<br />
aspect of becoming more competitive and contrasting with competitors on the market is investing in<br />
global oriented electronic government strategies. Based on the approach of business process reengineering<br />
and the improvement and increase of customer satisfaction, governments have to improve<br />
their public appearance within an international, competitive environment. Among other things, they can<br />
do so by using electronic government strategies following predefined goals, in turn transforming these<br />
strategies into measures in order to reach the defined goals and developing control structures for strategy<br />
progress analysis. One of the most emerging concepts of information technology is the one of electronic<br />
government. Government portals are an increasingly powerful element of the worldwide public<br />
administration reform strategies providing one stop online access to governmental services (Erkollar and<br />
Oberer 2010, Aichholzer and Schmutzer 1999). By providing benefits to citizens, electronic government<br />
has already become a part of life. The main targets are overcoming barriers of bureaucracy, reducing<br />
service time, increasing the efficiency of governmental processes, and permitting citizens and businesses<br />
as well as other governmental authorities to connect to government information. Electronic government<br />
enables communicating with governmental authorities and offering transaction possibilities for<br />
government driven processes in the private and business spheres. That is the case for not only citizens<br />
and businesses but also for governmental authorities as well. Electronic government established<br />
structures are able to change their business processes on a whole, interacting with each other using<br />
information technology avoiding media breaks, time delays, quality loss for process outcomes, and lost<br />
information due to lost data or available but not used data.<br />
422
2. Literature review<br />
Birgit Oberer and Alptekin Erkollar<br />
Electronic government is the use of information and communication technologies for providing and<br />
improving governmental services by enabling electronic information provision, communication, and<br />
transactions for administrations and their customers, who are citizens, businesses, as well as<br />
governments or administrative authorities themselves. Electronic government includes all administration<br />
measures at all levels (federal, state, as well as regional) to improve the requirement satisfaction for<br />
citizens (qualitative improvements in spheres of life), businesses and for governments to improve internal<br />
processes and procedures and to force structural changes. An electronic government strategy is a<br />
fundamental element of the modernisation process in administrations. Electronic government activities<br />
worldwide are driven by a need for higher efficiency, effectiveness, and the accessibility of public services<br />
for the administration's customers. Most governments follow certain strategies for electronic government<br />
or launched projects in this area to ensure a web presence of the administration, to offer communication<br />
methods, and on a higher level to offer transactional services for the government's customers (Aichholzer<br />
and Schmutzer 1999, Burn and Robin 2003, Chesher et al. 2003 and Ebrahim and Irani 2005).<br />
Governments produce, manage, and use huge amounts of data that become more valuable the easier<br />
the customers, which are citizens, businesses, and governmental authorities themselves, access these<br />
data. Information and communication technologies evolve into complex, globally oriented networks and<br />
governments are under pressure offering reliable, efficient, and effective services to their customers<br />
including, apart from citizens services trade and travel security, social service delivery and support for<br />
military services (Simon 2005). Electronic government refers to the improvement of internal service<br />
provision within administrations for external as well as internal customers and is related to the need for<br />
the higher transparency of public processes and procedures. Electronic government is an approach to<br />
increase governmental transparency, create added value for administration's customers and to ensure<br />
the effectiveness, efficiency, and security focus of internal processes. Stakeholder orientation is the main<br />
focus for electronic government oriented administrations. Around the world, a significant range of<br />
developing and developed countries have committed substantial resources to electronic government<br />
implementation. Electronic government as an instrument to strengthen competitiveness, increase<br />
efficiency, and enhance modernisation is a valuable component of public sector reform. Developments in<br />
electronic government comprise not only web-based developments but increasingly also mobile<br />
applications (m-government) (Al-Sebie and Irani 2003, Georgescu and Georgenscu 2008, Budde 2010<br />
and Claver-Cortés and de Juana-Espinosa 2006). According to a survey conducted by the United Nations<br />
in 2008, approx. 98% of member countries at least operate government websites (United Nations<br />
Department of Economic and Social Affairs 2008).<br />
3. The Austrian electronic government framework<br />
In 1998, the task force 'E-Austria', composed of leading experts in Austria, recommended to institute an<br />
'Information and Communication Technologies Board', responsible for the planning and coordination of<br />
electronic government implementation for federal government, provinces, and local governmental<br />
authorities. The board was headed by a federal chief information officer, who was responsible to<br />
coordinate the ideas and strategies of the board with the needs of the provinces and local authorities. For<br />
the board to be able to communicate with the federal government and provinces, an IT platform has been<br />
established that can be seen as the father of today's electronic government solutions: information<br />
exchange for all the parties involved, using simple information, best practices, white papers, or use cases<br />
to communicate and publish recommendations of specific work groups.<br />
In Austria, regulations regarding electronic government are not confined in a single law, in which there is<br />
a plenty of regulations and laws dealing with electronic government. The basic framework for Austrian<br />
electronic government consists of The eGovernment Act, General Administrative Procedures Act, Service<br />
of Official Documents Act, and the Electronic Signature Law. All of these laws are supplemented by other<br />
laws or regulations. Compared to other <strong>European</strong> countries, Austria was one of the first to pass<br />
comprehensive legal regulations in the area of electronic government. The eGovernment Act is the core<br />
of the Austrian laws on electronic government, enacted in 2004. 'It enables closer co-operation between<br />
all authorities that provide eGovernment services and gives them the opportunity for networking together.<br />
Many mechanisms such as the citizen card, sector-specific personal identifiers, and the electronic<br />
delivery of documents are also able to be put to use in the private sector' (Digital Austria 2010). The<br />
important principles are freedom of choice for citizens selecting the means of communication contacting<br />
government or public authorities, security and legal protection as well as unlimited access for people with<br />
special needs. The General Administrative Procedures Act lays the principles of administrative<br />
procedures, among other things regulating the ways how citizens and public authorities can communicate<br />
423
Birgit Oberer and Alptekin Erkollar<br />
with each other. The Service of Official Documents Act handles the delivery of all documents that<br />
governments are required to publish following the laws and regulations distinguishing between deliveries<br />
that require proof of delivery and others where no proof is required. Proof of delivery is carried out via an<br />
electronic delivery service that is available from delivery service providers, in turn allowing customers to<br />
register with their citizen card to confirm that they want to receive administrative documents<br />
electronically. Registering is sufficient notice in order to receive administrative documents. 'Proof of<br />
delivery is verified when the document is retrieved using the recipient’s citizen card, or when an explicit<br />
agreement exists that allows documents to be picked up automatically using an automated signature.<br />
Confirmation of delivery is also made even if the document is not picked up by the recipient. Electronic<br />
delivery can also be carried out in cases where the recipient gives an e-mail address to the public<br />
authority as his or her 'electronic delivery address' during a procedure' (Digital Austria 2010). The<br />
Electronic Signature Law lays down the principles of electronic signatures following the <strong>European</strong><br />
signature guidelines, differentiating simple, advanced, and qualified signatures. By definition, a qualified<br />
signature, as is used for citizen cards, is equal to a handwritten one. Apart from regulations for citizens,<br />
the law also defines the requirements for businesses that issue qualified certificates and procedures for<br />
the authentication of foreign certificates.<br />
IT and infrastructure: The Austrian electronic government strategy focuses on a secure, flexible, and<br />
expandable IT infrastructure. Basically, apart from a computer and a card reader, a citizen card<br />
environment, which is free for download software, is needed for enabling participation in the Austrian<br />
electronic government community. The citizen card environment is built upon open standards and allows<br />
all signature cards, which fulfil the predefined specifications and legal requirements, to be used as a<br />
citizen card. The same is valid for ID cards of foreign citizens, which follow the rules for electronic<br />
signatures. For the implementation of the citizen card, a secure layer, an interface between applications<br />
and citizen card, has been defined. The security layer, as a middleware, is embedded in the citizen card<br />
environment software and is hardware and technology independent as well as independent of<br />
cryptographic algorithms (Digital Austria 2010). To make applications available to the government’s<br />
customers, the Austrian electronic government strategy defined the need for modules for online<br />
applications, which are software components that encapsulate the procedures needed to carry out<br />
specific functions, such as reading identification data from the citizen card, delivering notifications from<br />
governmental authorities or verifying electronic signatures, within the electronic government area and<br />
implement open standard interfaces for web applications. An open source platform Digital Austria,<br />
EgovLabs, for developers was established offering information, distributions, releases, development data,<br />
and processes for Austrian electronic government projects. Being a registered user you can define your<br />
personal page (figure 1), monitoring assigned items, forums, file modules, and projects. According to<br />
Digital Austria (2010), by now modules supporting identification, signature verification, delivery, and<br />
server-side signature creation are available. For identification, a module is used to uniquely identify and<br />
authenticate users who want to conduct online procedures with their citizen cards. Using an identity link<br />
and the signature on the citizen card, the server-side module and the citizen card software interact and<br />
allow for identification and authentication. Public authority procedures can also be carried out by third<br />
parties on someone else's behalf. A valid electronic proxy authority agreement is needed between the<br />
parties. For this purpose, a module for 'authorisation and representation' has been created. For<br />
professional representatives, such as lawyers, there is an extension to the signature certificate on the<br />
citizen card showing that the representative is authorised to conduct electronic transactions on behalf of<br />
the principal. One module creates an interface between record delivery services and electronic file<br />
systems or special applications.<br />
3.1 Current electronic government initiatives<br />
In 2006, the Austrian Federal Government launched an initiative to reduce the administrative burden for<br />
businesses by 25% for each ministry by the end of 2007. The USP.GV.AT Portal, which is explained in<br />
section 4, is the flagship project for this initiative and one out of approximately 200 measures defined to<br />
reduce the administrative burden. For calculating the administrative burden for businesses, the standard<br />
cost model is used. By adding the costs of administrative procedures, data requirements, and information<br />
obligations to the individual legal provision, the total costs for individual regulation can be obtained.<br />
Administrative costs are the result of cost per administrative activity multiplied by the quantity of<br />
administrative activities. The initiative is coordinated by the Austrian Federal Ministry of Finance. The<br />
overall reduction should be achieved in two phases: the reductions for national induced burdens (by<br />
2010) and reductions for EU induced burdens (by 2012). For reducing the national burden by the end of<br />
2010, 50% of the reduction measures have already been implemented and, according to the Austrian<br />
Federal Government, approx. 40% are in the pipeline and an update process with the ministries ongoing<br />
424
Birgit Oberer and Alptekin Erkollar<br />
(Austrian Federal Government 2010). The final results for 2010 are currently not available but are<br />
expected to be below 90%.<br />
Figure 1: EgovLabs – personal page<br />
In 2009, the Austrian Federal Government launched a programme on the reduction of the administrative<br />
burden for citizens, including a focused baseline measurement, accompanied by actions in the areas of<br />
birth, marriage, and death, and increasing the quality of governmental services. The programme consists<br />
of two elements, the use of the standard cost model for the 100 most burdensome information obligations<br />
and fast track measures for priority areas such as birth, marriage, and death' (Austrian Federal<br />
Government 2010). To be able to calculate the administrative costs for citizens, the standard cost model<br />
has been adapted. Burdens are measured in time (hours) and out-of-pocket costs, such as travel<br />
expenses. The administrative burden for citizens in time is the result of time multiplied by quantity, which<br />
is the number of citizens multiplied by frequency. The administrative burden in costs is the result of the<br />
quantity multiplied by direct costs. Approximately 4,000 interviews have been conducted and, after the<br />
extrapolation of the results and the analysis of qualitative questions, workshops aiming at the<br />
identification of tangible reduction measures for citizens were organised. According to the 'less burden for<br />
the Austrian economy' initiative, an initiative of the Austrian Federal Government, coordinated by the<br />
Federal Ministry of Finance, more than 150 of the measures identified in these workshops have been<br />
reported to the Council of Ministers in fall 2010, where the next steps for the programme have been<br />
decided on. In addition, it will be implemented through defined measures starting from fall 2010 onwards<br />
(Stork 2010). The platform Digital Austria is a committee of the Federal Government for the coordination<br />
and management of electronic government in Austria. According to Digital Austria, more than 80% of all<br />
businesses use electronic government and more and more citizens become electronic customers.<br />
3.2 Electronic government tools and applications<br />
HELP.GV.AT is an interface between government, its authorities and citizens with a special emphasis<br />
placed on criteria such as transparency, clarity of information, and concentration on essential facts. The<br />
portal is designed to be accessed nearly without limits, dealing with information on hundreds of life<br />
situations within which different governmental authorities are involved. All content is listed in alphabetical<br />
order and arranged in main categories, such as documents, education, or finances, and themes. The<br />
HELP.GV.AT portal allows citizens and businesses to prepare interactions with authorities offline, handle<br />
administrative procedures electronically, and plan dealings with authorities. For governmental authorities,<br />
it is a new type of co-operation between authorities and their customers. HELP.GV.AT is an Internet<br />
platform with routes to a large number of public authorities, provides information on different interactions<br />
with Austrian authorities required in most frequent life situations such as housing, permits, pregnancy,<br />
childbirth, or marriage and the electronic processing of these procedures. HELP.GV.AT has offered<br />
services to citizens for years now and has been continuously improved since it was launched. An<br />
increasing number of administrative procedures can be done electronically using this portal. Apart from<br />
the main portal in the German language, a view in English is available that offers orientation to foreign<br />
nationals. Structured in accordance with individual life situations (e.g. work, car, retirement pension),<br />
425
Birgit Oberer and Alptekin Erkollar<br />
HELP.GV.AT provides information and support to foreigners who go to Austria in order to live and work<br />
there. It is the portal’s objective to guide foreign users step by step through the required administrative<br />
procedures. The entrance view of the portal is shown in figure 2.<br />
Figure 2: HELP.GV.AT portal<br />
USP.GV.AT – business service portal<br />
Electronic government for businesses means enabling them to make enquiries and file applications<br />
electronically, receive information online and to improve transactions with public authorities. In Austria, a<br />
customer centred approach is followed. Businesses should be able to apply for different services online<br />
or request documents such as criminal record certificates or income tax forms.<br />
In 2010, the USP.GV.AT (the abbreviation USP stands for 'Unternehmensserviceportal') portal, offering<br />
business services, was launched. By offering information, communications, and transaction services, the<br />
portal intends to help businesses fulfil their information obligations and to reduce their administrative<br />
burden. The Business Service Portal is an initiative of the Austrian Federal Government. The entrance<br />
view of the portal is shown in figure 3. The information provided is based on the business content<br />
originally offered under HELP.GV.AT that has been absorbed by the Business Service Portal. Generally,<br />
USP.GV.AT offers a links system, making it easy for businesses searching on a specific topic, contacting<br />
the authorities involved, and the forms needed for communication or transaction processing. One focus is<br />
offering regulatory news, thereby increasing transparency for businesses and deliver up-to-date<br />
information to businesses and enabling transactions processed fully or in the beginning at least partly<br />
(with media breaks).<br />
The Digital Austria Explorer provides all Austrian inhabitants and businesses access to over 1,000 forms<br />
and approximately 350 government procedures using one single portal. The portal developed by<br />
Microsoft Austria in co-operation with the Austrian Federal Chancellery was launched in 2010. It is a<br />
toolbar that, once downloaded and installed, provides the user with a virtual environment of the national<br />
government. Digital Austria Explorer enables easy access to the portals USP.GV.AT and HELP.GV.AT all<br />
under one flag, the Digital Austria Explorer. Generally, using this electronic platform, citizens and<br />
businesses can search for services, use electronic government applications, request certificates, and find<br />
useful information about daily services such as doctors, pharmacies, social security benefits, or public<br />
transport. After the platform has been installed, the Digital Austria Explorer can be opened using Internet<br />
Explorer and optionally the Digital Austria toolbar, which offers fast and easy access to different areas<br />
such as news, my help site, my citizen card, my region, Internet security, my Austria, and settings can be<br />
activated. In figure 4, the Digital Austria Explorer Toolbar is shown. In the section News, the user can find<br />
current information on new regulations in different areas (citizens and businesses as well) and can scroll<br />
down the menu searching for the relevant topics to them. For the other sections, such as my citizen card,<br />
there is a link system available for searching that is shown in figure 5. Because the toolbar is available in<br />
German, an English translation of the relevant terms has been added. The section 'my HELP' follows the<br />
link system of HELP.GV.AT and defines different topics regarding the life spheres of citizens, such as<br />
working, housing, education, documents, financial issues, social issues, families, the MYHELP portal,<br />
and information for businesses.<br />
426
Figure 3: USP.GV.AT portal<br />
Figure 4: Digital Austria explorer toolbar<br />
Birgit Oberer and Alptekin Erkollar<br />
My HELP is a personalised view on the Digital Austria Explorer. After filling in some relevant information<br />
about life spheres and identification using an Austrian citizen card and mobile phone, citizens can use the<br />
personalised view to get faster access to relevant information, data and forms, and finding authorities in<br />
the needed region easily. The citizen card is the key to electronic government services and to web<br />
services from businesses. The citizen card is increasingly becoming the "electronic identification for the<br />
Internet" and opportunities for using the citizen card are continuing to expand. The Austrian citizen card<br />
functionality can be activated on the e-card (the national insurance identification card), a bank card,<br />
student ID cards, or other official identity cards (Aichholzer and Strau 2010). For activating the citizen<br />
card, apart from a computer and Internet connection, you need a card reader, a chip card and the citizen<br />
card software. The a-sign citizen card installer from A-Trust makes it easy to install these components on<br />
Windows operating systems and no local software installation is needed. Using JAVA technologies, the<br />
citizen card software runs as an applet in the web browser. Foreigners can also use this service by filling<br />
in their foreign ID and selecting their home country, which is shown in figure 6. In using the 'Foreign Test<br />
ID' functionality, there are several countries available, as shown in figure 7.<br />
427
Figure 5: Digital Austria explorer link system<br />
4. Discussions<br />
Birgit Oberer and Alptekin Erkollar<br />
Austria started electronic government earlier compared to other <strong>European</strong> Union members and<br />
developed services such as Finanzonline, which is a portal where citizens can find services related to<br />
income and tax, which became show cases for solutions within the EU. One milestone for Austria was the<br />
successful go live of HELP.GV.AT, a service portal for citizens (at least in the beginning businesses as<br />
well), which is introduced in section 4. This portal has received the 'eEurope eGovernment Award' in<br />
2003. With the 'eGovernment Initiative 2003' that Austria wanted in order to make Austria one of the<br />
<strong>European</strong> Leaders in electronic government and ensure a position among the best five electronic<br />
government countries in the <strong>European</strong> Union. This initiative was started in addition to the Information and<br />
Communication Technology Board. In 2004, Austria reached fourth place within the <strong>European</strong> ranking<br />
and in 2005 placed second, claiming the title '<strong>European</strong> Champion' in 2006, defending this title in 2007<br />
and becoming a showcase country for electronic government in Austria. On the whole, Austria decided in<br />
2001 to focus on a long-run strategy, developing a flexible infrastructure that could be expanded and<br />
shows sustainability and security in the long-run (Digital Austria 2010). Basically, the Austrian electronic<br />
government strategy follows the concepts 'base components and open standards, which serve as<br />
guidelines for the implementation of electronic services and the creation of the underlying infrastructure'<br />
(Digital Austria 2010). The basic idea is that every citizen in every province has access to all electronic<br />
government services at all governmental levels focusing on secure communication, transactions, data<br />
integrity, and the appropriate handling of sensitive and confidential data. Following the main strategies of<br />
the <strong>European</strong> Union besides for cost reduction, more efficient government internal processes, improved<br />
services, and electronic government should make government activities and communication between the<br />
government and its customers, which are citizens, businesses, and the government itself, more<br />
transparent. The main focus of the information level is the downloading of forms, guides, and law<br />
information, electronic web forms in the communication area to start administrative processes and for<br />
transaction level tax declarations, public library systems, electronic procurement, or the registration of<br />
residence are the first results of the electronic government incentives in Austria (Oberer 2002, Rupp 2004<br />
and Digital Austria 2010). In the Austrian strategy, electronic government is seen as the basis for<br />
electronic democracy. E-democracy services, according to Rupp (2004) may cover all the stages of the<br />
political process from agenda setting over deliberation and decision making to the monitoring of the<br />
decisions made'. Austrian best practices in electronic democracy lie, according to Rupp (2004), in the<br />
downloading of political programmes, pages run by representatives, both of them at the information level,<br />
and moderated discussion fora and e-mail communication with representatives at the communication<br />
level. Sample services for the transaction level are voting, petition, and initiative, as in WWW.E-<br />
VOTING.AT. Electronic democracy systems require identification and authentication, which are<br />
428
Birgit Oberer and Alptekin Erkollar<br />
implemented in Austria with the citizen card and digital signature for public authorities as explained under<br />
the heading IT and infrastructure within section three. For Austria, the integration of all citizens, customer<br />
orientation, and management of data protection are of high priority. In a study conducted in 2010<br />
sponsored by the <strong>European</strong> Commission investigating electronic Government offerings in Europe as well<br />
as Iceland, Norway, and Switzerland, Austria was declared the '<strong>European</strong> Champion in eGovernment' the<br />
fourth time in a row. 'For the benchmark, 20 base services were defined; 12 for citizens and 8 for<br />
businesses. These were used to measure progress in the implementation of eGovernment in the more<br />
than 14,000 public administration websites that were analysed. The sophistication of each service is<br />
judged on a 4 or 5 level scale, starting from the net amount of information, to procedures that can be<br />
conducted completely online. In addition, they are also judged on the percentage of services that can be<br />
carried out completely online. Those services that achieved this are awarded the highest level' (Digital<br />
Austria 2010). The HELP.GV.AT site as a one stop portal as well as the application of the citizen card as<br />
a unique system of identification in Austria have mainly contributed to Austria’s success. Generally,<br />
procedures are able to be carried out electronically without media breaks (filling out applications, paying<br />
fees, government internal processing, document delivery, and notifications). Within the electronic<br />
government ranking conducted by the United Nations Department of Economic and Social Affairs in<br />
2010, published in the UN government survey 2010, the Austrian approach for operating a gender<br />
equality website is especially mentioned. The website provides information about current electronic<br />
government initiatives and promotes a programme providing parents with additional income during the<br />
first 14 months of their child's life. The website can be seen at WWW.FRAUEN.BKA.GV.AT. According to<br />
the United Nations Department of Economic and Social Affairs (2010), in addition to the USA, Canada,<br />
Denmark, the Netherlands, and about 15 other countries, Austria is one of the leaders in transactional<br />
and connected electronic government that currently has reached their third or fourth stage of online<br />
service development. 'Back office operations are integrated and electronic services to citizens are<br />
provided in a seamless manner while information is efficiently transferred between agencies and<br />
departments' (United Nations Department of Economic and Social Affairs 2010). HELP.GV.AT is a one<br />
stop shop in which procedures can be carried out without changing types of media, starting from filling<br />
out the form, paying fees, internal processing, and the final delivery of documents and notifications. The<br />
USP.GV.AT business service portal serves as a single entry point as well, and offers access to<br />
governmental services for businesses. To sum up, both portals follow the one-stop-shop idea.<br />
Historically, HELP.GV.AT was divided into two parts, one for citizens, and one for businesses. When<br />
developing detailed national strategies for electronic government for reasons of clearness and<br />
transparency Austria decided to divide this portal in two parts, offering two related but separated portals<br />
for different target groups. This means away from a one-stop-shop approach, to a one-stop-shop<br />
approach per target group. Responsible groups wanted to reach higher effectiveness and efficiency in<br />
offering separate portals, but neglected the aim of a one-stop-shop approach, having one single access<br />
point to governmental information, communication and transformation processes. The step towards to<br />
portals means a regression. Therefore, the Digital Austria Explorer was launched, which is a toolbar<br />
enabling access to USP.GV.AT and HELP.GV.AT all under one flag to make sure that target groups have<br />
(again) one single entry point. The benefit Austria communicated to justify the detouring from one portal<br />
over two separate ones, back to a toolbar combining these separate portals is, that the Digital Austria<br />
Explorer, once installed, can be used from a web browser to get easy access to governmental authorities<br />
without the need of opening some portal or different web pages, following the idea of simplification,<br />
efficiency and effectiveness demanded. With MY HELP, Austria offers personalized access for its target<br />
groups.<br />
Electronic government is of interest at all governmental levels, regional, state, as well as federal, and<br />
based on the success of modern information and communication technologies in the private sector,<br />
governments become increasingly more interested in embracing modern information and communication<br />
technologies. Electronic government is a key factor for increasing government productivity and efficiency<br />
and a driver for a customer-centric modern government with end-to-end one-stop-shop processes<br />
offered. Today, electronic government is a 'force for effective governance and citizen participation at the<br />
national and local levels. All <strong>European</strong> sub-regions excel in the e-government index and achieve high<br />
scores far above the world average'. Western and Northern Europe perform well in e-government,<br />
followed by Southern and Eastern Europe (United Nations Department of Economic and Social Affairs<br />
2010). The historically leading position of Austria is based on the first applications the country developed<br />
as one of the first member countries within the <strong>European</strong> Union, and these applications became show<br />
cases of highest relevance for all <strong>European</strong> Union member states. In 2009, the Austrian Federal<br />
Government launched a program on the reduction of the administrative burden for citizens, including a<br />
focused baseline measurement, accompanied by actions in the areas of birth, marriage, and death.<br />
429
Figure 6: MYHELP for foreigners<br />
Birgit Oberer and Alptekin Erkollar<br />
Figure 7: MYHELP for foreigners: foreign Test ID<br />
The first phase for this project ended in 2010 with the definition of about 150 measures to be taken to<br />
reduce the administrative burden, followed by the implementation of these measures, which started in in<br />
2011.Today, Austria has a leading position in doing electronic government because the country<br />
contributes to several pilot projects launched since 2010 within the <strong>European</strong> Union, offering inter alia<br />
cross border applications for electronic government: The applications include national portals from<br />
Austria (help.gv.at), Estonia (eesti.ee), Germany (mein-service-BW), Portugal (portaldocidadao.pt), the<br />
UK, one regional portal from Catalonia in Spain, and one specific service for compliance activities for<br />
working in Belgium (limosa.be)' (STORK 2010).To conclude, Austria has developed hybrid strategies on<br />
electronic government following the guidelines offered by the <strong>European</strong> Union, contributes to several<br />
leading pilot projects within the <strong>European</strong> Union to improve union-wide best practices on electronic<br />
430
Birgit Oberer and Alptekin Erkollar<br />
government. Nevertheless some inventions need to be revised because of missing linkage to the overall<br />
one-stop-shop approach.<br />
Lessons learnt from the Austria management on electronic government are that countries should develop<br />
an electronic government vision, conduct an electronic government strategy and define measures for<br />
implementing this strategy, always focusing on the one-stop-shop approach. This approach means<br />
focusing on all different target groups with one single entry point to governmental information,<br />
communication and transaction processes and not defining one-stop-shops per target group. With the<br />
Digital Austria Explorer Austria gave an example that, when focusing on single-access points per target<br />
group to be competitive in the longer run countries have to re-union these single approaches to one<br />
central one focusing on all target groups. One success factor for international competitiveness is as a<br />
country’s contribution to cross-country related electronic government projects. Within the <strong>European</strong> Union<br />
there are several cross-national pilot projects in the area of electronic government. Currently, there are<br />
two main pilots running: Pilot A covers 'secure identity across borders linked (STORK)', 'Pan <strong>European</strong><br />
public procurement online' and 'simple procedures online for cross-border services'. Pilot B runs 'e-<br />
Guidance and e-Government Services', '<strong>European</strong> Citizens' Attention Service', 'e-Government Lowering<br />
Administrative Burdens for Rural Businesses', and a '<strong>European</strong> Civil Registry Network'. The aim of the<br />
EU STORK Project is to establish a '<strong>European</strong> eID Interoperability Platform that will allow citizens to<br />
establish new e-relations across borders, just by presenting their national eID. Cross-border user<br />
authentication for such e-relations will be applied and tested by the project by means of five pilot projects<br />
that will use existing government services in EU Member States' (STORK 2010).<br />
To be successful and competitive in an international environment countries have to be active partners for<br />
cross-national electronic government projects and not simple followers facing time lacks for<br />
implementation and run of electronic government applications.<br />
References<br />
Aichholzer G. and Strau, B.S (2010) The Austrian case: multi-card concept and the relationship between citizen ID<br />
and social security cards, Identity in the Information Society, March, 2010, Springer Netherlands.<br />
Aichholzer G. and Schmutzer R (1999) E-Government - Elektronische Informationsdienste auf Bundesebene in<br />
Österreich, Institut für Technikfolgen-Abschätzung der österreichischen Akademie der Wissenschaften Wien.<br />
Al-Sebie, M. and Irani, Z. (2003) E-Government: Defining Boundaries and Lifecycle maturity, In Proceedings of the<br />
3rd <strong>European</strong> <strong>Conference</strong> on e-Government, Ireland: Trinity College of Dublin, 2003, pp 19-29.<br />
Austrian Federal Government, [online], www.verwaltungskostensenken.at<br />
Budde, P. (Ed.) (2010) World Digital Economy - E-Government, E-Health and E-Education Trends, report,Australia<br />
Burn, J. and Robins, G. (2003) Moving towards e-government: a case study of organizational change processes,<br />
Logistics Information Management, Vol. 16, No. 1, pp 25-35.<br />
Chesher, M., Kaura, R. and Linton, P. (2003) Electronic Business & Commerce, Springer, London.<br />
Claver-Cortés, E., de Juana-Espinosa, S. & Tari, J. (2006) e-Government maturity at Spanish local levels, In<br />
Proceedings of the 2006 EMCIS <strong>Conference</strong>, Alicante, Spain, 2006.<br />
Digital Austria, [online], www.digitales.oesterreich.gv.at.<br />
Ebrahim, Z. and Irani, Z. (2005) E-government adoption: architecture and barriers, Business Process Management<br />
Journal (Vol. 11, No. 5, pp 589-611.<br />
Erkollar, A. and Oberer, B. (2010) Globally branded E-Government IBIMA Publishing, Communications of the IBIMA,<br />
Vol. 2010 (2010), Article ID 267975.<br />
Federal Chancellery Austria, [online], www.austria.gv.at<br />
Georgescu, M. R. and Georgenscu, I. (2008) Do we Need a Powerful E-Government? IBIMA Publishing,<br />
Communications of the IBIMA, Vol. 5.<br />
Oberer, B. (2002) International Electronic Government Approaches, 35th Annual Hawaii International <strong>Conference</strong> on<br />
System Sciences (HICSS'02), Vol. 5, pp 127-133.<br />
Rupp, Ch. (2004) E-democracy in E-Austria, In Prosser, A. and Krimmer, R. (Eds.) (2004) 'Electronic Voting in<br />
Europe – technologies, law, politics and society, Proceedings Vol. P-47 (2004). Workshop of the ESF TED<br />
programme together with GI and OCG, June 7 -9, 2004, Bregenz, Austria. pp17-20.<br />
Simon, K.D. (2005) The value of open standards and open-source software in government environments, IBM<br />
Systems Journal, Vol. 44, No. 2, pp 227-238.<br />
STORK, secure identity across borders linked, URL: http://www.eid-stork.eu<br />
United Nations Department of Economic and Social Affairs (2010) UN Government survey 2010: Leveraging egovernment<br />
at a time of financial and economic crisis, [online],<br />
http://unpan1.un.org/intradoc/groups/public/documents/UN-DPADM/UNPAN038853.pdf<br />
United Nations Department of Economic and Social Affairs (2008) UN Government survey 2008: from eGovernment<br />
to Connected Governance, [online],<br />
http://unpan1.un.org/intradoc/groups/public/documents/UN/UNPAN028607.pdf<br />
431
Smoke and Mirrors: Can a Useful Approximation of the<br />
Cigarette tax gap be Determined?<br />
Clare Omelia<br />
Irish Revenue Commissioners, Dublin, Ireland<br />
comelia@revenue.ie<br />
Abstract: The tax revenue derived from cigarettes is a key contributor to the Irish Exchequer. Total net revenue<br />
receipts for 2009 amounted to €33.28 billion and within that, receipts of excise on cigarettes amounted to €1.159<br />
billion. The estimated return for VAT on cigarettes for 2009 is €0.325bn. Therefore, taken together, excise and VAT<br />
on cigarettes amount to a significant 4.5% of total net revenue receipts returned to the Exchequer. However,<br />
governments, health lobbies and tobacco companies universally acknowledge that the illicit trade in cigarettes is<br />
significant and growing and the consequent displacement of trade from the regulated to the unregulated market will<br />
reduce revenue, increase enforcement costs, and effectively undermine the fiscal planning process. This paper<br />
explores whether a useful approximation of the cigarette tax gap in Ireland can be arrived at. The factors affecting the<br />
cigarette tax gap are considered, and various approximation techniques are reviewed in order to choose a method<br />
that is appropriate in terms of cost and complexity. The selected method is adapted to Irish circumstances and<br />
applied for the years 2006-2009 to approximate the notional cigarette tax gap in Ireland for each of these years,<br />
highlighting that a significant cigarette tax gap exists and is growing.<br />
Keywords: Ireland, cigarette tax, illicit market, tax gap, tax gap approximation<br />
1. Introduction<br />
Government budget deficits by their nature create uncertainty, which can raise questions about fiscal<br />
policy and economic stability. In the context of Ireland’s national debt crisis, the economic recession,<br />
diminishing Exchequer returns and increasing pressure on the public purse, it is appropriate to monitor<br />
any erosion of the tax base.<br />
The “tax gap" is defined for the purposes of this paper as the difference between the tax revenue legally<br />
due to the Exchequer and the amount actually collected. It exists because revenue is lost due to error,<br />
non-payment, tax avoidance, evasion and fraud, and is sometimes described as the difference between<br />
potential and actual tax revenue. While actual tax collected by tax type can be measured with relative<br />
ease, significant challenges arise in obtaining a reasonably accurate measure of potential tax revenue.<br />
One of the reasons for the difficulty is that fraud is a significant element of revenue loss in the general tax<br />
gap. This is especially so in the case of cigarette tax. Cigarettes are lightweight, compact and highly<br />
taxed. Cigarette transport costs are relatively insignificant due to their high value-to-weight ratio and this<br />
renders them suitable for illicit trade. Despite regular increases in cigarette taxes, Ireland is currently<br />
experiencing disappointing tax returns in this area. It is of course possible that consumption has fallen in<br />
response to tax increases, anti-smoking initiatives and concerns about health. It is also possible that<br />
there has been significant product substitution (such as a switch to hand rolling tobacco), or other<br />
legitimate tax avoidance (e.g., cross border and duty free purchases). The alternative explanation is tax<br />
evasion and fraud.<br />
Deployment of mobile scanner technology is among the range of initiatives in place to improve antismuggling<br />
capability. Review of the effectiveness of this and other detection technologies is an essential<br />
element of any strategy to combat the illicit trade in cigarettes. In developing an effective response to<br />
erosion of the cigarette tax base and also to justify further investment in technology, it would be helpful to<br />
have a workable mechanism to approximate the extent of the tax loss and track changes. This paper<br />
explores whether a useful approximation of the cigarette tax gap in Ireland can be determined.<br />
The remainder of the paper is set out as follows. Section two briefly reviews the literature on tax gaps<br />
and the illicit cigarette trade. Section three examines cigarette tax in an Irish context and the factors<br />
affecting the tax gap, while section four investigates potential tax gap approximation methods. Section<br />
five describes how the measurement mechanism considered most appropriate in an Irish context is<br />
adapted and applied to approximate the Irish cigarette tax gap for each of the years from 2006 to 2009.<br />
Section six assesses the usefulness of the potential measure and concludes.<br />
432
2. Relevant literature<br />
Clare Omelia<br />
The literature indicates general agreement that the term ‘tax gap’ refers to tax revenue not collected and<br />
that the limitations of tax gap estimates are outweighed by potential benefits. Bird (2004) summarises the<br />
importance of general tax gap estimates in terms of maintaining and improving existing levels of<br />
compliance and facilitating fiscal planning. Feige (1990) contends that some method of measurement of<br />
the economic activity that takes place in the underground economy is essential to making informed policy<br />
decisions, arguing that “...while measurement alone is unlikely to provide definitive answers, it is sure<br />
folly to proceed without it.”<br />
Much work has been done both in the area of estimating the size of the hidden economy, (Feige 1982),<br />
(Frey and Weck Hannemann 1984), and of measuring tax evasion. One general approach to measuring a<br />
country’s tax gap, known as the ‘top down’ approach, uses aggregate data to estimate the size of the<br />
underground economy and multiplies this by the effective tax rate. Barthelemy (1988) and Schneider and<br />
Enste (2002) find that this macro approach has significant weaknesses and limitations.<br />
The literature does not always distinguish between cigarette tax avoidance and evasion. Saba et al<br />
(1995) found significant evidence of US citizens crossing state borders to purchase lower-priced<br />
cigarettes. In particular, they found that residents in high-tax jurisdictions, close to low-tax jurisdictions<br />
were very likely to cross the border to purchase. The factors influencing the level of cigarette smuggling<br />
include the income level in the country, the tax inclusive price of cigarettes, presence of informal<br />
distribution networks, tobacco industry participation, organised crime and corruption (Merriman et al.<br />
2000). The literature suggests a variety of estimates of the extent of cigarette smuggling. In 2000,<br />
Merriman et al summarised implied estimates of tax evasion, finding that worldwide cigarette smuggling<br />
could account for 6%-8.5% of consumption. More recently, Joossens et al. (2008) review a range of<br />
estimates and conclude that around 2007, 11.6% of the global cigarette market was illicit.<br />
Stehr (2005) compared consumption data from a telephone survey to tax-paid cigarette sales in the US,<br />
noting that reported consumption as a percentage of tax-paid sales averaged 57.1% from 1985 to 2001<br />
and indicating an issue in relation to under-reporting in such surveys. An earlier study of Mexican<br />
American smokers by Perez-Stable et al (1990) found occasional and light smokers under-reported their<br />
consumption by 20-25%, regular smokers by 8-10% and heavy smokers by 2-9%.<br />
The literature confirms that fraud and evasion are significant contributors to the tax gap. Inherent<br />
difficulties are identified in measuring tax evasion in general and cigarette tax evasion in particular. Selfreported<br />
consumption data has been shown to understate consumption levels. Despite these concerns,<br />
there appears to be widespread agreement that tax gap approximation adds value. It is increasingly<br />
recognised that such work can complement other forms of compliance and risk management, and can<br />
alert revenue authorities to emerging difficulties.<br />
3. Cigarette taxation in Ireland<br />
Excise taxes, or levies on specific commodities, have existed since the foundation of the State. While<br />
historically the primary aim of tobacco taxation was revenue generation, it is now increasingly used as a<br />
deterrent to consumption, to promote public health by reducing smoking. The tax on cigarettes in Ireland<br />
comprises three elements:<br />
A specific excise of a fixed amount per thousand cigarettes plus<br />
An ad valorem excise, levied at a fixed percentage of retail selling price (RSP) plus<br />
Value Added Tax (VAT)<br />
Customs duty in the form of Common Customs Tariff (CCT) is also chargeable on import of cigarettes<br />
from countries outside the EU.<br />
As the body of medical evidence on the negative health consequences of smoking grows, popular<br />
support for the Government health protection strategy and its objective of curbing smoking increases.<br />
Ireland is noted internationally as being to the forefront in implementing a range of tobacco control<br />
policies, which include tobacco taxation. In 2004, Ireland became the first EU country to implement a<br />
smoking ban. In 2007 and again in 2008 the Department of Health and Children raised the minimum price<br />
of cigarettes. During this period there were also notable increases in excise duty on cigarettes, which<br />
433
Clare Omelia<br />
increased in each of the five Government Budgets from 2006 to 2009. The total increase in specific duty<br />
per one thousand cigarettes in this period was 38%.<br />
Table 1: Rate of excise duty on cigarettes 2006-2009<br />
Year Specific duty per 1000<br />
cigs<br />
% var on last year Ad valorem duty as % of<br />
RSP<br />
Notes<br />
2006 133.39 18.32%<br />
2007 151.37 +13% 17.78%<br />
2008 160.57 +6% 17.92%<br />
2009 175.30 +9% 18.28% Oct 08 Budget<br />
2009 183.42 +5% 18.25% Apr 09 Budget<br />
Source: Revenue Commissioners Statistical Reports<br />
The tax inclusive retail selling price (RSP) of a standard pack of twenty Marlboro Red cigarettes in Ireland<br />
is 18% higher than that in our nearest neighbour the UK and 234% higher than the RSP in Estonia.<br />
Price € for 20 Marlboro<br />
9<br />
8<br />
7<br />
6<br />
5<br />
4<br />
3<br />
2<br />
1<br />
0<br />
EU Cigarette RSP Comparison April 2010<br />
8.55<br />
7.22<br />
2.63 2.65 2.56<br />
Country<br />
Figure 1: Cigarette price comparison within EU (source: Philip Morris International (PMI))<br />
Ireland<br />
UK<br />
Latvia<br />
Poland<br />
Estonia<br />
In Ireland, excise and VAT currently account for almost 79% of RSP of a pack of 20 cigarettes and the<br />
excise yield per 1000 cigarettes, at €260.98, is the highest in the EU. (<strong>European</strong> Commission 2010).<br />
The rational consumer response to high taxation is to minimise, avoid or evade the tax. There are a<br />
number of ways to reduce or escape cigarette tax without affecting ones level of consumption. This can<br />
be achieved legally by travelling to a low-tax jurisdiction to purchase cigarettes for personal use.<br />
Difference in price and the extent of international travel are key determinants of the extent of cross-border<br />
duty paid and duty-free cigarette purchases and it appears reasonable to assume that cigarettes<br />
purchased abroad are an element of total cigarette consumption in Ireland.<br />
Another option is to switch to a cheaper substitute product for manufactured cigarettes. In the period<br />
2006-2009, the quantity of RYO tobacco on which duty was paid more than doubled, suggesting that<br />
reduced Exchequer receipts of cigarette tax may be partly attributable to product substitution and a<br />
switch by consumers to RYO tobacco. Of course, the issue of smuggling RYO also arises as an element of the<br />
overall tobacco tax gap. However, this is outside the scope of this paper and RYO is dealt with only insofar as it is a<br />
substitute product for manufactured cigarettes.<br />
Alternatively, tax can be evaded by purchasing smuggled and counterfeit cigarettes within the<br />
underground economy. While it is clear that high taxation may reduce the demand for cigarettes, it is<br />
434
Clare Omelia<br />
equally clear that it specifically reduces the demand for highly taxed cigarettes. Thus, within the<br />
progression of normal consumer responses to taxation is introduced a displacement of demand from the<br />
regulated to the illicit market.<br />
In its submission to the Commission on Taxation in 2009, the Irish Tobacco Manufacturers Advisory<br />
Committee (ITMAC) stated that Irish people spend €2bn on cigarettes annually, approximately 20% of<br />
which are smuggled into Ireland resulting in a loss to the Exchequer of some €387m. In 2009, the (then)<br />
Irish Minister for Finance commented that, “While Revenue are not in a position to estimate the volume of<br />
smuggled cigarettes, they very tentatively estimate that about 20% of cigarettes consumed in Ireland may<br />
be untaxed. This however included substantial quantities of legitimate personal imports from other EU<br />
Member States and should be treated with caution”. (Lenihan 2009). Paul Cullen, writing in the Irish<br />
Times suggests “[Ireland is] The cigarette smuggling centre of Europe....the country is a tobacco<br />
smuggling black spot and a quarter of the cigarettes smoked here are illegal”. (Cullen 2010). The<br />
consensus view is that a significant part of the cigarette market in Ireland is illicit trade operating in the<br />
hidden economy.<br />
Figure 2: Annual RYO tobacco duty paid (source: revenue commissioners statistical reports)<br />
In period from 2006 to 2009, cigarette tax rates in Ireland increased progressively. Estimates by the<br />
Central Statistics Office indicate no decline in the ‘potential smokers’ population (aged fifteen years and<br />
over) in this period, and cigarette consumption surveys suggest no substantial change in smoking<br />
prevalence or in levels of cigarette consumption. It would therefore be expected that the number of<br />
cigarettes on which tax was paid would remain consistent and the amount of excise duty collected would<br />
increase. This was not the case. In 2009, the rate of excise duty on cigarettes increased twice and<br />
between 2008 and 2009 the duty collected on cigarettes increased by 2%. However, during this same<br />
period, the quantity of cigarettes on which duty was paid fell by 7%, indicating that a significant and<br />
persistent cigarette tax gap has emerged in Ireland. The facts are set out by the data in Table 2 and<br />
illustrated in Figure 3.<br />
Table 2: Quantity of cigarettes duty paid and amount collected 2006-2009.<br />
Year €m Duty collected % var on last year Quantity 000s Cigs duty % var on last year<br />
paid<br />
2006 1,071 5,604,884<br />
2007 1,155 +8% 5,401,702 -4%<br />
2008 1,132 -2% 4,940,567 -9%<br />
2009 1,159 +2% 4,607,146 -7%<br />
Source: Revenue Commissioners Annual Reports and Statistical Reports<br />
435
Figure 3: Fall in quantity of cigarettes duty paid<br />
4. Measurement options<br />
Clare Omelia<br />
Approximation of the cigarette tax gap requires a measurement of the illicit trade in cigarettes. Estimates<br />
of the extent of the illicit market may be based on academic articles, or compiled by market research<br />
organisations whose clients may be the tobacco industry, the EC, government agencies or health lobbies.<br />
It is common to see such estimates based on customs seizures, and not unusual for the calculation to be<br />
made by multiplying the number of cigarettes seized annually by ten, to arrive at a total estimate. Clearly,<br />
one major seizure such as that of 120 million cigarettes at Greenore Port in County Louth, in October<br />
2009, will skew such estimates. Furthermore, it is a recognised feature of illicit cigarette imports to Ireland<br />
that they are often destined for the Northern Ireland or United Kingdom markets, and are merely<br />
‘transiting’ Ireland. This approach is considered to be unsuitable for approximating of the cigarette tax<br />
gap in Ireland.<br />
An alternative is to measure total cigarette consumption and subtract legitimate consumption, the residual<br />
being the illicit market, from which the revenue loss can be derived. The challenge with this approach is<br />
the accurate measurement of total cigarette consumption.<br />
To assist in arriving at unbiased estimates of cigarette smuggling, the World Bank has developed a<br />
tobacco smuggling measurement toolkit. Five methods are identified to measure illegal circumvention of<br />
tobacco taxes and these are ranked from lower to higher, in terms of their level of technical complexity<br />
and statistical sophistication. The measurement methods are outlined below:<br />
1. Observe the producers and ask the experts for smuggling data.<br />
Experts, such as tobacco industry professionals, tobacco control advocates, academic experts,<br />
journalists, police, customs officials and, if possible, smugglers are identified and interviewed seeking<br />
estimates of changes in, rather than levels of, smuggling. The answers of different experts are weighted<br />
to arrive at a final estimate. While the objectivity of this method is clearly open to question, it can be of<br />
limited indicative use where a quick approximation is required.<br />
2. Observe smokers and ask them about their methods of obtaining cigarettes.<br />
Consumer’s cigarette packs are examined and on-street “show your cigarette pack” surveys and mail-in<br />
surveys are conducted. Social and demographic data about smokers whose packs are examined is also<br />
collected and the data is weighted so that it is representative of the population. This is recognised as a<br />
very high cost exercise requiring a high level of expertise.<br />
3. Monitor data on the import and export of cigarettes.<br />
436
Clare Omelia<br />
Data on recorded imports of cigarettes by country of origin is gathered. This is compared with the<br />
exporting countries’ recorded exports of cigarettes to arrive at an import/export discrepancy figure. Like<br />
method 1 above, this is said to be a suitable method for use when there is little data available and a quick<br />
approximation is required.<br />
4. Compare the sale of cigarettes with estimated consumption by using household surveys.<br />
Data on tax paid sales is compared with estimates of consumption that are based on household surveys<br />
for the same period. These figures used to estimate consumption of illicit cigarettes as a percent of total<br />
estimated consumption.<br />
5. Compare the sale of cigarettes with estimated consumption by using a mathematical formula and<br />
economic inference.<br />
An econometric study of the relationship between observed tax paid sales, variables associated with the<br />
demand for tobacco, and variables associated with smuggling, are used to estimate the level of<br />
smuggling. As the most technically demanding method, this is suitable only where there is adequate time<br />
and expertise is available.<br />
Methods 1,2, 3 and 5 are considered unsuitable for the purposes of this paper for the reasons as<br />
indicated. This leaves Method 4.<br />
5. Adjustment and application of method 4<br />
The six steps involved in the process are set out as follows:<br />
1. Estimate reported consumption from survey data<br />
2. Record tax paid sales from Revenue data<br />
3. Apply an uplift factor for assumed under-reporting<br />
4. Derive estimated consumption (1+3)<br />
5. Estimate the level of smuggling (4-2)<br />
6. Estimated smuggling as a percent of total estimated consumption<br />
Two further steps are added, to estimate legal tax avoidance and to factor in product substitution, given<br />
that both may feature in legitimate consumption in Ireland.<br />
Step 1 - Estimate Reported Cigarette Consumption in Ireland<br />
Household surveys are often seen as a source of independent data on cigarette consumption. However,<br />
we have seen in the literature that respondents to surveys may understate their consumption. Equally,<br />
caution is required in interpreting survey data based on different definitions of smokers, different survey<br />
methods and different sample groups. In search of reliable independent estimates of total cigarette<br />
consumption, a range of data sources was reviewed for this paper.<br />
A Eurobarometer survey was published in May 2010 based on approximately 1000 interviews per<br />
Member State, of citizens aged 15 years or over. Previous such surveys found that 98% of smokers in<br />
Ireland reported that they smoke every day. In 2005 it was found that the average number of cigarettes<br />
smoked per day was 16.7, and this reduced to 16 in 2009.<br />
Euromonitor International provides market research and business intelligence reports to industry. In a<br />
report published in July 2009, smoking prevalence, defined as the percentage of the total adult (aged 18<br />
years and over) population who report that they are daily smokers, was tracked for Ireland.<br />
In 2009, the Irish Department of Health and Children published SLAN 2007 ‘Smoking Patterns in Ireland’.<br />
A smoker was defined as someone who had smoked at least 100 cigarettes in their lifetime, and now<br />
smokes ‘every day’, or ‘some days’ and 10,364 adults aged 18 years or over were interviewed.<br />
437
Clare Omelia<br />
The Office of Tobacco Control conducted monthly tracker surveys from June 2003 to March 2008, of<br />
1000 adults each month, to collect data on smoking status and quantity consumed. A smoker was<br />
defined as someone who had smoked at least 1 cigarette in the previous 12 months. Smokers fell into<br />
four broad categories:<br />
10% of smokers are heavy smokers (21+ cigarettes per day),<br />
45% are regular smokers (11-20 Cigarettes/day),<br />
27% are light (6-10 cigarettes/day) smokers and<br />
18% are occasional (1-5 cigarettes/day) smokers.<br />
If the maximum smoked is 60 per day, this equates to an overall average of 13.7 per day and the data<br />
shows no significant fluctuation over the period.<br />
All these data sources indicate that smoking prevalence and quantity smoked have remained relatively<br />
stable in Ireland in the years 2006 to 2009. The findings of the various prevalence surveys are<br />
summarised below:<br />
Table 3: Summary of smoking prevalence surveys<br />
Year Eurobarometer:<br />
Smokers aged 15 and<br />
over<br />
Euromonitor:<br />
Smokers aged 18 and<br />
over<br />
SLAN 2007:<br />
Smokers aged 18 and<br />
over<br />
OTC:<br />
Smokers aged 18 and<br />
over<br />
2006 29% 20% Na Na<br />
2007 Na 20% 29% 24%<br />
2008 29% 20% Na Na<br />
2009 31% 19% Na Na<br />
While there are disparities in the definitions, the population base surveyed and the results, there are also<br />
some common threads. For the purposes of this paper, these have been pulled together as follows, to<br />
derive an objective basis for estimating cigarette consumption in Ireland in the period 2006 to 2009:<br />
The ‘smoking population’ is calculated as a percent of the total population aged 15 years and over,<br />
based on population estimates supplied by the Central Statistics Office for each of the years 2006-<br />
2009.<br />
A constant estimate of 29% smoking prevalence is used.<br />
A constant estimated average quantity consumed of 16 cigarettes per smoker per day by 98% of all<br />
smokers is used.<br />
This leads to an estimate of total consumption as set out in Table 4 below:<br />
Table 4: Estimate of cigarette consumption<br />
Year Population<br />
aged 15 years<br />
and over (000s)<br />
Smokers<br />
Consumption<br />
Estimate<br />
2006 3375 979 5,601,582<br />
2007 3455 1002 5,734,360<br />
2008 3510 1018 5,825,645<br />
2009 3522 1021 5,845,562<br />
Step 1a - Estimate Legal Cigarette Tax Avoidance<br />
Although legal tax avoidance is not typically a feature of the World Bank’s method four, it has been<br />
identified as a potentially relevant factor in Ireland. The 2009 Eurobarometer survey on Tobacco<br />
included data on EU citizens buying lower-priced cigarettes in another EU country during 2008 (<strong>European</strong><br />
Commission, 2009). The survey found that 20% of the Irish resident sample (both smokers and nonsmokers)<br />
who had travelled, purchased cigarettes at a lower price in another EU country. Focussing on<br />
this 20%, the quantities purchased are set out in Table 5 below.<br />
438
Clare Omelia<br />
Table 5: Declared cigarette quantities purchased abroad<br />
21 packets or more (400+ cigarettes) 7%<br />
11-20 packets (220-400 cigarettes) 6%<br />
5-10 packets (100-200 cigarettes) 5%<br />
1-5 packets (20-100 cigarettes) 2%<br />
While the Eurobarometer estimate refers to purchases in another EU country only, for the purposes of<br />
this paper, the same percentage is used in relation all travellers. Table 6 shows this data extrapolated to<br />
the entire population aged 15 years and over, combined with data from the CSO as to the number of<br />
visits abroad by Irish residents for each of the years 2006-2009. The resulting estimate of cigarettes<br />
purchased that avoid tax are added to tax paid quantities from Revenue data.<br />
Table 6: An approximation of the quantity of cigarettes purchased abroad<br />
2006 2007 2008 2009<br />
Total Population (‘000s) 4,240 4,339 4,422 4,459<br />
Number of visits abroad by Irish residents 6,848 7,713 7,877 7,047<br />
Population aged 15 years and over 3,375 3,455 3,510 3,522<br />
20 per cent purchase cigarettes abroad<br />
Aged 15 years and over, purchased cigarettes abroad 675 691 702 704<br />
Average trips abroad per person 2 2 2 2<br />
7% buy 800 75,600 77,392 78,624 78,893<br />
6% buy 320 25,920 26,534 26,957 27,049<br />
5% buy 160 10,800 11,056 11,232 11,270<br />
2% buy 60 1,620 1,658 1,685 1,691<br />
Number of cigarettes purchased abroad (‘000s) 113,940 116,641 118,498 118,90<br />
3<br />
Step 1b Estimate Product Substitution<br />
Consumers reacting to the high price of cigarettes may switch to a substitute product. Revenue data<br />
shows that in the period 2006-2009 clearances of RYO tobacco more than doubled. Table 7 shows how<br />
an estimate of 25 cigarettes per 12.5g pouch of tobacco has been applied, to derive the estimated<br />
number of RYO cigarettes consumed in each of the years 2006-2009. This is also added to tax paid<br />
quantities, to arrive at total legitimate consumption.<br />
Table 7: EstimatinG PRODUCT SUBSTITUTION by RYO tobacco<br />
2006 2007 2008 2009<br />
RYO Excise duty paid (kgs) 109,461 122,848 128,502 219,985<br />
Equivalent number 12.5g pouches 8,756,880 9,827,840 10,280,160 17,598,800<br />
Average cigarettes (000s) at 25 per pouch 218,922 245,696 257,004 439,970<br />
Step 2 Record Tax Paid Cigarette Sales from Revenue data<br />
439
Clare Omelia<br />
Information is available within Revenue as to the quantity of cigarettes on which excise duty was<br />
collected annually, as set out in Table 2 above.<br />
Step 3 Apply an Uplift Factor for Assumed Under-reporting<br />
An uplift factor is applied to allow for survey respondents understatement of their consumption levels.<br />
For the purposes of this project, an arbitrary uplift factor of 10%, thought to be conservative, has been<br />
applied each year.<br />
Steps 4-6 Estimate of the Illicit Cigarette Market<br />
Data from steps 1 and 3 is used to derive estimated total consumption. Combining this with Revenue<br />
data as to the number of cigarettes on which duty was paid, we derive the estimated illicit market<br />
percentage of total consumption as set out in Table 8 and illustrated in Figure 4 below.<br />
Table 8: Estimating illicit market percentage of total consumption<br />
2006 2007 2008 2009<br />
Total consumption 5,828,878 5,945,459 6,032,708 5,871,245<br />
Duty-paid 5,604,884 5,401,702 4,940,567 4,607,146<br />
Estimated illicit consumption 223,994 534,575 1,092,141 1,267,099<br />
Estimated illicit market percentage 4 9 17 20<br />
The emerging trend over the period from 2006 to 2009 is of a significant escalation in the proportion of<br />
cigarettes consumed that are likely to have been supplied by the illicit market.<br />
Figure 4: Estimated illicit market percentage of total consumption (source: Derived as set above)<br />
Approximating the Cigarette Tax Gap<br />
The tax loss is calculated by applying the relevant tax rates for each year to the estimated illicit cigarettes<br />
traded. It should be noted that the ad valorem rate of excise is based on the brand RSP and for the<br />
purposes of this project calculations are based on the RSP of a standard pack of 20 cigarettes of<br />
“unknown brand” in each year. This is the minimum RSP for cigarettes, as set by the Minister for Health<br />
and Children.<br />
The approximated cigarette tax gap for each of the years 2006-2009 is depicted in Figure 5:<br />
440
Clare Omelia<br />
Figure 5: Approximate cigarette tax gap €bn.(source: Derived as set out above)<br />
Given that total net tax receipts by the Irish Exchequer for 2009 were €32.28bn, the cigarette tax gap for<br />
2009 represents approximately 1.25% of Exchequer funds.<br />
6. Assessment and conclusions<br />
When demand for a popular commodity shifts from the regulated to the illicit market, the problems faced<br />
by our society are broader in their range than purely fiscal. That said, the relative simplicity of cigarette<br />
tax collection and the negative health effects of smoking, mark the commodity out as a sensible and<br />
politically acceptable target for taxation and there are obvious benefits in quantifying and monitoring any<br />
significant erosion of this tax base.<br />
Tax gap approximation is useful in indicating the existence of a tax compliance problem or warning of its<br />
emergence, suggesting the size of the problem and showing whether it is escalating or diminishing.<br />
However, any exercise based on estimates, extrapolation and data gathered from groups with vested<br />
interests has obvious limitations. A key question is whether the quality of the data output justifies the<br />
resources invested in deriving the approximation. The compilation of reliable objective cigarette<br />
consumption data is very costly, so the model used in this paper depends on previously published data.<br />
The disadvantages of using data compiled by interest groups are acknowledged, as is the established<br />
under-reporting bias in consumer surveys. Significant over- or under-estimation of any of the variables<br />
will seriously undermine the outcome of the exercise. Therefore, the findings carry a substantial ‘health<br />
warning’.<br />
Reliable consumption data is critical in this exercise and there is much scope for review and refinement of<br />
the data used here. Statistical assessment of all available data may produce a more reliable basis for<br />
estimating consumption. More detailed research into the phenomenon of under-reporting should be<br />
undertaken and the ‘uplift factor’ refined. The extent of legitimate importation of cigarettes from within the<br />
EU and from elsewhere merits further research, as does the extent of product substitution.<br />
Limitations aside, approximation and monitoring of the cigarette tax gap can focus attention on the factors<br />
that affect erosion of this tax base and can inform Revenue’s response to the issue. In the absence of<br />
another reliable measurement mechanism, such an approximation could be particularly useful in<br />
determining the effectiveness of the enforcement effort, possibly providing a trigger for changes in<br />
approach. It could be a reference in investment decisions for anti-smuggling technology such as<br />
scanning/imaging equipment, which require a large capital outlay. In considering whether to raise taxes<br />
further, it could also be a helpful reference in gauging the point of diminishing returns.<br />
Revenue’s primary goal is to ensure that all tax legally due is collected. While an approximation can<br />
never provide definitive answers, a consensus exists that it is an essential staring point in addressing the<br />
problem of tax base erosion. This paper set out to explore whether a useful approximation of the cigarette<br />
tax gap can be determined. From the methods suggested in the literature an approach suitable to Ireland<br />
441
Clare Omelia<br />
was adapted and applied for each of the years 2006-2009. The notional gap between actual and potential<br />
cigarette tax for each of these years has been approximated, clearly illustrating that a cigarette tax gap<br />
exists and is growing. With some refinement, the approach outlined in this paper has a potential<br />
application in focussing attention on the factors driving the illicit market and assisting in decision-making<br />
when responding to the erosion of this tax base.<br />
References<br />
Barthelemy P (1988) The Macroeconomic Estimates of the Hidden Economy: A Critical Analysis. Review of Income<br />
and Wealth, 34, 183-208<br />
Bird R (2004) Administrative Dimensions of Tax Reform. Asia-Pacific Tax Bulletin, 20, 134-150.<br />
Central Statistics Office. (2010) Population by Single year of Age and Sex.<br />
Central Statistics Office. Overseas Visits to and from Ireland (Thousand) by Visitor Detail and Year<br />
Comptroller and Auditor General. (2010). Central Government and Revenue. In Accounts of the Public Services<br />
2009.<br />
Cullen, P. (2010) The Cigarette Smuggling Centre of Europe. Irish Times, 20 February.<br />
Department of Health and Children. (2007). SLAN 2007, Survey of Life Attitudes and Nutrition in Ireland, Smoking<br />
Patterns in Ireland: Implications for Policy and Services. Dublin.<br />
Euromonitor International. (2009).Country Sector Briefing Cigarettes – Ireland.<br />
Euromonitor International. (2010) Illicit Trade in Tobacco Products – A World View.<br />
<strong>European</strong> Commission, Special Eurobarometer 239, Attitudes of <strong>European</strong>s towards Tobacco, January 2006.<br />
<strong>European</strong> Commission, Special Eurobarometer 272, Attitudes of <strong>European</strong>s towards Tobacco, May 2007<br />
<strong>European</strong> Commission, Special Eurobarometer 272c, Attitudes of <strong>European</strong>s towards Tobacco, May 2007<br />
<strong>European</strong> Commission, Flash Eurobarometer 253, Survey on Tobacco, Analytical Report, March 2009.<br />
<strong>European</strong> Commission, Special Eurobarometer 332, Tobacco, May 2010<br />
<strong>European</strong> Commission. Directorate General Taxation and Customs Union. Excise Duty Tables Part III Manufactured<br />
Tobacco, 7, July 2010.<br />
Feige E L (1982) A new perspective on macroeconomic phenomena: the theory and measurement of the unobserved<br />
economy in the United States: causes consequences and implications. In Walker M (ed) International Burden of<br />
Government, (pp112-136) The Fraser Institute Vancouver.<br />
Feige E L (1990) Defining and Estimating Underground and Informal Economies: The New Institutional Economics<br />
Approach. World Development 18(7), 989-1002<br />
Frey B S and Weck-Hanneman H (1984) The Hidden Economy as an unobserved variable. <strong>European</strong> Economic<br />
Review, 112, 33 -53<br />
Irish Revenue Commissioners. Revenue Annual Reports 2006-2009. Dublin.<br />
Irish Revenue Commissioners. Revenue Statistical Reports 2006-2009. Dublin.<br />
Irish Tobacco Manufacturers Advisory Committee. (2009). Submission to the Commission on Taxation.<br />
Joossens L, Ross H, Merriman D, & Raw M (2008). How eliminating the global illicit cigarette trade would increase<br />
tax revenue and save lives, Paris: The International Union against Tuberculosis and Lung Disease.<br />
Lakhdar CB (2008) Quantitative and qualitative estimates of cross-border tobacco shopping and tobacco smuggling<br />
in France. Tobacco Control 17, 12-16.<br />
Loveheim, M F (2008) How far to the border? The extent and impact of cross border casual cigarette smuggling.<br />
Stanford Institute for Economic Research Discussion Paper.<br />
Merriman D. Understand, Measure and Combat Tobacco Smuggling. In A Yurelki & J de Beyer (Eds.) World bank<br />
Economics of Tobacco Toolkit.<br />
Merriman D, Yurelki A, and Chaloupka F (2000) How big is the worldwide cigarette smuggling problem? pp365-392<br />
In Tobacco Control in Developing Countries eds P Jha and F J Chaloupka), London, Oxford University Press<br />
Office of Tobacco Control.2009) Research Programmes. Dublin.<br />
Perez- Stable EJ, Vanoss Marin B, Marin G, Brody DJ, Benowitz, NL (1990) Apparent Underreporting of Cigarette<br />
Consumption among Mexican American Smokers. American Journal of Public Health 80 (9).<br />
Saba R P, Beard T R, Ekelund R B and Ressler R (1995) The Demand for Cigarette Smuggling. Economic Inquiry<br />
33(2) 189-202<br />
Schneider F and D H Enste (2002) The Shadow Economy – An International Survey, Cambridge, England:<br />
Cambridge University Press<br />
Stehr M (2005) Cigarette Tax Avoidance and Evasion. Journal of Health Economics. 24(2), 277-297.<br />
Thursby J G and Thursby M C (2000) Interstate cigarette bootlegging: extent, revenue losses and effects of federal<br />
intervention. National Tax Journal 5(1) 59-78.<br />
442
Adopting Web 2.0 in Building Participatory eGovernment: A<br />
Perception Contour From Inside the Government<br />
Ching-Heng Pan 1 and Lichun Chiang 2<br />
1<br />
National Chung Hsing University, Taichung, Taiwan<br />
2<br />
National Cheng Kung University, Tainan, Taiwan<br />
chpan@nchu.edu.tw<br />
lcchiang@mail.ncku.edu.tw<br />
Abstract: Nowadays, the government is searching for new ideas to improve public governance so that it is not only<br />
more cost-effective in service delivery but also more responsive to the needs of multiple stakeholders including the<br />
citizens, political authorities, and administrative bodies. The Web technologies and applications have entered the<br />
phase of the conceptual umbrella of Web 2.0, which has been drawing increasing attention from public agencies. It is<br />
argued that Web 2.0 applications such as blogs, wikis, web syndication or web feeds, and a number of social<br />
networking services are useful tools for enhancing interactive collaboration and public participation. Web 2.0 can<br />
facilitate better service delivery by offering a platform where the government officials can exchange information more<br />
efficiently. Web 2.0 may as well help establish citizen-centric initiatives that reflect the core values of public services<br />
such as responsiveness, transparency, and social inclusiveness. In turn, this paper empirically examines the<br />
proposition that Web 2.0 enhances citizen participation. The literature suggests that the adoption and diffusion of<br />
technology-based initiative is subject to bureaucrat attitude. The purpose of this paper aims to explore government<br />
officials’ perception and intention to adopt Web 2.0-based citizen participation initiatives. The research model<br />
integrates the concepts of Technology Acceptance Model (TAM). A questionnaire is used to measure government<br />
officials’ intention to adopt Web 2.0 in eGovernment. Structural Equation Modeling (SEM) is used to further analyze<br />
the data and to design a theoretical model delineating the effects of perceived ease of use, perceived usefulness of<br />
e-services, attitude and trust. As the government is paying increasing attention to what Web 2.0 has to offer in public<br />
governance, this paper proposes a synthetic model in a timely manner to understand government officials’ intention as<br />
well as perceived obstacles to adopt Web 2.0 in participatory eGovernment initiatives.<br />
Keywords: technology acceptance model (TAM), Structural Equation Modeling (SEM), Web 2.0, public consultation<br />
1. Introduction<br />
In the first decade of the 21 st century, one of the most phenomenal trends in the internet world has been<br />
the growth of Web 2.0, a conceptual umbrella that describes the recent development of internet<br />
technologies and applications. The potential benefits of Web 2.0 are multifaceted. One key aspect is the<br />
remarkable networking capability that may pool people from around the globe to be “on the same page.”<br />
Private firms are seeking business opportunities by incorporate wikis, blogs, Facebook, Twitter, and other<br />
social networking services into their marketing strategy. The Web has become an indispensible platform<br />
for many firms to maintain good relationship with their customers. Governments are also aware that Web<br />
technologies can be of use to improve citizen engagement. Ever since the New Public Management era,<br />
concurrent with the take-off of internet usage, democratic governments around the globe have turned to<br />
utilizing internet technology to make the policy process more deliberative, transparent and citizen-centric.<br />
The positive experience of Web 2.0 applications that facilitate participation in the marketing context and<br />
political campaigns has drawn the attention of eGovernment reformers, who have been searching for<br />
ideas to improve public governance so it can be more responsive to the needs of diverse policy<br />
stakeholders. If Web 2.0 applications, characterized by participation, collaboration and network effects are<br />
effectively adopted to connect the government and the citizens, it will help reshape the governance<br />
structure and turn people from inert stakeholders to proactive designers and co-innovators of public<br />
policies (Tapscott & Williams 2006).<br />
This study specifically examines people’s perceptions of trust and their attitudes toward using Web 2.0 for<br />
public consultation. Social network service has been fast to gain general acceptance, suggesting that<br />
users hold positive attitudes toward it. Social network site such as Facebook, MySpace, and Twitter is a<br />
major category of Web 2.0 applications, and it would be an important venue for public consultation should<br />
the government chooses to deploy online public consultation. Besides the popularity of this Web 2.0<br />
application, the literature indicates that security and privacy are major concerns of using social network<br />
sites (Cain 2008). The perception of compromised security and privacy may result in lower user trust in<br />
participating in online communities. Meanwhile, other study shows that users were either unaware or<br />
unconcerned about their personal privacy while using social network services (Govani & Pashley 2005). If<br />
the government uses social network site as platform for public consultation, what would be the important<br />
factors that affect policy stakeholders’ intentions to use the platform?<br />
443
Ching-Heng Pan and Lichun Chiang<br />
The Technology Acceptance Model (TAM), a widely used model in management of information systems,<br />
offers an explanation of the determinants of adoption of a wide range of technology innovations (Davis<br />
1989; Davis, Bagozzi, & Warshaw 1989; Venkatesh, Morris, Davis & Davis 2003). TAM theorizes that an<br />
individual’s behavioral intention to adopt a new technology is determined by the person’s attitude toward<br />
the use of the technology, and attitude is determined by two basic beliefs: perceived ease of use and<br />
perceived usefulness. The literature also shows that trust is an important factor of purchase intention in an<br />
e-commerce context (Gefen 2002; Koufaris & Hampton-Sosa 2004). In the context of eGovernment, the<br />
lack of citizen trust brought on by the novelty and uncertainty of online transactions has inhibited the<br />
widespread acceptance for public e-services (Tan, Benbasat & Cenfetelli 2008; Susanto & Goodwin<br />
2010). Citizen trust is also deemed as a determinant of using e-voting system (Oostveen & Besselaar<br />
2005; Alvarez & Hall 2006). The underpinning rationale is that online environment is usually characterized<br />
by anonymity, uncertainty, and lack of control. These characteristics are simply stronger in a Web 2.0<br />
environment because Web 2.0 architecture diminishes centrality and control. User generated content<br />
becomes the core of a Web 2.0 service, and the service gets better as more people use it (O’Reilly 2005).<br />
The notion of relaxing control may bring about distrust in information authenticity and privacy protection. In<br />
turn, this study includes the perception of trust in the research model to explain the intention to use a Web<br />
2.0-based platform for public consultation. In sum, this study is composed of five constructs: (1) perceived<br />
ease of use, (2) perceived usefulness, (3) attitude toward Web 2.0-based public consultation platform, (4)<br />
trust, and (5) intention to use Web 2.0-based public consultation platform. Questionnaires were used to<br />
collect data and measure the five constructs. Structural Equation Modeling with LISREL 8.54 was used to<br />
analyze the research model.<br />
This paper is divided into four main parts: First, a review of the theoretical literature on Web 2.0 and the<br />
implication of citizen participation, and discussion on some of the experimental evidence in support of the<br />
theory. The second part describes the research method used in this paper, including the methodological<br />
approach, the variables used in the analysis, the sampling of cases and the questionnaire design. In the<br />
third part, data analysis and results are presented. Finally, a discussion of these results is provided along<br />
with description of some of the implications and future work to be done in this research area.<br />
2. Literature review<br />
2.1 Bureaucrat perception of Web 2.0 and participatory eGovernment<br />
The government ought to include public opinion in the political process by creating diverse participative<br />
mechanisms in order to build a responsive and legitimate “strong democracy” (Barber 1984). In the era of<br />
Web 2.0 that began in the early 2000s, the notion of e-governance has expanded to encompass<br />
e-citizenship and e-democracy that involve the general public in the policy process through e-engagement<br />
and e-participation (Misra 2008). The meaning of Web 2.0 may be diverse, but the notion is centered on<br />
the concept of “the Web as platform” on which all users including program developers and corporates<br />
interact with one another for pursuing their respective interests. Norris (2001) construed civic engagement<br />
from three aspects - political knowledge on public affairs, trust in the political system, and the impacts of<br />
participation on policy decisions. Web 2.0 applications are characterized by participation, collaboration<br />
and network effects. If the government effectively adopts the applications to connect with citizens, it will<br />
help reshape the governance structure and turn people from inert stakeholders to proactive designers and<br />
co-innovators of public policies (Tapscott & Williams 2006).<br />
Neutral information technologies can impact organizations and institutions through the hands of<br />
bureaucrats (Fountain 2001). The success of adoption depends on how organization members use it.<br />
Positive outcomes result from user acceptance and maturity of usage. For the full benefits of the<br />
interactive consultation platform to be realized, members within the supplying organizations must hold<br />
positive attitudes toward the platform. Therefore, e-participation is not an issue merely about the citizens.<br />
The attitude of the government employees who are responsible for operating the platform therefore is a<br />
crucial factor of successful adoption. Web 2.0 offers a new venue for public consultation, of which<br />
bureaucratic attitudes toward the venue is an important contingency.<br />
2.2 Attitude, trust and technology acceptance in using Web 2.0<br />
Since Davis (1989) provided the TAM as a theoretical foundation for analyzing behavioral intention, TAM<br />
has been widely used to empirically test and explain the use of information technology (Ma & Liu 2004).<br />
TAM theorizes that a person’s behavioral intention to adopt a new technology is subject to the person’s<br />
attitude toward the technology, and attitude is the function of perceived ease of use and perceived<br />
444
Ching-Heng Pan and Lichun Chiang<br />
usefulness. This model focuses on the attitudinal explanations of individual intentions to use a specific<br />
technology. TAM involves two primary predictors: perceived ease of use and perceived usefulness; the<br />
model uses the dependent variable of behavioral intention as a function of attitude toward use of a<br />
technology. In adopting new information technologies, user attitudes directly or indirectly affect their<br />
intention to use because only when a person holds a positive attitude toward the new technology would he<br />
or she have the intention to use (Davis et al. 1989).<br />
McKnight and Chervany (2001) argue that there are two categories of research on trust. One category<br />
focuses on the typology of trust construct such as attitudes, beliefs, behaviors and dispositions; the other<br />
refers to the object of trust such as someone or something. Warkentin et al. (2002) argue that trust in<br />
technology and trust in government are determinants of using electronic service offered by the<br />
government, which suggests that trust is a determinant of the intention to use. Carter and Bélanger (2005)<br />
investigate the factors of using eGovernment services among the citizens and find a positive relationship<br />
between the intention to use and level of trust in the system. It follows that trust also may be a determinant<br />
of the intention to use Web 2.0-based public consultation system.<br />
According to the TAM, the two important beliefs – perceived ease of use (PEU) and perceived usefulness<br />
(PU) – are instrumental in explaining the variance in intention (Agarwal & Prasad 1999; Kramer 1999; Li et<br />
al. 2004). Perceived Ease of use denotes the degree to which a potential adopter perceives using the<br />
referred technology to be relatively free of effort. Perceived usefulness denotes the extent to which a<br />
potential adopter views the referred technology as offering value over alternative ways of performing the<br />
same task (Davis et al. 1989; Gefen, Rose, Warkentin, & Pavlou 2005). In other words, perceived ease of<br />
use refers to the property of a technology that a user can operate without having to overcome a steep<br />
learning curve. Perceived usefulness means that a user believes in the existence of a positive relationship<br />
between use and performance (Davis 1989). The importance of perceived ease of use and perceived<br />
usefulness as determinants of user intention is indicated by their joint effects on attitude towards using the<br />
system, such as e-commerce, information technology, and voting system (Al-Gahtani & King 1999;<br />
Xenakis & Macintosh 2005).<br />
In sum, this study specifies the two determinants of a person’s behavioral intention (IN) to use Web<br />
2.0-based public consultation system: (1) perceived ease of use (PEU), denoting the belief of using the<br />
system without difficulties; (2) perceived usefulness (PU), denoting the belief that using Web 2.0-based<br />
consultation system would enhance one’s job performance. These beliefs affect user attitude and trust of<br />
the system. Specifically, attitude toward using the system (AT) express a person’s preference for the<br />
system, and trust in the system (TR) means that a person willingly accepts the consultation system.<br />
3. Research model and hypotheses<br />
It is commonly hypothesized that perceived ease of use impacts on enjoyment and perceived usefulness<br />
in the acceptance of information technology (Davis et al. 1989, 1993; Agarwal & Prasad 1999; Al-Gahtani<br />
& King 1999; Sa´nchez-Franco 2006). These postulations indicate that perceived ease of use is an<br />
antecedent to perceived usefulness. Furthermore, perceived ease of use and perceived usefulness<br />
influence attitudes toward using the system or IT adoption. The literature on the effect of attitude toward<br />
intention to adopt a technology appears to be indefinite. Yet, Sheppard, Hartwick, and Warshaw (1988) in<br />
their attitudinal research found strong support for using attitude to predict intentions. Chang and Cheung<br />
(2001) found that attitude plays a key mediating role or a partial mediator. These hypotheses are<br />
replicated in H1, H2 and H3.<br />
H1: Perceived Ease of use (PEU) will have positive influence on Perceived Usefulness (PU) in using Web<br />
2.0 for the purpose of public consultation.<br />
H2: Perceived usefulness (PU) will have positive influence on Attitudes (AT) in using Web 2.0 for the<br />
purpose of public consultation.<br />
H3: Attitudes (AT) will have positive influence on Behavioral Intention (IN) in using Web 2.0 for the purpose<br />
of public consultation.<br />
McKnight, Choudhury and Kacmar (2002) argue that people use whatever information they have, such as<br />
perceptions of a web site, to make trust inferences. The decision to engage in eGovernment transactions<br />
requires citizen trust in the government agency providing the service and citizen trust in the technology<br />
through which electronic transactions are executed (Lee & Turban 2001; McKnight et al. 2002). Therefore,<br />
445
Ching-Heng Pan and Lichun Chiang<br />
it is hypothesized that trust directly affects a person’s intention to use Web 2.0-based consultation while<br />
mediating attitude toward the intention to use, as shown in H4 and H5.<br />
H4: Attitudes (AT) will have positive influence on Trust (TR) in using Web 2.0 for the purpose of public<br />
consultation.<br />
H5: Trust (TR) will have positive influence on Behavior Intention (BI) in using Web 2.0 for the purpose of<br />
public consultation.<br />
Figure 1: Research model and hypotheses<br />
The research model and hypotheses are shown in Figure 1. The general form of the model is as follows:<br />
PU =γ1 EU<br />
IN = (ɵ1+ɵ2 β1+ ɵ3α1β1)PU<br />
where perceived usefulness (PU) is influenced by perceived ease of use (PEU). Attitude toward Web 2.0<br />
consultation (AT) reflects the influence of PU. Furthermore, trust in Web 2.0 consultation (TR) is<br />
influenced by AT. Then, γ1, β1, α1 and ɵ1, ɵ2, ɵ3 are correlation coefficients in the multiple regression<br />
analysis.<br />
4. Methodology<br />
4.1 Measures<br />
The study was conducted through a survey of a broad diversity of respondents from. The<br />
operationalization of each construct follows. Perceived Ease of use (PEU) is an indication of user belief in<br />
his/her capability of operating Web 2.0 consultation system without difficulties. PEU is measured by three<br />
question items: (1) Learning to use Web 2.0-based platform for public consultation would be easy for me;<br />
(2) I can easily adapted to the Web 2.0-based consultation system, and (3) It is comprehensible for me<br />
using Web 2.0-based platform for public consultation. Perceived usefulness (PU) is measured by three<br />
questions: (1) Using Web 2.0-based platform for public consultation is helpful to do my job; (2) Using Web<br />
2.0-based platform for public consultation may help improve my job performance; (3) Web 2.0-based<br />
public consultation is useful.<br />
Attitudes (AT) are captured in the following items: (1) Using Web 2.0-based platform for public<br />
consultation is a wise idea; (2) I will support the government to use Web 2.0-based platform for public<br />
consultation; (3) It is a good concept to use Web 2.0-based platform for public consultation.<br />
446
Ching-Heng Pan and Lichun Chiang<br />
Trust (TR) is measured by such questions as: (1) I believe that information or opinions on the public<br />
consultation website would be trustworthy; (2) I believe that most opinions offered in Web 2.0-based<br />
consultation are from people of goodwill; (3) I believe that a Web 2.0-based public consultation system is<br />
trustworthy.<br />
Intention (IN) is measured by the following items: (1) I am willing to use Web 2.0-based platform for public<br />
consultation in the future; (2) I will continue to use Web 2.0-based platform for public consultation in the<br />
future; (3) When I have access to the internet, I will use it for the purpose of public consultation as much as<br />
I possibly can. The question items of the survey were measured using a five-point Likert scale, with 1<br />
indicates strongly disagree and 5 indicates strongly agree.<br />
4.2 Samples<br />
The study adopted a non-probability sampling. The survey was administered in December 2010 to 250<br />
graduate students of the executive master in public administration (EMPA) programs in 10 different<br />
schools, of which the geographical locations are fairly dispersed in Taiwan. The majority of EMPA<br />
students are government employees, who are considered more aware of the issue of public consultation<br />
and capable of reflecting the perceptions of Web 2.0-based consultation from inside the government. Of<br />
the 250 administered questionnaires, 219 were completed and used in the analyses, including 117 males<br />
(53.40%) and 102 females (46.60%). The samples are evenly distributed among age groups, with the<br />
largest group of age 36 to 40 (25%). About 70 percent of the respondents consider themselves having<br />
about average knowledge or knowledgeable of the Internet. Table 1 shows the demographic data of the<br />
samples.<br />
Table 1: Demographic data<br />
Terms<br />
Sex<br />
Frequencies Percentage (%) N=219<br />
Male 117 53.40<br />
Female 102 46.60<br />
Total<br />
Age (Years Old)<br />
219 100<br />
25 and under 10 4.60<br />
26-30 34 15.50<br />
31-35 35 16.00<br />
36-40 55 25.10<br />
41-45 38 17.40<br />
46-50 34 15.50<br />
51-55 4 1.80<br />
Over 56 6 2.70<br />
Missing 3 1.40<br />
Total<br />
Knowledge of the Internet<br />
219 100<br />
Barely 1 0.50<br />
Some 61 27.90<br />
About average 127 58.00<br />
Knowledgeable 27 12.30<br />
Missing 3 1.40<br />
Total 219 100<br />
5. Results and findings<br />
The analytical procedures utilized a two-step approach; the first step used the analysis of the<br />
measurement model and the second step tested the structural relationships among latent constructs (Hair,<br />
Anderson, Tatham, & Black 1998). The aim of the two-step approach was to assess the reliability and<br />
validity of the measures before their use in the full model. The items for each dimension were measured<br />
through a 5-item scale from 1 (strongly disagree) to 5 (strongly agree). In discussing the threshold<br />
reliability of the measures, .60 is a recommended value for a reliable construct (Hu & Bentler 1995). As<br />
447
Ching-Heng Pan and Lichun Chiang<br />
Table 22 shows, the composite reliability values range from .81 to .89 (Cronbach’s α ≥ .60). Confirmatory<br />
Factor Analysis (CFA) was applied to assess the construct validity of the 5 scales (perceived ease of use,<br />
perceived usefulness, attitude, trust, and intention to use Web 2.0-based platform for public consultation)<br />
with LISREL. Each item was modeled as a reflective indicator of its latent construct in the CFA model.<br />
Table 2 presents the results of the CFA analysis. For the average variance extracted by a measure, a<br />
score of .5 indicates acceptability (Jöreskog & Sörbom 1989). Table 2 shows that the average variances<br />
extracted by these measures range from .60 to .75, which fall within the acceptable range.<br />
Table 2: Results of confirmatory factor analysis<br />
Variables Terms Composite Reliability AVE<br />
Perceived Ease of Use (PEU) 3 0.82 0.61<br />
Perceived Usefulness (PU) 3 0.81 0.60<br />
Attitude (AT) 3 0.81 0.61<br />
Trust (TR) 3 0.84 0.64<br />
Intention (IN) 3 0.89 0.75<br />
Note: N = 219, Cronbach’s α should exceed .60, the composite reliability values range from .81 to .89 (Hu<br />
& Bentler 1995), AVE (Average Variance Extracted) should be near .50 (Jöreskog & Sörbom 1989).<br />
As shown in Table 3, the structural model reflecting the assumed linear, causal relationships among the<br />
constructs is tested with the data collected from the validated measures (Bagozzi & Yi 1988; Bentler 1990;<br />
Hair et al. 1998; Hu & Bentler 1995). The model fit indexes are within accepted thresholds: χ 2 to degrees<br />
of freedom ratio of 1.89 (χ 2 = 164.24; df = 85), AGFI = .87, GFI = .91, CFI = .99 and RMSEA = .06. Except<br />
RMSEA that falls slightly below the recommended value, the indexes in general suggest adequate model<br />
fit.<br />
Table 3: Model fit indices for the structural model<br />
Fit indices Results Recommended value<br />
χ 2 (p-value) 160.24 (.01) P ≥ .05<br />
χ 2 /df 1.89 (df=85) P ≤ 3~5<br />
AGFI 0.87 P ≥ .80<br />
GFI 0.91 P ≥ .90<br />
CFI 0.98 P ≥ .80<br />
NFI 0.96 P ≥ .80<br />
RMSEA 0.06 P ≤ .10<br />
Note: GFI: Adjusted Goodness-of-Fit index, GFI: Goodness of Fit Index, CFI: Comparative Fit Index,<br />
NFI=Normed Fit Index, RMSEA: Root Mean Square Error of Approximation.<br />
The results of the analysis are shown in Figure 2. As shown in Figure 2, the ease of use presents a strong<br />
positive effect on perceived usefulness (t = 8.54, p ≤ .05). Thus, Hypothesis 1 is supported, agreeing with<br />
previous studies specifying perceived ease of use as antecedent of perceived usefulness. The perceived<br />
usefulness shows significant influences on attitude toward using Web 2.0 for public consultation (t = 8.12,<br />
p ≤ .05). Thus, Hypotheses 2 is also supported. Perceived usefulness shows significant mediation effects<br />
between ease of use and attitude toward using Web 2.0 for public consultation. The results of PEU and<br />
PU agree with the literature of TAM, confirming that perceived usefulness mediates perceived ease of use<br />
and is a determinant of attitude. Attitude and trust are both significant factors of intention to use Web<br />
2.0-based venue of public consultation (t = 6.79, p ≤ .05 and t = 2.96, p ≤ .05 respectively). Furthermore,<br />
attitude influences trust (t = 6.12, p ≤ .05), and trust also shows significant mediation effect of attitude on<br />
intention. Hypotheses 3, 4, and 5 are also supported. Consequently, this study found TAM suitable for<br />
explaining user intention of using Web 2.0 for public consultation. In terms of the measurement variables,<br />
the results suggest that ease of learning, operation, and use are three significantly influential factors to<br />
adopt web 2.0 for public consultation. Usefulness of web 2.0 for public consultation is helpful for<br />
completing respondents’ jobs and improving performance. Respondents agree that using web 2.0 for<br />
public consultation is a good and wise ideal. Based on the self-assessment of respondents’ knowledge of<br />
Web 2.0, they trust that Web 2.0-based public consultation will provide reliable and trustworthy<br />
information. In addition, respondents also believe that Web 2.0 is helpful for goodwill citizens to participate<br />
in online public consultation. In general, the results show that the respondents are willing to use Web 2.0<br />
technology for public consultation if the government launches such platforms in the near future.<br />
448
Figure 2: Path coefficients for the research model<br />
6. Conclusion<br />
Ching-Heng Pan and Lichun Chiang<br />
The statistical results show that the research model fits adequately. The specified variables all show<br />
significant effects on the postulated paths. The study also found that trust is not a dominant factor of the<br />
intention to use Web 2.0 for public consultation. In contrast, the basic predictors, i.e., perceived ease of<br />
use and perceived usefulness, are more salient in shaping the attitude toward using Web 2.0 for<br />
consultation. It seems to indicate that users concern more about the relationship between their use<br />
experience and efficiency, and pay relatively less attention to the trustworthiness of the innovative Web<br />
system. It is worth noting that the respondents were mostly government employees, and hold positive<br />
attitudes toward using new Web technologies for public consultation. As members from the supply side of<br />
public policies, government employees’ positive attitude toward Web 2.0 consultation platforms implies<br />
that engaging the constituents via innovative Web technologies is not some unrealistic speculation among<br />
the optimistic disciples of e-democracy. A few research limitations in this study should be noted. The<br />
model is a relatively reduced one. Other constructs such as perceived risk and service quality may also<br />
affect user confidence. The emotion constructs such as pleasure and fear, as opposed to such cognition<br />
constructs as belief and experience, might as well play a role in influencing behavioral intentions.<br />
Moreover, the theories of innovation diffusion may also have some insights to offer in understanding the<br />
adoption of Web 2.0-based public consultation. Future research can consider including these constructs.<br />
References<br />
Agarwal, R. and Prasad, J. (1999) “Are individual differences germane to the acceptance of new information<br />
technologies?”, Decision Sciences, Vol. 30, No. 2, pp.361–391.<br />
Al-Gahtani, S.S. and King, M. (1999) “Attitudes, satisfaction and usage: factors contributing to each in the acceptance<br />
of information technology”, Behaviour & Information Technology, Vol. 18, No. 4, pp.277–297.<br />
Alvarez, R.M. and Hall, T.E. (2006) “Controlling democracy: the principal-agent problems in election administration”,<br />
Policy Studies Journal, Vol. 34, No. 4, pp. 491–510.<br />
Bagozzi, R.P. and Yi, Y. (1988) “On the evaluation of structural equation models”, Journal of the Academy of<br />
Marketing Science, Vol. 16, pp.74–94.<br />
Barber, B.R. (1984) Strong Democracy: Participatory Politics for a New Age. Berkley University of California Press,<br />
Berkley, CA.<br />
Bentler, P.M. (1990) “Comparative fit indexes in structural models”, Psychological Bulletin, Vol. 107, pp.238–246.<br />
Cain, J. (2008) “Online social networking issues within academia and pharmacy education”, American Journal of<br />
Pharmaceutical Education, Vol. 72, No. 1, p. 1.<br />
Carter, L. and Bélanger, F. (2005) “The utilization of eGovernment services: citizen trust, innovation and acceptance<br />
factors”, Information Systems Journal, Vol. 5, pp. 5-25.<br />
449
Ching-Heng Pan and Lichun Chiang<br />
Chang, M.K. and Cheung, W. (2001) “Determinants of the intention to use Internet/WWW at work: A confirmatory<br />
study”, Information & Management, Vol. 39, pp. 1–14.<br />
Davis, F.D. (1989) “Perceived usefulness, perceived ease-of-use, and user acceptance of information technology”,<br />
MIS Quarterly, Vol. 13, No. 3, pp. 318–341.<br />
Davis, F.D., Bagozzi, R.P., and Warshaw, P.R. (1989) “User acceptance of computer technology: A comparison of<br />
two theoretical models”, Management Science, Vol. 35, pp. 982–1004.<br />
Davis, F.D., Bagozzi, R.P., and Warshaw, P.R. (1992) “Extrinsic and intrinsic motivation to use computers in the<br />
workplace”, Journal of Applied Social Psychology, Vol. 22, pp. 1111–1132.<br />
Fountain, J. (2001) Building the Virtual State: Information Technology and Institutional Change, Brookings<br />
Institution Press, Washington, D.C.<br />
Gefen, D. (2000) “E-Commerce: The Role of Familiarity and Trust”, Omega: The International Journal of Management<br />
Science, Vol. 28, No. 6, 725-737.<br />
Gefen, D., Rose, G.M., Warkentin, M., and Pavlou, P.A. (2005) “Cultural diversity and trust in IT adoption: a<br />
comparison of potential e-vote in the USA and South Africa”, Journal of Global Information Management, Vol. 13,<br />
No. 1, pp.54–78.<br />
Govani, T. and Pashley, H. (2005) “Student awareness of the privacy implications when using facebook”. Student<br />
Poster, Carnegie Mellon University, Pittsburgh.<br />
Hair, Jr. F., Anderson, R.E., Tatham, R.L. and Black, W.C. (1998) Multivariate Data Analysis, 5th ed., Macmillan,<br />
Basingstoke Hampshire, England.<br />
Hu, L. and Bentler, P.M. (1995) “Evaluating model fit”, in Hoyle, R.H. (ed.), pp. 76–99, Structural Equation Modeling:<br />
Concepts, Issues, and Applications, Sage, Thousand Oaks, CA.<br />
Jöreskog, K.G. and Sörbom, D. (1989) LISREL 7, SPSS Inc., Chicago.<br />
Koufaris, M. and Hampton-Sosa, W. (2004) “The Development of Initial Trust in an Online Company by New<br />
Customers”. Information and Management, Vol. 41, No. 3, pp. 377-397.<br />
Kramer, R.M. (1999) “Trust and distrust in organizations: emerging perspectives, enduring questions”, Annual<br />
Reviews Psychology, Vol. 50, pp.569–598.<br />
Lee, M. and Turban, E. (2001) “A trust model for internet shopping”, International Journal of Electronic Commerce, Vol.<br />
6, pp. 75–91.<br />
Li, X., Valacich, J.S., and Hess, T.J. (2004) “Predicting user trust in information systems: a comparison of competing<br />
trust models”, Paper read in The 37th Hawaii International <strong>Conference</strong> on System Sciences, University of Hawaii,<br />
Manoa, Hawaii, January<br />
Ma, Q. and Liu, L. (2004) “The technology acceptance model: a meta-analysis of empirical findings”, Journal of<br />
Organizational and End User Computing, Vol. 16, No. 1, pp. 59–74.<br />
McKnight, D.H. and Chervany, N.L. (2001) “Conceptualizing trust: a typology and E-commerce customer relationships<br />
model”, Paper read at The 34th Hawaii International <strong>Conference</strong> on System Sciences, Outrigger Wailea Resort,<br />
Maui, Hawaii.<br />
McKnight, D.H, Choudhury, V, and Kacmar, C 2002, ‘Developing and validating trust measures for e-commerce: an<br />
integrative typology’. Information Systems Research, Vol. 13, pp. 334–359.<br />
McKnight, H, Choudhury, V and Kacmar, C 2002, ‘Developing and validating trust measures for e-commerce: an<br />
integrative typology’. Information Systems Research, vol. 13, 334–359.<br />
Misra, D.C. (2008) “Ten guiding principles for e-civil service”, viewed 14 June 2009,<br />
http://egov-india.blogspot.com/2008/12/ten-guiding-principles-for-e-civil.html<br />
Norris, P 2001, Digital divide: Civic engagement, information poverty, and the internet worldwide, Cambridge<br />
University Press, New York.<br />
Oostveen, A.M. and Besselaar, P.V.D. (2005) “Trust, identity, and the effects of voting technologies on voting<br />
behavior”, Social Science Computer Review, Vol. 23, No. 3, pp 304–311.<br />
O’Reilly, T.E. (2005) What is web 2.0? viewed 18 December 2010,<br />
http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html<br />
Sheppard, B., Hartwick, J., and Warshaw, P. (1988) “The theory of reasoned action: A meta-analysis of past research<br />
with recommendations for modifications and future research”. Journal of Consumer Research, Vol. 15, pp<br />
325–344.<br />
Susanto, T.D. and Goodwin, R. (2010) “Factors Influencing Citizen Adoption of SMS-Based eGovernment Services”.<br />
Electronic Journal of eGovernment, Vol. 8, No. 1, pp 55–71.<br />
Tan, C.W., Benbasat, R.T., and Cenfetelli (2008) “Building Citizen Trust Towards eGovernment Services: Do High<br />
Quality Websites Matter?” paper read at the 41st Annual Hawaii International <strong>Conference</strong> on System Sciences.<br />
IEEE Computer Society <strong>Conference</strong> Publishing Services, pp 217-217.<br />
Tapscott, D. and Williams, A.D. (2006) Wikinomics: How mass collaboration changes everything, Penguin Books Ltd.,<br />
London.<br />
Venkatesh, V., Morris, M.G., Davis, G.B.. and Davis, F.D. (2003) “User acceptance of information technology: Toward<br />
a unified view”, MIS Quarterly, Vol. 27, No. 3, pp 425-478.<br />
Warkentin, M., Gefen, D., Pavlou, P.A., and Rose, G.M. (2002) “Encouraging Citizen Adoption of eGovernment by<br />
Building Trust”, Electronic Markets, Vol. 12, No. 3, pp 157-162.<br />
Xenakis, A. and Macintosh, A. (2005) “Trust analysis of the U.K. e-voting pilots”, Social Science Computer Review,<br />
Vol. 23, No. 3, pp 312–325.<br />
450
Combating Identity Fraud in the Public Domain: Information<br />
Strategies for Healthcare and Criminal Justice<br />
Marijn Plomp and Jan Grijpink<br />
Utrecht University, The Netherlands<br />
m.g.a.plomp@cs.uu.nl<br />
jan@grijpink.org<br />
Abstract: Two trends are present in both the private and public domain: increasing interorganisational co-operation<br />
and increasing digitisation. Nowadays, more and more processes within and between organisations take place<br />
electronically. These developments are visible on local, national and <strong>European</strong> scale. Research, strategy and policy<br />
often focus on the technological issues, whereas the organisational issues are complex and important as well. These<br />
issues prove to be difficult on a local scale and barely manageable on national and <strong>European</strong> scales, because the<br />
number of parties increases greatly and because of differences in culture, legislation and IT infrastructure. We<br />
introduce the theoretical framework of Chain-computerisation that explains large-scale chain co-operation as an<br />
answer to a dominant chain problem. Identity fraud proves to be the dominant chain problem in many chain cooperation<br />
situations. Therefore, our main research question is: what is a successful information strategy to combat<br />
identity fraud in the large-scale processes that constitute the public domain? Next, we demonstrate the problem of<br />
identity fraud using the example of the Dutch criminal justice chain, showing that a certain chain communication<br />
system enables to stop identity fraud using forensic biometrics. The second example is about healthcare. In the<br />
Netherlands, the government is introducing a national system of medical information exchange based on the national<br />
personal number as the sole identifier for recognition and linking. We show that people sometimes have interest in<br />
using somebody else’s number, to be treated in cases (s)he is not insured. This identity fraud can contaminate<br />
medical records on a national scale. We ponder about infrastructural elements that enable international exchange of<br />
medical information on a <strong>European</strong> scale and ask ourselves which additional safeguards will be necessary on this<br />
enormous scale. The examples are taken from our chain analysis programme that has an exploratory, empirical<br />
character. A chain analysis tests empirical findings against the theoretical framework of Chain-computerisation, to<br />
derive a suitable chain-specific information strategy. We use this novel approach which is specifically tailored to the<br />
peculiarities of large-scale situations, as opposed to the small-scale approach usually employed in these cases. The<br />
traditional authentication procedures do not take into account ‘wrong person’ identity fraud that causes fraud<br />
surreptitiously spreading from chain to chain. Therefore, in both cases, the problem of identity fraud presents a threat<br />
to the chain co-operation that has to be tackled with a large-scale approach and with person-oriented security<br />
procedures and instruments that are indeed able to prevent identity fraud from happening undetected. It is precisely<br />
this approach and this type of procedures and instruments that are explained here. This is a novel contribution to<br />
information science and to the security realm that still pivots only on traditional authentication frameworks. Taking<br />
into account that it is probable that the problem of identity fraud rises in many other domains and countries as well,<br />
we conclude that identity fraud is a major threat to the <strong>European</strong> society. Finally, we argue that an information<br />
strategy using basic, but chain-specific information systems, combined with random identity verification procedures<br />
enable combating identity fraud.<br />
Keywords: chain-computerisation, interorganisational information systems, chain co-operation, Information<br />
strategies within the public sector, Identity management<br />
1. Introduction<br />
Interorganisational co-operation is becoming increasingly important, as organisations are more and more<br />
interdependent. ICT can support the development of interorganisational relations through cost reduction<br />
and/or increasing possibilities for communication and coordination (Williams 1997). Since the internet has<br />
become mainstream, many organisations communicate with each other through this channel. This can be<br />
in the form of basic means like e-mail messaging, but nowadays also often takes place using advanced<br />
ICT applications like chain information systems. These developments are visible on local, national and<br />
<strong>European</strong> scales.<br />
Research, strategy and policy often focus only on technological issues, like standards for<br />
interorganisational information exchange. Organisational issues however, like who co-operates with<br />
whom, shares which information and why, are complex and important as well. It can therefore be argued<br />
that attention should be given to both dimensions (Plomp and Batenburg 2010). Both technological and<br />
organisational issues prove to be difficult on a local scale and barely manageable on national and<br />
<strong>European</strong> scales, because the number of parties increases greatly and because of differences in culture,<br />
legislation and IT infrastructure. For example, in the Netherlands processes in public sectors like<br />
healthcare and justice are digitised to a higher degree than in other <strong>European</strong> countries.<br />
451
Marijn Plomp and Jan Grijpink<br />
This example illustrates the difficulties and sensibilities that are encountered in the design of cross-border<br />
chain information infrastructures. Even when these large-scale communication initiatives are successfully<br />
deployed, there are many potential problems in their use that need to be taken into account. As<br />
interorganisational co-operation in the information age is becoming increasingly important, everyone<br />
working in (e-)government should be aware of its inherent risks. In this paper, we present those risks<br />
using two cases from the vital domains of criminal justice and healthcare. We argue that one of the main<br />
threats in these domains is identity fraud, and show the potential danger if this problem is not properly<br />
addressed.<br />
In this paper, we introduce the theoretical framework of Chain-computerisation that explains large-scale<br />
chain co-operation as an answer to a dominant chain problem (see §2). Identity fraud proves to be the<br />
dominant chain problem in many chain co-operation situations. Many people think that through further<br />
securing the authentication process, the risk of identity fraud can be reduced (e.g. Drogkaris,<br />
Geneiatakis, Gritzalis, Lambrinoudakis and Mitrou 2008). This basic security is necessary, but we claim<br />
that this is only sufficient for small-scale situations. Truly large-scale chain co-operation is much more<br />
complex and identity fraud proves to be hard to prevent in these situations. Therefore, our main research<br />
question is:<br />
What is a successful information strategy to combat identity fraud in the large-scale processes that<br />
constitute the public domain?<br />
In order to provide an answer to this question, the remainder of this paper is structured as follows. First,<br />
we present the theory of Chain-computerisation and the three components of its chain perspective. This<br />
provides the background against which we formulate our approach for combating identity fraud. We<br />
describe our research method and pay specific attention to the process of conducting a chain analysis<br />
and deriving an information strategy from that. Next, we present our two cases in which identity fraud<br />
plays a central role, and indicate how this phenomenon can be countered. We conclude with our main<br />
findings and suggest some topics for future research. Parts of this paper are based upon Grijpink<br />
(2010b).<br />
2. Chain-computerisation and its specific chain perspective<br />
Chain-computerisation (Grijpink 1999; 2010a) is a theoretical framework which explicitly focuses on<br />
social chains, not on logistical chains (the process of handling goods), nor on information chains (closely<br />
linked information systems). Examples of social chains are social security, criminal law enforcement or<br />
drug addicts’ healthcare: large-scale interorganisational processes that yield a social product such as<br />
income support, safety or survival.<br />
Central to the theory of Chain-computerisation is a specific chain perspective to better understand chain<br />
co-operation as large-scale processes and systems. This chain perspective consists of three<br />
components. The first component is the concept of a dominant chain problem; a problem that no party in<br />
the chain can solve on its own. The second component is the idea that a chain should be seen as a multilevel<br />
phenomenon, enabling a distinction between automation at the ‘base level’ and the ‘chain level’.<br />
The third component is the acknowledgement of irrational decision making at the collective chain level.<br />
The rationale of this chain perspective is recognising fallacies of the wrong level. They lead to invalid<br />
assumptions and unjustifiable expectations causing large-scale communication systems to fail or<br />
sometimes even backfire. We will now discuss these four central elements.<br />
2.1 The dominant chain problem as the trigger of chain communication<br />
In a social chain, thousands of organisations and professionals work together without a clear relationship<br />
of authority, in ever-changing combinations depending upon the actual case. However, co-operating with<br />
other organisations and professionals takes a great deal of effort, time and money. There must be a castiron<br />
reason for doing so. Chain partners only co-operate if they are forced to do so by a dominant chain<br />
problem. A dominant chain problem is one that none of the partners can solve on its own. It is only by<br />
effectively co-operating that chain partners can prevent the systematic failure of their own organisation<br />
and the entire chain. Because common interests are less pronounced than people usually think – and are<br />
also often unclear – the badly needed cohesion can only be provided by a pressing dominant chain<br />
problem. Only such a barely-manageable problem can create an interplay of forces which triggers largescale<br />
co-operation of so many organisations and individuals and promotes the development and<br />
maintenance of a large-scale chain communication system focused on the dominant chain problem.<br />
452
Marijn Plomp and Jan Grijpink<br />
However, in most chain co-operation situations, there is insufficient support for the large-scale exchange<br />
of information.<br />
2.2 The chain as a multi-level phenomenon<br />
The theoretical framework of Chain-computerisation sees a chain as a multi-level concept (see Figure 1).<br />
It makes a distinction between chain information systems at ‘chain level’ on the one hand, and intraorganisational<br />
information systems at the ‘base level’ of the chain, that can be linked to a chain<br />
information system, on the other hand. A chain information system automatically detects in which intraorganisational<br />
system relevant information can be found or, for instance, which organisation should be<br />
informed. This chain communication is brought about even when chain partners themselves do not know<br />
which organisations are involved in the case at hand. This distinction – for a better understanding of the<br />
problems inherent in large-scale co-operation and communication – can be applied to any large-scale<br />
phenomenon.<br />
Figure 1: Two distinct levels of analysis, with different types of information systems<br />
This analytic distinction is useful for two reasons:<br />
According to the theory of Chain-computerisation, only the critical details that are absolutely<br />
necessary for preventing the dominant chain problem should be available at the chain level.<br />
Irrational decision making takes place at the chain level, as will be explained next.<br />
2.3 Acknowledgement of irrational decision making at the collective chain level<br />
Because overall leadership or authority is absent, the chain is a difficult administrative domain in which<br />
decision making and information exchange proceed differently than within organisations. Rationality and<br />
efficiency are often hard to find at the collective chain level and, as a consequence, unpredictability and<br />
lack of control are the order of the day. A model of irrational decision making that fits well with the<br />
processes that take place at the chain level is the garbage can model of Cohen, March and Olsen (1972;<br />
March and Olsen 1976). This model states that the outcome of decision processes are a random<br />
selection of problems, solutions and decision makers. Often this concept of irrationality at the chain level<br />
is hard to grasp. The crux is that – as there is no single party in command – group processes at chain<br />
level are not rational, even if every individual professional and organisation acts rationally. Chaincomputerisation<br />
takes this lack of an overall co-ordinating and enforcing authority as its starting point.<br />
Large databases containing substantive data to be used by many independent organisations call for more<br />
authority and willingness to co-operate and pool resources than are usually present in chains. Collective<br />
decision making is chaotic and unpredictable. Therefore, chain solutions should be basic and noncomplex.<br />
A simple alert mechanism is often the maximum result that can be attained.<br />
453
2.4 Fallacies of the wrong level<br />
Marijn Plomp and Jan Grijpink<br />
In information science – as well as in management – we usually derive insights from small-scale<br />
situations such as a local information system, a small group experiment or a regional pilot. Thus, we have<br />
gained insights into the power of recording data and in management tools, such as time schedules and<br />
budgets. If we transpose such insights to large-scale situations without checking the validity of underlying<br />
assumptions at that level, we often make a ‘fallacy of the wrong level.’ This might partly explain why so<br />
many policy measures and large-scale systems unexpectedly produce poor results – or sometimes even<br />
backfire.<br />
The concept elaborated upon in the previous subsection provides a good example of such a fallacy of the<br />
wrong level. Expecting that chain decision making takes place in a rational fashion seems logical, as<br />
individual organisations behave largely rational. At the chain level however, this proves to be not the<br />
case. Another example is providing a single sign-on e-government architecture, as discussed by<br />
Drogkaris et al. (2008) for the Greek situation. Although this may seem convenient from the perspective<br />
of an individual user, it also means that once a malevolent person obtains the possibility to fraudulently<br />
sign on, (s)he has access to all e-government services. The notion that a person who provides the right<br />
credentials (e.g. username and password) does not necessarily imply that this is also the right person, is<br />
important in the respect. In small-scale situations, the focus is often only on optimizing the authentication<br />
procedure. In large-scale situations, the focus should also be on preventing malicious use of these<br />
authentication means by someone other than the authorised person.<br />
The theoretical framework of Chain-computerisation suggests several remedies against making fallacies<br />
of the wrong level, while taking into account the needs and preconditions of large-scale chain cooperation.<br />
One such remedy could be, for instance, taking a gradual approach to the development and<br />
implementation of large-scale systems. Most of all, we must stop treating large-scale communication<br />
systems as intra-organisational information systems with a somewhat larger group of users. This is a<br />
classic fallacy of the wrong level. Chain-computerisation features a chain approach providing<br />
professionals and researchers with a compass that is better suited for a working environment without a<br />
co-ordinating and enforcing authority.<br />
3. Chain-computerisation and its method of chain analysis<br />
Apart from the chain perspective, the theoretical framework of Chain-computerisation offers a specific<br />
method for chain analysis. The two examples that we present in the following two sections are case<br />
studies taken from the chain research programme at our university based upon this method. This<br />
programme has an exploratory, empirical character. A chain analysis tests empirical findings against the<br />
theoretical framework of Chain-computerisation, to derive a suitable chain-specific information strategy.<br />
By now, we have performed over 25 analyses of Dutch and international chains. For each chain analysis,<br />
desk and field research have been performed. Data collection took place from 2005 till 2010. By<br />
interviewing multiple stakeholders within a single chain, we try to obtain an accurate picture of a chain<br />
focused on the variables used in the chain analysis. Each chain analysis consists of constructing the four<br />
assessment profiles provided by the theory of Chain-computerisation: the mission, coordination,<br />
information, and co-operation profile. Completing these profiles entails, among other things, determining<br />
what the dominant chain problem is and what critical details are necessary to prevent the dominant chain<br />
problem from spoiling the result of the chain co-operation effort, assessing the required coordination<br />
forms in this specific chain and gauging the current level of chain-wide co-operation. An example of<br />
constructed assessment profiles for the chain analysis of the manic-depressive disorder chain-of-care<br />
can be found in a recent article in the Journal of Chain-computerisation (Grijpink, Visser, Dijkman and<br />
Plomp 2010, pp. 5-6). The results of this chain analysis, together with other input from the interviews,<br />
make it possible to formulate a workable information strategy. In the example mentioned above, this next<br />
step can also be seen (Grijpink et al. 2010, p. 7). In the future, more chain analyses based upon this<br />
method (Grijpink 2010a) will be published in the Journal of Chain-computerisation, thus enabling<br />
comparison of the chain analysis results of different chains and longitudinal analysis.<br />
The chain research programme at our university has resulted in a more realistic view of our<br />
interorganisational world and will in turn lead to better information strategies for large-scale information<br />
infrastructures supporting national or international public and private chain co-operation. We now turn to<br />
two cases studies to illustrate this point.<br />
454
Marijn Plomp and Jan Grijpink<br />
4. Identity fraud in the Dutch criminal justice chain<br />
Before describing the specific situation of the Dutch criminal law enforcement chain, we present a brief<br />
general introduction to the peculiarities of identity fraud. After indicating the Dutch problems and how they<br />
are dealt with, we look at some elements that come into play when we look at criminal law enforcement<br />
from a <strong>European</strong> perspective.<br />
4.1 Identity fraud: An introduction<br />
Identity fraud – using or stealing somebody else’s identity with malicious intent – is becoming a major<br />
issue in our information society. The real problem is that if an identity fraud succeeds, all clues and traces<br />
lead to the victim instead of the culprit. The culprit cannot be found afterwards and the victim<br />
subsequently has much difficulty proving his/her innocence. Identity fraud is difficult to detect while it is<br />
taking place unless special preventive tools and procedures are installed. This is usually not the case.<br />
Thus, identity fraud forms a major challenge.<br />
The chain perspective has provided a better understanding of the problem of identity fraud, revealing that<br />
its real damage will be the disruption of important large-scale communication systems. Once a person<br />
has fraudulently changed his/her identity, the new 'identity' can affect other situations along regular<br />
channels. In these situations it usually is no longer possible to see through the preceding fraudulent<br />
identity change.<br />
4.2 The situation in the Dutch criminal justice chain<br />
Because successful identity fraud cannot easily be detected and mostly goes unnoticed, only rarely can a<br />
successful fraudster be detected because (s)he is still there. One such situation where this is possible, is<br />
the prison cell. If a criminal finds someone willing to sit out his/her sentence in his/her place, we find<br />
his/her stand-in person in the cell. Alternatively, if the criminal has been successful in using the identity of<br />
someone else, we find the right person in the cell but with an identity that is not his/her own. If this identity<br />
fraud goes undetected, the criminal is untraceable after his/her release because the administrative details<br />
of the verdict – stored in the criminal registry for later use – point to someone else. This scenario could<br />
explain how a criminal sometimes succeeds in pursuing his/her career with a clean slate without links to<br />
his/her previous aliases.<br />
In 2004, more than 100,000 sets of criminal fingerprints linked to more than one administrative identity<br />
had been registered in the Dutch national forensic biometrics system HAVANK. The cleverest criminals<br />
had succeeded in using more than 50 aliases, implying that they had managed to get their criminal<br />
verdicts spread to as many criminal records of other persons (who may not be aware of this). Note that<br />
this volume of identity fraud may be even bigger because a fingerprint set linked to a single name does<br />
not guarantee that this name actually belongs to the criminal. This volume of aliases was the result of<br />
only fifteen years of automatic biometric fingerprint checking in only some criminal cases. Until October<br />
2010, the Criminal Procedure Law only allowed the use of forensic biometrics if necessary to prove<br />
someone’s involvement in the criminal case at hand. An immediate confession thus prevented biometric<br />
identity checking. For serious crimes, the Dutch Criminal Procedure Law now provides for compulsory<br />
biometrical identity checking.<br />
Apart from the HAVANK system, which is positioned at the base level of the chain, the criminal justice<br />
chain also has a chain information system, a reference index called VIP. This chain information system<br />
consists of a personal criminal number (the VIP-number) and a set of references pointing to criminal law<br />
enforcement agencies actually involved in this person’s criminal justice procedures. The VIP-number is<br />
issued to a criminal when (s)he is registered in the information system of one of the chain partners for the<br />
first time; it will never be re-issued to another person and will be used at every new contact with one of<br />
the chain partners during the rest of his/her life. By 2004 however, the VIP system had already<br />
administered more than 1.2 million VIP-numbers since the system was introduced in 1993. This amount<br />
of VIP-numbers suggested serious problems, because the Dutch population could not possibly account<br />
for so many criminals.<br />
The above two systems, HAVANK and VIP, illustrate the apparent pollution that is present in the<br />
information systems of the Dutch criminal justice chain, as a consequence of successful identity fraud. In<br />
the future, this can be prevented or at least reduced by improving identity checking of criminals (i) by the<br />
police and (ii) in prisons:<br />
455
Marijn Plomp and Jan Grijpink<br />
(i) The police perform identity checking at the beginning of the chain. They used to do this by asking for<br />
an identity document or for name and address which are then checked against the residents’ register of<br />
the relevant municipality. However, if name and address go together but belong to another person, this<br />
checking causes a wrong name mentioned in the official report as well as in the subsequent summons<br />
and criminal verdict. This way the criminal will be processed incorrectly throughout the entire chain. In the<br />
new procedure the police have to perform a biometric identity check first together with high resolution<br />
photographs, both taken simultaneously at the start of the procedure.<br />
(ii) Until recently, the detention process was only supported by an administrative information system.<br />
Nowadays, prison management can also use biometric details in order to check with every interaction<br />
whether there is a match.<br />
Still, we are left with the challenge of ensuring that older verdicts have been booked under the right<br />
name.<br />
4.3 Fading borders: The criminal justice chain at EU-level<br />
As criminals more frequently operate internationally, criminal justice will also need to operate across<br />
borders more often. Let us now see how extending this national scale to international complicates our<br />
national approach. Within the <strong>European</strong> Union, this chain co-operation takes place within the realm of<br />
intergovernmental co-operation. The difficulties that make national chain processes barely manageable<br />
hold even more for the <strong>European</strong> situation.<br />
An illustrative example of this increased complexity is the case of Michel Fourniret. This French moral<br />
delinquent was able to start with a ‘clean slate’ in Belgium and even work at a school there. Apparently,<br />
the Belgian police never questioned the French criminal registry. The Belgian education chain might have<br />
questioned the Belgian criminal registry because, in many EU member states, Fourniret’s job was<br />
considered sensitive enough to ask a job candidate for a so-called declaration of good conduct. However,<br />
consulting the Belgium criminal registry from the Belgian education chain would wrongly have produced a<br />
clean slate. To avoid this from happening in the future, criminal record information must be exchanged<br />
between two member states at the moment of a sensitive appointment of a person with another<br />
nationality. This communication will only be correct if two conditions are met:<br />
The national criminal law enforcement chain in every member state prevents identity fraud in its own<br />
criminal procedures.<br />
Each member state sends every criminal verdict to the convict’s member state of nationality while<br />
preventing identity fraud during this transfer.<br />
This implies a close co-operation among police forces within the EU, focused on the identity of their<br />
nationals in other EU-countries using the forensic biometrics procedures of the home country (i.e. the<br />
country of origin, not the country were the crime was committed). Chain-computerisation theory tells us<br />
that a physically centralised EU registry for criminal justice cannot be expected to work adequately at this<br />
enormous scale. Fortunately, at the moment, the efforts are being aimed at a bilateral exchange of<br />
criminal verdicts regarding member states’ nationals based on a central access system and the use of<br />
the national biometric identities. In line with the theory of Chain-computerisation, this will eventually lead<br />
to a distributed EU criminal registry based on biometric identities that might be able to prevent criminal<br />
cases such as Fourniret’s from happening again. At the moment, we are very far from this ideal situation,<br />
but much will already be gained if every transferred criminal verdict is accompanied by fingerprints and<br />
photographs, similar to the Dutch national solution.<br />
5. The importance of identity in Dutch medical chains<br />
We now shift our attention to another vital domain of our society where identity plays an important role:<br />
the healthcare sector. In the Netherlands, the government wants to introduce a national system of<br />
medical information exchange based on the national personal number as the sole identifier for<br />
recognition and linking. Recently, there has been much debate about the implementation of this<br />
Electronic Personal Record (Schäfer et al. 2010). With the chain perspective of Chain-computerisation in<br />
mind, it is clear that the small-scale doctor-patient relationship does not adequately represent the largescale<br />
field of forces in healthcare between more than half a billion EU-patients and the EU’s hundreds of<br />
thousands of medical service providers. A simple risk assessment might reveal, for instance, that some<br />
patients have a clear interest in using somebody else’s personal number to be treated in cases (s)he is<br />
not insured, or to hide his/her illness from other persons. This identity fraud can take many forms but<br />
456
Marijn Plomp and Jan Grijpink<br />
inevitably contaminates the medical record of the patient and of his/her victim. Identity fraud will probably<br />
surface in this large-scale healthcare chain as the dominant chain problem to be countered on national<br />
and international scales. This problem proves to be barely manageable on a regional scale and on a<br />
national scale many preventive measures are needed. We are very far from an ideal situation, but much<br />
will already be gained if any national linking of medical records would not be based on the patient’s<br />
personal number alone and – additionally – would also automatically present a clear picture of the patient<br />
on the doctor’s computer screen. In the near future, research should also establish which infrastructural<br />
elements and which additional safeguards are needed for the safe exchange of medical information on a<br />
<strong>European</strong> scale.<br />
One such infrastructural element – that is also relevant for computerisation on national level – is the<br />
consideration that not all medical chains are similar, and thus may benefit from different information<br />
infrastructures. In our chain research we have found differences between for example the diabetes<br />
control chain and the manic-depressive disorder chain-of-care (Grijpink et al. 2010). These two diseases<br />
require fundamentally different medical data in order to provide adequate treatment. Furthermore, for<br />
diabetes it is usually sufficient to share patient data regionally, whereas manic-depressive people tend to<br />
be less ‘sedentary’, so it may be wise to share their data on a larger scale. And there are more relevant<br />
variables that vary across medical chains: differences in speed required, differences in the role of the<br />
patient (active/passive) and differences in the nature of the process (e.g. monitoring an illness,<br />
discovering an illness). For instance, the aforementioned illnesses are both chronic, but it is not hard to<br />
see that the acute medical care chain has other requirements.<br />
Similar to the criminal justice example, we again see that a central – be it national or <strong>European</strong> –<br />
database for healthcare records is undesirable, as this facilitates identity fraud, makes it harder to keep<br />
all information up to date, and is more difficult from a privacy perspective.<br />
6. Conclusion and discussion<br />
Identity fraud/theft is easy and very profitable. In both cases discussed above, the dominant chain<br />
problem of identity fraud presents a threat to the relevant chain co-operation that has to be tackled with a<br />
large-scale approach and with person-oriented security procedures and instruments that are indeed able<br />
to prevent identity fraud from happening undetected. Taking into account that this problem exists in many<br />
other domains as well, we conclude that identity fraud is a major threat to our society. The main reason is<br />
that our social systems are not designed to prevent or detect identity fraud. Because committing identity<br />
fraud is not a seriously sanctioned criminal offence, the culprit can effectively evade such unpleasant<br />
consequences as long-term imprisonment. Often, the cost-benefit relationship is in his/her favour.<br />
Moreover, the interests and motivations of the target persons in a chain process vary greatly, depending<br />
on the dominant chain problem. We have seen that only preventive measures can protect against identity<br />
fraud. Our examples illustrate that the chain concept is a powerful tool in understanding how large-scale<br />
public information infrastructures can effectively tackle identity fraud, even on an enormous scale. The<br />
chain perspective and chain analysis have proven useful to uncover hidden aspects of large-scale social<br />
systems and to develop and deploy successful chain information systems geared to the dominant chain<br />
problem at hand. Therefore, we argue that basic, but chain-specific information systems, combined with<br />
random identity verification procedures enable combating identity fraud.<br />
An important contribution of this paper is that we have shown how the chain analysis method (Grijpink,<br />
2010a) is tuned towards the peculiarities of large-scale chain co-operation and the corresponding chain<br />
information infrastructures. The pressure of the dominant chain problem and irrational decision making at<br />
the collective level bring about that simply scaling up the usual authentication procedures and traditional<br />
defence measures working on the individual or organisational level is not good enough. This does not<br />
take into account identity fraud of the type of ‘wrong person’-situations that surreptitiously spread from<br />
chain to chain.<br />
Future research could focus on how identity fraud differs across various social chains. How do the<br />
severity of the consequences, the ease of detection and the available prevention methods differ? We<br />
have already seen in this paper that there are similarities but also great differences between identity fraud<br />
in the context of serving a sentence in a prison cell and receiving medical treatment at a hospital.<br />
Politicians and public managers like to simplify complicated interdependencies between and within largescale<br />
systems and produce simple measures. Our chain research has taught us that this is fruitless in the<br />
real world; we had better deal with the world as it really is. This does not exclude a simple solution, as<br />
457
Marijn Plomp and Jan Grijpink<br />
these two examples show. The example of the criminal law enforcement chain also applies to many other<br />
large systems at EU scale. If it proves to be that easy to use other people’s identity under the watchful<br />
guard of the criminal law enforcement officials, we must not delude ourselves about the future of identity<br />
fraud in less well-guarded public information infrastructures, such as employment, education or travel. If,<br />
in the future, we are not able to adequately counteract identity fraud – even, for example, in large-scale<br />
EU co-operation in the fields of identity management and healthcare – governments will ultimately lose<br />
much of their legitimacy.<br />
References<br />
Cohen, M.D., March, J.G. and Olsen, J.P. (1972) "A garbage can model of organizational choice", Administrative<br />
Science Quarterly, Vol. 17 No. 1, pp. 1-25.<br />
Drogkaris, P., Geneiatakis, D., Gritzalis, S., Lambrinoudakis, C. and Mitrou, L. (2008) "Towards an Enhanced<br />
Authentication Framework for eGovernment Services: The Greek Case", in Ferro, E., Scholl, J. and Wimmer, M.<br />
(Eds.), Proceedings of the 7th International <strong>Conference</strong> on Electronic Government, pp. 189-196.<br />
Grijpink, J.H.A.M. (1999) "Chain-computerisation for interorganisational public policy implementation: A new<br />
approach to developing non-intrusive information infrastructures", Information Infrastructure and Policy, Vol. 6<br />
No. 2, pp. 81-93.<br />
Grijpink, J.H.A.M. (2010a) "Chain Analysis for Large-scale Communication Systems: A Methodology for Information<br />
Exchange in Chains", Journal of Chain-computerisation, Vol. 1, pp. 1-32.<br />
Grijpink, J.H.A.M. (2010b) "Public information infrastructures and identity fraud", in Van der Hof, S. and Groothuis, M.<br />
(Eds.), Innovating Government: Normative, policy and technological dimensions of modern government, T.M.C.<br />
Asser Press/Springer, The Hague, The Netherlands.<br />
Grijpink, J.H.A.M., Visser, T., Dijkman, J.J. and Plomp, M.G.A. (2010) "Towards an Information Strategy for the<br />
Manic-Depressive Disorder Chain-of-care", Journal of Chain-computerisation, Vol. 1, pp. 1-11.<br />
March, J.G. and Olsen, J.P. (Eds.) (1976) Ambiguity and choice in organisations, Universitetsforlaget, Bergen,<br />
Norway.<br />
Plomp, M.G.A. and Batenburg, R.S. (2010) "Measuring chain digitisation maturity: An assessment of Dutch retail<br />
branches", Supply Chain Management: An International Journal, Vol. 15 No. 3, pp. 227-237.<br />
Schäfer, W., Kroneman, M., Boerma, W., Van den Berg, M., Westert, G., Devillé, W. and Van Ginneken, E. (2010)<br />
"The Netherlands: Health system review", Health Systems in Transition, Vol. 12 No. 1, pp. 1-229.<br />
Williams, T. (1997) "Interorganisational information systems: issues affecting interorganisational cooperation", The<br />
Journal of Strategic Information Systems, Vol. 6 No. 3, pp. 231-250.<br />
458
Approaching the eGovernment as a Strategic Driver for<br />
Improving the Ethical Model: An Empirical Analysis From<br />
Business Economics<br />
Massimo Pollifroni<br />
University of Turin, Italy<br />
pollifroni@econ.unito.it<br />
Abstract: The paper presents a research regarding the effective correlation between innovation (where the<br />
eGovernment processes are included) and ethical behaviour model. The final result applied in <strong>European</strong> Union<br />
States (approximately the final results is 0,90, as average value for the period of six years 2003-2008) shows us that<br />
is possible to approach the eGovernment as a strategic driver for improving the ethical model shared by the people in<br />
a nation, as well as in a business company or - in general terms - in a community.<br />
Keywords: business economics, eGovernment, ethics, innovation, information system<br />
1. Introduction to the research methodology<br />
The first part of the paper presents the research regarding the effective correlation between two clusters:<br />
innovation and ethical behaviour model : the empirical research studies the <strong>European</strong> Union States and<br />
covers a six years period (2003-2008). The innovation cluster includes eGovernment processes,<br />
Information Communication Technologies (ICT), Research & Development Expenditure, Education<br />
Investment, (etc.), while the second one (ethical behaviour model) contains elements such as e-<br />
Governance processes, ethical values, the observance of the law, merit rating system, social cohesion,<br />
(etc.). The research of the indicators was carried out by consulting the data sources offered by the<br />
following international bodies: <strong>European</strong> Commission, Eurostat, Transparency International, World Bank<br />
and Ethical Rating Agencies (Agenzia Europea di Investimenti Standard Ethics). The contribution of this<br />
research has had, as prerequisite, the identification in the current processes for improvement and<br />
development of models of eGovernment (Mofleh et al., 2009), where the crucial role is represented by the<br />
share of the underlying reference model value, measured by ethical parameters. In the model, the issue<br />
of governance (Power, 2010; Spirakis et al., 2010) and their criticality, has been pressing an action that<br />
often, as we have already registered, leading to inefficient results, or in some cases, insufficient demand,<br />
born spontaneously the reasoning above is whether there are other ways in addition to that legislation,<br />
the improvement of these imbalances: the alternative way (followed in this study) was designed to<br />
measure the level of innovation, cluster where the eGovernment processes are located. In a short period<br />
study the eGovernment processes represent a right way to introduce efficiency and effectiveness in the<br />
public sector management and innovation improve the ethical behaviour model; while in a long period<br />
study, it can be argued that there is an exchange on dependence between the two variables: the ethical<br />
behaviour model can improve the innovation level standard, including, therefore, also an optimization of<br />
the processes of eGovernment (Kumar et al., 2007). The first part of the paper presents the research<br />
regarding the effective correlation between two clusters: innovation and ethical behaviour model: the<br />
empirical research studies the <strong>European</strong> Union countries area and covers a six years period (2003-<br />
2008).<br />
To achieve the above mentioned goal, two baskets of indicators have been identified:<br />
The first basket (basket of innovation indexes) is the Summary Innovation Index (SII), that is an<br />
arithmetic weighted average of 33 innovation indexes (data sources: <strong>European</strong> Com-<br />
<br />
mission/Eurostat);<br />
The second basket (basket of ethical indexes) includes the following seven ethical indexes: 1) AEI<br />
Standard Ethics (data source: Agenzia Europea di Investimenti Standard Ethics); 2) Corruption<br />
Perception Index (CPI) (data source: Transparency International); 3) Control of corruption (data<br />
source: World Bank); 4)Voice and accountability(data source: World Bank); 5) Government<br />
effectiveness (data source: World Bank); 6) Political stability and absence of violence (data source:<br />
World Bank); 7) Regulatory quality (data source: World Bank) and 8) Rule of law (data source: World<br />
Bank).<br />
Each index has presented the following characteristics:<br />
Availability for the period 2003-2008;<br />
459
Massimo Pollifroni<br />
Applicability to almost all of the 27 <strong>European</strong> Union countries;<br />
Representativeness of the country;<br />
Possibility of comparison between them.<br />
1.1 Presentation of the basket of innovation indexes<br />
The basket of innovation indexes includes the Summary Innovation Index (SII), that is an arithmetic<br />
weighted average of 33 innovation indexes (data sources: <strong>European</strong> Commission/Eurostat). The indicator<br />
is composed of a basket of sub-indicators that vary over time. This composite index measures the<br />
“innovation performance” through three innovation inputs [A1) drivers of innovation, A2) creation of new<br />
knowledge, A3) innovation and entrepreneurship] and two innovation outputs [B1) applications, B2)<br />
intellectual property]: the sub-indicators considered for the purposes of this study have the characteristics<br />
specified below.<br />
A1) Drivers of innovation (7 indexes).<br />
• 0Graduates in science and engineering per 1,000 population (age group 20-29 years) - S & E<br />
graduates (% of population aged 20-29).<br />
• Population with tertiary education in the field (age 25-64) - Population with tertiary education (%<br />
of population aged 25-64).<br />
• Rate of broadband penetration (number of broadband lines per 100 inhabitants) - Broad-band<br />
penetration rate (number of broadband lines per 100 population).<br />
• Participation in a long training period (age 25-64) - Participation in life-long learning (% of<br />
population aged 25-64).<br />
• Level of education achieved at a young age (% of population aged 20-24 years who have<br />
completed university) - Youth education attainment level (% of population aged 20-24 having<br />
completed at least upper secondary education).<br />
• Internet Access or domestic - Level of Internet access of households.<br />
• Share or SMEs with a website - Level of Internet access of enterprises.<br />
A2) Creation of new knowledge (6 indexes).<br />
• Public expenditure on research and development (% of GDP) - Public R & D expenditures (% of<br />
GDP).<br />
• Private expenditure on research and development (% of GDP) - Business R & D expenditures (%<br />
of GDP).<br />
• Share of R & D in medium-high and high technology (% of expenditure in R & D in Industry) -<br />
Share of medium-high-tech and high-tech R & D (% of manufacturing R & D expenditures).<br />
• Proportion of firms that receive public funds for innovation - Share of enterprises receiving public<br />
funding for innovation.<br />
• University R & D financed by the private sector - University R & D expenditures financed by<br />
business sector.<br />
• Share of venture capital investments in High-tech venture capital (% of venture capital invested).<br />
A3) Innovation and entrepreneurship (6 indexes).<br />
• Industrial products and services, created in SMEs (% product and service).<br />
• Proportion of Early-stage venture capital (% of GDP).<br />
• SMEs innovating in cooperation (% product and service).<br />
• Expenditure on innovation - Innovation expenditures (% of turnover).<br />
• ICT expenditure (% GDP) - ICT expenditures (% of GDP).<br />
• Share of SMEs that do not change on a technical level - SMEs using non-technological change<br />
(% of SMEs).<br />
B1) Applications (7 indexes).<br />
• Employees in high-tech services (% of the workforce) - Employment in high - tech services (% of<br />
total workforce).<br />
460
Massimo Pollifroni<br />
• Employed in the production of high-or medium-high technological content (% Labour Force) –<br />
Employment in medium/ high and high - tech manufacturing (% of total work-force).<br />
• Exports of high technology products as a share of total exports.<br />
• Sales of new products (% of sales) - Sales on new market products (% of turnover).<br />
• Sales of new products for the firm, but not new to the market (% of turnover).<br />
• Value-added in high-tech manufacturing (% of manufacturing value-added).<br />
• SMEs Rate of volatility (sum of birth rate and death rate).<br />
B2) Intellectual property (7 indexes).<br />
• <strong>European</strong> habitants: this indicator brings together the number of high-tech patents validated by<br />
the <strong>European</strong> Patent Office, with the total population.<br />
• American habitants. (New) USPTO high-tech patents: this indicator is the U.S. equivalent, of the<br />
above described for Europe.<br />
• EPO patents: this indicator brings together the number of patents approved by the <strong>European</strong><br />
Patent Office (EPO) with the total population.<br />
• USPTO patents per million Americans: this indicator brings together the number of patents<br />
approved by the U.S. Patent Office (USPTO) with the total population.<br />
• New Triadic patent families per million population: this indicator brings together the number of<br />
patents of the “triad”, with the total population. A patent is the triad if and only if it was lodged with<br />
the <strong>European</strong> Patent Office (EPO), the Japanese Patent Office (JPO) and the U.S. Patent and<br />
Trademark Office (USPTO).<br />
• Number new domestic community trademarks (CTM) per million population.<br />
• Number of (new) domestic community industrial designs per million population.<br />
1.2 Presentation of the basket of ethical indexes<br />
The second basket (basket of ethical indexes) includes the following seven ethical indexes: 1) AEI<br />
Standard Ethics (data source: Agenzia Europea di Investimenti Standard Ethics); 2) Corruption<br />
Perception Index (CPI) (data source: Transparency International); 3) Control of corruption (data source:<br />
World Bank); 4)Voice and accountability(data source: World Bank); 5) Government effectiveness (data<br />
source: World Bank); 6) Political stability and absence of violence (data source: World Bank); 7)<br />
Regulatory quality (data source: World Bank) and 8) Rule of law (data source: World Bank).<br />
AEI Standard Ethics (data source: Agenzia Europea di Investimenti Standard Ethics). Evaluations in<br />
terms of ethical Rating (national or regional) have as a reference the concept of Ethics and Social<br />
Responsibility issued according to parameters set by international bodies like the UN, OECD and the<br />
<strong>European</strong> Union. The final evaluations of the EEA Ethics Standards are expressed in the form of a rating<br />
to eight levels (EEE, EEE-, EE+, EE, EE-, E+, E, E-). The rating is the result of statistical and scientific<br />
activity carried out with the intention of photographing the world of business in relation to ethical<br />
principles promoted by large international organizations.<br />
Corruption Perception Index (CPI) (data source: Transparency International). The index of perceptions of<br />
corruption in English Corruption Perception Index (CPI) is an indicator published annually since 1995 by<br />
Transparency International ordering the countries of the world on the basis of the level that the existence<br />
of corruption is perceived among public and political office.<br />
Control of corruption (data source: World Bank). The indicator provided by the World Bank measures the<br />
ability of the political, legal and judicial systems to prevent and combat corruption.<br />
Voice and accountability(data source: World Bank). This index provided by the World Bank measures the<br />
degree of civil liberties and political rights and influence of the effective population in the election of<br />
political leaders, so far, to the level of independence of the media from political pressure.<br />
Government effectiveness (data source: World Bank). The indicator published by the World Bank that<br />
measures the quality of public services, the credibility of the Government on the measures to be<br />
implemented, the quality of the bureaucracy and the independence of civil servants from political<br />
pressure.<br />
461
Massimo Pollifroni<br />
Political stability and absence of violence (data source: World Bank). The index published by the World<br />
Bank, which measures the perceptions of the likelihood that destabilize the government or be removed by<br />
unconstitutional or violent means, including domestic violence and terrorism.<br />
Regulatory quality (data source: World Bank). Indicator published by the World Bank, which measures<br />
the ability of the government to formulating and implementing policies that can enable and promote the<br />
development of the private sector.<br />
Rule of law (data source: World Bank). Indicator published by the World Bank, which captures<br />
perceptions of the extent to which agents have confidence in and abide by the rules of society, and in<br />
particular the quality of contract enforcement, property rights, the police, and the courts, as well as the<br />
likelihood of crime and violence.<br />
2. Standardization original data<br />
In order to compare these indexes, their values have been standardized, and traced back to a single<br />
scale in terms of cents: the process used is explained below.<br />
Innovation Indicators. Summary Innovation Index (SII) (data sources: <strong>European</strong> Commission/Eurostat).<br />
Summary Innovation Index standardization was obtained by multiplying by 100 the original data,<br />
according to the following proportion: Since the original: Given standardized (x) = 1:100.<br />
Ethics Indicators.<br />
AEI Standard Ethics (data source: Agenzia Europea di Investimenti Standard Ethics). Cents in the<br />
conversion of this quality indicator is obtained through the following conversion scale: EEE=100; EEE-=<br />
85.71428571; EE + =71.42857143; EE=57.14285714; EE-=42.85714286; E +=28.57142857;<br />
E=14.28571429 and E-=0.<br />
Corruption Perception Index (CPI) (data source: Transparency International). The indicator in question is<br />
represented by a scale from 0 to 10, its conversion into cents was realized through the following<br />
proportion: since the original: Given standardized (x) = 10:100. Control of corruption, Voice and<br />
accountability, Government effectiveness, Political stability and Absence of Violence, Regulatory quality<br />
and Rule of Law (data source: World Bank). The six indicators of the World Bank are expressed on a<br />
scale whose values range from -2.5 to +2.5. Cents in the conversion has been obtained through the<br />
following conversion scale: since normalized (x) = (as original + 2.5) * 20.<br />
For achieving the aim and the scope of the research, the calculation of the correlation was obtained by<br />
the following indicators:<br />
The independent variable “Innovation”: the indicator is calculated as a result of several sub-indicators<br />
and corresponds to the Summary Innovation Index;<br />
The dependent variable “Ethics”: the data used is the value that results from the average of the<br />
basket composed of the seven indicators described above;<br />
The values that derives from the process of normalization of the original data bases.<br />
In the following pages the research presents the tables “Calculation of correlation between “Innovation”<br />
(x) and “Ethics” (y), Years 2003, 2004, 2005, 2006, 2007 and 2008” (see Tables: 1, 2, 3, 4, 5 and 6):<br />
once completed these Tables the correlation index has been calculated, separately for each year, using<br />
the Pearson index model.<br />
Table 1: Correlation between “innovation” (x) and “ethics” (y) – year: 2003<br />
Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />
Austria 47 82,19 8,48 10,11 71,91 102,21 85,73<br />
Belgium 51 76,69 12,48 4,61 155,75 21,25 57,53<br />
Bulgaria 20 50,91 -18,52 -21,17 342,99 448,17 392,07<br />
Cyprus 29 67,77 -9,52 -4,31 90,63 18,58 41,03<br />
Denmark 68 89,40 29,48 17,32 869,07 299,98 510,59<br />
Estonia 35 68,60 -3,52 -3,48 12,39 12,11 12,25<br />
Finland 69 89,46 30,48 17,38 929,03 302,06 529,74<br />
France 48 74,94 9,48 2,86 89,87 8,18 27,11<br />
462
Massimo Pollifroni<br />
Germany 59 79,79 20,48 7,71 419,43 59,44 157,90<br />
Greece 26 63,80 -12,52 -8,28 156,75 68,56 103,67<br />
Ireland 50 79,89 11,48 7,81 131,79 61,00 89,66<br />
Italy 32 65,28 -6,52 -6,80 42,51 46,24 44,34<br />
Leetonia 16 61,34 -22,52 -10,74 507,15 115,35 241,86<br />
Latvia 23 63,89 -15,52 -8,19 240,87 67,08 127,11<br />
Luxemburg 50 84,65 11,48 12,57 131,79 158,00 144,30<br />
Malta 27 76,37 -11,52 4,29 132,71 18,40 -49,42<br />
Netherlands 50 84,96 11,48 12,88 131,79 165,89 147,86<br />
Poland 21 58,72 -17,52 -13,36 306,95 178,49 234,07<br />
Portugal 21 73,48 -17,52 1,40 306,95 1,96 -24,53<br />
United Kingdom 57 82,04 18,48 9,96 341,51 99,20 184,06<br />
Czech Republic 32 63,90 -6,52 -8,18 42,51 66,91 53,33<br />
Romania 16 45,91 -22,52 -26,17 507,15 684,87 589,35<br />
Slovakia 23 59,84 -15,52 -12,24 240,87 149,82 189,96<br />
Slovenia 32 68,49 -6,52 -3,59 42,51 12,89 23,41<br />
Spain 32 75,34 -6,52 3,26 42,51 10,63 -21,26<br />
Sweden 82 88,83 43,48 16,75 1890,51 280,56 728,29<br />
Hungary 24 66,60 -14,52 -5,48 210,83 30,03 79,57<br />
<strong>European</strong> Average 38,52 72,08 === === 310,69 129,18 174,06<br />
Correlation Index 0,87<br />
Table 2: Correlation between “innovation” (x) and “ethics” (y) – year: 2004<br />
Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />
Austria 46 82,79 7,63 11,09 58,22 122,99 84,62<br />
Belgium 49 78,66 10,63 6,96 113,00 48,44 73,98<br />
Bulgaria 21 51,63 -17,37 -20,07 301,72 402,80 348,62<br />
Cyprus 29 65,63 -9,37 -6,07 87,80 36,84 56,88<br />
Denmark 66 90 27,63 18,3 763,42 334,89 505,63<br />
Estonia 34 69,37 -4,37 -2,33 19,10 5,43 10,18<br />
Finland 68 89,59 29,63 17,89 877,94 320,05 530,08<br />
France 48 75,74 9,63 4,04 92,74 16,32 38,91<br />
Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />
Germany 59 80,16 20,63 8,46 425,60 71,57 174,53<br />
Greece 26 63,4 -12,37 -8,3 153,02 68,89 102,67<br />
Ireland 49 79,69 10,63 7,99 113,00 63,84 84,93<br />
Italy 33 63,53 -5,37 -8,17 28,84 66,75 43,87<br />
Leetonia 16 60,26 -22,37 -11,44 500,42 130,87 255,91<br />
Latvia 24 63,03 -14,37 -8,67 206,50 75,17 124,59<br />
Luxemburg 50 84,75 11,63 13,05 135,26 170,30 151,77<br />
Malta 27 74,2 -11,37 2,5 129,28 6,25 -28,43<br />
Netherlands 49 84,91 10,63 13,21 113,00 174,50 140,42<br />
Poland 21 56,72 -17,37 -14,98 301,72 224,40 260,20<br />
Portugal 24 72 -14,37 0,3 206,50 0,09 -4,31<br />
United Kingdom 57 82,36 18,63 10,66 347,08 113,64 198,60<br />
Czech Republic 33 62,93 -5,37 -8,77 28,84 76,91 47,09<br />
Romania 15 46,51 -23,37 -25,19 546,16 634,54 588,69<br />
Slovakia 22 60,59 -16,37 -11,11 267,98 123,43 181,87<br />
Slovenia 34 68,29 -4,37 -3,41 19,10 11,63 14,90<br />
Spain 31 74,19 -7,37 2,49 54,32 6,20 -18,35<br />
Sweden 80 88,8 41,63 17,1 1733,06 292,41 711,87<br />
463
Massimo Pollifroni<br />
Hungary 25 66,15 -13,37 -5,55 178,76 30,80 74,20<br />
<strong>European</strong> Average 38,37 71,70 === === 288,97 134,44 176,07<br />
Correlation Index 0,89<br />
Table 3: Correlation between “innovation” (x) and “ethics” (y) – year: 2005<br />
Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />
Austria 48 82,61 9,44 11,64 89,11 135,49 109,88<br />
Belgium 49 77,39 10,44 6,42 108,99 41,22 67,02<br />
Bulgaria 20 51,38 -18,56 -19,59 344,47 383,77 363,59<br />
Cyprus 30 66,17 -8,56 -4,8 73,27 23,04 41,09<br />
Denmark 65 88,88 26,44 17,91 699,07 320,77 473,54<br />
Estonia 35 69,03 -3,56 -1,94 12,67 3,76 6,91<br />
Finland 65 88,86 26,44 17,89 699,07 320,05 473,01<br />
France 48 75,69 9,44 4,72 89,11 22,28 44,56<br />
Germany 59 80,64 20,44 9,67 417,79 93,51 197,65<br />
Greece 26 62,23 -12,56 -8,74 157,75 76,39 109,77<br />
Ireland 50 80,59 11,44 9,62 130,87 92,54 110,05<br />
Italy 33 60,12 -5,56 -10,85 30,91 117,72 60,33<br />
Leetonia 17 60,6 -21,56 -10,37 464,83 107,54 223,58<br />
Latvia 24 62,89 -14,56 -8,08 211,99 65,29 117,64<br />
Luxemburg 53 83,3 14,44 12,33 208,51 152,03 178,05<br />
Malta 28 72,63 -10,56 1,66 111,51 2,76 -17,53<br />
Netherlands 49 83,69 10,44 12,72 108,99 161,80 132,80<br />
Poland 22 55,01 -16,56 -15,96 274,23 254,72 264,30<br />
Portugal 23 71,63 -15,56 0,66 242,11 0,44 -10,27<br />
United Kingdom 56 80,39 17,44 9,42 304,15 88,74 164,28<br />
Czech Republic 33 62,37 -5,56 -8,6 30,91 73,96 47,82<br />
Romania 16 46,86 -22,56 -24,11 508,95 581,29 543,92<br />
Slovakia 23 61,51 -15,56 -9,46 242,11 89,49 147,20<br />
Slovenia 34 67,37 -4,56 -3,6 20,79 12,96 16,42<br />
Spain 32 73,39 -6,56 2,42 43,03 5,86 -15,88<br />
Sweden 78 86,93 39,44 15,96 1555,51 254,72 629,46<br />
Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />
Hungary 25 63,97 -13,56 -7 183,87 49,00 94,92<br />
<strong>European</strong> Average 38,56 70,97 === === 272,77 130,78 169,41<br />
Correlation Index 0,90<br />
Table 4: Correlation between “innovation” (x) and “ethics” (y) – year: 2006<br />
Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />
Austria 48 82,84 8,85 11,76 78,32 138,30 104,08<br />
Belgium 48 77,69 8,85 6,61 78,32 43,69 58,50<br />
Bulgaria 22 51,36 -17,15 -19,72 294,12 388,88 338,20<br />
Cyprus 32 67,54 -7,15 -3,54 51,12 12,53 25,31<br />
Denmark 64 89,33 24,85 18,25 617,52 333,06 453,51<br />
Estonia 37 70,46 -2,15 -0,62 4,62 0,38 1,33<br />
Finland 67 88,84 27,85 17,76 775,62 315,42 494,62<br />
France 48 75,19 8,85 4,11 78,32 16,89 36,37<br />
Germany 59 80,79 19,85 9,71 394,02 94,28 192,74<br />
Greece 25 61,93 -14,15 -9,15 200,22 83,72 129,47<br />
Ireland 49 80,74 9,85 9,66 97,02 93,32 95,15<br />
Italy 33 62,26 -6,15 -8,82 37,82 77,79 54,24<br />
Leetonia 18 62,11 -21,15 -8,97 447,32 80,46 189,72<br />
464
Massimo Pollifroni<br />
Latvia 26 61,97 -13,15 -9,11 172,92 82,99 119,80<br />
Luxemburg 57 79,53 17,85 8,45 318,62 71,40 150,83<br />
Malta 29 73,51 -10,15 2,43 103,02 5,90 -24,66<br />
Netherlands 48 83,41 8,85 12,33 78,32 152,03 109,12<br />
Poland 23 54,38 -16,15 -16,7 260,82 278,89 269,71<br />
Portugal 25 69,85 -14,15 -1,23 200,22 1,51 17,40<br />
United Kingdom 55 82,29 15,85 11,21 251,22 125,66 177,68<br />
Czech Republic 34 63,14 -5,15 -7,94 26,52 63,04 40,89<br />
Romania 17 48,33 -22,15 -22,75 490,62 517,56 503,91<br />
Slovakia 24 61,13 -15,15 -9,95 229,52 99,00 150,74<br />
Slovenia 36 68,51 -3,15 -2,57 9,92 6,60 8,10<br />
Spain 32 70,41 -7,15 -0,67 51,12 0,45 4,79<br />
Sweden 76 87,23 36,85 16,15 1357,92 260,82 595,13<br />
Hungary 25 64,27 -14,15 -6,81 200,22 46,38 96,36<br />
<strong>European</strong> Average 39,15 71,08 === === 255,76 125,59 162,71<br />
Correlation Index 0,91<br />
Table 5: Correlation between “innovation” (x) and “ethics” (y) – year: 2007<br />
Nations x y (x – mx) (y – my) (x – mx)2 (y – my)2 (x – mx)*(y – my)<br />
Austria 48,00 83,04 9,00 11,82 81,00 139,71 106,38<br />
Belgium 47,00 77,56 8,00 6,34 64,00 40,20 50,72<br />
Bulgaria 23,00 51,53 -16,00 -19,69 256,00 387,70 315,04<br />
Cyprus 33,00 67,49 -6,00 -3,73 36,00 13,91 22,38<br />
Denmark 61,00 89,53 22,00 18,31 484,00 335,26 402,82<br />
Estonia 37,00 70,31 -2,00 -0,91 4,00 0,83 1,82<br />
Finland 64,00 87,49 25,00 16,27 625,00 264,71 406,75<br />
France 47,00 74,59 8,00 3,37 64,00 11,36 26,96<br />
Germany 59,00 80,64 20,00 9,42 400,00 88,74 188,4<br />
Greece 26,00 61,45 -13,00 -9,77 169,00 95,45 127,01<br />
Ireland 49,00 81,49 10,00 10,27 100,00 105,47 102,7<br />
Italy 33,00 60,04 -6,00 -11,18 36,00 124,99 67,08<br />
Leetonia 19,00 59,11 -20,00 -12,11 400,00 146,65 242,2<br />
Nations x y (x – mx) (y – my) (x – mx)2 (y – my)2 (x – mx)*(y – my)<br />
Latvia 27,00 62 -12,00 -9,22 144,00 85,01 110,64<br />
Luxemburg 53,00 84,13 14,00 12,91 196,00 166,67 180,74<br />
Malta 29,00 73,49 -10,00 2,27 100,00 5,15 -22,7<br />
Netherlands 48,00 84,29 9,00 13,07 81,00 170,82 117,63<br />
Poland 24,00 59 -15,00 -12,22 225,00 149,33 183,3<br />
Portugal 25,00 69,65 -14,00 -1,57 196,00 2,46 21,98<br />
United Kingdom 57,00 81,59 18,00 10,37 324,00 107,54 186,66<br />
Czech Republic 36,00 63,09 -3,00 -8,13 9,00 66,10 24,39<br />
Romania 18,00 49,21 -21,00 -22,01 441,00 484,44 462,21<br />
Slovakia 25,00 61,52 -14,00 -9,7 196,00 94,09 135,8<br />
Slovenia 35,00 68,6 -4,00 -2,62 16,00 6,86 10,48<br />
Spain 31,00 70,31 -8,00 -0,91 64,00 0,83 7,28<br />
Sweden 73,00 88,45 34,00 17,23 1156,00 296,87 585,82<br />
Hungary 26,00 63,29 -13,00 -7,93 169,00 62,88 103,09<br />
<strong>European</strong> Average 39,00 71,22 === === 223,56 127,93 154,35<br />
Correlation Index 0,91<br />
465
Massimo Pollifroni<br />
Table 6: Correlation between “innovation” (x) and “ethics” (y) – year: 2008<br />
Nations x y (x – mx) (y – my) (x – mx)2 (y – my)2 (x – mx)*(y – my)<br />
Austria 53 82,71 10,33 11,83 106,78 140,04 122,28<br />
Belgium 51 76,21 8,33 5,33 69,44 28,45 44,45<br />
Bulgaria 22 51,23 -20,67 -19,65 427,11 386,02 406,05<br />
Cyprus 47 67,03 4,33 -3,85 18,78 14,80 -16,67<br />
Denmark 57 88,57 14,33 17,69 205,44 312,99 253,58<br />
Estonia 45 69,20 2,33 -1,68 5,44 2,82 -3,92<br />
Finland 61 85,70 18,33 14,82 336,11 219,67 271,73<br />
France 50 75,07 7,33 4,19 53,78 17,58 30,75<br />
Germany 58 80,10 15,33 9,22 235,11 85,03 141,40<br />
Greece 36 60,26 -6,67 -10,62 44,44 112,75 70,79<br />
Ireland 53 81,36 10,33 10,48 106,78 109,80 108,28<br />
Italy 35 58,85 -7,67 -12,03 58,78 144,76 92,24<br />
Leetonia 24 60,60 -18,67 -10,28 348,44 105,68 191,89<br />
Latvia 29 61,13 -13,67 -9,75 186,78 95,00 133,20<br />
Luxemburg 52 81,78 9,33 10,90 87,05 118,72 101,66<br />
Malta 33 71,17 -9,67 0,29 93,51 0,08 -2,77<br />
Netherlands 48 84,33 5,33 13,45 28,41 180,90 71,69<br />
Poland 30 61,86 -12,67 -9,02 160,53 81,33 114,27<br />
Portugal 36 70,32 -6,67 -0,56 44,49 0,32 3,74<br />
United Kingdom 55 79,50 12,33 8,62 152,03 74,33 106,30<br />
Czech Republic 40 64,11 -2,67 -6,77 7,13 45,89 18,09<br />
Romania 28 50,44 -14,67 -20,44 215,21 417,91 299,90<br />
Slovakia 31 62,85 -11,67 -8,03 136,19 64,50 93,73<br />
Slovenia 45 69,30 2,33 -1,58 5,43 2,50 -3,68<br />
Spain 37 69,42 -5,67 -1,46 32,15 2,14 8,30<br />
Sweden 64 87,77 21,33 16,89 454,97 285,32 360,29<br />
Hungary 32 62,76 -10,67 -8,12 113,85 65,89 86,61<br />
<strong>European</strong> Average 42,67 70,88 === === 138,30 115,38 114,97<br />
Correlation Index 0,91<br />
3. Research results and final conclusions<br />
The aim and the scope of this research has been to investigate - by a Business Economics approach -<br />
the potential correlation between two clusters (or variables): innovation and ethical behaviours related to<br />
the life standards in a country or inside a public institution. The first cluster (innovation) includes<br />
Information Communication Technologies (ICT), Research & Development Expenditure, Education<br />
Investment, (etc.); while the second one (ethical behaviours) contains elements such as ethical values,<br />
the observance of the law, education, meritocracy, (etc.) (Barzelay, 2000).<br />
In the public sector management it is necessary to introduce the related concepts of eGovernment and egovernance<br />
(or e-democracy) to improve the ethical model by innovation (Northrop, 2002). The concept<br />
of eGovernment (or e-administration) is referred to the use of modern Information and Communication<br />
Technologies (ICT) linked to the development of electronics and the Internet in the modernization<br />
process of the Public Administration (Rahm, 1999; Hood, 1983). The different processes of eGovernment<br />
may be analyzed with reference to the various models, that the Public Institution may adopt during the<br />
modernization process of the structure (Layne et al., 2001; Reschenthaler et al., 1996). The development<br />
of the eGovernment processes (conditioning processes or causes) determines an improvement in the<br />
governance processes of the Public Institution that – using highly technological solutions – now called egovernance<br />
processes (conditioned processes or effects) (United Nations, 2008). Consequently, the egovernance<br />
is the second aspect of technological innovation applied to Public Administration processes<br />
(Kettl, 2000; Aucoin, 1990): that is to say the possibilities to improve of the democratic participation<br />
processes offered by the new technologies (Milward et al., 1996; Pollifroni, 2003). In recent years, in<br />
addition to the implementation and development of technological innovation, it has been developed a<br />
466
Massimo Pollifroni<br />
parallel process of attention to ethics, as a related discipline (Landsbergen et al., 2001); some studies<br />
have sought to show how innovation is able to influence the ethical behaviour (Osborne et al., 1992).<br />
With reference to the EU Countries Area in the following pages the paper has tried to achieve this goal:<br />
measuring the possible correlation between the indicators that consider the level of innovation<br />
(independent variable) and ethical behaviours (dependent variable).<br />
The contribution of this research has had, as prerequisite, the identification in the current process of<br />
improvement and development of governance models of the crucial role of the underlying share<br />
represented by the reference model of values, measured by ethical parameters (Freeman, 1984).<br />
Looking at the Italian model the governance of the public institutions has been the subject of several<br />
actions that have often led to inefficient and inadequate results (the same problem concerns the private<br />
business sector): the question then arises spontaneously from the reasoning outlined here and if there<br />
are other ways, in addition to legislation, for the improvement of these imbalances: the alternative way<br />
followed in the present study was aimed at measuring the level of innovation.<br />
The final part of the paper is dedicated to comment the research result that shows the several actions of<br />
eGovernment processes. According to the empirical evidence outlined above it was possible to measure<br />
a significant positive correlation (ranging between 0.87 and 0.91, for the six years 2003-2008) between<br />
the values and ethical behaviour, and implementation of variable “innovation” of a Country. The results of<br />
the research have shown that in countries where the economy is more oriented to innovative practices<br />
(such as, for example, Sweden, Finland and Denmark) it is possible to find the highest ethical standards.<br />
These results lead us to theorize new profiles of analysis applicable to the concept of innovation (Chung,<br />
2002; Carter et al., 2004), such as, e.g.:<br />
The profile of innovation financing, which should be systematic, stable and continuous (strategic view<br />
of the resource in the long term) (Kim et al., 1994),<br />
System making (synergy in knowledge management, for example, between enterprises located in the<br />
same economic sector or between subjects located both in the public sector and the private one)<br />
(Rocheleau et al., 2002; Bajjaly, 1998).<br />
So it is possible to say that implementing innovation (defined above), may represent a right way for the<br />
growth of the ethical shared model; environmental sustainability and social responsibility (McWilliams et<br />
al. 2001; Orlitzky et al., 2011) are the areas of contact between the two variables considered and the<br />
corporate durability depends on them: innovation and ethics are thus highly correlated to each other,<br />
forming at the same time, essential “driver” for the durability of the public institution also oriented to<br />
environmental sustainability and social responsibility (Grimsley et al., 2008). The research results could<br />
shows the biphasic action of eGovernment processes (Chourabi et al., 2009): these processes represent<br />
a right way to introduce efficiency and effectiveness in the public sector management (Heeks, 1999;<br />
Moon et al., 2005) and eGovernment applications can have a useful effect on the ethical shared<br />
behaviours, such as tax evasion control, observance of the law, reengineering a public merit rating<br />
system, (etc.). It is also possible to observe various roles for eGovernment in addressing the ongoing<br />
world financial and economic crisis (United Nation, 2010). The United Nation eGovernment Survey 2010 -<br />
above mentioned - explains that: “(…) the ability of eGovernment to handle speed and complexity can<br />
also underpin regulatory reform. While technology is no substitute for good policy, it may give citizens the<br />
power to question the actions of regulators and bring systemic issues to the fore. Similarly, eGovernment<br />
can add agility to public service delivery to help governments respond to an expanded set of demands<br />
even as revenues fall short (…)”.<br />
In conclusion, following a Business Economic approach, the research result (the value of the correlation<br />
detected) shows us that it is possible to state that the implementation of the component of innovation (a<br />
cluster that includes Information Communication Technologies, Research & Development Expenditure,<br />
Education Investment, etc.) is one way to improve the ethical model shared by the people in a nation, as<br />
well as in a business company or - in general terms - in a community: on the other hand, the processes of<br />
eGovernment (included inside the innovation cluster) are also a strategic tool to contrast the present<br />
crisis, as the United Nation report (mentioned above) has explained us.<br />
References<br />
Aucoin, P. (1990) Administrative reform in public management paradigms, principles, paradoxes and pendulums,<br />
Governance, Vol. 3, No.2, pp 115-37.<br />
467
Massimo Pollifroni<br />
Bajjaly, S.T. (1998) Strategic information systems planning in the public sector, American Review of Public<br />
Administration, Vol. 28, No. 1, pp 197-212.<br />
Barzelay, M. (2000) The New Public Management: Improving Research and Policy Dialogue, University of California<br />
Press, Berkeley.<br />
Carter, L. and Belanger, F. (2004) The Influence of Perceived Characteristics of Innovating on e Government<br />
Adoption, The Electronic Journal of eGovernment, Vol. 2, No.1, pp 11 20.<br />
Chourabi, H., Mellouli, S. and Bouslama, F. (2009) Modeling eGovernment business processes: New approaches to<br />
transparent and efficient performance, Information Polity Journal, Vol. 14, No. 1,2, pp 91-109.<br />
Chung, S. (2002) Building a national innovation system through regional innovation systems, Technovation, Vol. 22,<br />
No. 8, pp 485-491.<br />
Freeman, E.R. (1984) Strategic Management. A Stakeholder Approach, Pitman, Boston.<br />
Grimsley, M. and Meehan, A. (2008) Attaining Social Value from Electronic Government, The Electronic Journal of<br />
eGovernment, Vol. 6, No.1, pp 31 42.<br />
Heeks, R. (1999) Reinventing Government in the Information Age, Routledge, New York.<br />
Hood, C. (1983) The Tools of Government. Macmillan, London.<br />
Kettl, D.F. (2000) The Global Public Management Revolution: A Report on the Transformation of Governance,<br />
Brookings, Washington, D. C.<br />
Kim, P.S. and Wolff, L.W. (1994) Improving government performance: Public management reform and the National<br />
Performance Review, Public Productivity & Management Review, Vol. 18, No. 1, pp 73-87.<br />
Kumar, V., Mukerji, B. and Butt, I. (2007) Factors for Successful e Government Adoption: a Conceptual Framework,<br />
Electronic Journal of eGovernment, Vol. 5, No.1, pp. 63-76.<br />
Landsbergen, D.Jr. and Wolken, G.Jr. (2001) Realizing the promise: Government information systems and the fourth<br />
generation of information technology, Public Administration Review, Vol. 61, No. 2, pp 206-220.<br />
Layne, K. and Lee, J. (2001) Developing fully functional eGovernment: A four stage model, Government Information<br />
Quarterly, Vol. 18, No. 2, pp 122-136.<br />
McWilliams, A. and Siegel, D. (2001) Corporate Social Responsibility: A Theory of the Firm Perspective, The<br />
Academy of Management Review, Vol. 26, No. 1, pp 117-127.<br />
Milward, H.B. and Synder, L.O. (1996) Electronic government: Linking citizens to public organizations through<br />
technology, Journal of Public Administration Research and Theory, Vol. 6, No. 2, pp 261-276.<br />
Mofleh, S., Wanous, M. and Strachan, P. (2009) Understanding national eGovernment: the role of central<br />
government, Electronic Government, an International Journal, Vol. 6, No.1, pp. 1-18.<br />
Moon, M.J. and Norris, D.F. (2005) Does managerial orientation matter? The adoption of reinventing government and<br />
eGovernment at the municipal level, Information Systems Journal, Vol. 15, pp 43–60.<br />
Northrop, A. (2002) Lessons for managing information technology in the public sector, Social Science Computer<br />
Review, Vol. 20, No. 2, pp 194-205.<br />
Orlitzky, M., Siegel, D.S. and Waldman, D.A. (2011) Strategic Corporate Social Responsibility and Environmental<br />
Sustainability, Business & Society, Vol. 50, No. 1, pp 6-27.<br />
Osborne, D. and Gaebler, T. (1992) Reinventing Government: How the Entrepreneurial Spirit is Transforming the<br />
Public Sector, Penguin Books, London.<br />
Pollifroni, M. (2003) Processi e modelli di eGovernment ed e-governance applicati all’azienda pubblica, Giuffrè,<br />
Milan.<br />
Power, A. (2010) EU Legitimacy and new Forms of Citizen Engagement, The Electronic Journal of eGovernment,<br />
Vol. 8, No.1, pp 45 54.<br />
Rahm, D. (1999) The role of information technology in building public administration theory, Knowledge, Technology,<br />
and Policy, Vol. 12, No. 1, pp 74-83.<br />
Reschenthaler, G.B. and Thompson, F. (1996) The information revolution and the new public management, Public<br />
Administration Research Theory, Vol. 6, No. 1, pp 125-143.<br />
Rocheleau, B. and Wu, L. (2002) Public Versus Private Information Systems, The American Review of Public<br />
Administration, Vol. 32, No. 4, pp 379-397.<br />
Spirakis, G., Spiraki, C. and Nikolopoulos, K. (2010) The impact of electronic government on democracy: edemocracy<br />
through e-participation, Electronic Government, an International Journal, Vol. 7, No.1, pp 75-88.<br />
United Nations (2008) EGovernment Survey 2008. From EGovernment to Connected Governance, Department of<br />
Economic and Social Affairs, United Nations, New York.<br />
United Nations (2010) EGovernment Survey 2010. Leveraging eGovernment at a time of financial and economic<br />
crisis, Department of Economic and Social Affairs, United Nations, New York.<br />
468
Public Procurement and Internet-purchasing: the Defence<br />
Sector Evidence<br />
Nataša Pomazalová and Zbyšek Korecki<br />
University of Defence, Brno, Czech Republic<br />
natasa.pomazalova@unob.cz<br />
zbysek.korecki@unob.cz<br />
Abstract: The defence sector uses both centralized and decentralized platforms for the acquisition and purchase of<br />
supplies, materials and services. The decentralised platform is eCommerce where the basic evaluation criterion for<br />
public tenders is the lowest price offered. The purpose of this research is to analyse purchase price variability of<br />
selected property in the observed years. The comparison of purchase of different property arrangements differs due<br />
to the material, the purchase amount, and other exogenous and endogenous factors. We found that the purchase<br />
price variability for materials for general use was over 11%. The purchase price variability for military transport and<br />
support services was lower than 10%. The achieved annual purchase prices of material for general use in observed<br />
years 2006 – 2009 were different.<br />
Keywords: eCommerce, price variability, property arrangements, defence sector<br />
1. Introduction<br />
Public procurement by Internet-purchasing is one of the more important governmental logistics activities.<br />
These activities have impact on decision making by citizens and companies. The task to purchase goods<br />
and services of high quality, with on-time delivery, at a low purchase price, and in accordance with public<br />
procurement law is a crucial eGovernment application accomplishment. ECommerce usage is also one of<br />
the possible solutions for improvement of public comprehension of government procurement as<br />
ECommerce procurement technology supports transparency and non-discrimination for commercial<br />
users.<br />
In the governmental sector of the Czech Republic, ECommerce usage was straightforwardly suggested in<br />
the Ministry of Defence (MoD), during the transformation processes of its acquisition system (2001 to<br />
2003). Barriers in the area of public procurement were identified and analyzed. It was determined that<br />
public procurement in the defence sector was not managed well enough to achieve the principles of<br />
effectiveness, efficiency, and economy (3E). It was also recognised that it was very difficult to complete<br />
and review information on public procurement at decentralized point. Other principles of public<br />
procurement were recognised as limited or at risk (transparency, discrimination, corruption during<br />
competition, etc.). Other aspects of the problem were based on organizational structure; complexity of<br />
procurement operations, processes and management; especially control system and formal control<br />
instruments, and also administrational supervision of written guidelines.<br />
This case has been important for policy decisions in the defence sector in the Czech Republic. An<br />
eCommerce instrument for automated purchasing – the Electronic Support System of Purchasing (ESSP)<br />
-- has been implemented in the defence sector to achieve the lowest prices, best quality and best time of<br />
delivery of material goods and services in accordance with 3E principles and also for better<br />
communication with companies offering products and services. ESSP is also designed to provide for<br />
transparent purchasing of property and services purchase (in the defined scope) within anti-corruption<br />
policy framework, and abolition of discrimination barriers. Legally, when ESSP is used as a decentralised<br />
platform for e-public procurement, the total amount of financial liability shall not exceed 2mil. Czech<br />
crowns (CZK) without value added tax. This tool was recently used in the defence department condition<br />
according to governmental tasks for support of e-public procurement (Government of the Czech<br />
Republic, 2006). ESSP selects the Czech military is continuing to learn from the private sector to<br />
automate and modernize military logistics. ESSP selects offers according to automatic evaluation<br />
procedure based on defined major purchase criteria for each responsible organizational part of MoD and<br />
Armed forces of the Czech Republic (ACR). However ESSP has some limitations on the side of<br />
exogenous and endogenous factors. ESSP remains a developing area with a critical sense for<br />
innovation.<br />
2. Literature review<br />
Zott et al. (2000) regarded the year 1999 as one of explosive growth and expansion of eCommerce in<br />
Europe which continued into the year 2000 despite worldwide high volatility in tech stocks. Global<br />
469
Nataša Pomazalová and Zbyšek Korecki<br />
eCommerce is based on structural conditions, which vary from country to country and even within country<br />
(Marcus and Soh, 2002). Global eCommerce activity is strongly formed by structural conditions –<br />
physical, social, and economic and also dimensions of national culture (Nakayama, 2009). The public<br />
and governmental sector has adopted, or modified as required, purchasing tools, new business<br />
marketing paradigms and marketing methods for purchasing, supported with usage of new information<br />
and communication technologies (eCommerce, e-marketplace, business to business, business to<br />
customer etc.) from the private sector.<br />
According to Stemberger and Jaklic (2007) e-business is enormously important in the private sector for<br />
business and business relationships and relationships with customers. ECommerce is regarded as<br />
a revolution that has transformed the structure of business and the mechanisms of economic systems.<br />
Hence at al. (2004) conducted research on price competition and strategic behaviours in eCommerce. It<br />
is also a new approach in governmental organizations as instrument with another function compare with<br />
business. In government specific conditions, this electronic instrument and related processes are referred<br />
to as eGovernment. It is possible to find many explanations of eGovernment. Some definitions of<br />
eGovernment note the technology for enhancing the access to and delivery of governmental information<br />
and services to citizens, businesses, government employees, and other agencies (Hernon at al., 2002).<br />
Usual use of eGovernment is conducted in combinations of political reforms and organisational changes<br />
to enact, support and drive profound transformations in the organisation of the public sector (Cordella and<br />
Iannacci, 2010). Governmental sector use the purchasing tools for the procurement of services and<br />
material goods for achieving effectiveness, efficiency and economy (3E). The e-procurement as<br />
commercial practice adopted from the private sector may provide cost-saving opportunities to both<br />
suppliers and the government (Erridge et al., 2001).<br />
The problems of the implementation of the new technologies for public purchasing are recognised and<br />
analysed in different public procurement literature from the points of view of public procurement process,<br />
e-procurement, managing public procurement processes, impacts of eCommerce usage to the<br />
organizational structures, and managing information and knowledge etc. (Vaidyanathan and Devaraj,<br />
2008). Hence, eCommerce technology can be defined as a technology that allows business transactions<br />
based on processing and transmission of digital data on the Internet, in contrast to the traditional<br />
business technology, the logistics of which are based on the physical environment (Dinlersoz and<br />
Pereira, 2006). Corbitt et al. (2003) explored the Internet which has become an essential business<br />
marketing paradigm related to the development of platform for trading, distributing and selling products<br />
between organisations, among organisations and consumers, and even between consumers where trust<br />
and trustworthiness play the key role. In their survey the trust relationship was established as the centre<br />
of technical systems of eCommerce. Trust is a centre and is fundamental for business relationships<br />
factors and for relationships between citizens and public organizations. Gunasekarana et al. (2002)<br />
focused on eCommerce as popular topic in the mass media and in informatics circles as well and argued<br />
that eCommerce is an emerging area that encompasses processes directly and indirectly related to the<br />
buying, selling and trading of products, services and information via computer networks – including the<br />
Internet (Oxley and Yeung, 2001).<br />
E-procurement has been viewed as an opportunity for efficiency in the governmental sector. Business-togovernment<br />
e-procurement, in the framework of eGovernment is understood as an instrument for cost<br />
reduction and has been developed due to the concentration on qualitative higher level of connections of<br />
government with the civilians and the companies (Towns, 2001). Hardy and Williams (2008) highlighted<br />
the information technology use to achieve better information, value for money, efficiencies, and maximize<br />
procurement effectiveness with respect to public and private sector. The goals of this usage in the case<br />
of public procurement are given by special needs of public and also defence sector and there are<br />
differences to private sector because of its focus on value, competitiveness, and accountability, it differs<br />
because of its social welfare implications (Panayiotou, Gayialis and Tatsiopoulos, 2004). Shu-Hsien at al.<br />
(2003) found implementing of eCommerce into the procedures of military organizations for electronic<br />
procurement and analysed benefits of e-procurement procedure for military organizations, diagnosing<br />
and preventing procurement faults for achieving procurement efficiency.<br />
The common further question of eCommerce in the defence sector is adapted, refined and built up nonconventional<br />
reliable approaches to the quality measurement of procurement processes and awareness<br />
evaluation of these processes, sharing complex knowledge and knowledge networks in according to the<br />
knowledge paradigm shifts.<br />
470
3. Research approach<br />
Nataša Pomazalová and Zbyšek Korecki<br />
The purpose of this paper is to analyze variability of purchase price of property arrangements (PA).<br />
Purchase prices of different PA have been based on ESSP. In all researched cases has been the lowest<br />
offered price as the major purchase criterion according to law order for public procurement and internal<br />
orders of defence sector.<br />
In this research was used the statistical analysis of average year purchase prices of goods from two<br />
different PA with different coding. Military transport and support technique are coded PA 2.3 and for<br />
analyse were selected two different types of detector tubes and special filter were selected and purchase<br />
prices of these goods were observed. Material for general use are coded PA 4.1 and in this sample here<br />
are flag, battery and drill.<br />
For study has been conducted comparison of two samples of different types of goods coded as PU 2.3<br />
and PU 4.1 to each other and the mean of prices in sample was also compared year to year. The sample<br />
number of observation for each coded observed PA was year to year as an annual means of prices and<br />
the sample was n=11 for each year. For the research were conducted t- tests and for multiple<br />
comparisons were used methods, such as Bonferron and F-test. Degrees of freedom (d.f. 22) and<br />
significance level (α = 0.05), Bonferron significance level is in our case 0.0125. Purchase prices of both<br />
chosen PA 2.3 and 4.1 were observed for each year 2006 – 2009. Data were collected in Distribution<br />
Centre in Pardubice. The measuring of purchase prices variability was based on available annual means<br />
of purchase prices of PA 2.3 and PA 4.1 were achieved via use of ESSP.<br />
For two sample t-test were measured average purchase prices of PA 2.3 in year 2006 for clarification,<br />
that average purchase prices of PA 2.3 are not otherwise in years 2007– 2009. In this study was<br />
expected, that the average purchase prices (means) are equal cause of usage of automatic instrument<br />
ESSP and the major criterion of the lowest offered price. The same procedure was used for average<br />
purchase prices of PA 4.1.<br />
For the case of PA 2.3: The null hypothesis H0: Considered annual purchase prices of PA 2.3 from<br />
observed in each year 2006 – 2009 are similar. Alternative hypothesis HA: Considered annual purchase<br />
prices of PA 2.3 from observed in each year 2006 – 2009 are different.<br />
For the case of PA 4.1: The null hypothesis H0: Considered annual purchase prices of PA 4.1 from<br />
observed in each year 2006 – 2009 are similar. Alternative hypothesis HA: Considered annual purchase<br />
prices of PA 4.1 from observed in each year 2006 – 2009 are different.<br />
According to limitations of this research on purchase price variability, here was not analysed on findings<br />
depending of purchase prices on the types of specifications, types of commercial subjects, socioeconomic<br />
circumstances and also crisis management and security in electronic environment (Nečas at<br />
al., 2006).<br />
4. Results and findings<br />
The results of purchase price variability analysis are presented in Table 1 using year-on-year data. The<br />
coefficient of variation of PA 2.3 is up to 10%, comparing PA 4.1, where is coefficient of variation 12% -<br />
70%. These findings show that the variability of purchased price of the PA 2.3 observations is<br />
concentrated around its mean. Goods contented in PA 4.1, however, scattered at a considerable distance<br />
from the mean. It may be expected for purchase prices of PA 2.3, here is less competitiveness between<br />
offered gaps of firms required goods. Hence, here are some specifics of this material, hygienic conditions<br />
etc. PA 2.3 is used in specifics conditions and quantity of purchased peaces is smaller than usage of PA<br />
4.1.<br />
For test of PA 2.3 in years 2006 and 2007 is t (22) = 0.96, p-value = 0.345 and F(11,11) = 0.46, p-value =<br />
0.208. The p-value for this test is over α = 0.05 and Bonferron significance level 0.0125. for years 2006<br />
and 2008 is t (22) = 1.38, p-value = 0.182, F(11,11) = 0.46, p-value = 0.228 and for years 2006 and 2009<br />
is t (22) = 1.23, p-value = 0.231 and F(11,11) = 1.65, p-value = 0.420 The p-value for these tests is over<br />
0.18 as a result with 95% confidence that the effect was not found to be statistically significant, thus the<br />
null hypothesis is not rejected.<br />
471
Nataša Pomazalová and Zbyšek Korecki<br />
Table 1: Purchase price variability of PA 2.3 and PA 4.1<br />
PA code and types<br />
PA 2.3<br />
Average<br />
pcs./CZK 2006-<br />
2009<br />
Range<br />
pcs./CZK<br />
Variance<br />
pcs./CZK S. d. pcs./CZK<br />
Detector tube I 63.73 3.25 0.81 0.90 1.47<br />
Detector tube II 53.87 42.80 10.70 3.27 6.07<br />
Filter 2123.28 36120.49 9030.12 95.03 4.48<br />
PA 4.1<br />
Flag 613.33 741884.55 185471.14 430.66 70.22<br />
Drill 4,98 1.35 0.34 0.58 11.67<br />
Accumulator 4,95 0.49 0.12 0.89 17.98<br />
Coefficient<br />
of variation %<br />
The case of PA 4.1, where for observed years 2006 and 2007 is t (22) = 5.32, p-value = 0.000, the<br />
statistics are F(11,11) = 22.68. The statistic is significant (p-value = 0.000). For years 2006 and 2008 is t<br />
(22) = 6.07, p-value = 0.000, F(11,11) = 485.72, p-value = 0.000 which is less than the critical value<br />
corresponding to α = 0.05 and Bonferron significance level 0.0125. The latter test, hence years 2006 and<br />
2009 is t (22) = 5.91, p-value = 0.000 and F(11,11) = 203.16, p-value = 0.000 for this test. Thus, the<br />
conclusion with 95% confidence is that the effect was not found to be statistically significant and the null<br />
hypothesis is rejected and the alternative hypothesis is supported.<br />
From the results of this analysis, it seems to purchase price levels vary according to kind and especially<br />
specification and purchased quantity of PA through ESSP – the null hypothesis for PA 2.3 is not rejected<br />
and for PA 4.1 is the alternative hypothesis supported as well. However, analysis has some limitations.<br />
Hence, limitations of this study cannot identify a set of endogenous and exogenous variables affected<br />
purchase price variability of PA 2.3 and PA 4.1.<br />
5. Discussion<br />
The need of usage ESSP tool is based on transformational processes in the Czech defence sector.<br />
Development of ESSP is also used for transmission of information from defence department to<br />
commercial users. Here is evidence that use of eGovernment is conducted in combinations of political<br />
reforms and transformation and processes changes in the organisation of the public sector (Cordella and<br />
Iannacci, 2010). Changes in ESSP use are based on new development on logistics support procedures<br />
and information technology improvement.<br />
MoD performs a methodical and legal assistance for military units in order to realization of e-public<br />
procurement. Usage of ESSP may perform professional activity in/out defence sector with many<br />
companies as well. ESSP is also tool for managing logistic support of ACR units on the Czech territory<br />
and missions abroad. The logistic support is realized in this case from the Czech Republic to National<br />
Support Elements. The responsible body for purchase conduct is the logistics division of the General<br />
Staff on strategic level and Support Command Headquarters on the operational level. The logistics group<br />
manages purchasing via eCommerce on the tactical level.<br />
This study has presented average purchase price variability of different property arrangements (PA 2.3<br />
and PA 4.1) through analysis. These prices are based on usage of automatic instrument ESSP as<br />
instrument of eCommerce used in the defence sector; in this case it is MoD of the Czech Republic.<br />
ECommerce could be understood as a toll of eGovernment (Hernon at al., 2002) and may support<br />
achieving governmental goals. Through ESSP commercial subjects offer their products or services which<br />
are required by organizational parts of MoD and units of ACR both on the Czech territory and in abroad in<br />
the conditions of foreign operation. The e-procurement is discussed as an instrument for cost-saving in<br />
the governmental side, but also for suppliers (Erridge et al., 2001).<br />
The results showed large purchase price variability of goods coded in PA 4.1 is over 11% and variability<br />
for PA 2.3 is lower 10%. Considered annual purchase prices of PA 2.3 from observed in each year 2006<br />
– 2009 are similar. According to result it seems considered annual purchase prices of PA 4.1 from<br />
observed in each year 2006 – 2009 are different.<br />
472
Nataša Pomazalová and Zbyšek Korecki<br />
The results have relevance in the current debate on the impact of the level of knowledge needs and<br />
practical experience of logistic experts as decision makers in daily routine analytic procedures for<br />
achieving operational goals reflecting governmental goals on one side and expectations of commercial<br />
partners on the market. The participation of private firms for achieving goals of the public procurement is<br />
assumed on this base much more attractive for suppliers of PA 4.1, than PA 2.3. But for suppliers of PA<br />
2.3 are on the other side also strength in usage of ESSP, cause of considering quality can be higher<br />
priced. This analytical result is supported by empirical evidence; those property arrangements with low<br />
sale cause of its specific tend to have higher price in the market.<br />
ESSP technology may make purchase price of property arrangements as military transport and support<br />
technique and material for general use lower and property arrangements comparisons of public<br />
procurement for defence sector. The idea of ESSP is to gradually increase the level of credibility and<br />
validity to give evidence to support procurement decision makers especially at the tactical level. Public eprocurement<br />
has somewhat uncomfortable with these ideas as political sensitivities, divergent viewpoints<br />
and different approaches for complex e-procurement planning process with many stages and<br />
interrelationships. ESSP in the future development may correct critical problems. ESSP as a tool shows<br />
some kind of improvement and optimize the procurement processes. However, in reality, there were<br />
many non-rational goals in the public procurement.<br />
These results bring understandings that permanently adjust ESSP, procurement knowledge needs to suit<br />
the needs of the end users in ACR and also for ACR planning processes. Public procurement<br />
methodology may reinforce competition between commercial organizations as suppliers of property<br />
arrangements – military transport and support technique and material for general use. This result is<br />
supported achieved findings.<br />
6. Conclusion<br />
Material support and supplies of property in the property arrangement groups and services and also<br />
procurement administration at decentralised subset is realised through an appropriate ESSP. ESSP<br />
addresses and ensures an effective dealing with financial means from the state budget, makes public<br />
purchasing professional and takes control over the public procurement activities.<br />
The key sense of ESSP for defence sector usage is reduction of expenditures, non-discrimination, and<br />
transparency of public procurement. Reasons for usage this tool is also on the side of processing of<br />
relationships defence sector with the commercial organizations as others governmental goals (Cordella<br />
and Iannacci, 2010). In addition the platform for achieving efficiency is expected on the side of strategy<br />
processes of allocation of resources and on innovation of ESSP and increasing of participation of<br />
commercial subjects and advantages for both public and private sector.<br />
Analysis of the dataset and a comparative analysis show the comparison of purchase prices of different<br />
property arrangements. The achieved annual purchase prices of material for general use in observed<br />
years 2006 – 2009 were different. We found that the purchase price variability for materials for general<br />
use was over 11% and the purchase price variability for military transport and support services was lower<br />
than 10%. These results may be interesting for achieving effective use of military and commercial<br />
capabilities in the logistics support process of the units located in the foreign countries, but also for<br />
entrepreneurs, companies and enterprises as suppliers of property arrangements.<br />
Possible direction for future research and methodology development is to investigate how to develop risk<br />
procurement strategy (exactly what defence department wants and can therefore estimate the value of<br />
items), new organisational structures with new information technologies and using various well-developed<br />
and accepted commerce principles. The same ways to deal with such complexity can be applied to<br />
standardisation of the use eCommerce in defence department and organizational levels. The possible<br />
way is description of complex logistic and procurement processes in the foreign operations for saving<br />
internal costs, improving e-procurement realization and increasing of e-purchase security.<br />
Acknowledgement<br />
The paper has arisen within the Research Projects of Organizational Development/Economic Laboratory<br />
No. 9079301010 of the Department of Economics, Faculty of Economics and Management of the<br />
University of Defence. Special thank to Distribution Centre in Pardubice.<br />
473
References<br />
Nataša Pomazalová and Zbyšek Korecki<br />
Amelinckx, I., Muylle, S. and Lievens, A. (2008) Extending electronic sourcing theory: An exploratory study of<br />
electronic reverse auction outcomes. Electronic Commerce Research and Applications 7, 119–133.<br />
Chun, S.H. and Kim, J.C. (2005) Pricing strategies in B2C electronic commerce: analytical and empirical approaches.<br />
Decision Support Systems 40, 375– 388.<br />
Corbitt, B.J., Thanasankit, T. and Yi, H. (2003) Trust and eCommerce: a study of consumer perceptions. Electronic<br />
Commerce Research and Applications 2, 203–215.<br />
Cordella, A. and Iannacci, F. (2010) Information systems in the public sector: The eGovernment enactment<br />
framework. Journal of Strategic Information Systems 19, 52–66.<br />
Czech Republic, Ministry of Defence and Armed Forces of the Czech Republic. (2010) SEPO<br />
http://www.army.cz/scripts/detail.php?id=7210 [online]. Prague: 2010, 09.01.<br />
Dinlersoz, E.M. and Pereira, P. (2007) On the diffusion of electronic commerce International. Journal of Industrial<br />
Organization 25, 541–574.<br />
Erridge, A., Fee, R. and McIlroy, J. (eds.) (2001) Best Practice Procurement: Public and Private Sector Perspectives.<br />
Gover Pub Co., Burlington, VT.<br />
Government of the Czech Republic (2006) Resolution no. 500/2006 on National Plan for the Introduction of<br />
Electronic Public Procurement Over the Period 2006 – 2010. Prague.<br />
Gunasekarana, A., Marrib, H.B., McGaugheyc, R.E. and Nebhwani M.D. (2002) ECommerce and its impact on<br />
operations management. International Journal of Production Economics 75, 185–197.<br />
Hardy, C.A. and Williams, S.P. (2008) EGovernment policy and practice: A theoretical and empirical exploration of<br />
public e-procurement. Government Information Quarterly 25, 155–180.<br />
Hernon, P., Reylea, H. C., Dugan, R. E., and Cheverie, J. F. (2002). United States government information: Policies<br />
and Sources. Westport.<br />
Koch, J.V. and Cebula, R.J. (2002) Price, quality and service on the internet: sense and nonsense. Contemporary<br />
Economic Policy 20 (1), 25–37.<br />
Markus, M. L. and Soh, Ch. (2002) Structural Influences on Global Ecommerce Activity. Journal of Global Information<br />
Management 10, (1), 5-12.<br />
Nakayama, Y. (2009) The impact of eCommerce: It always benefits consumers, but may reduce social welfare.<br />
Japan and the World Economy 21, 239–247.<br />
Nečas, P., Szabo, S. and Bučka, P. (2006) Crisis management and security in simulation environment. Science &<br />
Military. Vol. 1, No. 1, 33-37.<br />
Oxley, J. And Yeung, B. (2001) ECommerce Readiness: Institutional and International Competitiveness. Journal of<br />
International Business Studies, Vol. 32, No.4, 705-732.<br />
Panayiotou, N. A., Gayialis, S. P., and Tatsiopoulos, I. P. (2004). An e-procurement system for governmental<br />
purchasing. International Journal of Production Economics, 90, 79−102.<br />
Shu - Hsien Liao et al. (2003) A web-based architecture for implementing electronic procurement<br />
in military organisations. Technovation 23, 521–532.<br />
Stemberger, M.I. and Jaklic, J. (2007) Towards EGovernment by business process change – A methodology for<br />
public sector. International. Journal of Information Management 27, 221–232.<br />
Towns, S. (2001) Security blanket: Public key infrastructure unlocks eGovernment potential. Government Technology<br />
26–28, 32–33.<br />
Vaidyanathan, G. and Devaraj, S. (2008) The role of quality in e-procurement performance: An empirical analysis.<br />
Journal of Operations Management 26, 407–425.<br />
Zott, Ch., Amit, R. and Donlevy, J. (2000) Strategies for Value Creation in ECommerce: Best Practice in Europe.<br />
<strong>European</strong> Management Journal Vol. 18, No. 5, 463–475.<br />
474
Evaluating the Development of eGovernment Systems: The<br />
Case of Polish Local Government Websites<br />
Leszek Porębski<br />
AGH University of Science and Technology, Kraków, Poland<br />
leszekpo@agh.edu.pl<br />
Abstract: The evaluation of public institutions’ web sites in the context of eGovernment sophistication constitutes an<br />
important part of the literature on eGovernment. However, the decided majority of studies of this kind is focused on<br />
central administration (government, its agencies and state institutions coordinating public services delivery). This<br />
paper undertakes the issue of the major functions performed by public institutions’ web sites, in a different – much<br />
less developed – perspective. The focal point is local government web sites and their role in constructing new model<br />
of relations between government and citizens. The major part of the paper is the presentation of results of the<br />
empirical study carried out in the period of 2005-2009. The project comprised the analysis of the content of the<br />
official web sites of the Polish counties, which are the secondary level of the local government system in Poland.<br />
During the research, web sites of all 314 counties were analyzed. The evaluation of each web site was focused on<br />
the availability of specific type of information and/or online service. Therefore, the research depicts the “supply”<br />
aspect of eGovernment. The quantitative method of analysis, based on the concept of Website Attribute Evaluation<br />
System (WAES) was applied in the research. The analytical framework of the study is based on the assumption that<br />
there are four major functions performed by local government web sites. They are: information, promotion,<br />
consultation and service delivery. The results of the analysis prove that information delivery is the dominating<br />
function performed by local government web sites in Poland. It is so at the sacrifice of more sophisticated types of<br />
the Internet use (consultation and electronic service delivery). At the same time, a modest but stable progress can be<br />
observed in the number and variety of information and services offered by web sites of Polish local governments.<br />
Keywords: local government, eGovernment, eDemocracy, web site content, ICT<br />
1. Introduction<br />
Signs of rapid growth of information and communication technologies (ICT), often referred to as “the<br />
information revolution”, are evident in various aspects of everyday life. Mutual relations between citizens<br />
and political institutions are an important part of the realm of the ICT use in public domain. Originated<br />
during recent decades extensive literature of that field, deals with such range of problems as e-voting on<br />
one hand and Internet-based political communication on the other. An issue of eGovernment can be<br />
considered one of the most often debated aspects of political dimension of ICT use.<br />
Various elements of eGovernment can be emphasized when defining this notion. The focus could be the<br />
cost effectiveness of public service delivery (Carbo and Williams 2004), back office operations of<br />
administrative structures (Kunstelj and Vintar 2004) or the role of ICT in the formulation of the public<br />
policy (Bannister 2007). Nevertheless, each specific definition can be placed on a continuum, the<br />
extremes of which are set up by a “narrow” and a “broad” concept of eGovernment (Janssen, et al. 2004).<br />
The former model reduces the concept of eGovernment to: “the use of technology to provide electronic<br />
services to citizens, businesses and organizations” (Berntzen and Olsen 2009: 77). According to the<br />
latter, the notion of eGovernment should be associated with: “the entire range of government roles and<br />
activities, shaped by and making use of information and communications technologies” (Brown 2005:<br />
241). This paper adopts the broader definition of eGovernment, the one referring to the use of ICT by<br />
public bodies in their interactions with citizens and organizations. Such a wide-ranging approach makes<br />
the concept of eGovernment closely related to eDemocracy defined in descriptive (and not normative)<br />
terms. Thorough analysis of the scope and meaning of both terms goes beyond the subject matter of this<br />
paper but can be found in numerous studies (Sakowicz 2004, Holzer and Kim 2006, Schellong 2009).<br />
One of the most important planes of the analysis of eGovernment is the inquiry of the web sites of public<br />
institutions. Regardless of the emergence of new instruments employed to stimulate virtual contacts (e.g.<br />
social network services), web sites still play the role of the major channel used by public bodies for digital<br />
interactions with both individuals and organizations. Furthermore, in case of many local and/or small<br />
entities they remain the only tool used for institutional ICT-mediated activity. Consequently, various<br />
aspects of the analysis of web sites can be found in studies concerning eGovernment. They propose<br />
models of web sites evaluation (Henriksson, et. al. 2007), present international benchmarking reports<br />
(West 2006, 2007), or simply offer an in-depth assessment of a selected group of public bodies web sites<br />
in individual countries (Ferber, et. al. 2003; Stoica and Ilas 2009). This presentation can be included to<br />
the latter category of research.<br />
475
Leszek Porębski<br />
2. Polish local government system: The role of counties<br />
The current system of local government in Poland was introduced in January 1999 (following the law<br />
approved by the parliament in June 1998). It is based on the three-tier division of local government units.<br />
A primary level consists of 2478 municipalities (gmina), secondary level of 314 territorial counties and 65<br />
urban counties (powiat), while sixteen provinces (województwo) make up the third tier of local<br />
government system.<br />
Urban counties are cities, which are legally endowed with rights of counties. In this case the territory of<br />
the county is limited to the area of the single city – the county seat. Cities with population over one<br />
hundred thousand residents as well as some smaller ones (which used to be the seat of the province<br />
authorities prior to the local government reform in 1999) have the status of urban counties. Territorial<br />
counties consist of several rural and urban municipalities. The largest municipal city of the area usually<br />
takes the role of a seat of a county in addition to serving as an economic, cultural and educational centre<br />
of the region. The elected organ of the county is the council (its term of office is four years). The<br />
executive branch is represented by the county board, comprising four to six members and headed by the<br />
chair. The most important numerous statutory tasks of the county include: health care, social welfare,<br />
public transport and public roads maintenance, culture and tourism, education and building supervision.<br />
Territorial counties represent regions often linked with strong ties, rooted in distant history and based on<br />
traditions shared by local community. Thus, they are a good example of the local government unit, which<br />
is responsible not only for the everyday performance of public institutions but for the preservation and<br />
support for local identity as well.<br />
3. Scope and methodology of the research<br />
The purpose of the research presented in this paper was the assessment of the Polish local government<br />
web sites. The level of local government selected for the research was territorial counties. Urban counties<br />
were excluded from the study to ensure the internal cohesion of the sample and to allow for generalized<br />
conclusions. Cities with populations often close to or even greater than half a million inhabitants are very<br />
much different from the majority of territorial counties. The latter are typically rural and sparsely populated<br />
units, often – as mentioned above – founded around common history and enduring social ties. Therefore,<br />
the assumption that both types of counties are equal (and, consequently, including them within the same<br />
sample) would distort the results of the study.<br />
The main goal of the study was to create the comprehensive, broad profile of the Polish local government<br />
web sites and thus the quantitative method was selected for the purpose of this analysis. The<br />
questionnaire constructed for the study and applied in the research was based on the concept proposed<br />
by the Cyberspace Policy Research Group, known as the Website Attribute Evaluation System (WAES).<br />
The WAES, commonly used for the assessment of various aspects of web sites performance (see e. g.<br />
Ferber, et. al. 2003), is the binary tool. It analyses the content of the web site in the context of specific<br />
detailed criteria (types of information, services, web tools). The component in the content either exists or<br />
is absent. As a result, a score of either “0” or “1” is assigned to the specific criterion. The same formula<br />
was used in the research of Polish local governments.<br />
Online communication with citizens can lead to the accomplishment of various goals. The point of<br />
departure for the presented research project was: What is the role of web sites in everyday activity of<br />
local governments? Or, more precisely: What major goals are fulfilled by local governments through their<br />
web sites? Consequently, based on the preliminary qualitative study, four major functions performed by<br />
the analyzed web sites were identified. They were: information, promotion, consultation and service<br />
delivery.<br />
The information function is associated with the online publishing of basic data on local government<br />
bodies (e. g. personal composition of the county council and the county board) and their work, such as:<br />
office hours, texts of acts accepted by the council, county budget). This function includes also information<br />
concerning the broader context of the Polish local government system (e. g. links to the web sites of<br />
government institutions or municipalities located in the specific county). Promotion refers to the online<br />
presentation of the county assets, both from the perspective of possible individual visitors (touristic<br />
attractions of the region, accommodation) and the commercial viewpoint (investment offer). Availability of<br />
the web site content in foreign languages is also regarded as the element of the promotion function.<br />
Consultation is closely interrelated with interactive capability of the Internet and its ability to stimulate the<br />
476
Leszek Porębski<br />
public debate. Thus, this particular aspect of web sites’ content fulfills the essential aspect of<br />
eDemocracy. Several tools can be considered especially useful in this function. The basic one is the<br />
email address of the office and/or to the local government representatives. More sophisticated online<br />
devices include: a discussion forum on local problems, polls, chat or interactive service dedicated to the<br />
direct contact with members of the county board (often performed with the use of instant messaging<br />
applications). The degree of responsiveness of local authorities is also an important aspect of the<br />
consultation function. It can be measured by a reply received/not received to the message sent to the<br />
email address of the office placed on the web site. The last function, electronic service delivery, is<br />
tantamount to the narrowly defined notion of eGovernment. It refers to various aspects of relations<br />
between the office and the individual regarded as the consumer – the beneficiary of public services.<br />
Detailed criteria of this function performance reflect stages of eGovernment evolution and include:<br />
downloading of administrative forms, ability to apply online, electronic transactions with the office (e. g.<br />
paying parking tickets online). Regardless of four major functions the availability of a few additional<br />
services was assessed during the research. They were: accessibility of the web site for the disabled<br />
persons and presence of various types of multimedia content (pictures, audio and video materials).<br />
In the course of the research all the country’s 314 territorial counties’ web sites were examined. They<br />
were only the official sites, formally maintained by the county, as opposed to community portals or web<br />
sites of local NGOs. The research was carried out for five years, from 2005 to 2009, between April and<br />
May of each year.<br />
The questionnaire used in 2005 included 55 detailed criteria. After minor modifications introduced in 2006<br />
(a few criteria were substituted with new ones – e.g. the problem of online payments for public services<br />
was included in the questionnaire) the number of criteria was reduced to 54. This final version of the<br />
questionnaire was used in the research from 2006 to 2009.<br />
4. Research results<br />
4.1 eGovernment Advancement Index: Longitudinal trends<br />
Longitudinal research project provides the opportunity to both present the picture of the analyzed<br />
phenomena in the particular moment and reflect upon more general trends observable in the area of<br />
consideration. Research of Polish counties allows for a generalization of the transformation trends of the<br />
overall ICT use between 2005 and 2009 and the degree in which specific Internet tools and services are<br />
available on the local government web sites.<br />
Table 1 presents scores of The eGovernment Advancement Index of the county web sites in the<br />
consecutive years of the study. Depicted are results for each of four basic functions as well as the total<br />
score. The total raw score obtainable in the research was 54 (1 point for each criterion in the<br />
questionnaire). The eGovernment Advancement Index score represents the result of county web sites as<br />
the percent of the total number of points, which could be obtained in the whole research and within the<br />
particular function. Therefore, the maximum value of the index is 100. Results in the table illustrate the<br />
overall advancement of eGovernment use in Polish territorial counties, measured by means of the<br />
content of their web sites and perceived from the perspective of Internet users.<br />
Table 1: eGovernment Advancement Index: Websites of Polish counties (2005-2009)<br />
Total score<br />
Information<br />
Promotion<br />
Consultation<br />
Service Delivery<br />
2005 2006 2007 2008 2009<br />
40,00<br />
39,98<br />
44,21<br />
46,05<br />
47,76<br />
49,30<br />
46,86<br />
26,56<br />
19,33<br />
50,35<br />
43,86<br />
29,86<br />
11,50<br />
55,80<br />
47,14<br />
32,29<br />
17,00<br />
57,15<br />
48,00<br />
36,57<br />
19,00<br />
58,15<br />
48,00<br />
34,29<br />
28,75<br />
The index scores reveal that new options of communication with citizens opened by the Internet are<br />
exploited by Polish local governments at relatively low level. For 2005 results, in case of none of five<br />
analyzed aspects, the overall score was greater than 50. It means that less than half of various online<br />
resources, taken into account in the research questionnaire, was available for users of the analyzed web<br />
sites. Performance of two out of four functions (information and promotion) is visibly more advanced,<br />
while the remaining two (consultation and service delivery) are considerably lagging. The case of service<br />
delivery is especially striking. Its index score (19,33) in not only less than half of the total score of the<br />
whole index (40,00) but it also stays far behind results of all other functions. If the total score of the index<br />
477
Leszek Porębski<br />
in 2005 is considered to be 100, the same year scores of particular functions are the following:<br />
information – 123,2, promotion – 117,2, consultation – 66,4, service delivery – 48,32. In fact, in 2005 web<br />
sites of Polish territorial counties were based on the availability of information on the office activity and<br />
advantages of the region, while interactive potential of the net was hardly explored. The latter claim refers<br />
both to communication with individuals as citizens (consultation) and contacts with residents regarded as<br />
consumers (service delivery).<br />
The comparison of 2005 and 2009 results indicates that there is a gradual but steady increase in the use<br />
of the ICT by Polish counties. It refers to all the dimensions analyzed in the research, yet the magnitude<br />
of the growth is very much different in case of particular aspects of the web content. If scores of 2005 are<br />
taken as 100, the 2009 results illustrate these different rates of advancement (see table 2).<br />
Table 2: Growth of the eGovernment Advancement Index (2006-2009): Websites of Polish counties<br />
(2005 = 100)<br />
2006 2007 2008 2009<br />
Total score<br />
99,9<br />
110,5<br />
115,1<br />
119,4<br />
Information<br />
Promotion<br />
Consultation<br />
Service Delivery<br />
102,1<br />
93,6<br />
112,4<br />
59,5<br />
113,2<br />
100,6<br />
121,6<br />
87,9<br />
115,9<br />
102,4<br />
137,7<br />
98,3<br />
118,0<br />
102,4<br />
129,1<br />
148,7<br />
During five years the overall score increased only by about twenty percent, which does not seem to be a<br />
spectacular achievement, considering relatively low point of departure in 2005. Nonetheless, it is worth<br />
stressing that EGovernment Advancement Index, taken as a whole was growing at a very stable rate.<br />
Starting with 2006, it gained a few percentage points during each consecutive year of the study.<br />
Information and promotion, functions which were performed relatively well even in 2005, have not added<br />
to the general progress in the five year period. This refers especially to the use of web sites for the<br />
promotion of the county – the only function that failed to grow during five years of the research. Moreover,<br />
this remains to be true regardless of the fact that in 2009 the index score for the promotion function was<br />
only 48. Thus, there are still many online resources, which could be used for the promotion of the region<br />
but are unavailable on the web sites.<br />
Two remaining functions: consultation and service delivery, registered significant growth between 2005<br />
and 2009. Both of these aspects of online endeavors performed disappointingly low in 2005. Hence, ‘the<br />
lower you start, the higher you finish’ rule can be applied to explain the substantial progress in making<br />
use of various forms of e-consultation and e-delivery of public services. Service delivery function,<br />
improved by almost fifty percent between 2005 and 2009, in fact recorded the greatest progress only in<br />
the last year of the study. The enormous breakdown, which can be observed in service delivery between<br />
2005 and 2006 can be attributed to, as mentioned before, changes in the research questionnaire. The<br />
addition of the online payments criterion – the option barely accessible on web sites – remarkably<br />
lowered the overall performance of this function in 2006.<br />
This tendency of fast growth of interactive aspects of web sites content at the sacrifice of more passive,<br />
information-oriented features reflects the general characteristic of eGovernment expansion observed<br />
globally. Moreover, it represents the switch from the rudimentary stage of eGovernment maturity to no<br />
more than intermediate phase in the whole sequence of eGovernment development (see e. g. Capgemini<br />
2007, Hiba, et. al. 2009). It seems that in case of the Polish counties the moment of that transition<br />
occurred between 2005 and 2009 and it was identified by the research project presented in the paper.<br />
4.2 Resources available on web sites of Polish counties<br />
The overall picture of the eGovernment development on the level of Polish local governments should be<br />
supplemented by more detailed presentation of the web sites content. An Internet user, accessing a city<br />
or municipality official web site is not seeking ‘information content’ or ‘consultation tools’. He simply wants<br />
to verify office hours in the public transportation department or express an objection to the idea of new<br />
shopping center construction (next to his place of residence). Thus, from the perspective of a<br />
responsiveness of a local government to residents’ needs and expectations, online presence of the<br />
specific information and services is of great importance for the eGovernment analysis.<br />
478
Leszek Porębski<br />
Selected types of the content available on the web sites of Polish counties are presented in table 3.<br />
Beside tools, services and information assigned to four basic functions, some additional data collected in<br />
the research is displayed.<br />
Table 3: Selected services and information available on official web sites of Polish counties (%)<br />
Content 2005 2009<br />
Information<br />
Organization of the office<br />
Information on handling specific matters<br />
County budget<br />
EU and/or <strong>European</strong> funds availability information<br />
Searchable archive of the web site content<br />
Promotion<br />
Tourist attractions of the region<br />
Tourist amenities (restaurants, accommodation)<br />
Commercial investment offer<br />
Availability of at least part of web site content in a foreign language<br />
Consultation<br />
Email address to the office available on the web site<br />
Response to the message sent to the office was received<br />
Online discussion forum<br />
Online poll on local issues<br />
Interactive service for the direct contact with county officials<br />
Service delivery<br />
Downloading forms<br />
Ability to apply online<br />
Online transactions with the office*<br />
Possibility of tracking the individual matter handling<br />
Additional content<br />
Audio files accessible<br />
Video files accessible<br />
Web site accessible by persons with disabilities<br />
* Criterion not included in the 2005 questionnaire<br />
Regarding the information function, the growth of online accessibility of all presented information and/or<br />
services is noticeable. The role of electronic bulletin board is played effectively by the web site, yet<br />
general political information (e.g. concerning the EU) or information on the office itself are available more<br />
often than specific outcomes of the activity of the council (e. g. county budget). Internet is thus still not<br />
sufficiently perceived as the tool of local democracy reinforcement. Transparency of local power and its<br />
openness towards citizens appear to be values easily obtainable via Internet use. Nonetheless, in case of<br />
Polish local government they still await appreciation.<br />
Promotion is the only function of local government web sites, that is aimed mainly at visitors and not<br />
members of the local community. Almost all counties take advantage of opportunities produced by the<br />
Internet in the field of self-presentation and construction of the favorable image. So far this task is<br />
performed better with respect to potential individual tourists than possible commercial investors. The<br />
former can find online all types of information required for planning summer holidays, skiing weekend or<br />
participation in local folk fiesta. The offer for the latter is much more limited. Moreover, commercial<br />
investment solicitation is the only type of promotional material, which has diminished in the analyzed<br />
period. It is probably the result of the relocation of such information from the official web site to more<br />
specialized services. Promotion refers also to the presentation of at least basic information on the region<br />
in foreign languages. The number of county web sites offering such an option has increased from one<br />
third in 2005 to almost one half in 2009. The accession of Poland to the <strong>European</strong> Union (effective May<br />
2004) seems to be associated with these relatively large and still growing numbers. International<br />
cooperation and access to the EU funds is perceived more and more as the regular aspect of local<br />
community existence. Consequently, making the web site accessible in foreign languages becomes selfevident.<br />
English is the most popular foreign language on county web sites. In 2009 more than one third of<br />
all sites (36,3%) were accessible in English. German was only slightly less common (31,5%) while<br />
French (8,9%) followed by Russian (7,0%) took the third and fourth position, respectively.<br />
479<br />
89,2<br />
38,5<br />
24,5<br />
38,2<br />
54,1<br />
85,6<br />
63,1<br />
54,8<br />
32,8<br />
90,8<br />
21,3<br />
27,1<br />
15,6<br />
8,0<br />
46,2<br />
2,9<br />
-<br />
9,2<br />
3,8<br />
6,1<br />
0,3<br />
92,0<br />
49,4<br />
28,3<br />
62,4<br />
72,3<br />
90,1<br />
72,0<br />
42,4<br />
44,6<br />
95,6<br />
21,7<br />
13,7<br />
18,8<br />
16,9<br />
59,6<br />
28,7<br />
1,0<br />
25,5<br />
24,2<br />
25,5<br />
3,8
Leszek Porębski<br />
Consultation capacity of the Internet, implied by its interactive attributes, is of essential importance with<br />
respect to the stimulation and the strengthening of eDemocracy. It refers mostly to its deliberative<br />
dimension, regarding public debate and articulation of one’s views to be the very foundations of<br />
democracy. In this perspective web sites analyzed in the study are still in the beginning of the path<br />
leading to mature eDemocracy. The only interactive feature, which can be identified as common is an<br />
email address. Yet, this does not necessarily mean that electronic mode of contacts with local authorities<br />
is effective. Only around one fifth of county representatives emailed during the research replied to the<br />
message. Moreover, that number is stable and has not grown since 2005. Among tools, which enable<br />
real online debate, the most widespread – poll on local issues – can be found in less than one fifth of all<br />
web sites. Diminishing popularity of discussion forums goes together with prevalence of various forms of<br />
services facilitating direct contact with a particular member of local authorities. However, while online<br />
forums protect anonymity in case of more than half of interactive services constructed specially for<br />
debate, revealing personal data is required. It shows apparent tendency of local power holders to control<br />
online deliberation in a more rigorous way. Such aspirations do not seem to be the best forecast for the<br />
future of eDemocracy.<br />
Online delivery of public services still remains the weakest aspect of web sites content. Apart from the<br />
substantial progress during last five years, some tools are still hardly available. Primarily it refers to online<br />
transactions, which in 2009 could have been handled on no more than one percent of web sites. Delays<br />
in the introduction of mature e-services platform in Poland have many sources. The decisive one is<br />
perhaps the vague division of powers between various institutions of central administration and local<br />
government institutions. Where too many are responsible, no one can be blamed.<br />
An important feature of the Internet is its multimedia character. The analyzed web sites are slowly but<br />
gradually reaching the status of multimedia portals. Yet, it is worth stressing that in 2005, the point of the<br />
departure for the research project, any audio or video materials were hardly available on county web<br />
sites. Currently, about one fourth of all sites give access to various audio or video files. They are mostly<br />
promotional films or tourist guides but records of the county council meetings are also available. For the<br />
majority of web sites the only kind of multimedia file is pictures documenting local events or just<br />
presenting the chair of the county board who ‘welcomes all dear virtual visitors to our charming region’.<br />
The problem which still awaits its resolution is accessibility of web sites for the persons with disabilities. In<br />
2005 only one site (out of 314) applied some services facilitating the use by the handicapped. After five<br />
years, in 2009, that number has risen to twelve sites (3,8%) and two most popular services are: the<br />
possibility of enlarging characters on the site and audio transcript of selected texts.<br />
5. Conclusion<br />
Hopes for the spectacular democratic breakthrough, brought on by new technologies and promising real<br />
empowerment of citizens in their relations with the state and its representatives turned out to be an<br />
illusion. Nevertheless, eGovernment, defined as the use of the ICT by public institutions, is one of the<br />
most important instruments which modify the current meaning of democracy. Public bodies, while<br />
interacting online with citizens, make use of variety of tools, thus web sites are no longer the only channel<br />
of computer mediated communication. Yet, in many cases they still remain the basic means employed for<br />
that purpose. It refers especially to relatively small units of local government, in countries representing<br />
the intermediate level of economic development. They are often located far from urban regions and<br />
experience both drawbacks of technological infrastructure and shortage of funds for investments. Polish<br />
territorial counties appear to match that characteristic, hence the assessment of their web sites –<br />
presented in this paper – should be regarded as the preliminary step to the comprehensive account of the<br />
local dimension of Polish eGovernment model.<br />
Results of the study prove that the overall picture is very much changing and Polish counties portrayed in<br />
2005 differ considerably from those examined five years later. They are still focused on information<br />
delivery but interactive aspect of the ICT is emerging as an important part of their online offer. Step by<br />
step local governments recognize the value of the Internet. Nevertheless, however fast, this rate of<br />
transition will not put the Polish local government among the leaders of the race. Users of Polish counties<br />
web sites can already benefit from some signs of the information revolution. They still need a lot of time<br />
to enjoy the full flavor of it.<br />
480
Acknowledgments<br />
Leszek Porębski<br />
This work was funded by the Polish Ministry of Science and Higher Education (research project N N116<br />
331338).<br />
References<br />
Bannister, F. (2007) “The Curse of the Benchmark: An Assessment of the Validity and Value of eGovernment<br />
Comparisons”, International Review of Administrative Sciences, Vol. 73, No. 2, pp. 171-188.<br />
Berntzen, L. and Olsen M. (2009) “Benchmarking eGovernment: A Comparative Review of Three International<br />
Benchmarking Studies”, Proceedings of the Third International <strong>Conference</strong> on Digital Society, IEEE Computer<br />
Society, pp. 77-82.<br />
Brown, D. (2005) “Electronic Government and Public Administration”, International Review of Administrative<br />
Sciences, Vol. 71, No. 2, pp. 241-254.<br />
Capgemini (2007) “The User Challenge: Benchmarking the Supply of Online Public Services”, September 2007<br />
[online] http://ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/ egov_benchmark_2007.pdf<br />
Carbo, T. and Williams, J. (2004) “Models and Metrics for Evaluating Local Electronic Government Systems and<br />
Services”, Electronic Journal of eGovernment, Vol. 2, Issue 2, pp. 95-104.<br />
Ferber, P., Foltz, F. and Pugliese, R. (2003) “The Politics of State Legislature Web Sites: Making eGovernment More<br />
Participatory”, Bulletin of Science, Technology & Society, Vol. 23, No. 3, June, pp. 157-167.<br />
Henriksson, A., Yi, Y., Frost, B. and Middleton, M. (2007) “Evaluation Instrument for eGovernment Websites”,<br />
Electronic Government. An International Journal, Vol. 4, No. 2, pp. 204-226.<br />
Hiba, M., Tamara, A. and Amer, A. (2009) “eGovernment in Jordan”, <strong>European</strong> Journal of Scientific Research, Vol.<br />
35, No. 2, pp. 188-197.<br />
Holzer, M. and Kim S-T. (2006) Digital Governance in Municipalities Worldwide (2005): A Longitudinal Assessment of<br />
Municipal Websites thorough the World, National Center for Public Productivity.<br />
Janssen, D., Rotthier, S. and Snijkers, K. (2004) “If You Measure It They will Score: An Assessment of International<br />
eGovernment Benchmarking”, Information Polity, Vol. 9, pp. 121-130.<br />
Kunstelj, M. and Vintar, M. (2004) “ Evaluating the Progress of eGovernment Development: A Critical Analysis”,<br />
Information Polity, Vol. 9, pp. 131-148.<br />
Sakowicz, M. (2004) “How to Evaluate eGovernment? Different methodologies and Methods”, NISPACEE<br />
Occasional Papers in Public Administration and Public Policy, Vol. V, No. 2, Spring, pp. 18-26.<br />
Schellong, A. (2009) “EU eGovernment Benchmarking 2010+. General Remarks on the Future of Benchmarking<br />
Digital Government in the EU”, [online], http://www.iq.harvard.edu/blog/<br />
netgov/papers/schellong_2009_wp_eu_egovernment_benchmarking_future_methodology.pdf.<br />
Stoica, V. and Ilas, A. (2009) “Romanian Urban eGovernment. Digital Services and Digital Democracy in 165 Cities”,<br />
Electronic Journal of EGovernment, Vol. 7, Issue 2, pp. 171-182.<br />
West, D. (2006) “Global eGovernment 2006”, [online], www.insidepolitics.org/egovt06int.pdf.<br />
West, D. (2007) “Global eGovernment 2007”, [online], www.insidepolitics.org/egovt07int.pdf.<br />
481
Comparative Analysis of Information Security Governance<br />
Frameworks: A Public Sector Approach<br />
Oscar Rebollo 1 , Daniel Mellado 2 , Luis Enrique Sánchez 2 and Eduardo Fernández-<br />
Medina 2<br />
1<br />
Social Security IT Management, Ministry of Labour and Immigration, Madrid,<br />
Spain<br />
2<br />
GSyA Research Group, University of Castilla-La Mancha, Spain<br />
orebollo@gmail.com<br />
damefe@esdebian.org<br />
LuisE.Sanchez@uclm.es<br />
Eduardo.FdezMedina@uclm.es<br />
Abstract: Security awareness has spread inside many organizations leading them to tackle information security not<br />
just as a technical matter, but from a corporate point of view. Information Security Governance (ISG) provides<br />
enterprises with means of dealing with the security of their information assets in a comprehensive manner, involving<br />
every stakeholder through the whole governance and management processes. Boards of Public Entities cannot<br />
remain unaware of this development and should make efforts to include ISG in their business processes. Realizing<br />
this relevant role, scientific literature contains a variety of proposals which define different frameworks to foster ISG<br />
inside any corporation. In order to facilitate the adoption of any of them by the public sector, this paper compiles<br />
existing approaches, highlighting the main contributions and characteristics of each one. Senior executives and<br />
security managers may need support on their decisions about adopting one of these frameworks, so a comparative<br />
analysis is performed. Although some comparative reviews are found in literature, they lack a systematic and<br />
repeatable methodology, ignore recently published contributions or focus on specific areas, making results biased<br />
and inappropriate for general use in corporations and the public sector. This paper tries to guarantee an objective<br />
comparison through a set of comparative criteria that have been defined and applied to every proposal, so that<br />
strengths and weaknesses of each one can be pointed out. These criteria have been selected from a deep analysis<br />
of existing ISG papers, including both governance and management aspects. As results show, each proposal<br />
focuses on different aspects of ISG giving priority to some of the defined criteria, and none of them covers the entire<br />
required spectrum. Most of the selected frameworks can be used by any public organization as a starting point<br />
towards integrating security into their processes, but this paper helps managers to be aware of their limitations and<br />
the gaps which need to be covered in order to achieve a complete integration. Consequently, more investigation is<br />
needed to fulfill detected gaps and define an ISG framework that organizations can rely on, and which offers security<br />
guarantees of covering every information asset of the company. Public sector´s idiosyncrasy must be taken into<br />
account in this development, resulting in a general framework eligible for adoption by both public and private<br />
companies.<br />
Keywords: information security governance, security governance, comparative analysis, review, governance<br />
framework<br />
1. Introduction<br />
Information Technology (IT) security can no longer be considered as a technical issue that can be<br />
assessed through hardware implementations, but it is a process that involves the whole company<br />
(Pasquinucci, 2007). It is widely accepted that security needs to reach the governance level so that<br />
senior directors understand the risks and the opportunities, and have assurance that these are being<br />
properly and continuously managed (Williams, 2001). The motivations to introduce IT in the corporate<br />
executive agenda is twofold: many countries have developed legislation to hold responsibilities for<br />
security breaches (BSA, 2003, Hardy, 2006), and achieving a higher security degree may become a<br />
competitive advantage to the organization (Humphreys, 2008, Johnston and Hale, 2009).<br />
Public entities are also involved with these considerations, as higher IT security usually strengthens the<br />
trust relationship between Administrations and their citizens. A recent <strong>European</strong> Union research shows<br />
existing gaps related to security and privacy concerns that need to be fulfilled in the field of electronic<br />
governance and policy modelling (Crossroad, 2010).<br />
All these objectives may be achieved through Information Security Governance (ISG) which is an<br />
overarching category directly affecting the entire policy management process (Knapp et al., 2009). There<br />
is not a unique definition of ISG, but among the most widespread conceptions it is generally accepted<br />
that ISG consists of the leadership, organizational structures and processes that safeguard information<br />
(ITGI, 2006b). ISG can also be defined more specifically as the process of establishing and maintaining a<br />
482
Oscar Rebollo et al.<br />
framework and supporting management structure and processes to provide assurance that information<br />
security strategies are aligned with and support business objectives, are consistent with applicable laws<br />
and regulations through adherence to policies and internal controls, and provide assignment of<br />
responsibility, all in an effort to manage risk (Bowen et al., 2006). Finally, focusing on the stakeholders’<br />
roles, ISG consists of the frameworks for decision-making and performance measurement that Board of<br />
Directors and Executive Management implement to fulfil their responsibility of providing oversight, as part<br />
of their overall responsibility for protecting stakeholder value, for effective implementation of Information<br />
Security in their Organization (Rastogi and Solms, 2006).<br />
In order to secure their information assets, companies need to adopt an ISG framework that assures<br />
effective implementation and makes process operational (Corporate Governance Task Force, 2004).<br />
Although there exist a variety of proposed frameworks, organizations neither know which one to adopt<br />
nor which one tailors to their own necessities. To help managers in their decisions, the following three<br />
comparative reviews have been found: (Rastogi and Solms, 2006) provide existing guidance on ISG and<br />
use four frameworks to propose a new definition of ISG; (Park et al., 2006) develop a literature review to<br />
look for ISG definitions and use this research to find which security management approaches cover<br />
governance success factors, and to know their limitations; (Mahncke et al., 2009) offer a literature review<br />
of approaches to measure ISG, and evaluate their suitability to general medical practice.<br />
Existing literature reviews do not compare the proposals in a systematic comprehensive manner, so an<br />
additional effort has been performed, presenting the results in this paper. This analysis will show the most<br />
relevant ISG frameworks, their characteristics, and the gaps that need to be filled in by future research.<br />
Achieved results may help security professionals identify the proposal that best suits their organizations;<br />
and lay the foundations of new researches focused on the thorough development of these frameworks.<br />
The research has lead to a set of criteria that allow performing an objective comparison and the<br />
repeatability of the results. These criteria have been selected from existing ISG definitions through the<br />
extraction of compulsory and desirable features that every framework should accomplish.<br />
During the process, specific and differentiating characteristics of the public sector are taken into account.<br />
While E-government is subject to the same threats as e-business, E-government operates within different<br />
constraints(Stibbe, 2005). Government entities exist for the purpose of serving society, while commercial<br />
firms exist for the benefit of their shareholders (Conklin and White, 2006); therefore the resulting security<br />
implementation must have specific considerations. Public organizations may be bound to security<br />
considerations according to applicable legislation, but an ISG framework can complement them or even<br />
be a substitute in case of lack of regulation (Ozkan and Karabacak, 2010).<br />
This paper is structured as follows: next section offers a brief description of the nine frameworks that<br />
have been studied; section 3 presents the comparative criteria that have been defined and the analysis<br />
performed; finally, our conclusions and future work are set out in section 4.<br />
2. Information security governance approaches<br />
A literature review has been carried out in depth to locate existing ISG frameworks. The nine most<br />
relevant ones are summarized in this section.<br />
2.1 A practical guide to implement and control Information security governance<br />
In (de Oliveira Alves et al., 2006), authors propose a framework for implementing ISG. It focuses on<br />
selecting metrics and indicators to track information security evolution, and also on measuring the<br />
maturity level of information security inside the organization.<br />
The approach considers the integration of corporate governance indicators, such as Balance Scorecard,<br />
with IT and security governance best practices, such as those included in COBIT and ISO/IEC 17799.<br />
The practical guide to implement ISG is composed of five stages, which are divided into activities,<br />
detailing the actions to be taken and who is responsible for performing each one.<br />
2.2 Business Software Alliance<br />
The Business Software Alliance (BSA) formed the Information Security Governance Task Force whose<br />
goal is to frame a response in terms that organizations can understand and implement. This Task Force<br />
483
Oscar Rebollo et al.<br />
has resumed in two white papers many ideas and concepts contained in other reports, legislation and<br />
guidelines.<br />
Firstly, in (BSA, 2003), authors state that there is already a legislative and regulatory regime around IT<br />
security and it must be enough so that companies stop treating security as a technology issue and start<br />
dealing with it as a corporate governance issue. They recommend adopting best practices and standard<br />
procedures such as ISO/IEC 17799 (later included in ISO/IEC 27000 family) and recognize the lack of an<br />
ISG framework that organizations can adopt. The Task Force proposes a framework where each<br />
management role knows what its functions are, how to accomplish its objectives and how to measure and<br />
audit the activities performed.<br />
Secondly, the proposal (Corporate Governance Task Force, 2004) expands the framework formerly<br />
introduced detailing the functions and responsibilities of every stakeholder involved in security. To<br />
implement this framework, authors propose the IDEAL model which is based on five steps: Initiating,<br />
Diagnosing, Establishing, Acting and Learning. Finally, tools are provided for the assessment, verification<br />
and compliance of the corresponding implementation.<br />
2.3 Information security policy: An organizational-level process model<br />
The proposal (Knapp et al., 2009) focuses on the policy side of ISG. Following a different approach from<br />
other studies, authors’ methodology includes data collection from security experts and some interviews<br />
and questionnaires with security professionals. The result is an information security policy model based<br />
on a set of interrelated processes that can be implemented in a repeatable cycle.<br />
Similar to other governance proposals, the model considers the impact of external and internal<br />
influences, as well as the role of corporate governance. Also, there is a great emphasis on training and<br />
awareness of developed policies through out the whole cycle.<br />
2.4 Information security governance (Von Solms)<br />
Authors have been researching the field of ISG, and as a result they have published a wide variety of<br />
papers and a compendium book.<br />
In (Posthumus and Solms, 2004), authors introduce the reason why information security should be<br />
considered as a corporate governance issue. They propose an information security framework clearly<br />
distinguishing between the governance and management sides.<br />
The approach (Posthumus and Solms, 2006) gives more detail on ISG and Information Security<br />
Management, as a part of corporate governance; and describes the tasks, roles and responsibilities of<br />
any key individual in an organization.<br />
As stated in (Solms and Solms, 2006), considering that Corporate Governance can be modelled using<br />
the Direct-Control Cycle, the same model is applied to Information Security Governance. Each of the<br />
steps of this cycle is analyzed through the three management levels: strategic, tactical and operational.<br />
All these results are compiled in the book (Solms and Solms, 2009), where authors describe ISG as part<br />
of Corporate Governance and also sharing some aspects of IT Governance. The Direct-Control Cycle<br />
anticipated in the previous paper is applied to a group of dimensions of information security and is<br />
combined with COBIT and ISO/IEC 27000 as best practices. Also, a methodology of 14 steps is<br />
developed to establish an ISG environment.<br />
2.5 ISACA<br />
The Information Systems Audit and Control Association (ISACA) has proposed (ISACA, 2009), where<br />
they define a generic model to tackle Information Security within a corporation. The model is based on<br />
systems theory and, therefore, consists of processes with inputs and outputs viewed holistically as a<br />
complete function unit.<br />
The model has the structure of a tetrahedron with four elements situated in its vertexes and six dynamic<br />
interconnections between them that link the elements together. The four elements are:<br />
Organization Design and Strategy<br />
484
People<br />
Process<br />
Technology<br />
The six dynamic interconnections are:<br />
Governing<br />
Culture<br />
Enabling and support<br />
Emergence<br />
Human factors<br />
Architecture<br />
Oscar Rebollo et al.<br />
2.6 ISO/IEC standards<br />
The International Organization for Standardization (ISO) has a wide portfolio of standards. Among these,<br />
the ISO/IEC 27000 family is dedicated to Information Security Management Systems, which can be used<br />
by organizations to develop and implement a framework for managing the security of their information<br />
assets and prepare for an independent assessment applied to the protection of their information. These<br />
standards provide guidelines to protect information assets through defining, achieving, maintaining, and<br />
improving information security; what is achieved implementing suitable controls and treating<br />
unacceptable information security risks.<br />
Although at first instance, it may seem that this publication only deals with management issues, there are<br />
some proposals to integrate them with information security governance. The paper (Solms, 2005)<br />
recognizes the broader scope of COBIT, as it covers the whole field of IT Governance, but states that<br />
COBIT focuses on what to do but without giving details on how to do it. Here is where the ISO/IEC 27000<br />
family has a chance, as it focuses on Information Security and gives more detail on how to do things.<br />
Both frameworks complement each other as shown in (ITGI, 2006a). Standard ISO/IEC 27014, currently<br />
under development, pretends to be a proposal on an ISG framework. Its scope includes defining ISG<br />
clarifying its relationship with corporate and IT governance; and developing a framework establishing its<br />
objectives, principles, and processes. The ISO/IEC 38500 family (ISO/IEC, 2008), which is related to<br />
Corporate Governance of information technology, can also be taken into consideration when dealing with<br />
ISG. The governance framework proposed in this standard, can be exported to information security<br />
implementations.<br />
2.7 ITGI<br />
The IT Governance Institute (ITGI), established in 1998 by the ISACA to focus on original research on IT<br />
governance and related topics, has developed COBIT (ITGI, 2007), which is a framework for IT<br />
Governance. COBIT 4.1 introduces a set of 34 processes grouped into four domains; detailing the control<br />
objectives, metrics, maturity models and other management guidelines for each of these processes.<br />
Although COBIT is mainly focused on IT Governance, four of its processes are more related to ISG,<br />
namely:<br />
PO6—Communicate management aims and directions<br />
PO9—Assess and manage IT risks<br />
DS4—Ensure continuous service<br />
DS5—Ensure systems security<br />
Surrounding COBIT, there are a group of products which complement it beyond the main framework (i.e.<br />
implementation guide, assurance guide, value of IT investments, etc). The most relevant ones in relation<br />
to ISG are the following guides:<br />
In (ITGI, 2006b) ITGI describes what ISG is and why it is important; details what the Board of<br />
Directors and Senior Executives should do, how it can be implemented and what, as consequence,<br />
can be achieved.<br />
The proposal (ITGI, 2008b) is based on the foundations presented in the previous one. It provides<br />
more detail on the definition of Information Security Objectives, and the strategies and action plans<br />
485
Oscar Rebollo et al.<br />
that can be used to reach them. Furthermore, critical success factors and metrics are introduced to<br />
monitor and measure Information Security, showing that this guide is directed to a lower<br />
management level than the aforementioned one.<br />
2.8 NIST<br />
The National Institute of Standards and Technology (NIST), an agency of the U.S. Department of<br />
Commerce, has published many guidelines related to Information Security. The guide (Bowen et al.,<br />
2006) has its second chapter dedicated to ISG.<br />
According to this book, there are five components of ISG:<br />
Strategic Planning<br />
Organizational Structure<br />
Roles and Responsibilities<br />
Enterprise Architecture<br />
Policies and Guidance<br />
All of these components of governance must be linked to the current implementation of security through<br />
on-going monitoring. In order to achieve this result, a description of activities and supporting processes to<br />
perform this monitoring is offered. In another NIST publication, (Bowen et al., 2007), the focus points<br />
towards developing an Information Security Program, so the key activities of this task are detailed.<br />
Among these activities, ISG is highlighted. Also, applicable laws and regulations to security programmes,<br />
from the U.S. point of view, are resumed.<br />
2.9 Software engineering institute<br />
The Software Engineering Institute, from the Carnegie Mellon University, has published the guide (Allen<br />
and Westby, 2007), as part of the Computer Emergency Response Team (CERT) programme. This guide<br />
defines governance for enterprise security and what the characteristics of effective ISG are so that<br />
readers can distinguish between effective and ineffective security governance. To succeed on ISG, the<br />
guide proposes the definition of an Enterprise Security Program within the corporation. This programme<br />
involves personnel at all levels throughout the organization, so different roles are identified pinpointing<br />
their functions and responsibilities. Each role has associated a set of activities with their correspondent<br />
outputs and supporting documents, which are described in a sequential way.<br />
3. Comparative analysis<br />
This section contains a comparative analysis of the most relevant approaches to Information Security<br />
Governance described previously. There is not any standardized framework to compare this kind of<br />
proposals so a set of criteria from different research fields will be utilized. These criteria have been<br />
selected taking into account the wide variety of existing literature definitions related to ISG. Most of these<br />
definitions place this subject as closely linked with IT Governance, Corporate Governance and<br />
Information Security, among other areas. Considering these three points of view, a comprehensive group<br />
of criteria has been defined, which covers both governance and management aspects.<br />
Selected criteria facilitate performing an objective analysis of the nine identified frameworks. With the<br />
proposed comparison topics, the whole spectrum of desirable characteristics related to ISG that can be<br />
found in literature is taken into account. To achieve unbiased results, some of the criteria are subdivided<br />
into different sub-criteria as a second aggregation level, so that each proposal may be easily classified.<br />
Furthermore, besides these three comparison groups, which are shared by every organization, public<br />
sector distinct characteristics have been considered. This constitutes a fourth criterion, which reflects the<br />
fact that governance processes have their own peculiarities within institutional units. Therefore, the<br />
comparative analysis will be based on the criteria detailed in the following subsections.<br />
3.1 IT governance criteria<br />
The literature review shows that there are many definitions of IT Governance. Papers such as (Webb et<br />
al., 2006) and (Dahlberg and Kivijärvi, 2006) analyze more than a dozen definitions and highlight five<br />
elements, which provide the foundations of IT Governance. These elements are:<br />
486
Oscar Rebollo et al.<br />
Strategic Alignment: information security must be aligned with business strategy towards the goals of<br />
the organization.<br />
Delivery of business value through IT: optimization of security investments delivering the promised<br />
benefits.<br />
Performance Management: monitoring security strategies to ensure reaching the organization´s goals<br />
in time.<br />
Risk Management: security risk awareness, identifying threats, vulnerabilities and impacts to control<br />
and reduce risks over the whole enterprise.<br />
Control and Accountability: every person in the organization needs to be involved in the security<br />
controls and has to know the responsibilities he owns inside the defined framework.<br />
3.2 Corporate governance criteria<br />
As a part of Corporate Governance, the following domains taken from (Simonsson and Johnson, 2006)<br />
will be considered:<br />
Goals: strategy decisions, development of information security policies and guidelines, and controls<br />
to monitor whether the goals are achieved.<br />
Processes: implementation and management of information security processes, with their related<br />
activities and procedures.<br />
People: structure within the organization; defining roles and responsibilities of the different<br />
stakeholders.<br />
Technology: link between Information Security Governance and the physical IT assets that the<br />
organization manages (inside and outside).<br />
3.3 Security criteria<br />
Information Security Governance is obviously related to the Information Security field, so a set of security<br />
criteria have been selected:<br />
Standards integration: some proposals refer to controls and best practices included in security<br />
standards (i.e. ISO/IEC 27000).<br />
Information Security Management: policies and procedures defined on the governance side can be<br />
linked to the management and operative side of information security.<br />
Tools and techniques: usually frameworks utilize tools to facilitate their implementation, such as<br />
metrics to measure the degree of compliance or maturity models to enable benchmarking between<br />
organizations.<br />
Practical implementation guidelines: theoretical approaches may be distinguished from practical<br />
ones; the latter involve detailing implementation activities, including case studies and even practical<br />
examples.<br />
3.4 Public sector suitability<br />
Although every identified ISG framework may be adapted to a public organization, some of them include<br />
differentiating characteristics that make them more suitable for the public sector. These particularities<br />
range from the compliance with specific laws, policies and regulations to requirements originated from<br />
multiple governing bodies; going through funding limitations in budgets and investments. Public<br />
institutions need to consider security beyond technical aspects in four domains: social, political, cultural<br />
and legal (Wimmer and Bredow, 2002). This fourth criterion evaluates these domains so that it may help<br />
boards in their decisions, avoiding unnecessary efforts in tailoring an ISG framework to a public entity.<br />
3.5 Analysis results<br />
The former defined criteria have been applied to the nine frameworks presented in section 2. The results<br />
are summarized in Table 1, which has been elaborated assigning three levels of conformance (high,<br />
medium and low) to each of the criteria.<br />
487
Table 1: Comparison of ISG frameworks<br />
Public Sector Suitability<br />
low<br />
medium<br />
low<br />
low<br />
low<br />
low<br />
low<br />
high<br />
low<br />
Practical implementation guidelines<br />
medium<br />
high<br />
low<br />
medium<br />
medium<br />
high<br />
low<br />
medium<br />
medium<br />
Tools and techniques<br />
high<br />
high<br />
medium<br />
low<br />
low<br />
high<br />
medium<br />
low<br />
low<br />
Information Security Management<br />
medium<br />
low<br />
medium<br />
high<br />
low<br />
high<br />
medium<br />
medium<br />
medium<br />
Standards integration<br />
high<br />
medium<br />
low<br />
high<br />
low<br />
high<br />
low<br />
high<br />
medium<br />
Security<br />
Technology<br />
high<br />
low<br />
medium<br />
medium<br />
high<br />
medium<br />
low<br />
low<br />
medium<br />
People<br />
high<br />
high<br />
low<br />
high<br />
high<br />
medium<br />
medium<br />
high<br />
medium<br />
Oscar Rebollo et al.<br />
Processes<br />
high<br />
high<br />
high<br />
high<br />
high<br />
high<br />
high<br />
high<br />
high<br />
Goals<br />
medium<br />
medium<br />
high<br />
medium<br />
high<br />
medium<br />
high<br />
high<br />
high<br />
488<br />
Corporate Governance<br />
Control and Accountability<br />
medium<br />
low<br />
medium<br />
high<br />
low<br />
medium<br />
high<br />
low<br />
high<br />
Risk Management<br />
high<br />
high<br />
high<br />
high<br />
low<br />
high<br />
high<br />
high<br />
high<br />
Performance Management<br />
low<br />
medium<br />
medium<br />
medium<br />
medium<br />
high<br />
high<br />
medium<br />
low<br />
Delivery of business value through<br />
IT<br />
medium<br />
low<br />
low<br />
low<br />
medium<br />
low<br />
high<br />
low<br />
medium<br />
Strategic Alignment<br />
medium<br />
medium<br />
high<br />
medium<br />
high<br />
medium<br />
high<br />
high<br />
high<br />
IT Governance<br />
Criteria<br />
A practical guide to<br />
implement and<br />
control Information<br />
Security Governance<br />
Business<br />
Software<br />
Alliance<br />
ISG Frameworks<br />
Information<br />
security policy:<br />
An<br />
organizationallevel<br />
process<br />
model<br />
Information<br />
Security<br />
Governance<br />
(Von Solms)<br />
ISACA<br />
ISO<br />
Standards<br />
IT<br />
Governance<br />
Institute<br />
NIST<br />
Software<br />
Engineering<br />
Institute
Oscar Rebollo et al.<br />
Table results can be analyzed from two different perspectives. On the one hand, horizontally, some of the<br />
proposed criteria are more widespread over the ISG frameworks than others. Among the governance<br />
criteria, nearly all of the proposals deal with strategic alignment, risk management, goals and processes;<br />
however, delivery of business value through IT is only deeply developed by the IT Governance Institute<br />
on the Val IT Framework (ITGI, 2008a), and technology relations with physical IT implemented assets are<br />
seldom considered. Generally speaking, security criteria seem to be less relevant than the previous ones,<br />
as authors tend to offer high level solutions, distant from implementation details.<br />
On the other hand, vertically, three of the frameworks seem to be more aligned with the groups of criteria<br />
and could be considered as reference starting points. Namely: IT Governance Institute focuses on IT<br />
Governance, ISACA is mainly related to Corporate Governance, and ISO Standards deal principally with<br />
Security criteria. The rest of the approaches are situated in intermediate positions, leveraging the<br />
importance each one gives to every comparative aspect.<br />
With respect to public sector suitability, most of the frameworks do not detail the specific implications of<br />
implementing ISG into a public entity. The guidelines proposed by the NIST are the main exceptions<br />
which take into account these considerations, but they are much localized as a consequence of having<br />
their foundations based on US regulations and laws. Therefore, additional efforts are needed when<br />
adapting this framework to other country´s organizations. Also, some guidance is included in BSA´s<br />
proposal, which offers some key notes when adopting information security by educational and non-profit<br />
institutions.<br />
Public organizations are usually bound to a specific regulatory framework which results in different<br />
governance processes. This is the consequence of the application of the corresponding legislation which<br />
emanates from various level authorities (national, regional, etc). In most cases, the selected ISG proposal<br />
needs to be localized to the regulations where the organization resides.<br />
4. Conclusions and future work<br />
The security of any organization´s assets must involve every stakeholder from senior executives to<br />
operational personnel. Information Security Governance helps to carry out this task providing a<br />
framework which can be adopted by enterprises. The board of governance of any company that relies on<br />
this methodology should be confident about compliance with a wide set of security measures and even<br />
regulation requirements; furthermore, information security becomes a process inside the organization<br />
covering all of the information assets and provides alignment with business strategy.<br />
The nine most relevant ISG frameworks existing in the literature have been reviewed in this paper,<br />
performing a comparative analysis between them using a comprehensive set of conformance criteria.<br />
The performed review has shown that none of the approaches, not even the most recent ones, fulfil every<br />
necessity field that organizations need to tackle. Although these proposals include desirable features,<br />
their main lacks have been highlighted.<br />
Special attention has been paid to public sector suitability, but most ISG proposals are more focused on<br />
private corporations than public organizations. This issue may be considered by the directors of any<br />
public institution when adopting one of these methodologies.<br />
Additional research work is needed to develop a general ISG framework which fills the detected gaps.<br />
Either taking any of the approaches included in the comparative study as a starting point, or building it<br />
from scratch, it is imperative that such a task is undertaken. Future work will follow this line,<br />
complementing existing proposals to reduce their weaknesses as well as to achieve a comprehensive<br />
framework that can be systematically extended to any organization.<br />
Acknowledgements<br />
This research is part of the following projects: MEDUSAS (IDI-20090557), financed by the Centre for<br />
Industrial Technological Development (CDTI), ORIGIN (IDI-2010043(1-5)) financed by the CDTI and the<br />
FEDER, BUSINESS (PET2008-0136) awarded by the Spanish Ministry for Science and Technology and<br />
SEGMENT (HITO-09-138) and SISTEMAS (PII2I09-0150-3135) financed by the Council of Education<br />
and Science of the Castilla-La Mancha Regional Government.<br />
489
References<br />
Oscar Rebollo et al.<br />
Allen, J. H. & Westby, J. R. (2007) Governing for Enterprise Security Implementation Guide, Software Engineering<br />
Institute - CERT.<br />
Bowen, P., Chew, E. & Hash, J. (2007) Information Security Guide For Government Executives, National Institute of<br />
Standards and Technology.<br />
Bowen, P., Hash, J. & Wilson, M. (2006) Information Security Governance. Information Security Handbook: A Guide<br />
for Managers. National Institute of Standards and Technology.<br />
BSA (2003) Information Security Governance: Toward a Framework for Action.<br />
Conklin, A. & White, G. B. (2006) e-Government and Cyber Security: The Role of Cyber Security Exercises.<br />
Proceedings of the 39th Annual Hawaii International <strong>Conference</strong> on System Sciences.<br />
Corporate Governance Task Force, T. (2004) Information Security Governance: A Call to Action.<br />
Crossroad (2010) Updated Gap Analysis Report. A Participative Roadmap for ICT Research in Electronic<br />
Governance and Policy Modelling.<br />
Dahlberg, T. & Kivijärvi, H. (2006) An Integrated Framework for IT Governance and the Development and Validation<br />
of an Assessment Instrument. Proceedings of the 39th Hawaii International <strong>Conference</strong> on System Sciences.<br />
de Oliveira Alves, G. A., Rust da Costa Carmo, L. F. & Ribeiro Dutra de Almeida, A. C. (2006) Enterprise Security<br />
Governance: A practical guide to implement and control Information Security Governance. Business-driven IT<br />
Management.<br />
Hardy, G. (2006) Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and<br />
compliance challenges. Information Security Technical Report, 11, 55-61.<br />
Humphreys, E. (2008) Information security management standards: Compliance, governance and risk management.<br />
Information Security Technical Report, 13.<br />
ISACA (2009) An Introduction to the Business Model for Information Security.<br />
ISO/IEC (2008) ISO/IEC 38500:2008 Corporate governance of information technology.<br />
ITGI (2006a) COBIT Mapping to ISO/IEC 17799:2000 With COBIT.<br />
ITGI (2006b) Information Security Governance: Guidance for Boards of Directors and Executive Management (2nd<br />
Edition).<br />
ITGI (2007) Control Objectives for Information and related Technology (COBIT 4.1).<br />
ITGI (2008a) Governance of Investments, The Val IT Framework 2.0.<br />
ITGI (2008b) Information Security Governance: Guidance for Information Security Managers.<br />
Johnston, A. C. & Hale, R. (2009) Improved Security through Information Security Governance. Communications of<br />
the ACM, 52, 126-129.<br />
Knapp, K. J., R. Franklin Morris, Thomas E. Marshall & Byrd, T. A. (2009) Information security policy: An<br />
organizational-level process model. Computers & Security, 28, 493-508.<br />
Mahncke, R. J., McDermid, D. C. & Williams, P. A. H. (2009) Measuring Information Security Governance Within<br />
General Medical Practice. Proceedings of the 7th Australian Information Security Management <strong>Conference</strong>.<br />
Ozkan, S. & Karabacak, B. (2010) Collaborative risk method for information security management practices: A case<br />
context within Turkey. International Journal of Information Management, 30, 567-572.<br />
Park, H., Kim, S. & Lee, H. J. (2006) General Drawing of the Integrated Framework for Security Governance. Lecture<br />
Notes in Computer Science, 4251, 1234-1241.<br />
Pasquinucci, A. (2007) Security, risk analysis and governance: a practical approach. Computer Fraud & Security, 12-<br />
14.<br />
Posthumus, S. & Solms, R. v. (2004) A framework for the governance of information security. Computers & Security,<br />
23, 638-646.<br />
Posthumus, S. & Solms, R. v. (2006) A Responsibility Framework for Information Security. International Federation<br />
for Information Processing.<br />
Rastogi, R. & Solms, R. v. (2006) Information Security Governance - A Re-Definition IFIP International Federation for<br />
Information Processing, 193, 223-236.<br />
Simonsson, M. & Johnson, P. (2006) Assessment of IT Governance - A Prioritization of Cobit. Proceedings of the<br />
<strong>Conference</strong> on Systems Engineering Research.<br />
Solms, B. v. (2005) Information Security governance: COBIT or ISO 17799 or both? Computers & Security, 24, 99-<br />
104.<br />
Solms, R. v. & Solms, S. H. B. v. (2006) Information Security Governance: A model based on the Direct–Control<br />
Cycle. Computers & Security, 25, 408-412.<br />
Solms, S. H. v. & Solms, R. v. (2009) Information Security Governance, Springer.<br />
Stibbe, M. (2005) E-government security. Infosecurity Today, 2, 8-10.<br />
Webb, P., Pollard, C. & Ridley, G. (2006) Attempting to Define IT Governance: Wisdom or Folly? Proceedings of the<br />
39th Hawaii International <strong>Conference</strong> on System Sciences.<br />
Williams, P. (2001) Information Security Governance. Information Security Technical Report, Vol 6, No. 3, 60-70.<br />
Wimmer, M. & Bredow, B. v. (2002) A Holistic Approach for Providing Security Solutions in e-Government.<br />
Proceedings of the 35th Hawaii International <strong>Conference</strong> on System Sciences.<br />
490
Web 2.0 on the Mexican State Sites: An Overview<br />
Rodrigo Sandoval Almazán 1 , Gabriela Díaz Murillo 2 , Ramón Gil-Garcia 3 , Luis<br />
Luna-Reyes 2 and Dolores Luna-Reyes 2<br />
1 Universidad Autónoma del Estado de México, Toluca, México<br />
2 Universidad de las Américas Puebla, México<br />
3 Centro de Investigación y Docencia Económicas, México<br />
rsandovala@uaemex.mx<br />
gabriela.diaz@udlap.mx<br />
joseramon.gil@cide.edu<br />
luisf.luna@udlap.mx<br />
dolorese.luna@udlap.mx<br />
Abstract: The use of Web 2.0 features to increase the number of users on e-commerce sites is a trend that is even<br />
expanding to government sites. Web 2.0 features, such as blogs, wikis, forums, RSS, podcasts and videocasts, as<br />
well as social markers such as Del.icio.us, Technorati, Facebook and Digg have reached government sites. The<br />
purpose of this research is to assess the impact of this tendency on Mexican local government sites by asking the<br />
following question: To what extent have local eGovernment sites in Mexico adopted Web 2.0 tools? As a result of an<br />
evaluation of Mexican local government sites in 2009, we found that several Web 2.0 characteristics are being used;<br />
however, we also found that not all features are as equally well-developed or used on the local sites. Web 2.0 is only<br />
a starting point for innovation in eGovernment sites. This paper is organized into four sections: The first section<br />
introduces the trend of Web 2.0 over internet sites and how it is different from Web 1.0 and Web 3.0. The second<br />
section is dedicated to discussing the link between eGovernment and Web 2.0 according to the evolutionary model<br />
proposed by the authors. The third section describes the methodology used to collect data from local states in<br />
Mexico and the eGovernment ranking where this data was collected. The fourth and final section describes the<br />
findings of Web 2.0 and discusses the future of this trend in eGovernment sites.<br />
Keywords: Web 2.0, eGovernment, websites, twitter, social media<br />
1. Introduction<br />
Web 2.0 represents an evolution in Internet applications and sites for presenting unidirectional content<br />
and information through to the creation of applications that facilitate higher levels of interaction between<br />
Web content users. These applications promotes collaboration and provide services which seek to<br />
replace traditional processes for creating content. Specifically, Web 2.0 refers to a new version of the<br />
Web based on the creation of content produced and shared by the very same users of a Web site. In<br />
other words, consumers of information have become “prosumers” or producers of part of the information<br />
that they consume (Tapscott, 2006).<br />
This way, Web 2.0 applications may be considered as the next step in the development of technologies<br />
related to the Internet. Some of these applications are the so-called social networks, micro-formats,<br />
social labels, RSS (content syndication), blogs, videoblogs, podcasts, wikis and forums, etc. Examples of<br />
commercial websites that implement these applications include Technorati, Digg, Facebook, Flickr,<br />
YouTube, MySpace, Twitter and Del.icio.us, amongst others. Some government sites are also starting to<br />
include some of these applications. Part of this study evaluated the use of Web 2.0 tools on state sites.<br />
Specifically, we noted the use of Blogs, Wikis, Forums, RSS, APIs (such as Google Maps), Podcasts,<br />
Videocasts, Social Markers (such as Del.icio.us, Technorati, Facebook or Digg) and social networks.<br />
All of these applications, despite the fact that their purpose and make-up appear to be very different,<br />
share certain characteristics, such as the generation and classification of information and content in a<br />
collective manner, the integration of communities, and the production and consumption of knowledge<br />
distributed socially. These common characteristics allow them to be catalogued as Web 2.0 tools and<br />
applications. These tools have proven themselves to be efficient mechanisms for developing political<br />
activism (perhaps the most well-known case in the world is that of the Barack Obama presidential<br />
campaign in the United States), as tools for handling relationships with the media, as in the case of<br />
Twitter, and as an alternative ways of disseminating content, like the case of YouTube, in the face of<br />
social problems or political crises, such as the recent elections in Iran or the coup d’état in Honduras, and<br />
the deposition of the Tunisian President.<br />
491
Rodrigo Sandoval Almazán et al.<br />
For government sites Web 2.0 applications have the potential to generate greater interaction between<br />
different social actors, and as a consequence, greater citizen participation in government processes,<br />
which have recently been labeled as Government 2.0. These applications are beginning to be used at all<br />
three levels of government and within diverse public policy areas. A recent study revealed that Mexicans<br />
between the ages of 18 and 28 years were dissatisfied with the level of communication established<br />
between them and the government, and suggests that Web 2.0 tools could be an effective mechanism for<br />
opening alternative channels of communication (Deloitte, 2009). However, the use of these tools is still in<br />
its early stages, and we know little about the outcomes reached by these social experiments, given the<br />
scarcity of research on this field. Furthermore, despite signs that some Mexican state sites already have<br />
working Web 2.0 tools, a significant number of users are unaware about how these tools work. Based on<br />
measurements of these technologies taken from Mexican state sites in 2008, this paper will show the<br />
extent to which they are currently used, and in which areas of state government sites are used more<br />
frequently.<br />
Web 2.0 Internet Sites and Tools<br />
The term Web 2.0 has yet to be fully defined in a manner widely accepted by experts in the field. It was<br />
coined by O’Reilly in 2005 (O'Reilly, T. 2005) who defines it as: “the web as a platform that extends to all<br />
connected devices”, although these devices are not just limited to being interconnected, instead much of<br />
their functionality rests on the fact that they use technologies that allow users to build the content and<br />
format of sites. Table 1 shows a comparison made by O’Reilly (O'Reilly, T. 2005) between Web 2.0<br />
applications and traditional applications.<br />
Table 1: Comparison between Web 1.0 and Web 2.0<br />
Web 1.0 Web 2.0<br />
Double click Google AdSens<br />
Ofoto Flickr<br />
Akamai BitTorrent<br />
mp3.com Napster<br />
Encyclopedia Britannica Online Wikipedia<br />
Personal Web sites Blogging<br />
Screen scraping Web services<br />
Page views Cost per Click<br />
Domain name speculation Search engine optimization<br />
Directories (taxonomy) tagging ('folksonomy')<br />
Publishing Participation<br />
Content management systems Wikis<br />
Stickiness Syndication<br />
Source: O’Reilly, 2005<br />
O’Reilly says that Web 2.0 is a mechanism for social cohesion and cooperation. More recent works, such<br />
as that undertaken by Tapscott and Williams (Tapscott and Williams, 2006) describe the phenomenon as<br />
follows: “The new web is fundamentally different in both its architecture and applications. Instead of a<br />
digital newspaper, it is a canvas where every splash of paint contributed by a user enriches the tapestry;<br />
whether people are creating, sharing or socializing, the new Web is about participating rather than<br />
passively receiving information” (p. 37).<br />
Web 2.0 reveals itself as a revolutionary way of gathering, organizing and sharing information. Some of<br />
its better-known examples include: Google, Weblogs, Wikipedia, YouTube, Twitter and Second Life.<br />
Other authors have mentioned that it is a standard platform or model for current websites, and is not an<br />
improved version of the earlier Web 1.0. Zappen and his colleagues (Zappen, M. Harrison and David<br />
Watson, 2008) point out some differences:<br />
Web 2.0 facilitates flexible design, creative reuse and updating,<br />
It offers the user an enriched and interactive interface,<br />
It facilitates collaboration for creating and modifying content,<br />
492
Rodrigo Sandoval Almazán et al.<br />
It allows new applications to be created by reusing and combining different data and sources,<br />
It establishes social networks between people who have the same interests, and<br />
It supports cooperation in gathering collective intelligence.<br />
Web 2.0 is a social network platform because its content is user-generated –as if it were a collective<br />
intelligence— converting into co-producers of content and not just passive subjects who only receive the<br />
information. Interaction plays a vital role in this platform. This capacity for interaction is vital and to<br />
achieve it; governments must consider this type of tool very seriously (Woods, 2007), not just to enable<br />
the bureaucracy to reduce its costs and allow a greater flow of information, but as a way of approaching<br />
citizens and making sure their participation enriches government efforts.<br />
Although relatively new, Web 2.0 tools and applications have been used on government websites in such<br />
countries as Germany where De Kool and Van Wamelen (2008) proposed six categories for analyzing<br />
electronic government using Web 2.0, gathering case studies in their country to demonstrate the use of<br />
Web 2.0. It has also been suggested as a way of solving problems related to information transparency in<br />
governments. Kubicek, who submited those ticket systems used for providing services, suggested that<br />
this tool could also be employed to improve transparency and rendering of accounts, through the use of<br />
social networks (Kubicek, 2008). Lastly, Eliason and Lundberg focused their attention on investigating the<br />
specific use of Web 2.0 in designing municipal websites using gender as a tool to reduce the complexity<br />
of sites and better organize content (Eliason, 2006).<br />
Currently, the notion of open government (o-government) or transparent government has begun to use<br />
Web 2.0 tools to interact with the citizenry and request their opinions on just how open federal<br />
government should be to its citizens. This initiative from the United States’ President, Barack Obama<br />
(Memorandum of Transparency and Open Government), and the White House website which invites<br />
citizens to participate in this initiative through discussion forums whose purpose is to establish principles<br />
(United States Government, 2009) and come up with proposals for law reform (United States<br />
Government, 2009) are clear examples of how these technologies can be used by government (United<br />
States Government, 2009).<br />
Even though the usefulness of Web 2.0 in governments is promising, the great question that prevails is<br />
whether public sector organizations are able to commit to this new way of interrelating with their citizens,<br />
and improving user-experience and their perceptions of public services. Some of the risks that may arise<br />
from the use of Web 2.0 tools and applications are: data isolation, exclusion of content, privacy issues<br />
and the risk of improper use of the information (de Kool and Wamelen, 2008).<br />
2. Electronic government and Web 2.0<br />
There are different definitions for electronic government but all contemplate the use of Information and<br />
Communication Technologies (ICT) in carrying out the activities of governments (Gil-García and Luna-<br />
Reyes, 2008). In Mexico, in addition to the Federal Government’s significant presence on the Internet,<br />
occupying the 56 th place on the last UN classification (UNPAN, 2010), all state governments and a<br />
significant number of municipal governments have a presence on the Internet. Internet sites are now one<br />
of the primary means of providing information, dealing with applications and services, and interacting with<br />
different government dependencies. Web 2.0 tools have the potential to take these relationships to the<br />
next level and change interaction schemes between citizens and their participation in government<br />
processes and decision making (Yáñez, 2009).<br />
Electronic Government and Web Sites<br />
There is still not an unified vision of the Electronic Government term. From analysis made from the<br />
literature on the topic, Gil-García and Luna-Reyes (2008) concluded to define electronic government as<br />
“the selection, implementation and use of information and communication technologies in government to<br />
provide public services, improve the effectiveness of administration and promote democratic values and<br />
mechanisms, as well as to create a legal framework that facilitates the development of intensive<br />
initiatives for the use of information resources and promote the development of the knowledge society”.<br />
State government sites are just one example of the application of electronic government. The<br />
development of these applications are applicable not only to pressure from the public to receive the same<br />
service it receives from the private sector, but also the perception of a multitude of potential benefits to<br />
public administration (Luna-Reyes, Hernández-García and Gil-García, 2009). A government site is<br />
493
Rodrigo Sandoval Almazán et al.<br />
understood as “an access point integrated into a state government Internet site which provides both<br />
external entities and government personnel with a single online access point to state resources and<br />
information” (Gant-Burley, Gant and Craig-Johnson, 2002).<br />
Government Sites as Communication Systems<br />
State websites can be considered government-citizen communication systems via the computer and<br />
Internet. This communication system via computers is characterized by the integration of different media<br />
and its interactive potential. Multimedia, as Castells puts it (Castells, 1998), extends the reach of<br />
electronic communication to every aspect of life (from home to the workplace, from schools to hospitals,<br />
from entertainment to trips).<br />
In this sense, state sites are immersed in a new multimedia system which includes and covers all<br />
expressions of culture. In this new kind of society, all types of messages work in a binary fashion:<br />
presence/absence, whereby presence enables the communicability and socialization of the message.<br />
While the function of communicability is present in all state websites, socialization is only present in some<br />
given that not all have the tools and applications for this (socialization) to take place between users and<br />
government. From a society perspective, communication based on electronic means (typographic,<br />
audiovisual or via computer) is communication (Castells, 1998). This means that the media –in this case,<br />
the site–, is immersed in this multimedia universe, fulfills the role of communicating Government<br />
information.<br />
The evolution of Sites and Models for Communication and Socialization<br />
There are different models that explain the processes of development and evolution of Internet sites<br />
(Layne and Lee, 2001). A few years ago, and taking these evolutionary models as a base, an evaluation<br />
was carried out of state government sites in Mexico (Sandoval Almazán, Gil-Garcia and Luna-Reyes,<br />
2007 and 2008). The stages of Information, Interaction, Transaction, Integration and Participation were<br />
proposed as complementary, but not mutually exclusive components, which can be used to characterize<br />
the development of government sites. Furthermore, this reference framework can be reinterpreted from a<br />
theoretical standpoint in relation to the communication systems included in the previous section. The<br />
communication that arises from the interaction between government and citizens can take place in<br />
different ways, which are explained below.<br />
The Information stage. The characteristics of the sites that belong to the information stage are<br />
comprised by those that only display information on the activities of public administration. Examples of<br />
these characteristics include news or announcements about events, as well as services available to<br />
citizens. The communication that takes place between the Government and Citizens at this stage is one<br />
of sender to receiver, which is horizontal and one way. In this, as well as other levels of site development,<br />
the receiver plays both roles mentioned by Castells (1998). They can be interactors by choosing their<br />
communication path, deciding and selecting the topic, and the knowledge they hope to obtain, as well as<br />
the media; or they can be interacted, users that, within their own capabilities and possibilities, select and<br />
seek out knowledge from inside a media which provides them with limited options. Nevertheless, the<br />
inherent characteristics of the information stage limit the users’ capacity to interact, relegating them to the<br />
position of interacted.<br />
The Interaction Stage. Characteristics inherent to sites in the interaction stage include applications that<br />
allow interaction between citizens and the government, such as forms for asking questions and making<br />
enquiries, forums or automated applications like virtual public servers. Communication between Citizens<br />
and the Government at this stage is two-way, from the sender to the receiver and vice versa, establishing<br />
channels for interaction, such as electronic mail or those mentioned previously. At this stage of two-way<br />
communication, there are more opportunities for interactors to choose their means of communication.<br />
The Transaction Stage. Characteristics of Internet sites at the transaction stage mainly include what<br />
have been electronic commerce topics. The main difference between this and the interaction stage is the<br />
interchange of services and application processes with a well defined cycle and on many occasions, the<br />
fees payments. Nevertheless, since these are services with clearly defined cycles and processes, it is<br />
more common to find an interest in obtaining feedback on how they have performed. One example is<br />
online services that can be carried out by citizens.<br />
494
Rodrigo Sandoval Almazán et al.<br />
The Integration Stage. Characteristics inherent to the integration stage make reference to the capability<br />
of the site to present itself as a single window for providing services to the citizen and making it<br />
transparent which agency or agencies are in charge of delivering the services or information. At this<br />
stage, not only does communication take place between the Government and Citizen, but also between<br />
Government dependencies which in turn, communicate this information to the citizen and provide<br />
feedback from the government to the citizen, the citizen to the government and between government<br />
dependencies. For example, municipal government sites that make it easy to obtain construction permits<br />
and licenses needed to start a business on the same site, requiring different agencies that participated in<br />
this process and that were coordinated in order to offer this service to the citizen. This coordination can<br />
be achieved in different ways from using an agent to process all the applications submitted by the<br />
citizens through the technical integration of data and processes between different agencies that enabled<br />
them to offer the service without the need for an agent.<br />
The Participation Stage. Government sites that show characteristics of the participation stage offer the<br />
citizen the ability to socialize and get this way to a full interaction. At this stage, communication is most<br />
extensive, taking place between Government and Citizen, between dependencies, between citizens and<br />
providing feedback.<br />
Communication produced through the use of Web 2.0 tools takes place according to the type of<br />
population and media they choose to obtain information from. In the case of interactors, as mentioned by<br />
Castells (1998), Web 2.0 tools are useful applications for obtaining information without the need to<br />
search for it, which simplifies the job for the user. As for the interacted population, searching for and<br />
finding information within media is made easier by the introduction of these tools on the site. But it is not<br />
only important depending on the type of population that uses the media, it is important because Web 2.0<br />
is implementing applications that make communication possible between different actors within a site, in<br />
which communication takes place in settings where citizens and government communicate between each<br />
other.<br />
3. Methodology<br />
This section describes the data collection methods and the procedures followed to analyze them. The<br />
target population for this analysis is the sites of the 31 Mexican states and the Federal District. Sites were<br />
viewed by three independent observers during the first half of 2008. Observers used a guide to evaluate<br />
the state sites and record the inclusion of Web 2.0 tools, as well as the sections of the site that used<br />
these tools. Data from these observations were collected by each observer and collected by one of them.<br />
In order to get to results related to the use and the frequency of Web 2.0, it was first determined whether<br />
the Web 2.0 tools were used, followed by their frequency. In other words, the number of times a tool in<br />
the sections of the different state sites was used.<br />
To complement this initial measurement in 2008, a second one was undertaken for the 32 state sites<br />
which only looked at Web 2.0 tools linked to the Twitter and Facebook social networking sites in order to<br />
understand what impact this social media technology has on the web pages of state governments. More<br />
specific questions include: How do these governments currently use social media tools? Which state<br />
governments use Facebook and Twitter to raise awareness?<br />
Once the sample from the 32 states and the two social networking platforms were chosen, the procedure<br />
that followed was: Each platform was visited to find out whether the government web pages had valid<br />
accounts –Twitter or Facebook– which were validated by entering them and verifying that they did in fact<br />
belong to the elected government and not a fictitious or erroneous name, or one from another country.<br />
During this validation, data provided by the websites were noted down, such as: followers, individuals<br />
that follow twitter and lists in the case of Twitter, and the number of “friends” in the case of Facebook.<br />
This information was collected during the months of May and October, 2010, using the web browsers<br />
Firefox and Safari, and a broadband Internet connection.<br />
4. Findings and discussion<br />
This section contains a summary of the data collected during the first evaluation of the use of Web 2.0<br />
tools by Mexican state government sites for both the 2008 and the 2010 measurements. Figure 1 shows<br />
the use of the different tools evaluated expressed as a percentage. The most commonly used tools are<br />
APIs at 65% of all Mexican state government sites which use this tool to display dynamic content to<br />
users. The next most used tools are Podcasts (40.6%) and Videocasts (37.5%). It is worth noting that, for<br />
this first evaluation, Podcasts or Videocasts were considered as any sequence of audio or video content<br />
495
Rodrigo Sandoval Almazán et al.<br />
posted on the site, regardless of whether it was tourism-related, general information or simply promoted<br />
the state or the incumbent governor. Only 34.4% of state government sites used RSS to distribute<br />
content related to news items or events. The least used mechanisms were forums (25%), wikis (15.6%),<br />
social markers and social networks (6.3%), and only 3.1% of all sites evaluated used blogs. It is clear that<br />
state government electronic sites focus mostly on displaying informative content in text, video and audio<br />
format (Podcasts, Videocasts and RSS) rather than on applications that allow easy communication<br />
between public officials and citizens.<br />
Figure 1: Percentage use of tools by state sites 2008<br />
Regarding to the frequency with which these Web 2.0 tools from the different sections of the sites are<br />
employed, we found that tools located in the Citizens section generally received the most use, followed<br />
by the Government and Tourism sections. The most commonly used tool in the Citizens section was<br />
APIs, which suggests that states are interested in creating interactive applications in this section of the<br />
site. The Government section demonstrates the greatest diversity of tool use, which reflects wide-ranging<br />
interest on the part of the states in terms of the type of communication they seek to create with their<br />
citizens through this section. The tourism section showed a pattern for including multimedia information in<br />
audio and video format. This same pattern was observed in the culture section, albeit with less<br />
frequency. It is interesting to note that only a couple of sites used content syndication services (RSS) in<br />
the press area.<br />
Table 2: Sections where Web 2.0 tools were found<br />
Tools/Section<br />
s<br />
Governme<br />
nt<br />
Citizen Tourism Culture<br />
Application<br />
s and<br />
Services<br />
Transparency Press Othe<br />
rs<br />
Podcasts 1 1 6 2 1 0 0 2<br />
RSS 3 4 0 1 0 0 2 0<br />
Blogs 1 0 0 0 0 0 0 0<br />
Forums 1 1 0 0 0 0 0 0<br />
Videocasts 1 0 4 2 0 1 1 0<br />
Chat 1 1 0 0 1 0 0 0<br />
API 4 17 0 0 0 0 0 0<br />
Red Social 0 1 0 0 0 0 0 1<br />
TOTAL 12 25 10 5 2 1 3 3<br />
496
Rodrigo Sandoval Almazán et al.<br />
2 nd Observation of Twitter and Facebook on state sites 2010<br />
Data collected reveals that 16 states, in other words 50 percent, have Twitter and Facebook. Only three<br />
states (9%) have a Facebook account and only five states have Twitter. Eight states (25%) do not have<br />
accounts with either social networking platform.<br />
Facebook<br />
Several Mexican states show no potential growth in the number of registered friends. The states of<br />
Morelos, Durango, Colima, State of Mexico, Sonora, Hidalgo, Baja California, Campeche and Quintana<br />
Roo have remained the same in each case. Morelos and Durango stand out from the others with more<br />
than three thousand friends each one.<br />
States that have shown growth in the number of “friends” or followers on this platform are: Jalisco and<br />
Guerrero. Jalisco increased from 13 to 3611, growing 27 times. As for Guerrero, it is also noteworthy that<br />
it began with 46 individuals and has now 2973. Nuevo León also experiences a sustained growth going<br />
from 2150 to 4972, an increase of 131 percent. States, such as the Federal District –the capital–<br />
Zacatecas, Chihuahua, Michoacán and Guanajuato, show the same trend. (See Append 1)<br />
Twitter<br />
One of the components of Twitter is its followers. Without doubt, this is one of the most interesting<br />
categories as it relates to the number of individuals or institutions that want to have a link with the<br />
government using this technological tool. Followers of the web page of the president, standing out with a<br />
growth of more than 10 times, going from eight thousand followers to more than one hundred thousand in<br />
six months (see Append 2). This however, is exceeded by Querétaro, Sinaloa and Chiapas –which grew<br />
20 times– and Guanajuato -69 times– amongst others. States experiencing more modest growth<br />
included: the Federal District, the State of Mexico and Baja California.<br />
The phenomenon related to increases in the number of followers is explained in the section individual<br />
followers. Nevertheless, it should be added that it is also dependent on the viral effect (Boynton, 2009),<br />
the replication and spread of links among citizens and government officials promoting the page, which<br />
can lead to a significant explosion in the number of followers in just a few days.<br />
5. Conclusions<br />
Web 2.0 tools and applications seem to be an important alternative for governments and their websites in<br />
the not too distant future. The so-called Government 2.0 has the potential to bring governments and their<br />
citizens closer together simple and effective way. These types of tools will allow greater citizen<br />
participation and enable government dependencies to transmit more and better information. However, it<br />
is also clear that these tools and applications are currently receiving little use on state government sites.<br />
This evaluation reveals some preliminary data on the use of Web 2.0 by state government sites in<br />
Mexico. Given the speed at which Web 2.0 tools change and their availability on the Internet, many sites<br />
could be using them already. Nevertheless, this initial data offers up a first look at this phenomenon and<br />
serves as the grounds for future studies on the topic.<br />
A next stage for the Mexican states that have connected using these tools is for them to hold a dialog<br />
(Boyd, Golder, & Lotan, 2010) –an exchange of tweets and retweets– between users to bring about a<br />
citizen-government collaboration (Honeycutt & Herring, 2008) using Facebook or Twitter. Twitter can help<br />
to both exchange information and recommend news, data or relevant information (Phelan, McCarthy, &<br />
Smyth, 2009). In recent research into the impact of Twitter on the government, Wigand (2010) tried to<br />
analyze the participation of Twitter in the government using four theories: Diffusion and Innovation; Social<br />
Influence, Social Presence and Collective Intelligence Theories through which social networking tools<br />
can interact with the government.<br />
We can conclude that the evaluated Mexican states are beginning to use social networking tools in a<br />
rudimentary fashion. More research is needed to observe the level of interaction with the citizens, their<br />
use to generate value within an organization –and that they’re not just a waste of time– as well as to<br />
determine whether these technologies are useful for improving local government practices and the<br />
relationship with citizens.<br />
497
Rodrigo Sandoval Almazán et al.<br />
Finally, the use of Web 2.0 tools on electronic government sites is not just limited to posting the tool.<br />
Including tools and applications on the sites is just the first step; there needs to be a strategy and clear<br />
approach as to what they are expected to achieve. Government 2.0 has great potential to transform and<br />
improve relations between government, citizens, companies and other interest groups, but these tools<br />
must be combined with a clear vision and effective strategies if their effects are to be valuable and<br />
meaningful to governments and citizens alike, as well as to society as a whole. We hope that this first<br />
look at the topic proves useful and arouses greater interest in these types of applications, and leads us in<br />
the near future to internet sites that can really be considered shining examples of Government 2.0.<br />
6. Appendix 1: Evolution of Facebook friends on state websites<br />
Government March 2010 October 2010 Numerical Dif. % Dif.<br />
Presidency 0 83067 83067 8306700,0<br />
Morelos 0 5003 5003 500300,0<br />
Querétaro 2628 7225 4597 174,9<br />
Durango 0 3927 3927 392700,0<br />
Jalisco 13 3611 3598 27676,9<br />
Colima 0 2958 2958 295800,0<br />
Guerrero 46 2973 2927 6363,0<br />
Nuevo León 2150 4972 2822 131,3<br />
State of Mexico 0 2602 2602 260200,0<br />
Sinaloa 0 2023 2023 202300,0<br />
Hidalgo 0 1930 1930 193000,0<br />
Federal District 1121 2751 1630 145,4<br />
Zacatecas 882 2360 1478 167,6<br />
Chihuahua 543 1280 737 135,7<br />
Michoacán 211 948 737 349,3<br />
Guanajuato 182 456 274 150,5<br />
Baja California 0 256 256 25600,0<br />
Campeche 0 215 215 21500,0<br />
Quintana Roo 0 118 118 11800,0<br />
Aguascalientes 0 0 0 0,0<br />
Baja California Sur 0 0 0 0,0<br />
498
Rodrigo Sandoval Almazán et al.<br />
Chiapas 0 0 0 0,0<br />
Coahuila 292 292 0 0,0<br />
Nayarit 0 0 0 0,0<br />
Oaxaca 0 0 0 0,0<br />
Puebla 0 0 0 0,0<br />
San Luis Potosí 0 0 0 0,0<br />
Sonora 0 0 0 0,0<br />
Tabasco 0 0 0 0,0<br />
Tamaulipas 0 0 0 0,0<br />
Tlaxcala 0 0 0 0,0<br />
Veracruz 0 0 0 0,0<br />
Yucatán 0 0 0 0,0<br />
7. Appendix 2: Twitter followers on Mexican local government websites<br />
Government Followers March Followers October Numerical Dif. % Dif.<br />
Presidency 8990 100849 91859 1021,8<br />
Federal District 6605 19506 12901 195,3<br />
Queretaro 910 11110 10200 1120,9<br />
Hidalgo 0 9135 9135 913500,0<br />
Chiapas 448 9500 9052 2020,5<br />
Guanajuato 127 8890 8763 6900,0<br />
Sinaloa 329 8837 8508 2586,0<br />
Yucatan 0 8039 8039 0,0<br />
Nuevo León 928 8467 7539 812,4<br />
499
Rodrigo Sandoval Almazán et al.<br />
Durango 273 7094 6821 2498,5<br />
Colima 0 6470 6470 647000,0<br />
Baja California Sur 0 5695 5695 569500,0<br />
State of Mexico 2781 6347 3566 128,2<br />
Jalisco 502 3401 2899 577,5<br />
Guerrero 346 1730 1384 400,0<br />
Sonora 20 1386 1366 6830,0<br />
Nayarit 0 1352 1352 135200,0<br />
Baja California 426 1471 1045 245,3<br />
Michoacán 219 1206 987 450,7<br />
Morelos 0 942 942 94200,0<br />
Zacatecas 46 738 692 1504,3<br />
Puebla 0 527 527 52700,0<br />
Quintana Roo 0 51 51 5100,0<br />
Aguascalientes 0 0 0 0,0<br />
Campeche 0 0 0 0,0<br />
Chihuahua 0 0 0 0,0<br />
Coahuila 0 0 0 0,0<br />
500
Rodrigo Sandoval Almazán et al.<br />
Oaxaca 0 0 0 0,0<br />
San Luis Potosi 0 0 0 0,0<br />
Tabasco 0 0 0 0,0<br />
Tamaulipas 0 0 0 0,0<br />
Tlaxcala 0 0 0 0,0<br />
Veracruz 0 0 0 0,0<br />
References<br />
Boyd, D., Golder, S., & Lotan, G. (2010). Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter.<br />
Paper presented at the System Sciences (HICSS), 2010 43rd Hawaii International <strong>Conference</strong> on, Honolulu, HI.<br />
Burley-Gant, D., Gant, J. P. & Johnson, C. L. 2002. "State Web Sites: Delivering and Financing E-Service.".<br />
Castells, M. 1998. La Era De La Informacion (Vol.1): Economia, Sociedad Y Cultura. La Sociedad Red, Madrid,<br />
España, Alianza Editorial.<br />
Eliason, E. & Lundberg, J. Year. The Appropriateness Of Swedish Municipality Web Site Designs. In: Proceedings of<br />
the 4th Nordic conference on Human-computer interaction: changing roles, 2006 Oslo, Norway. ACM, 48-57.<br />
Gil-Garcia, J. R. & Luna-Reyes, L. F. 2008. Una Breve Introducción Al Gobierno Electrónico: Definición, Aplicaciones<br />
Y Etapas. 11th Annual International Digital Government Research <strong>Conference</strong> on Public Administration Online:<br />
Challenges and Opportunities 49-73.<br />
Honeycutt, C., & Herring, S. C. (2008). Beyond Microblogging: Conversation and Collaboration via Twitter. Paper<br />
presented at the 42nd Hawaii International <strong>Conference</strong> on System Sciences, Waikoloa, Big Island, Hawaii<br />
Kubicek, H. Year. Next Generation Foi Between Information Management And Web 2.0. In: Proceedings Of The<br />
2008 International <strong>Conference</strong> On Digital Government Research, 2008 Montreal, Canada. Digital Government<br />
Society Of North America, 9-16.<br />
Layne, K. & Lee, J. 2001. Developing Fully Functional Egovernment: A Four Stage Model. Government Information<br />
Quarterly, 18, 122-136.<br />
Luna-Reyes, L. F., García, J. M. H. & Gil-García, J. R. 2009. Hacia Un Modelo De Los Determinantes De Éxito De<br />
Los Sites De Gobierno Estatal En México. Gestión Y Política Pública, Xviii No. 2, 307-341.<br />
O'Reilly, T. 2005. What Is Web 2.0 | O'reilly Media %U Http://Oreilly.Com/Pub/A/Oreilly/Tim/News/2005/09/30/What-<br />
Is-Web-20.Html [Online]. O'Reilly. Available: http://Oreilly.Com/Pub/A/Oreilly/Tim/News/2005/09/30/What-Is-<br />
Web-20.html [Accessed Mayo 4, 2009 2009].<br />
Phelan, O., Mccarthy, K., & Smyth, B. (2009). Using Twitter To Recommend Real-Time Topical News. Paper<br />
Presented At The Proceedings Of The Third Acm <strong>Conference</strong> On Recommender Systems, New York, New<br />
York, Usa.<br />
Sandoval-Almazán, R., J. Ramón, G. G. & Reyes, L. F. L. 2007. 2007 State Site Ranking (In Spanish: Ranking De<br />
Sitees Estatales, La Medición 2007). Politica Digital Mexico Df: Grupo Nexos.<br />
Sandoval-Almazán, R., J. Ramón, G. G. & Reyes, L. F. L. 2008. Ranking Estatal 2008 De Sitees .Gob. Politica<br />
Digital Mexico Df: Grupo Nexos.<br />
Tapscott, D. & Williams, A. D. 2006. Wikinomics: How Mass Collaboration Changes Everything, Portfolio Hardcover.<br />
Wigand, F. D. L. (2010, 12-14 April 2010). Twitter In Government: Building Relationships One Tweet At A Time.<br />
Paper Presented At The Information Technology: New Generations (ITNG), 2010 Seventh International<br />
<strong>Conference</strong> On, Las Vegas, Nv.<br />
Woods, E. 2007. Web 2.0 And The Public Sector - Public Sector - Breaking Business And Technology [Online].<br />
Silicon.Com Driving Business Through Technology. Available:<br />
http://Www.Silicon.Com/Publicsector/0,3800010403,39168737,00.htm [Accessed].<br />
Yáñez, A. 2009. El Gobierno Y La Generación Y La Revolución De Su Relación. Available:<br />
http://Www.Deloitte.Com/Assets/Dcom-Mexico/Local%20assets/Documents/Mx%28es-Mx%29gobierno-<br />
Generacionyfinal_270609.pdf.<br />
Zappen, J. P., Harrison, T. M. & Watson, D. Year. A New Paradigm For Designing Egovernment: Web 2.0 And<br />
experience design. In: Proceedings of the 2008 international conference on Digital government research, 2008<br />
Montreal, Canada. Digital Government Society of North America, 17-26.<br />
501
eGovernment in Serbia: Prospects and Challenges<br />
Laslo Šereš and Ivana Horvat<br />
University of Novi Sad, Serbia<br />
laci@ef.uns.ac.rs<br />
ivana.horvat@ef.uns.ac.rs<br />
Abstract: eGovernment is a great opportunity for every country to improve the efficiency of public administration<br />
and to gain a competitive edge. Despite the early recognition of the information society importance, Serbia is, like<br />
many other transitioning countries, struggling with the transformation of its legacy bureaucratic and administrative<br />
processes. This document describes a short history of eGovernment in Serbia, gives an overview of current state<br />
of eGovernment services, and proposes guidelines that would help future eGovernment deployment in Serbia.<br />
Through comparison of Serbian eGovernment solutions with those implemented in a number of EU countries,<br />
some of the strengths and weaknesses of the eGovernment deployment in Serbia are pointed out. The empirical<br />
research conducted in this paper reveals the areas which are crucial in terms of greater public access to<br />
information, and a more efficient, cost-effective government. In this sense, the paper particularly emphasizes the<br />
need to: a) strengthen the legislative framework and the institutional capacity related to the use of eGovernment<br />
within the Serbian public administration; b) support the implementation of public administration reforms necessary<br />
for the further development of eGovernment; c) provide assistance to the development of a National<br />
Interoperability Framework; d) create and/or further develop basic public services to citizens through the use of<br />
eGovernment. In order to develop citizen-centered interoperable eGovernment services, all these areas require<br />
adequate strategy and action plans. This paper aims to analyze different areas and their concepts in order to<br />
define and elaborate guidelines that would initiate evolving of eGovernment in Serbia. The findings and<br />
implications of this survey could contribute to better understanding of conditions and determining the priorities of<br />
further eGovernment development in Serbia.<br />
Keywords: eGovernment, eServices, Serbia, public administration<br />
1. An overview of eGovernment evolution in Serbia<br />
Serbia (as a part of former Yugoslavia) recognized the importance of the information society in the<br />
late 80’s, when regulatory activities and organizational preparations in this area started. The first step<br />
was the adoption of The Guidelines for Developing and Adoption of the Governmental Institutions<br />
Information System Projects by the Executive Council of Serbia Parliament in October 1989. Since<br />
then, there is more or less continuous work on institutionalization and development of governmental<br />
institution’s information systems. Some of the most important acts adopted in the 90’s, which defined<br />
the guidelines for development, were: The Legal Act on Securing and Protecting of Governmental<br />
Institutions Information Systems (1990), Law on Information System of Republic of Serbia (1996),<br />
Legal Act on Program of Information System Development of Republic of Serbia (1997), etc. From the<br />
middle of ‘90s, the realization of several important projects started, but only a few of them were<br />
applied: The Project of Database for IT Standards (1996), Project of Database for Codes and<br />
Classification in Governmental Institutions (1997), Project of Common Computer-Telecommunication<br />
Network of Governmental Institutions (1998) and others. Over time the number of projects with<br />
successful implementation increased: in 2000/01 the Project of Information System about Personal<br />
Status of Citizens was adopted, along with the program system which involves three functional<br />
subsystems: Master register, Electorate and Citizens. In the same year the Project of Unique Register<br />
of Streets and Home Numbers in the Republic of Serbia was adopted and a program system for<br />
maintaining the registry was developed.<br />
Significant results in realization of important eGovernment projects were visible from 2002, when<br />
technological prerequisites were satisfied for intensive and efficient development. An important<br />
milestone in these efforts was the signing of the eSEE Agenda for Information Society Development<br />
in 2002 as a basic document for development of information society in the region. The aim of<br />
Electronic South Eastern Europe (eSEE) Initiative is the better integration of SEE countries into the<br />
global, knowledge-based economy by regionally supporting the development of Information Society.<br />
In order to prove the commitment to the Agenda, in 2004, the Government of Serbia has adopted a<br />
Strategy of the State Administration Reform with the aim of public administration modernization. The<br />
Strategy defined three basic stages according to which the modernization of the Serbian<br />
administration should be implemented. The first stage includes analysis within which is necessary to<br />
analyze the current state of existing infrastructure and currently used information systems as well as<br />
the impact and necessary extents of laws and regulations. The second stage deals with integration<br />
and implementation of international standards in the design and development of state bodies<br />
502
Laslo Šereš and Ivana Horvat<br />
communication infrastructure, while the third stage consists of introducing e-services to citizens and<br />
commercial subjects on the levels of both central and local government. In order to establish<br />
appropriate legal surroundings the following laws have been adopted: Law on Electronic Signature<br />
(2004), Law on Free Access to Information of Public Significance (2004), Criminal Code (2005), Law<br />
on the Organization and Jurisdiction of State Organs against High-Tech Crime (2005), Law of<br />
Ministries (2007) – upon which the Republic Office for Informatics and Internet as a special<br />
organization appointed by the Ministry of Telecommunications and Information Society was formed,<br />
Law on Personal Data Protection (2008), Law on e-Commerce (2009), Law on Electronic Documents<br />
(2009).<br />
At the end of this brief overview of important events that signified the development of eGovernment in<br />
Serbia, it is necessary to point out three documents adopted in 2009 & 2010 which will determine<br />
further development: the Strategy of Development of eGovernment in the Republic of Serbia in the<br />
Period 2009-2013 (2009), Strategy of Development of the Information Society in the Republic of<br />
Serbia from 2010 to 2020 (2010) and the Strategy of Development of Electronic Communications in<br />
the Republic of Serbia from 2010 to 2020.<br />
2. Comparative analysis of eGovernment usage: Serbia, Croatia, Austria and<br />
Germany<br />
In order to provide the most accurate information on eGovernment implementation in EU countries,<br />
we used the results of EU eGovernment benchmark conducted in 2009. This benchmark comprises<br />
31 <strong>European</strong> countries (Cap 2009), whereas four of them are non-EU countries - Croatia, Iceland,<br />
Norway and Switzerland. 12 services for citizen and 8 services for business were tested, as it used to<br />
be a practice in earlier benchmarks. In this benchmark we focused to Austria, Germany and Croatia<br />
while comparing them to Serbia.<br />
2.1 Institutional framework<br />
Austria claimed the State Secretary in the Federal Chancellery to be in charge for eGovernment. The<br />
federal CIO represents “a personal function (i.e. not an institution) supporting coordination of<br />
eGovernment activity, advising the government and representing Austria abroad” (Cap 2009). The<br />
central forum for eGovernment in Austria is a platform ‘Digital Austria’, which comprises<br />
representatives of the federal government, regions, cities, municipalities, private and public sector<br />
bodies. This platform represents an institution that has to do everything with all present activity in<br />
eGovernment, and ensures interconnection among all government levels and stakeholders. It is<br />
chaired by the federal CIO and contains a number of task forces and thematic working groups.<br />
Furthermore, the ICT Strategy Unit does coordination at the federal level. Each ministry and agency<br />
carries out its’ own projects, even though the strategy is overall directed toward binding and<br />
coordinating.<br />
In 2003 Germany launched eGovernment strategy Deutschland-Online, which remained mostly<br />
unchanged. The BundOnline2005 Programme was launched in 2000 at the federal level, and later<br />
was followed by the EGovernment 2.0 Programme. In order to downsize the bureaucracy, and involve<br />
e(participation) as much as providing public services delivery over the Internet, Germany developed a<br />
very comprehensive eGovernment programme. In parallel, this programme focuses on integration of<br />
different levels of government and management of legacy systems. Germany introduced the new<br />
Federal IT Steering System in 2008. This system has governance provided by the Federal CIO<br />
system and the new IT Planning Council. It has deployment that “is largely decentralized, following<br />
Germany’s federal structure. Different states are responsible for piloting new services” (Cap 2009).<br />
In 2003, Croatia has incepted the eGovernment as a part of the general ICT strategy eCroatia. In<br />
2009, it has gained more prominence after a dedicated eGovernment strategy was adopted, which<br />
was primarily focused on separating the development and delivery of services by putting each in<br />
place. Inspired by bid for EU membership, Croatia’s eGovernment activities are strongly aligned with<br />
EU’s policies. Many well organized practices can be found here. On the other hand, due to its’<br />
complex administrative structure, achieving progress might seem a little bit out of limits. Sharing<br />
knowledge, experience and technical know-how with developed countries could speed up this<br />
process. In favor of this “the updated joint national eGovernment strategy (2010-2015) of the federal<br />
states and municipalities level encourages a more streamlined development” (Cap 2009). Croatia has<br />
recently identified eGovernment as a specific policy area, which is under a jurisdiction of the Prime<br />
503
Laslo Šereš and Ivana Horvat<br />
Minister, who is appointed by the Central Administrative Office. Furthermore, this office is responsible<br />
for the eCroatia programme, rationalization of the ICT investments and international cooperation.<br />
Decentralized governance that has some involvement of non-government actors (mixed National<br />
Council for the Information society) advises the government about issues being related to the<br />
Information society development as a whole. In Serbia eGovernment has become a part of the<br />
national strategy of administrative reform in 2004. Similar to Croatia, it gained a much greater<br />
significance in 2009 when a separate eGovernment strategy was established. Operations of<br />
eGovernment administration and tasks are under jurisdiction of Ministry of Telecommunications and<br />
Information Society (MTIS), National Information Technology and Internet Agency, and Office for<br />
Common Operations of Government Institutions. The Ministry performs the role of national<br />
certification body for electronic signature, which is different from the majority of EU and South Eastern<br />
Europe countries, where the practice is that this body (Root CA) is independent from the executive<br />
authorities. Serbia is much more centralized than the above mentioned countries and the<br />
eGovernment development is largely under the patronage of central state organs. In terms of effective<br />
development, the large number of government institutions participating in this development can be an<br />
obstacle.<br />
2.2 eGovernment portals<br />
In Austria the Federal Computing Centre is the leading eGovernment service provider with solutions<br />
like: ELAK, MOA Services, eDemocracy, eDK, and help.gv.at. “Combining a document management<br />
system with a workflow system, workgroup applications and an archive, ELAK is designed to enable<br />
administrative units to electronically record, save, find and re-work information, thereby supporting the<br />
transfer of paper files to electronic files for all inter-ministerial processes at federal level.” (PoA 2010)<br />
The government agency’s help site HELP.gv.at offers information necessary for living and working in<br />
Austria. At the moment, many of the connecting links are available only in German (some of them in<br />
English, too). This type of linked portals builds a solid basis for cooperation and collaboration.<br />
Germany has a portal www.bund.de whose main purpose is to provide services and online<br />
information of the German Federal Administration and other public services. This portal represents the<br />
basic component of eGovernment in Federal Government initiative – BundOnline 2005. “The aim of<br />
this initiative, launched at the Expo 2000, was to render all eGovernment services accessible by<br />
2005. The web portal bund.de is an active partner of Deutschland-Online and is involved in the<br />
implementation of harmonization and networking aims.” (PoG 2010)<br />
In order to provide eGovernment to citizens and business users, Croatia developed portal<br />
“MojaUprava“ (http://mojauprava.hr/) which serves as a gateway to various kinds of eGovernment<br />
services and information. This portal gives valid information about every matter in state administration<br />
for all users, both citizens and business users.<br />
The central portal of eGovernment in Serbia “e-Uprava“ (http://www.euprava.gov.rs/) was created in<br />
2007 in order to obscure citizens and business users with relevant information, so they could easily<br />
carry out the administration processes. The most important contents of the portal are: electronic<br />
services, the latest news, FAQ etc. Electronic services can be searched by several criteria - life<br />
situation, initial letter, as well as the competent authority in charge of service implementation. The<br />
execution of certain electronic services is available only to users registered with an electronic<br />
certificate. As a result of the e-Procurement project (2007) a public procurement web portal is<br />
established too (www.ujn.gov.rs). At this moment there is no infrastructure on governmental level for<br />
knowledge management in Serbia.<br />
2.3 Quality of eGovernment services<br />
Considering eGovernment availability “Austria has held a leading position in eGovernment in the EU<br />
for the last few years”. eGovernment as a service is a “fully integrated aspect of government, which is<br />
demonstrated by 100% level of services on line” (Cap 2009). Both government and stakeholders are<br />
taking care of improving strategy and implementation of eGovernment. Germany, on the other hand,<br />
accomplished expansion of broadband access as much as the Internet availability but still keeping<br />
availability and usage stagnated, particularly in business. Croatia has just started to develop<br />
eGovernment and has not reached the maturity level yet. A certain efforts were made to increase<br />
availability of online services, as much as to deliver those services in user-friendly manner. Serbia, as<br />
a country that is by economical, social and geographical position the most similar to Croatia, is at the<br />
504
Laslo Šereš and Ivana Horvat<br />
maturity level of eGovernment that is the closest to Croatia. There are many services delivered online<br />
which are user-friendly, but the level of usage is low, due to broadband access and readiness of users<br />
to use eGovernment services, as well to invest in ICT.<br />
Analysis of eGovernment as a service shows that Austria has a fully integrated solution that reduces<br />
administration business for both sides – citizens/business and public administration, primarily taking<br />
care of their users. On the other hand, even if it has 100% services offered online (like Malta, Portugal<br />
and the United Kingdom), there is a minor negligence from citizens, partly due to the rear use of<br />
Internet as well as broadband unavailability. When it comes to online sophistication, Austria achieves<br />
99%, the 3 rd best result in Europe right behind Malta and Portugal. Austria sets an example for Userfocused<br />
Portal Design by scoring over the average of the EU27+, while below the average for<br />
Usability and One-Stop-Shop Approach. “Germany scores 74% on full online availability. In terms of<br />
User Experience, Germany obtains 39% on Usability, 24% on User Satisfaction Monitoring, 70% on<br />
One-Stop-Shop Approach and 71% on User-focused Portal Design.” (Cap 2009) Croatia has userfocused<br />
portal design which scores 100% and One-Stop-Shop Approach reaching even 80%. “On<br />
usability, Croatia scores 34% while 24% of the screened web sites score positively on the User<br />
Satisfaction Monitoring metric.” (Cap 2009) When this benchmark was conducted, usability of<br />
eGovernment services in Serbia was 12.9%, while in 2010 it slightly arose and scores 13.2%. Figures<br />
1 and 2 compare full online availability of eGovernment services for citizen’s and business in Austria,<br />
Germany, Croatia and Serbia in 2009 (Eur 2010, Ins 2009). These figures point out that eGovernment<br />
services designed for citizens have lower availability in Serbia than in any other of compared<br />
countries. On the other hand, in G2B segment Serbia accomplished better results than Croatia,<br />
almost equal to the results of Germany, but still lagging behind Austria.<br />
Figure 1: Full online availability of eGovernment<br />
services – citizens 2009<br />
Figure 2: Full online availability of<br />
eGovernment services –<br />
business 2009<br />
According to Capgemini’s benchmark (Cap 2009), sophistication of 20 basic services in EU 27+ was<br />
76% in 2007 and 83% in 2009. Total sophistication level of eGovernment in Serbia scores 38% in<br />
2007 and 46% in 2009 (Ins 2009). These results show a great backlog of Serbia when compared to<br />
EU countries and justify giving a wakeup call to government and IT society to develop strategy that<br />
would ensure future success in this segment and undertake an appropriate action Plan.<br />
Figure 3: Comparison of eGovernment sophistication<br />
505
Laslo Šereš and Ivana Horvat<br />
3. Strengths and weaknesses of eGovernment in Serbia<br />
For several years the Statistical Office of Serbia conducts researches concerning information and<br />
communication technologies usage. In 2010 the research is conducted with 2400 households<br />
(including the individuals that were 16 to 74 years old) sample that was two-phase stratified, in<br />
accordance with the Eurostat methodology. This research was divided in two separate studies: the<br />
first one relates to the citizens, both households and individuals, while the second one is concerned<br />
with the business companies. According to the data provided by these studies, it can be noticed that<br />
there is a constant growth in the number of computers as well as in a number of internet access<br />
points in the last five years.<br />
The research results for 2010 (Sta 2010) showed that more than 50% of households in Serbia had a<br />
computer and 39% of them had an internet access. Analysis of the household data for the last five<br />
years shows that there is a constant growth both, in the number of computers and internet access<br />
points, while the ratio of Internet access points and computer owners is more or less unchanged -<br />
about 80% of computer owners have Internet access (Figure 4).<br />
Figure 4: Percentage of households in Serbia with computer and internet accessIt would be rational<br />
to expect that the trend of computer owner’s growth will continue until it reaches a saturation point, at<br />
the level of 70-80% of households with a computer, which is expected in a few years’ time.<br />
Concerning the usage of eGovernment it is important to note that there is a significant increase in the<br />
number of households with a broadband connection: 47.3% of households have DSL (ADSL)<br />
connection, while 24.5% use cable internet.<br />
In order to get an adequate insight, the results for business companies are also shown here. Based<br />
on a sample of 1400 business companies it was found that in 2010 almost 98% of the Serbian<br />
companies owned a computer, 97% of them had Internet access, and over 90% of them used a<br />
broadband connection.<br />
The research conducted in 2010 (Sta 2010) also included the analysis of users readiness to use<br />
eGovernment services that has provided very interesting results (Figure 5).<br />
It is obvious that there is a significant stratum of citizens who are interested in using the eGovernment<br />
services but many of them are missing the technical prerequisites needed for it. The proportion of<br />
those who use or are interested in the use of eGovernment services is over 60% of the population<br />
while less than 40% of the population has internet access. Another question is why only a third of<br />
citizens with Internet connection are using eGovernment services.<br />
506
Laslo Šereš and Ivana Horvat<br />
Figure 5: Readiness of the citizens of Serbia to use eGovernment services<br />
Another survey conducted (Ins 2009) showed similar results: slightly above 40% of citizens with<br />
Internet connection were using eGovernment services both in 2007 and 2009 (Figure 6), while this<br />
percentage is growing in the case of companies.<br />
Figure 6: Percentage of eGovernment services users in Serbia calculated in relation to the number of<br />
internet connection owners<br />
These facts indicate that there is still much work to do in Serbia to increase citizen’s willingness to<br />
adopt eGovernment. In order to develop “citizen-centered” eGovernment services that provide citizens<br />
with accessible, relevant information and quality services the government agencies should pay much<br />
more attention on the factors that influence citizen adoption of this innovation. The maturity model<br />
from the 2009 benchmark is used in order to provide an adequate description of strengths and<br />
weaknesses of eGovernment in Serbia. This model differ five different stages which define the level of<br />
sophistication and online availability of some services. The stages are defined as follows:<br />
Stage 0 the service provider doesn’t have a publicly accessible website or it doesn’t qualify for<br />
any of the four levels.<br />
Stage 1 (information) all information is available on website which is accessible. The website is<br />
managed by the service provider.<br />
Stage 2 (one-way interaction) provides a user to obtain a necessary paper in non electronic way.<br />
Stage 3 (two-way interaction) gives an opportunity to electronic intake with an official electronic<br />
form.<br />
Stage 4 (transaction) offers the possibility to completely keep track of a process via the website.<br />
There is no other formal procedure for applicant.<br />
Stage 5 (targetization) the provider of the service is already familiar with the user’s data, provides<br />
him/her with regulations for data protection and brings up a certain level of personalization.<br />
507
Laslo Šereš and Ivana Horvat<br />
Figure 7: Five-stage maturity model used in benchmark (Cap 2009)<br />
The table below gives a detail overview of online availability and sophistication stage of 20 basic<br />
services and their current stage of maturity (Ins 2009). All table data are gathered from the research<br />
conducted by Republic Office for Informatics and Internet. The research was conducted according to<br />
the Capgemini’s methodology including both, the republic authority, at the highest level of service<br />
suppliers, and the local authority, at the lowest level. The level of sophistication was calculated as an<br />
average value of local authority values. In order to evaluate strength of these services, a maximum<br />
stage is supplied.<br />
Table 1: Sophistication stage of 20 basic government services in Serbia (2009)<br />
Service name Current Max.<br />
Service name Current Max.<br />
stage stage<br />
stage stage<br />
Citizen service Business service<br />
Job search 4 4 Corporate tax 3 5<br />
Social security benefits 2 4 Building permission and<br />
environment-related permits<br />
1 5<br />
Personal document 1 5 Electronic cadastre and property<br />
registries<br />
2 4<br />
Car registration 1 5 Health-related services and social 2 4<br />
contributions<br />
Public libraries 4 5 Company registration 3 4<br />
Certificates 1 4 Registration of company revenue 3 4<br />
Enrolment in higher education 1 4 VAT 2 4<br />
Announcement of moving 1 4 Customs declaration 4 4<br />
Registration of foreign trade 1 4<br />
transactions<br />
Public procurement 3 4<br />
Registry of legal persons mortgage 4 5<br />
Statistical data 2 5<br />
The most developed services are those related to budget inflow, while the services connected with<br />
licenses and certificates are less developed. In 2008 the sophistication level of eGovernment in<br />
Serbia was 47%, while in 2009 it reached 51%. This increase is a consequence of higher<br />
sophistication levels of some services: Electronic cadastre and property registries, Register of legal<br />
persons mortgage, Social security benefits and Public libraries.<br />
Observing the sophistication stage of services it is obvious that great part of them, 7 of 20 services<br />
are developed to match the first stage. Five services are at the second stage, 4 are at the third stage<br />
and only 4 of them achieved the forth level. The lowest sophistication of all services is measured in<br />
the Personal documents group (birth certificates). There is a (bit strange) sophistication level downfall<br />
– from stage 2 in 2008 to stage 1 in 2009. Although the average has fallen, 34% of local governments<br />
508
Laslo Šereš and Ivana Horvat<br />
supply service at the third stage. Considering that the forth level implies electronic signature and<br />
document this is a really good result. Considering that the use and exchange of electronic documents<br />
in certain areas (customs, accounting jobs, banking and others) becomes a reality, the achieved<br />
results can be assessed as partial. In order to achieve better results it is necessary to eliminate or at<br />
least reveal obstacles that tie down further development. The existing situation in this area is featured<br />
by:<br />
Insufficiently developed shared computing;<br />
Underdevelopment of official records in electronic form, as the core data necessary for the<br />
development of electronic government;<br />
Inevitability of paper documents in almost every proceeding;<br />
Lack of standardization and coordination of authority’s information systems;<br />
Lack of competent personnel.<br />
Although the weaknesses are much more widespread there are a few bright sides:<br />
Strong political commitment in terms of eGovernment development;<br />
Experience gained through successful development of solutions in other areas of e-business.<br />
4. Guidelines for future development of eGovernment in Serbia<br />
The strategy of eGovernment development in Serbia is compatible with the objectives of the Action<br />
Plan for implementation of priorities from eSEE Agenda+ for the Information Society in South Eastern<br />
Europe in the period 2007-2012. It is based on the condition of legislative regulation of this area and<br />
results achieved in implementation of legislative solutions. In this context the significance of<br />
implementation of the Law on Electronic Signatures is particularly emphasized (TGS 2010). The<br />
strategy is based on the results of ongoing projects, such as the introduction of electronic government<br />
sessions, electronic cadastre, initial results in the introduction of electronic services for some tasks<br />
and others. It is very important to raise the motivation of all participants in order to intensify activities<br />
in this field and establish an institutional framework for managing and coordinating the development of<br />
eGovernment at the strategic and operational levels.<br />
The realization of the vision and general objectives of eGovernment should be guided by the following<br />
principles:<br />
User satisfaction - it is crucial to identify main adoption factors (perceived usefulness, relative<br />
advantage, compatibility, etc.) in order to raise users’ intention to use online government services.<br />
Single access point (one stop shop).<br />
Public information availability in electronic form - without charge or other conditioning.<br />
Electronic services availability - free access for all users, including people with disabilities, by<br />
using open and widely accepted standards.<br />
Not neglecting the classical forms of service delivery - all users should benefit from the<br />
eGovernment development, regardless of whether they use electronic means to access services.<br />
New ICT based services - public services should be provided through different communication<br />
channels.<br />
Avoiding technological dependence - technological foundation for the development and<br />
exploitation of electronic public services related to computers, software solutions and<br />
communication network should be independent from suppliers of goods and services as much as<br />
possible.<br />
Information security - security and reliability of eGovernment must be in accordance with<br />
established standards of information security and protection of personal data.<br />
Staffing - electronic public services must be supported by professionally trained officers.<br />
The priorities of eGovernment development could be grouped into the following pillars:<br />
Establishment of key levers;<br />
Process automation;<br />
Establishment of electronic public services;<br />
509
Human resources development<br />
4.1 Establishment of key levers<br />
Laslo Šereš and Ivana Horvat<br />
The first pillar of eGovernment includes system solutions which are essential for an effective<br />
development of eGovernment. It includes the following priorities:<br />
ICT infrastructure<br />
− Communication infrastructure that enables computer-based connectivity between authorities<br />
and Internet connection;<br />
− Computer centers with servers and other information and communication resources –<br />
database servers, application servers, etc.;<br />
− Infrastructure at different locations, including local area networks.<br />
Electronic identity, electronic signature and electronic document<br />
It is necessary to ensure reliable and secure authentication of electronic documents signatories<br />
and electronic services users. It is also necessary to achieve the electronic document being used<br />
as the original.<br />
Electronic official records.<br />
In addition to keeping records in electronic form, it is necessary to ensure efficient and secure<br />
electronic access to this data by officers conducting proceedings, to eliminate the need for a party<br />
in the proceedings to obtain fact’s evidence from the records.<br />
Standardization in the field of ICT implementation and coordination of ICT projects in government.<br />
Standardization and coordination could contribute to the rationalization of resources, security,<br />
interoperability, and a simpler and better implementation of individual projects.<br />
4.2 Process automation<br />
The second pillar of eGovernment should substantially contribute to better execution of business<br />
processes by using ICT, along with improving efficiency and streamlining of costs. The introduction of<br />
electronic documents speeds up communication and retrieval of the documents, but does not<br />
necessarily change the processing of the documents. Electronic documents can be created in the<br />
same way the paper documents were previously prepared with a computer, but instead of delivering a<br />
printed document on paper, it is delivered in electronic form. Any processing of such documents still<br />
includes the need to be read by someone, which is essentially not an automated processing.<br />
Electronic documents should be produced, stored and delivered in a form which is suitable for further<br />
automated processing, in other words as a structured electronic document (which enables<br />
independently developed information systems to communicate via standard protocols and formats of<br />
structured electronic documents).<br />
4.3 Establishment of electronic public services<br />
This pillar includes the following priorities:<br />
eGovernment portals and shared electronic services<br />
Portal is a single point of access to multiple electronic public services. Shared electronic services<br />
are important for the realization of many electronic public services (central authentication system,<br />
electronic payment, electronic forms, etc.).<br />
Electronic public services.<br />
4.4 Human resources development<br />
It is necessary to improve the official staff’s competence as information systems and electronic<br />
services users, as well as the competence of ICT experts’ responsible for functioning of technical<br />
systems and their improvement. Main priorities of this pillar are:<br />
Computer literacy and skills of officers<br />
It is necessary to raise the general IT literacy of employees in state administration, as well as<br />
skills in using specific IT solutions.<br />
510
Employment of ICT professionals<br />
Laslo Šereš and Ivana Horvat<br />
In favor of sustainable ICT solutions needed for eGovernment development, it is necessary to<br />
provide adequate ICT support. In addition, special attention should be paid to the formation of<br />
expert teams who provide ICT services.<br />
4.5 Abbreviated action plan for the period 2011-2012<br />
In order to achieve defined objectives and realize priorities listed above it is necessary to define an<br />
action plan. Some of the most important activities that should be implemented in the next two years<br />
are listed in table 2 (TGS 2010).<br />
Table 2: Abbreviated action plan of eGovernment development in Serbia for the period 2011-2012<br />
Year of<br />
Priority Activities<br />
implement.<br />
State network establishment 2011<br />
ICT Infrastructure<br />
Standardization in the field of ICT<br />
implementation and coordination<br />
of ICT projects in public<br />
administration<br />
Exchange of structured<br />
documents and inter-agency<br />
process automation<br />
Process automation<br />
eGovernment portals and shared<br />
Establishment of electronic official records Data Dictionary 2011<br />
Plan for EU identifiers (passwords, identity or registration<br />
numbers, codes, etc.) in various official records<br />
2011<br />
Development of the National Interoperability Framework 2012<br />
Development of a plan for structured documents exchange<br />
establishment in individual transactions and process<br />
automation<br />
General administrative procedure reform in order to adapt to<br />
prevailing use of electronic communication and process<br />
automation capabilities.<br />
2011<br />
2012<br />
Establishment of a national Geoportal 2012<br />
e-Services Initiation of electronic payment services 2011<br />
Realization of single electronic counter for taxpayers 2012<br />
Realization of electronic service for issuing environmental<br />
licenses<br />
2012<br />
Implementation of electronic services related to building<br />
permits issuance<br />
2012<br />
Realization of electronic real estate and real estate rights<br />
Realization of e-services related to health and pension<br />
2012<br />
insurance of employees (full e-service in filing returns,<br />
payments and obtaining information on the state tax<br />
2011<br />
Individual e-Services<br />
liabilities and tax laws change)<br />
Realization of e-service application for corporate income tax 2011<br />
Realization of e-service application for value added tax<br />
Establishing a single electronic counters for foreign trade in<br />
2011<br />
accordance with the recommendations of UN Economic 2011<br />
Commission for Europe<br />
Realization of electronic services for the achievement of<br />
statutory rights in the field of social protection and financial<br />
support to families with children<br />
Realization of electronic services related to the issuance of<br />
identity documents (identity card, passport and driving<br />
license)<br />
Realization of e-services of motor vehicle registration (new,<br />
used and imported) that do not require a physical visit of<br />
citizens in case of an extension of vehicle registration<br />
Public libraries (realization of e-accessibility of catalogs and<br />
search tools publications)<br />
Realization of e-services for issuing birth and death<br />
certificates and citizenship certificates<br />
Realization of e-services related to citizens annual income<br />
tax<br />
Realization of e-services related to provision of health<br />
services (interactive advice on the availability of services,<br />
scheduling of examinations, ... )<br />
511<br />
2012<br />
2011<br />
2011<br />
2011<br />
2012<br />
2011<br />
2011
5. Conclusion<br />
Laslo Šereš and Ivana Horvat<br />
Investment in ICT by governments in the SEE countries has increased dramatically in recent years.<br />
Most SEE countries are adopting ICTs primarily to modernize and increase internal effectiveness as<br />
well as to improve service delivery. They consider eGovernment applications as an enabling tool to<br />
increase efficiency, enhance transparency, collect more revenue and facilitate public sector reform.<br />
Observing the results of the adoption of eGovernment concepts in Serbia, it can be noticed that a lot<br />
has been done with regard to the legislative regulation in the last few years, but there is much to be<br />
done in the field of implementation, for instance - e-signatures. Although Serbia lags behind most<br />
<strong>European</strong> countries in terms of eGovernment adoption, there are many similarities: the sophistication<br />
level as well as the full online availability of eGovernment services is much higher in the business<br />
area than it is in the citizen.<br />
According to the reached level of sophistication (51%), eGovernment in Serbia reached the stage of<br />
two-way interaction which implies the ability to send completed forms via the Internet. The situation is<br />
considerably better in the case of services used by business, while in terms of citizen services<br />
sophistication the average level is closer to one-way interaction. When compared to particular<br />
domains, the highest level of sophistication is related to the Registry of legal person’s mortgage,<br />
Customs declaration and Job search, while the lowest level is achieved in Permits and documents. In<br />
contrast to EU countries (27+) where, on average, more than a half of services are fully available<br />
online, in Serbia none of the eGovernment segments is on the level that can completely replace direct<br />
or written communication.<br />
As extracted from the results presented in this paper, a substantial obstacle in creating a fully<br />
computerized eGovernment in Serbia is the lack of appropriate internet infrastructure and the low<br />
level of internet penetration. Serbia should allocate budgetary funds and create the ideal conditions<br />
that will boost the development of modern communication networks. In parallel, stimulation of public<br />
awareness on the availability and potential benefits of eGovernment services is vital towards<br />
reinforcing democracy, improving public services, and strengthening economic and business<br />
development. In addition to the current strong political commitment, Serbia needs to ensure active<br />
involvement of the entire society in eGovernment and IS development. By following the best practices<br />
of other countries, planning realistic eGovernment projects and identifying issues of technical and<br />
human capacity Serbia has an opportunity to catch up and reach the goal of modern eGovernment.<br />
References<br />
Capgemini (2009) 8th Benchmark Measurement of <strong>European</strong> eGovernment services, [online],<br />
www.capgemini.com/insights-and-resources/by-publication/2009-egovernment-benchmark<br />
Carter, L. and Belanger, F. (2004) “Citizen Adoption of Electronic Government Initiatives”, Proceedings of the 37 th<br />
Hawaii International <strong>Conference</strong> on System Sciences - 2004, pp 1-10.<br />
Eurostat (2010) EGovernment usage by enterprises (demand side) (NACE Rev. 1.1), [online],<br />
http://appsso.eurostat.ec.europa.eu/nui/show.do?dataset=isoc_si_egov&lang=en<br />
Graafland-Essers, I. and Ettedgui, E. (2003) Benchmarking eGovernment in Europe and the US, [online], RAND,<br />
www.rand.org/pubs/monograph_reports/MR1733.html<br />
Institute for Informatics and Internet of Republic of Serbia (2009) Current state of eGovernment development -<br />
2009, [online], www.rzii.gov.rs/FileSystem/SiteDocuments/publikacije/Stanje razvoja eUprave u RS -<br />
2009.pdf<br />
Leith, P. (2002) Legal Issues in eGovernment, [online], www.lri.jur.uva.nl/~winkels/eGov2002/Leith.pdf<br />
Lilić, S. and Stojanović, S. (2009) “E-Governemnt and Administrative Reform in Serbia”, Journal of Law and<br />
Technology, Vol. 2, No. 2, pp 127-136.<br />
Millard, J. (2010) “Open Governance – The Role and Impact of ICT in Engaging Citizens”, Selected Proceedings<br />
of the Second International <strong>Conference</strong> on eGovernment and eGovernance, Antalya-Turkey, Vol. 1, pp 29-<br />
42<br />
Portal of Federal Computing Centre of Austria (2010), [online],<br />
www.brz.gv.at/Portal.Node/brz/public/content/home-en/17622.html<br />
Portal of eGovernment – Germany (2010), www.bund.de/EN/Home/homepage_node.html<br />
Statistic Institute of Republic of Serbia (2010), ICT usage in Republic of Serbia, [online],<br />
http://webrzs.stat.gov.rs/axd/dokumenti/ict/2010/Saop2010.pdf & http://rzii.gov.rs/News/?id=138<br />
The Government of Republic of Serbia (2009) Strategy of eGovernment Development in Republic of Serbia<br />
2009-2013, [online], www.mtid.gov.rs/upload/documents/konsultacije/seu/strategija-euprava-2009-06-29.pdf<br />
512
An Organizational Framework for Managing eGovernment<br />
Systems in Developing Countries: The Case of Kurdistan<br />
Region of Iraq<br />
Shareef Shareef, Elias Pimenidis, Hamid Jahankhani and J. Arreymbi<br />
University of East London, UK<br />
s.shareef@uel.ac.uk<br />
e.pimenidis@uel.ac.uk<br />
Hamid.jahankhani@uel.ac.uk<br />
J.Arreymbi@uel.ac.uk<br />
Abstract: This paper aims at proposing an organizational framework for implementing eGovernment in developing<br />
countries. Furthermore a management process to meet the modernization goals of government based on a proposal<br />
by Heeks (2006), in his work on managing eGovernment systems, is specified. The challenges that affect the<br />
implementation and management of eGovernment systems are critically analysed and the authors expect<br />
practitioners and authorities to find the results useful in the planning and implementation of new eGovernment<br />
systems.<br />
Keywords: KRG, KRI, eGovernment, centralize, decentralize, hybrid approach, management process.<br />
1. Introduction<br />
Information and Communication Technologies (ICT) are utilized as tools of eGovernment aiming to<br />
decrease the load of public administration and enhance performance in service provision to the<br />
community. Additional benefits include the expected decrease in the gap between the urban and rural<br />
area population in terms of access to service provision (Kamar, and Ongo’ndo, 2007). The mission to<br />
initiate and implement eGovernment is inspired by policies aiming at increased accountability, efficiency,<br />
effectiveness and improved transparency; thus enhancing governance tools and practice (Grant & Chau<br />
2005). This paper investigates the above desired qualities of governance based on literature review and<br />
proposes an organizational framework for managing the eGovernment sector and its operation with the<br />
confines of a regional government structure.<br />
The Kurdistan Regional Government (KRG) in Iraq focuses on the role of new technology to develop<br />
public administration and at the same time improve the government’s capability to supervise key activities<br />
in the re-construction of Kurdish social life, infrastructure, services, increased political freedom and<br />
tangible improvements in the people’s daily lives. The electronic government strategic plan is a national<br />
initiative for KRG (see www.KRG.org). It aspires at improving effectiveness and efficiency in government<br />
services by improving the quality of service delivery to its citizens and businesses through ICT adoption,<br />
and the potential of multi-channel delivery of services. To carry out this plan, the IT department of the<br />
council of ministries of KRG has been established, in order to prepare eGovernment initiatives and their<br />
implementation in collaboration with various stakeholders, and also to plan the way for Kurdistan and its<br />
citizens would become competitive members of the global economy and information society.<br />
The rest of the paper is organized as follows: the next section discuses the need for an organizational<br />
framework of eGovernment. Section three discuses the proposed organizational structure for the<br />
eGovernment sector in developing countries. The fourth section explains the current state of affairs of<br />
KRI, while section five discusses the proposed management approach as applied to the eGovernment<br />
sector in the IT department of a regional government in a developing country, namely the KRG. Before<br />
concluding, section six provides the authors’ views on challenges and dilemmas in managing<br />
eGovernment systems.<br />
2. Need for organizational framework of eGovernment<br />
eGovernment is a dynamic form of continuous service provision process which makes availability of<br />
services to the community electronically via multiple channels of delivery; such as the Internet, telephone,<br />
wireless devices, and other communication systems, through an effective management process (Shareef,<br />
et al. 2010). Managing eGovernment is vital in attaining and sustaining a high level of service provision,<br />
because eGovernment could fail due to weak implementation and poor management (Heeks, 2006).<br />
Without good management it would be impossible to make good decisions continuously and egovernance<br />
will not be able to succeed and provide services effectively and efficiently, and as a<br />
513
Shareef Shareef et al.<br />
consequence the system will be abandoned and will fail. Therefore, to implement a successful<br />
eGovernment, a robust and rigorous managing process is essential. In order to understand how to<br />
manage eGovernment sector, it’s also necessary to understand the concept of management.<br />
Many governments face troubles and problems when undertaking large ICT projects for implementing<br />
eGovernment systems. Budgets and completion deadlines are often exceeded, and progress is out of<br />
control, often resulting in the quality of the resulting services being compromised and possibly falling<br />
behind the project’s targets at the conception stage (Goepp et. al., 2006; Wang et al. 2004).<br />
Investment in ICT is not always synonymous to success in eGovernment; even in the case of Saudi<br />
Arabia which has seen massive investment in ICT and has seen considerable improvements in<br />
infrastructure (Al-Kamali, 2005). Despite all the above investment, Saudi Arabia was still ranked number<br />
70 in the world in terms of eGovernment readiness two years ago and has not seen any significant<br />
changes since (UN 2008). Heeks (2006) believes that the potential failures of eGovernment systems can<br />
be attributed to the wide divide between system design and institutional reality. That implies the gap<br />
between the current situation of government and the assumptions built into the design of the system.<br />
The success and failure of eGovernment relies on the extent of the divide that exists between the current<br />
state of affairs and the design of eGovernment systems employed. The root cause of eGovernment<br />
failure has not been well captured and analyzed by literature so far. In order to overcome eGovernment<br />
failure, a proper and robust management process is essential.<br />
2.1 Management forms<br />
According to literature there are various concepts, applications, and models used to manage<br />
eGovernment systems; the prevailing emphasis is on consumer requirements and consumer information.<br />
In one of the most predominant amongst these words, Arif (2008) has applied (Jaworski and Kohli<br />
1993)’s model to eGovernment management. This model measures the consumer orientation and<br />
comprises three mechanisms; the first mechanism is institution-wide generation, the second is diffusion,<br />
and the last mechanism is institution-wide-responsiveness. The simplicity and ease of this model make it<br />
easily adaptable to varying situations and hence could be adapted to any special situation such as the<br />
specific requirements of a regional government. The versatility of this model has been proven by a<br />
number of researchers by having been applied to a wide range of application domains; supply chain<br />
(Saiguaw et al, 1998), hospitality and tourism (Sin et al, 2005; Qu et al, 2005), manufacturing (Singh and<br />
Ranchodd, 2004), new product development (Kahn, 2001), and construction (Dulaimi, 2005).<br />
Coursey, et al. (2007) explain the two different trends of eGovernment systems, as such conventional<br />
public information management and institutional. The first trend concentrates on organizational approach<br />
such as politics, application features, and resources. This type of trend comes from authors and public<br />
administration researchers, in which they are more trained in conventional public IT research and not<br />
eGovernment. The second trend concentrates on more common political features, such as government<br />
structure.<br />
Wang et al. (2004) have proposed an information knowledge management model and refer to some<br />
missing links in the managing of eGovernment IT infrastructure. Firstly, lack of the essential software and<br />
the fundamental systems and mechanism information for design, implementation, and deployment<br />
stages. Secondly, lack of tools for providing precise and up-to-date information regarding the hard or<br />
physical IT environment. Thirdly, the lack of system that plans for the large amount of data into a<br />
collected knowledge-based to support and decision analysis. Fourthly, the lack of process for<br />
systematically dealing with IT functions.<br />
Heeks (2006) categorized eGovernment management into three approaches namely; Centralized,<br />
Decentralized and Hybrid. In the first category decision making is performed by upper, senior or central<br />
level decision makers. Decision making being the responsibility of lower level, under senior level or<br />
individual institution staff and individual work unit, is the format of the second category. Finally the third<br />
category involves both lower level and senior level staff in the decision making process, either alone or in<br />
an integrated mode.<br />
The method proposed in this paper is based on Heek’s third category. The details of the model are<br />
discussed in details in section five.<br />
514
3. Proposed framework<br />
Shareef Shareef et al.<br />
This section discusses the proposed organizational framework for the eGovernment sector in developing<br />
countries. The structure of the proposed framework is depicted in figure 1.<br />
Electronic Government Director General<br />
E-council Deputy Director General<br />
E-Gov. planning centre<br />
Includes: Web designer, Database, Programmer,<br />
Language Interpreter, and Implementation<br />
Networking Centre<br />
Includes; Wiring and Installation, Technological<br />
equipment maintenance, Hardware and Software.<br />
Computer applications & Training Centre<br />
Includes; ICT skills, Citizen and Stakeholder<br />
awareness programme<br />
Financial Centre<br />
Includes; Business Analysts<br />
E-Gov. Support Centre: Includes; Analysis<br />
E-Gov. service development Centre<br />
Includes; Data management, Testing,<br />
Quality Assurance, and Production<br />
Security Centre; Confidentiality, Integrity,<br />
and Availability<br />
Figure 1: Structural framework for eGovernment sector<br />
The proposed framework is based on Arif’s (2008) IT project management model, but the focus is on<br />
eGovernment and its management in general rather than a specific project.<br />
In order to implement a proposed integrated eGovernment model it is essential to derive an<br />
organizational framework of the eGovernment system in terms of implementation and management.<br />
Moreover, the initial pace towards eGovernment is to digitize and develop back-office processes in order<br />
to empower government employees to conduct citizens’ transaction effectively and efficiently.<br />
In the proposed framework the electronic government sector comprises seven centres, all of which are<br />
managed by an electronic council, and the sector will be managed by a Director of General (DG). The<br />
director general should be thoroughly knowledgable and experienced in ICT managment at strategic<br />
level, preferably by exposure to knowledge management (Berce, et al. 2008; Rodriguez & Edwards,<br />
2007). The responsibilities of the DG will range from critically assessing employees in terms of IT<br />
competences to evaluating whether the current methods of using technology and the tools used (wireless<br />
devices, SMS, kiosks, and others) are adequate to ensure acceptance of eGovernment technologies<br />
amongst citizens (Andersen, 2006). The Deputy Director of General (DDG) will be in charge of an<br />
electronic council. This will be responsible for developing the vision and direction of eGovernment<br />
applications and practices. Membership of this council will comprise the corporate directors of all other<br />
515
Shareef Shareef et al.<br />
centres in the sector. The main responsibilities of the proposed structure of the eGovernment sector can<br />
be considered as a five main responsibilities.<br />
A. Plan, design, monitor, control, upgrade, supervise, manage, develop, support all computer<br />
networks of eGovernment system and respond to any risks facing the system.<br />
B. Systematize, recognize the technical standards, and criteria relevant to the development of<br />
eGovernment.<br />
C. Train government staff and other stakeholders in order to be able to upgrade and develop the<br />
system. Furthermore to promote, and encourage citizens to utilize eGovernment services by raising<br />
awareness.<br />
D. Organize all the ICT units in government institutions and ministries in order to cooperate and<br />
contribute to the development of the eGovernment system.<br />
E. Financially manage, organize, and control budgets and projects for eGovernment implementation.<br />
The above tasks will be carried out by seven main centres in eGovernment sector as follows:<br />
3.1 eGovernment planning centre<br />
This centre deals with the planning and designing of the eGovernment system with short, medium, and<br />
long term objectives embedded into the strategic plan (Arif, 2008). Furthermore it is responsible for web<br />
design, programming, creating databases, interpreting the information into various languages such as;<br />
national and international language, in order to facilitate understanding of information and services to the<br />
stakeholders(Moore, 2005; Jaeger and Thompson, 2003).<br />
3.2 Networking centre<br />
This deals with the design and maintenance of networks. It is also involved with the operation of external<br />
and internal computer networks. Finally it is responsible to wiring and installing all the peripheral<br />
equipment, also technological component maintenance such as hardware and software.<br />
3.3 Computer application and training centre<br />
The centre manages the web site and the eGovernment system. Further responsibilities include training<br />
employees and other stakeholders in terms of ICT skills, aiming at reducing the effects of the digital<br />
divide (Ke, and Wei, 2004).<br />
Finally the centre is responsible for creating and managing citizen and stakeholder awareness<br />
programmes, aiming to enhance the relations with stakeholders; namely citizens, business, and<br />
employees (Weerakody, 2009; Carter, and Belanger, 2005).<br />
3.4 Financial centre<br />
The centre manages financial issues such as budget setting and its monitoring process. It is also<br />
responsible for funding sources to support the projects and the day to day running of the eGovernment<br />
systems (Gant, 2002).<br />
3.5 eGovernment support centre<br />
It addresses the need for technical and economical support to the sector, and supports any technical<br />
principles and values for development. It also studies all the trends of the system in terms of regulatory<br />
units at government institutions in order to construct the suitable decision. This centre is analysing the<br />
services in terms of coding and programming. The services will be prepared and send to the<br />
development centre.<br />
3.6 eGovernment service development centre<br />
This centre deals with the flow and type of services provided to the community, through gathering<br />
information and researching in order to improve and develop services. It guarantees that the information<br />
and services that provided to the community are in a good order (Jaeger and Thompson, 2003). Finally, it<br />
is responsible to test the flow of services, and to evaluate the various aspects of the services in terms of<br />
human resource, quality assurance and the quality of services (Nygren, 2009; Wang and Liao, 2008;<br />
DeLone and McLean, 2003).<br />
516
3.7 Security centre<br />
Shareef Shareef et al.<br />
This centre is responsible for security of the system in general and the gateway or web site in particular.<br />
This centre is vital to guarantee and facilitate citizen’s transaction, make citizens’ information safe; secure<br />
their privacy and confidentiality of information network (Reddick and Frank, 2007). Moreover, is<br />
responsible to protect the system from any inter and intra hackers and theft of information.<br />
4. Current state of affairs of Kurdistan Region of Iraq (KRI)<br />
Kurdistan is a federal region of Iraq. It is a secular and democratic region with a parliamentary system of<br />
Government. It comprises three cities, namely; Erbil (capital), Sulaymani, and Duhok with Kurdish<br />
inhabitants around five million (KRSO, 2007). The new Iraqi constitution recognizes the KRG as the legal<br />
government of the Kurds, and lets it to continue to live within the new federal country. The KRG vision of<br />
its IT department is to transform government and to act in a customer oriented approach as an effective<br />
and accountable entity, instead of being a bureaucratic institution. This was a major hypothesis of the IT<br />
department administration found during the interview that the leading author has had with the head of the<br />
IT department. Given the above context, the government has managed to sign an agreement with Price<br />
Water House Cooper UK (PWCUK) in order to create an IT strategy for Kurdistan Regional Government,<br />
which will facilitate the initiative of eGovernment system in the region. In addition, the KRG has launched<br />
the IT academy on 10th September 2009 as a centre for training government employees in diverse topics<br />
such as, IT skills, managing, human resource, capacity-building and others (www.krg.org). The strategic<br />
plan is essential for the success of eGovernment implementation, and the organizational framework is<br />
expected to contribute to this (Heeks 2006). Therefore, for the purpose of this research it is essential to<br />
consider the proposed framework of an eGovernment implementation in regional governments in<br />
developing countries. In addition, this proposal precisely could be applied to the IT department in the<br />
council of ministries in the KRG, within the management process of the sector. Therefore, this will<br />
contribute to the effective and efficient integration of customer requirements into service design.<br />
5. Proposed management process<br />
To manage the proposed integrated eGovernment system, a robust and professional management<br />
process is essential. Heeks (2008) revealed in his study that, most eGovernment implementation projects<br />
fail. 35% of eGovernments are total failures, in which the implementation were abandoned or the system<br />
were never implemented such as East Africa. 50% can be measured to be partial failures, in which main<br />
goals of the implementation were not attained such as Eastern Europe. Merely, approximately 15% are<br />
successes, where most of the aims of the stakeholders were achieved. However, eGovernment initiatives<br />
could be successful if the government authority identifies community requirements and takes them into<br />
account (Savvas et al. 2009).<br />
In addition, the discipline and rigor of system management can considerably contribute to the overall<br />
success of the eGovernment system (Rose and Grant 2010). In other words, proper management will<br />
enhance the success of eGovernment implementation. Each part of the eGovernment sector will perform<br />
a distinct function if managed correctly. In order to improve and enhance the management process, the<br />
entire staff working in eGovernment sector should have ICT skills, and the directors should have<br />
management knowledge.<br />
Furthermore, should meet on regular bases in order to share and exchange information and to work as a<br />
team, which is a critical success factor (Milis and Mercken, 2002). The ability of all staff to cooperate with<br />
each other and the ability of a formal mechanism of performing that, if not that will create a lack of<br />
knowledge sharing. Heeks (2006) mentioned three main approaches regarding eGovernment<br />
management namely; centralized, decentralized, and hybrid approach.<br />
5.1 Centralized approach<br />
This approach is an effective and efficient approach that makes an institution more independent. It makes<br />
lots of staff and consumers depending on a single management unit and larger dependence on a staff<br />
that plan, expand, and organize eGovernment. This approach suffers from various problems such as;<br />
many changes should take place in terms of information system (IS) in government institutions, such as<br />
IS architecture, new hardware, software, and new process to perform decisions. Such changes will<br />
consume time and money to gather information from decentralized institutions as an input to centralized<br />
decision, and also need more time to distribute this information to the down institutions. That will affect<br />
the delay of system process development such as in social security systems in the UK (Margetts, 1999).<br />
517
5.2 Decentralized approach<br />
Shareef Shareef et al.<br />
This approach is recognized as introducing fewer gaps between the user of the system and system<br />
developer and, this system is likely to be faster in terms of development. Other features of the system<br />
include operation, troubleshooting, implementation and maintenance, with a possibility of being<br />
completed faster under this approach. In addition, this approach presents lower costs compared to the<br />
centralized one. This is due to faster progress, greater focus on buying software packages rather than<br />
progressing software in-house and greater focus on smaller computers.<br />
However, this approach also suffers from diverse problems and constraints such as high initial cost<br />
investment on IT, lack of skills in government institutions employees to support decentralized decision<br />
making, and work on the eGovernment implementation system. In other words buying computers for<br />
information collection, staff training to system maintenance and operation, these will increase, cost, and<br />
duplicate efforts.<br />
Data sharing in this approach also is one of the main dilemmas facing eGovernment management. In<br />
other words the same data distributed amongst various institutions with different formats, name, and<br />
codes. Sharing other resources, for instance if an institution wants to create its own eGovernment<br />
system, that may be difficult to replace software and hardware. However, each system needs a unique<br />
set of skills for system operation, implementation, and evolution.<br />
5.3 Hybrid approach<br />
This approach is the most effective approach for eGovernment management, because the decision is<br />
executed by both senior level and lower level officials and would be a combination of both centralized and<br />
decentralized approach into some type of compromise. The Canadian government has used the hybrid<br />
approach of a federated architecture, in which it allows institutions to make their own networks together,<br />
communications integrate a computing architecture to allow the technology to connect together, and data<br />
exchanged through common information architecture (D’Auray, 2003).<br />
The authors propose this approach as a main principle to manage eGovernment sector in regional<br />
governments in developing countries. This approach has also been used by various federal governments<br />
in different countries such as Germany, and the USA. The idea is to create a single portal that links to<br />
sub-portals with users being free to access the main portal or the sub-portals. The responsibilities of main<br />
data management are reserved at sub-portal level, and managed by individual ministries and institutions<br />
(Curtin et al. 2003).<br />
Furthermore, this approach involves division of labour or division of responsibilities such as, recognizing<br />
particular types of eGovernment system as appropriate for central evolution, and others appropriate for<br />
end user/decentralized evolution. The hybrid approach is better than both centralized and decentralized<br />
approaches, “because it can simultaneously provide the control necessary to share key resources<br />
(including data), to avoid duplication, and to achieve economies of scale; and the freedom necessary to<br />
meet user needs, and to overcome blocks to IT usage and system development” (Heeks, 2006, p 29).<br />
Nevertheless, the hybrid approach is not easy to implement and is not panacea. It can suffer from some<br />
of the disadvantages and shortfalls encountered in the other two approaches.<br />
To succeed, any system should be evaluated and monitored in order to be able to consider its potential<br />
for implementation. The core of ICT evaluation requires consideration of internal managerial behaviours<br />
and external interactions such as citizen responses (Hackney, et al. 2005). Literature demonstrates that a<br />
wide range of approaches and methodologies have been used to evaluate eGovernment systems. The<br />
Analytic Hierarchy Process & Grey (AHP-Grey) method uses multi-criteria to perform a comparative<br />
assessment between new and existing systems (Ji, 2009; Wang, et al. 2007). The consideration of key<br />
performance indicators (KPI), consumer satisfaction surveys and other monitoring and evaluation (M&E)<br />
tools to a different way of testing the success of eGovernment systems (infoDev, 2008). Furthermore, the<br />
Strength, Weakness, Opportunities and Threats (SWOT) analysis method can also be used to evaluate<br />
the proposed framework against best practice frameworks in developing countries (Backus, 2001;<br />
Kahraman, et al. 2007; Mousavi, et al. 2010; UN, 2010).<br />
518
Shareef Shareef et al.<br />
In addition, there are a variety of methodologies that have been deployed to evaluate IT projects such as<br />
Real Option Valuation (ROV) by Paul & Evan (2007), Return on management (ROM) and also Multi-<br />
Objective and Multi Criteria (MOMC) by Remenyi et al. (1999).<br />
The above mentioned methodologies can also be applied to evaluate the eGovernment sector. This<br />
research is ongoing and its next phase will address the evaluation of eGovernment systems, allowing the<br />
authors for more close focus on evaluation models and methodologies.<br />
6. Challenges<br />
Information technologies play a vital role in the running of every institution across the globe.<br />
Nevertheless, three out of five IT projects fail in terms of satisfying user requirements (Goepp et. al.,<br />
2006). Furthermore, most of the above also fail by exceeding their completion deadlines and/or budgets.<br />
Such failings represent a substantial financial loss for the organizations involved (Sauer et al., 2001).<br />
EGovernment projects face the same challenges as any other IT project (Arif, 2008). Literature contains<br />
the results from various researches on the challenges in developing eGovernment systems such as the<br />
lack of awareness (Reffat, 2003), bureaucratic culture, lack of government support (Karunanada &<br />
Weerakody, 2006), lack of usability of websites, trust, human resource, and capacity building. All of the<br />
above can also be considered as key risks in IT projects of diverse types. Overcoming such challenges<br />
would therefore be the fundamental tests for citizens and government for any country planning to<br />
implement eGovernment.<br />
Currently, most local, regional, federal, and state governments face severe dilemmas in managing<br />
eGovernment, both in developing and even developed countries. As far as literature is concerned, most<br />
of such challenges arise not from the application, but from the complexity of the infrastructure itself<br />
(Wang, et al. 2004). Furthermore, another key factor of failure in eGovernment management is that of<br />
poor management process inherent within the organization (Heeks, 2008).<br />
Proper management will enhance the success of an eGovernment initiative. Lack of discipline and rigor<br />
of system management can also considerably contribute to the failure of the eGovernment system (Rose<br />
and Grant 2010). Another factor that can impact on eGovernment systems is the lack of interoperability<br />
among government institutions (Moore, 2005; Ogilvie, 2005), where each institution sets up their own<br />
system without sharing data or information with the others. In addition, misunderstanding and lack of<br />
collaboration between the services and ICT may cause tension (Socitm, 2003).<br />
The interference of politicians in public management may contribute to the failure of systems, particularly<br />
in developing countries. Politicians should support the development process in order to implement<br />
successful systems (Reddick & Frank, 2007). The lack of direct contact can result in multiple iterations,<br />
weak leadership and poor IT skills employed in the eGovernment sector will also invoke failures in the<br />
eGovernment system (Prybutok, et al. 2008).<br />
Moreover, lack of participation from business, employees, citizens, and others of different ICT means and<br />
capabilities may influence failure in eGovernment systems (Brown & Schelin, 2005; Carter & Bélanger,<br />
2005; Jaeger & Thompson, 2003; Moore, 2005; Löfstedt, 2007). The cooperation of all stakeholders<br />
therefore is a key factor for a successful eGovernment system.<br />
7. Conclusion<br />
In developing countries and particularly in the Kurdistan Region of Iraq (KRI) both government sector and<br />
private sector are commonly technology-based rather than information-based, in terms of service<br />
provision. That may cause significant divide between the evolving program in the private sector and the<br />
expectation of the government. Therefore, the authors propose an organizational framework for the<br />
eGovernment sector. A management process that focuses on the effect of citizens’ orientation and the<br />
cooperation of all stakeholders for successful eGovernment initiative. Thus, senior managers and chief<br />
executives should consider these issues in the context of implementing eGovernment. A hybrid concept<br />
for managing eGovernment system for IT department relevant to the initiative of an eGovernment for<br />
KRG has been proposed. This framework can be applied to other regional governments in developing<br />
countries. The authors believe that the hybrid approach of managing eGovernment implementation is<br />
very useful as it combines both centralized and decentralized features in managing the eGovernment<br />
sector. The above framework fulfils the key requirement of considering the organizational aspect as an<br />
equally important factor while managing IT projects for eGovernment implementation. Environmental and<br />
519
Shareef Shareef et al.<br />
societal challenges might have a significant effect on eGovernment failure and, should be considered to<br />
allow for success in the sector.<br />
References<br />
Al-Kamali, A. (2005) ‘Opening Address’, the 11th GCC eGovernment Forum, Dubai, UAE, May 21-25<br />
Andersen, K. V., (2006) ‘eGovernment: Five Key Challenges for Management’, the Electronic Journal of<br />
eGovernment, 4(1), pp.1-8.<br />
Arif, M. (2008) ‘Customer Orientation in eGovernment Project Management: a Case Study’, the Electronic Journal of<br />
eGovernment, 6(1), pp1–10.<br />
Backus, M. (2001) ‘E-governance and developing Countries: Introduction and examples’, research report, available<br />
at: http://www.ftpiicd.org/files/research/reports/re port3.pdf, (Accessed: 16 August 2010)g.<br />
Berce, J., Lanfranco, S. and Vehovar, V. (2008) ‘e-Governance a new Challenge After e Government’, Proceedings<br />
of the 8th <strong>European</strong> <strong>Conference</strong> on eGovernment, Ecole Polytechnique, Lausanne,Switzerland,10-11 July 2008<br />
Brown, M. M. Schelin, S. (2005) ‘American local governments: Confronting the EGovernment challenge’, by D.<br />
Helmut (Ed.), Local electronic government: A comparative study, London: Routledge.<br />
Carter, L. and Belanger, F. (2005) ‘the utilization of EGovernment services: Citizen trust, innovation and acceptance<br />
factors’, Information Systems Journal, 15(1), pp. 5−25.<br />
Coursey, D. Yang, K. Kasserkert, A. and Norris, D. (2007) ‘E-Gov Adoption in U.S. Local Governments: Bridging<br />
Public Management and Institutional Explanations in a Pooled Time Series Model’, Paper prepared for the 2007<br />
Public Management Research <strong>Conference</strong>, Tucson, Arizona, Available at: http://www.pmranet.org/conferences,<br />
(Accessed:16 January 2010), pp. 1-27.<br />
Curtin, G. G. Sommer, H. M. and Vis- Sommer, V. (2003) The world of e- government’, Haworth press, New York,<br />
pp. 107-126.<br />
D’Auray, M. (2003) ‘the dual challenges of integration and inclusion: canada’s experience with government online’, in<br />
G.G. Curtin, M. H. Sommer and V. Vis-Sommer (eds), The world of e government. New York: Haworth press,<br />
pp 31-40.<br />
DeLone, W. H. and McLean, E. R. (2003) ‘The DeLone and McLean model of information systems success: A ten<br />
year update’. Journal of Management Information Systems, 19(4), pp. 9−30<br />
Dulaimi, M.F. (2005) ‘The Challenge of Customer Orientation In The Construction Industry’, Construction Innovation,<br />
5(1), pp. 3-12.<br />
Gant, J. P. and Gant, D. B. (2002) ‘Web portal functionality and state government eservice’, Proceedings of the 35th<br />
Annual Hawaii International <strong>Conference</strong> on System Sciences, IEEE 2002, Available at:<br />
http://www.albany.edu/~hjscholl/MSI522_2002/pdfs/Gant_et_al_2002.pdf, (Accessed: 05 March 2010), pp.<br />
1627−1636.<br />
Goepp, V., Kiefer, F. and Geiskopf, F. (2006) ‘Design of Information System Architectures Using A Key-Problem<br />
Framework’, Computers in Industry, 57(2) pp. 189-200<br />
Grant, G. and Chau, D. (2005) ‘Developing a Generic Framework for eGovernment’, Journal of Globalb Information<br />
Management, 13(1), Issue 1, pp.1-30<br />
Hackney, R., Jones, S. and Irani, Z. (2005) ‘EGovernment information systems evaluation: conceptualising ‘customer<br />
engagement’, eGovernment Workshop ’05 (eGOV05), September 13 2005, Brunel University, West London<br />
UB8 3PH, UK<br />
Heeks, R. (2006) Implementing and managing eGovernments, an international text, SAGE publication Ltd, ISBN,<br />
0761867915.<br />
Heeks, R. (2008) ‘Success and Failure Rates of eGovernment in Developing/ Transitional<br />
Countries: Overview’, Last updated on 19 October, 2008. Available at: http://www.egov4dev.org/success/sfrates.s<br />
html, (Accessed: 23 October 2009).<br />
InfoDev, (2008) ‘The Introduction to EGovernment’, Chapter 10: Monitoring andEvaluation, available at:<br />
http://egov.infodev.org/en/Section.110.html, (Accessed: 08 September 2010).<br />
Jaeger, P. T. and Thompson, K. M. (2003) ‘EGovernment around the world: Lessons,challenges, and future<br />
directions’, Government Information Quarterly,20(4), pp. 389−394.<br />
Jaworski, B.J. and Kohli, A.K. (1993) ‘Market Orientation: Antecedents and Consequences’, Journal of Marketing,<br />
57(1), pp. 53-70.<br />
Ji, Z. (2009) ‘The Research on the Evaluation of EGovernment System’, International <strong>Conference</strong> o Industrial and<br />
Information Systems, April 24-April 25, ISBN: 978-0-7695-3618-7.<br />
Kahn, K.B. (2001) ‘Market Orientation, Interdepartmental Integration and Product Development Performance’,<br />
Journal of Product Innovation Management, 18(3) pp. 314-323.<br />
Kahraman, C., Demirel, C. N. and Demirel, T. (2007) ‘Prioritization of e Government strategies using a SWOT-AHP<br />
analysis: the case of Turkey’, <strong>European</strong> Journal of Information Systems, 16(1), pp. 284-286.<br />
Kamar, N., Ongo’ndo, M. (2007) ‘Impact of eGovernment on management and use of Government Information in<br />
Kenya’, Government Informationand Official Publication, Available at:http://archive.ifla.org/IV/ifla73/papers/119-<br />
Kamar_Ongondo-en.pdf, (Accessed: 04 March 2010).<br />
Karunanada, A. and Weerakody, V. (2006) ‘eGovernment implementation in Sri-Lanka: lesons from the UK’, 8 th<br />
International Information Technology conference, Colombo, Sri-Lanka.<br />
Ke, W. and Wei, K. K. (2004) ‘Successful EGovernment in Singapore’, Communications of the ACM, 47(6), pp.<br />
95−99<br />
KRG, (2010) ‘Kurdistan Regional Government’, Available at: www.krg.org, (Accessed: 10 March 2009).<br />
520
Shareef Shareef et al.<br />
KRSO, (2007) ‘Kurdistan Regional Statistics Office’, available at:<br />
http://www.krso.net/detail.aspx?page=statisticsbysubjects&c=sbsPopulationLabor&id=361, (Accessed: 05<br />
August 2009).<br />
Löfstedt, U. (2007) ‘EGovernment services in local governments—a study of development in Swedish municipalities’,<br />
Journal of Organisational Transformation & Social Change, 4(2), pp.157−176<br />
Margetts, H. (1999) ‘information technology in government: Britain and America’, London: Routledge, 11New Fetter<br />
Lane, London EC4P.<br />
Milis, K., and Mercken, R. (2002) ‘Success Factors Regarding the Implementation of ICT Investment Projects’,<br />
International Journal of Production Economics, Vol. 80, No1, pp 105-117<br />
Moore, A. (2005) ‘Implementing EGovernment portals, technical and organizational issues: Montgomery county<br />
(USA) portal’, Proceedings of the E-Gov VC Series Under Joint Economic Research Program of the<br />
Government of Kazakhstan, available at: http://web.worldbank.org , (Accessed: 02 February 2010).<br />
Mousavi, A. S. Pimenidis, E. Jahankhani, H. (2010) ‘Five Stage Development Framework for Electronic Government’,<br />
The Proceedings of the 10th <strong>European</strong> <strong>Conference</strong> on eGovernment, University of Limerick, Ireland 17-18 June<br />
2010.<br />
Nygren, G. K. (2009) ‘the Rhetoric of eGovernment management and the reality of eGovernment work: the Swedish<br />
action plan for eGovernment considered’, International Journal of Public Information Systems, 2(1), pp. 135-<br />
146.<br />
Ogilvie, M. (2005) ‘Implementing EGovernment portals, technical and organizational issues: Service New Brunswick<br />
(Canada) portal’, Proceedings of the E-Gov VC SeriesUnder Joint Economic Research Program of the<br />
Government of Kazakhstan, available at: http://web.worldbank.org , (Accessed: 05 February 2010).<br />
Paul, R. S. Evan, J. D. (2007) ‘Valuing technology investments: use real options thinking but forget real options<br />
valuation’, International Journal of Techno entrepreneurship. 1(1), pp. 58-77.<br />
Prybutok, R.V., Zhang, S.X. Ryan, D. (2008) ‘Evaluating leadership, IT quality, and net benefits in an eGovernment<br />
environment’, Information and Management, 45(3), pp. 143–152<br />
Qu, R., Ennew C. and Sinclair, M.Y. (2005) ‘The Impact of Regulation And Ownership Structure On Market<br />
Orientation In The Tourism Industry In China’, Tourism Management, 26(8), pp. 939-950.<br />
Reddick, C. G. and Frank, H. A. (2007) ‘The perceived impacts of EGovernment on U.S. cities: A survey of Florida<br />
and Texas city managers’, Government Information Quarterly, 24(3), pp. 576−594.<br />
Reffat, R. (2003) ‘developing a successful eGovernment’, Working paper, school of agriculture, Design Science and<br />
Planning, University of Sydney, Australia Rodrigues, A. S., Patrício, A. C. L., Silva.<br />
Remenyi, D. Money, A. and Bannister, F. (1995) ‘Effective Measurement and Management of ICT Costs and<br />
Benefits’, Butterworth, Heinemann.<br />
Rodriguez, E. and Edwards J.S. (2007) Knowledge management applied to enterprise risk management: Is there any<br />
value in using KM for ERM? In Proceedings of 8th <strong>European</strong> <strong>Conference</strong> on Knowledge Management (Remenyi<br />
D, Ed), pp 813-820. <strong>Academic</strong> <strong>Conference</strong>s Limited, Reading, UK, Limerick, Ireland.<br />
Rose, R. R. Grant, G. G. (2010) ‘Critical issues pertaining to the planning and implementation of EGovernment<br />
initiative’, Government Information Quarterly, 27(1), pp. 26–33<br />
Sauer, C. Liu, L. Johnston. K. (2001) ‘Where Project Managers Are Kings’, Project Management Journal, 32(4), pp.<br />
39-49.<br />
Siguaw, J. Simpson, P. and Baker, T. (1998) ‘Effects of Supplier Market Orientation on Distributor Market Orientation<br />
and the Channel Relationship: The Distributor Perspective’, Journal of Marketing 62(2) pp.99-111.<br />
Savvas, I., Pimenidis, E. and Sideridis, A. (2009) ‘mapping eGovernment stakeholder requirements to public<br />
administration operational needs ‘, IADIS International Journal on WWW/Internet, 7(1) pp. 152-165.<br />
Shareef, M. S., Arreymbi, J. Jahankhni. H. and Pimendis, E. (2010) ‘mutli-channel delivery of services: initial pace<br />
towards m-government: the case of Kurdistan region of Iraq’, proceedings of the Advances in Computing and<br />
Technology, January2010, pp54-63, ISBN: 978-0-9564747-0-4.<br />
Sin, L.Y.M., Tse, A.C.B. Heung, V.C.S, and Yim, F.H.K. (2005) ‘An Analysis Of The Relationship Between Market<br />
Orientation And Business Performance In The Hotel Industry’, Hospitality Management, 24(6), pp. 555-577.<br />
Singh and Ranchodd, (2004) ‘Market Orientation and Customer Satisfaction: Evidence From British Machine Tool<br />
Industry’, Industrial Marketing Management, 33(2), pp. 135-144.<br />
Socitm (2003)’managing eGovernment-a discussion paper’, Insight publication, Available at:<br />
http://unpan1.un.org/intradoc/groups/public/documents/UNTC/UNPAN011528.pdf, (Accessed: 23 January<br />
2010).<br />
United Nations (2008) ‘eGovernment Survey, from eGovernment to Connected Governance’, Department of<br />
Economic and Social Affairs Division for Public Administration and Development Management, pp1-225<br />
UN, (2010) ‘eGovernment Applications’, United Nations Asian and Pacific Training Centre for Information and<br />
Communication Technology for Development (APCICT), Briefing Note No. 3, (Accessed: 11 April 2010).<br />
Wang, J., Cao, J. Leckie, O. J. and Zhang, S.S. (2004) ‘Managing EGovernment IT Infrastructure: An approach<br />
combining Autonomic Computing and Awareness Based collaboration’, Proceeding of the Fourth International<br />
<strong>Conference</strong> on Computer and Information Technology, pp 998 - 1003<br />
Wang, Y-S., and Liao, Y-W (2008) ‘Assessing eGovernment systems success: A validation of the DeLone and<br />
McLean model of information systems success’, Government Information Quarterly, 25(4), pp. 717–733.<br />
Wang, M., Liu, P. and Ou, G. (2007) ‘TheEvaluation Study of Customer Satisfaction Based on Gray –AHP Method for<br />
B2C Electronic-Commerce Enterprise’, Engineering letters, Vol. 15, Issue 1, pp 1-6.<br />
Weerakody, V. Janssen, M. and Dwivedi, K. Y. (2009) ‘Handbook of Research on ICT-Enabled Transformational<br />
Government: A Global Perspective. IGI Global; 1 st edition<br />
521
Outsourcing of IT Projects in the Public Sector – Sustainable<br />
Solution or Erosion of the Public Sector?<br />
Dalibor Stanimirovic and Mirko Vintar<br />
University of Ljubljana, Slovenia<br />
dalibor.stanimirovic@fu.uni-lj.si<br />
mirko.vintar@fu.uni-lj.si<br />
Abstract: While the number of outsourcing projects in the last ten years has been growing exponentially in Slovenia,<br />
sourcing strategies seem to be one of the core factors in creating a sustainable while effective and efficient public<br />
sector, at the same time. Outsourcing projects ought to reduce costs and help organizations to focus on core<br />
business processes which should consequently improve service provision and quality. Past experience and recent<br />
research carried out in the public sector show that outsourcing can indisputably bring many benefits to the<br />
organizations which master the art of devising, deploying, and maintaining outsourcing relationships, but for many<br />
organizations, these benefits remain elusive. The research focuses on in-depth analysis of the essential factors<br />
within the concept while examining the current situation in the field of outsourcing in the Slovenian public sector and<br />
eventually presents research findings on outsourcing of information technology projects (IT-projects) at the municipal<br />
level. According to some experts and rough estimates, the amount of outsourcing projects in the Slovenian public<br />
sector have doubled in recent years and during the present economic and financial crisis, reach tens of millions of<br />
Euros. The article analyzes the methodological, substantive, procedural and other relevant factors within the process<br />
of outsourcing and summarizes the results of our own empirical research on outsourcing of IT-projects in the<br />
Slovenian public sector. Paper finally provides a set of relevant criteria and guidelines for critical evaluation of such<br />
projects and eventually presents the conceptual design of sustainable model for quality selection as well as effective<br />
and efficient implementation of outsourcing projects in the public sector.<br />
Keywords: IT outsourcing, public sector, outsourcing criteria, sustainable outsourcing model<br />
1. Introduction<br />
Concept of New Public Management has had undoubtedly a major impact on development and<br />
functioning of Slovenian public sector in the last more than one decade, however it should be noted that<br />
apart from positive results, many negative, unexpected effects have been experienced as well. The first<br />
phase of its implementation was very promising in the field of improving the effectiveness and efficiency<br />
of public sector, which was indisputably true to some extent. Problems came later when the euphoria<br />
gave way. New Public Management started straying to the growing and increasingly less justified<br />
outsourcing of public services, leading to a completely opposite effect than expected and desired.<br />
Despite the high expectations, subsequent experience has shown that outsourcing cannot be a panacea<br />
for the majority of problems in the public sector, which most frequently occur due to poor long term<br />
strategy, or even lack of it. While on the other hand, regardless of the long term strategies and goals,<br />
public sector often acts uncontrollably, indiscriminately and non-critically while implementing and<br />
pursuing somehow non-reflectively set objectives.<br />
Furthermore, significant problems are charted in movement to the wholesale use of competitive tendering<br />
and positioning outsourcing as a strategic tool of public management. Over the last two decades external<br />
provision of IT projects (outsourcing) has become a principle in most parts of public sector, which caused<br />
uncontrolled “brain drain’’, outflow of vital professional knowledge and loss of core competencies in public<br />
sector. It is evident that situation has escalated to the point that some government departments<br />
completely lost control over preparation, development and realization of planned projects, which<br />
consequently results in weak control over increasing costs and reduced accountability for services.<br />
Furthermore outsourcing very often means absolute dependence on external providers. This issue is<br />
currently a very hot topic and represents one of the fundamental problems of cost-effective while longterm<br />
successful and user-oriented public sector.<br />
Objective evaluation of outsourcing projects should be based on formalised methods and tools rather<br />
than intuitive, often political criteria, used in many countries today. The latter statement provides a basis<br />
for the main hypothesis in this research paper which argues that future planning, implementation and<br />
evaluation of outsourcing projects should be based on formalised multi-criteria models supported by<br />
information tools, which could significantly facilitate and improve decision making process while<br />
minimizing risk and reducing project costs.<br />
522
Dalibor Stanimirovic and Mirko Vintar<br />
Thus the main objective of this paper is to highlight implications of outsourcing on achieving long-term<br />
goals, human resources management, provision of quality public services and cost effectiveness of public<br />
sector organizations. Given the theoretical foundations of foreign and domestic authors and the results of<br />
our own empirical research, the paper is focusing primarily on the following research questions:<br />
Organizations in the Slovenian public sector are largely unaware of the long-term implications of<br />
outsourcing of IT-projects to their continued operation and reorganization of human resources.<br />
Decision making process on outsourcing of IT-projects in Slovenian public sector organizations is<br />
conducted largely without the use of formalized multi-criteria methods and models.<br />
Is it possible to develop relatively simple and practically applicable multi-criteria decision making<br />
model for selection and implementation of IT outsourcing projects in Slovenian public sector?<br />
The following paper is based on various theoretical issues, our own empirical research and presents a<br />
conceptual design for creation of a structured and balanced model for the selection and implementation<br />
of outsourcing projects in the public sector. Development of sustainable multi-criteria model for effective<br />
decision-making process, planning and implementation of outsourcing projects in the public sector<br />
inevitably requires a multidisciplinary approach and involvement of different stakeholders in all stages of<br />
development and decision making process.<br />
After a brief introduction, the second chapter of this paper presents the concept of outsourcing and an<br />
overview over the relevant literature while outlining its contextual considerations and implications of<br />
sourcing alternatives. The third chapter reveals the characteristics of our own outsourcing research, its<br />
results and their synthesis, as well as offers guidelines for successful implementation of outsourcing<br />
strategy. The fourth chapter describes the development of a comprehensive approach when deciding to<br />
outsource IT-projects in the public sector, based on a set of selected quantitative and qualitative criteria<br />
and presents an integral approach in developing a conceptual model of outsourcing, while at the end of<br />
the chapter we are respectively presenting our own solution to support decision making process in this<br />
field. The fifth chapter contains the evaluation of the presented model, discussion on its practical<br />
applicability and description of its positive features and limitations, and subsequently submits the final<br />
arguments and observations regarding the described approach.<br />
2. Outsourcing - the conceptual definition, implications and literature review<br />
Ellram and Maltz (1997) argue that outsourcing is a contractual transfer of organizational activities and<br />
responsibilities to other (external) business entity. They emphasize that the volume of outsourced<br />
activities depends on their content and the needs of the parent organization. Kubr (2002) defines<br />
outsourcing as a contractual elimination and transfer of the activity, for which the organization decides not<br />
to perform it itself in future, to the external business entities. Such an operating strategy in his view,<br />
allows the efficient allocation of resources. Literature presents a wide range of different definitions,<br />
ranging from the most consistent and accurate up to superficial and partial definition of the phenomenon.<br />
We think that the most useful and versatile is its most widespread and widely accepted definition, which<br />
reads as follows: Outsourcing is a contractual transfer of certain activities and business processes from<br />
the parent organization to the external contractor (Greaver, 1999).<br />
Outsourcing within the concept of New Public Management since 1980’s can be seen as a business<br />
strategy in which the organization is striving to improve business performance and primarily cut back<br />
costs as well as focus on its core functions and core activities. Non-critical and over abundant<br />
implementation of outsourcing projects has led to some unforeseen problems in public sector. Slovenia<br />
has encountered problems with outsourcing especially in the last five years and ongoing financial and<br />
economic crisis just revealed its magnitude. Seeking short-term solutions on account of the New Public<br />
Management philosophy and lack of experience in this field as well as neglecting all other organizational<br />
aspects except costs (even cost-effectiveness of some outsourcing projects is very doubtful in the long<br />
run) has led some public sector organizations to the unenviable situation. Because of a variety of<br />
negative implications caused by outsourcing, some public sector organizations found themselves in a<br />
vicious circle. In fact, their continued operation is no longer possible without external contractors, while on<br />
the other hand, outsourcing is undermining their organizational foundations such as control over costs,<br />
human resources and future development.<br />
Considering the above assumptions and international research (Bongard, 1994, Chapman and Andrade,<br />
1997, Greaver, 1999, Jensen, 2007) as well as our own, the potential negative consequences of<br />
outsourcing are highlighted as they follow:<br />
523
Loss of core competencies,<br />
“Brain drain”,<br />
Dalibor Stanimirovic and Mirko Vintar<br />
Loss of control over the most important organizational functions,<br />
Reduced quality of services,<br />
Reduce accountability for services,<br />
Complete dependence on external contractor,<br />
Collusive tendering and other tendering problems.<br />
The continuation of this paper will present up to date literature and research concerning the outsourcing<br />
phenomenon, which have been trying to resolve the problems addressed above and facilitate more<br />
objective and sustainable decision making in this field of public sector.<br />
2.1 Overview of the literature and recent research<br />
Most literature does not illuminate the complex and multidimensional strategy of outsourcing through a<br />
wider perspective. Authors are most often focusing on a rather narrow perspective, usually costs and<br />
other particularly financial benefits, but do not provide sufficiently comprehensive answers regarding the<br />
advantages and disadvantages of outsourcing strategy. Public sector is particularly at risk here, because<br />
meeting broader societal needs cannot easily be passed to the outside (private) contractor for cost<br />
reductions and other somewhat controversial reasons. Nevertheless, because of its complexity,<br />
pervasiveness and its broad implications, number of outsourcing researchers has been rising in recent<br />
years.<br />
The first systematic and scientific research of outsourcing can be found in the late 80’s and early 90’s of<br />
the last century (Ford and Farmer 1986, Due, 1992, Willcocks and Lacity, 1995 etc.). Thorough scientific<br />
studies of the impact and importance of outsourcing are still rare. Experts in this area (Corbett, 2004,<br />
Jensen, 2007) claim that the phenomenon of outsourcing gained so much importance over the last<br />
twenty years due to global social change and transformation as well as the booming public sectors<br />
worldwide.<br />
Previous research of outsourcing (Quinn and Hilmer, 1994, Johnson, 1997, Lonsdale and Cox, 1997,<br />
Wasner, 1999, Jacobides, 2005) is largely exploring the financial implications of outsourcing and mainly<br />
presents parent organizations dissatisfaction with the ongoing projects which are often terminated before<br />
expected (Kavcic and Tavcar, 2008). Despite the growing interest in the phenomenon of outsourcing,<br />
which have recently raised increasing attention among researchers in the most propulsive economies<br />
over the past few years, namely the authors in India (Pandey and Bansal, 2003) and China (Choy et al.,<br />
2005), it is difficult to trace a comprehensive strategy for preventing or resolving problems of outsourcing<br />
projects. Studies (Thoms, 2004, Schniederjans et al., 2005, Taylor, 2006) often reveal the hidden costs<br />
as the most problematic segment of outsourcing, in which problems usually occur when organizations are<br />
already heavily involved in the outsourcing projects and the termination of contract in that phase would<br />
inflict large financial losses for both sides. Surprisingly, research is rarely dealing with the other negative<br />
consequences that may pose a potential threat.<br />
On the other hand, outsourcing literature (Barney 1991, Peteraf, 1993, Nellore and Soderquist, 2000)<br />
deals with separate aspects of the parent organization and the external contractor and rarely addresses<br />
the outsourcing projects in an integrated manner in which attention is focused to the whole project, rather<br />
than individual business entities within the project (Kavcic and Tavcar, 2008). Here it should be noted that<br />
the substantive and formal criteria presented by the most literature, which should form the basis for<br />
quality decision making in the process of selection and implementation of outsourcing projects, are<br />
extremely vague and arbitrary and consequently prevent organizations to adopt comprehensive and<br />
objective evaluation of such projects. Previous research (Kern et al., 2002, Linder, 2004, Power et al.,<br />
2006) is mainly focused on a small number of criteria, which consider only short-term and partial aspects<br />
of business cooperation and do not address long-term, strategic implications of outsourcing projects.<br />
Presented study exceeds the weaknesses and limitations of previous research, since it is exploring the<br />
implications of outsourcing on different organizational aspects and conducting substantive analysis of<br />
decision making criteria in the broader perspective. As seen in previous surveys, the studies are<br />
predominantly unilateral and focused primarily on short-term cost indicators that highlight mainly the<br />
524
Dalibor Stanimirovic and Mirko Vintar<br />
financial background of the whole problem, which makes it impossible to adopt quality and<br />
comprehensive decision.<br />
In analyzing the suitability and viability of outsourcing strategy, multidisciplinary method which includes<br />
structured and balanced approach in addressing the overall problem, is essential. The presented<br />
empirical study used the Balanced Scorecard (Balanced scorecard, Kaplan and Norton, 2001) to achieve<br />
conceptual and long-term solutions. Balanced Scorecard facilitates analysis of dynamic criteria and<br />
quantifies the important strategic elements of organization. The method used will help generate effective<br />
long-term strategy and align organizational goals with four perspectives: Financial, Customer, Internal<br />
Business Processes and Learning and Growth.<br />
3. Research of outsourcing projects at the municipal level<br />
The survey was conducted during the first six months of 2010 at the Institute for Informatization of<br />
Administration at the Faculty of Administration (University of Ljubljana), in a sample of 85 municipalities<br />
(212 municipalities in Slovenia, which means that the sample covered 40.09% of all municipalities). 64<br />
municipalities responded to the survey (75.3% response rate of the sample, which means that the<br />
realized sample amounted 30.18% of the total number of municipalities in Slovenia). The questionnaire<br />
consisted of qualitative and quantitative indicators, adjusted for objective and comprehensive ex ante<br />
evaluation of the outsourcing projects in public sector organizations.<br />
The purpose of the research is thorough and comprehensive analysis of the situation in the field of<br />
outsourcing at the municipal level in Slovenia, with special emphasis on the analysis of organizational<br />
factors within the Balanced Scorecard. Methodology within the survey focuses particularly on the<br />
financial, organizational, developmental and human resources perspective. The findings obtained will<br />
enable the development of concrete guidelines and recommendations for an integrated outsourcing<br />
strategy and the development of a sustainable model for outsourcing of IT-projects in the Slovenian<br />
municipalities.<br />
3.1 Results of empirical research and their synthesis<br />
The results of empirical study presented below provide answers to two research questions, while the<br />
answer to the third question, which addresses a construction of multi-criteria decision making (MCDM)<br />
model for selection and implementation of outsourcing projects in the public sector, is offered in the next<br />
chapter. Paper focuses on a comprehensive and systematic classification of the results and in-depth<br />
content analysis. The survey results, which are directly related to the first research question showed that<br />
as many as 51 (80%) surveyed municipalities believe that outsourcing cannot negatively affect the<br />
organization and its human resources. The study has also revealed that 64% of the surveyed<br />
municipalities are not familiar with the long-term impacts of outsourcing which are directly linked to loss of<br />
competencies, quality human resources and staffing problems, and are consequently unaware of<br />
potential risks which they are exposed to, when signing an outsourcing contract. Furthermore, the results<br />
showed that 37 (57.82%) municipalities believe that the financial sector is most exposed to potential<br />
negative impacts of outsourcing in the long run, 10 (15.63%) municipalities believe that human resources<br />
and development are compromised because of outsourcing, while 7 (10.92%) municipalities believe that<br />
outsourcing poses the biggest threat to the organizational aspect of municipalities (Figure 1).<br />
The latter results directly reveal the need for better strategies, more responsible decision making and in<br />
particular, a better understanding of this complex phenomenon, whose negative consequences,<br />
especially in the long run, affect almost all aspects of organizational performance.<br />
Concerning the second research question, results revealed that the municipalities do not use formal<br />
multi-criteria decision making models in the process of decision making on outsourcing projects,<br />
thereafter, it was confirmed that their decisions to outsource are based primarily on short-term financial<br />
benefits. The latter was confirmed, while as many as 46.90% of municipalities surveyed, identified<br />
financial reasons as the main argument for the selection of external providers (Figure 2).<br />
The survey also revealed that 60 (94%) municipalities do not have comprehensive long-term strategy in<br />
the field of outsourcing (Figure 3). In addition, research showed the vast majority of surveyed<br />
municipalities (80%) have no actual evaluation framework, including objective criteria or a system of<br />
indicators to measure the eligibility of outsourcing decisions (Figure 3). The latter results indicate that the<br />
municipalities’ decisions on outsourcing are mainly based on intuition and the inertia of previous years,<br />
525
Dalibor Stanimirovic and Mirko Vintar<br />
rather than pre-established objective criteria and measurable indicators. This kind of decision making<br />
allows a multitude of speculation. The issue requires a comprehensive and sustainable solution, which is<br />
not possible without considering modern concepts of management in public sector organizations and<br />
professional attitude of the management.<br />
Figure 1: Potential negative impacts of outsourcing on certain organizational aspects<br />
Figure 2: Reasons for outsourcing<br />
Figure 3: Long term strategy and indicators for outsourcing<br />
526
Dalibor Stanimirovic and Mirko Vintar<br />
3.2 Guidelines on conducting outsourcing projects in the public sector<br />
In surveyed municipalities following problem areas can be identified and highlighted:<br />
Non-defined core and non-core activities in municipalities.<br />
The excessive and indiscriminate outsourcing and lack of strategy in the field of outsourcing.<br />
Unawareness of the potential long-term negative implications of outsourcing projects.<br />
Utilization of human and other resources and the synergies within the public sector organizations.<br />
Lack of vision and strategic objectives of organizations within the public sector, exceeding a period of<br />
government mandate.<br />
Unfortunately, research results cannot always be easily transferred into action, especially when the poor<br />
performance of the organization is related to several areas. Such situation requires a detailed analysis<br />
and preparation of solutions, which often necessitate a radical systemic change in the organization.<br />
Bellow will be presented guidelines that could bring improvement to the areas of particular concern and<br />
risk, which were disclosed by the results of the survey:<br />
Definition of core and non-core activities in the functioning of municipalities.<br />
Formulation of outsourcing strategy, creation of formal multi-criteria decision making models and<br />
indicators for decision making in outsourcing processes.<br />
Assessment of the potential long-term negative implications of outsourcing projects.<br />
Utilize human and other resources as well as hidden potential and synergy within numerous public<br />
sector organizations.<br />
Formulate a vision, strategic objectives, and precise tactics as well as provide funds for achieving<br />
long-term organizational goals, beyond a period of government mandate.<br />
Next chapter presents the development of a sustainable MCDM model for quality selection and<br />
implementation of outsourcing projects, presented model is also an answer to the third research question.<br />
4. Development of sustainable decision making model for outsourcing in the<br />
public sector<br />
Development of sustainable MCDM model to decide on outsourcing of IT-projects in the public sector<br />
inevitably requires balancing several different factors, such as: economic, social, political, regulatory and<br />
technological. This requires the inclusion of numerous stakeholders with different priorities and objectives<br />
in all phases of development and hence decision making process. Given the above arguments, the paper<br />
focuses on the selection of appropriate criteria and suggests the possible construction of MCDM model<br />
which will assist decision makers in setting priorities and making enhanced decisions in the field of public<br />
sector outsourcing.<br />
4.1 Criteria selection<br />
Selection of the criteria is the most critical step in decision making process. Structure of the entire<br />
decision making process should be limited only to the relevant factors that reveal the certain implications<br />
on the problem. We must make sure that the whole procedure does not stray in over excessive dissection<br />
of the problem, because it can blur the important issues and lead to lower quality decisions. Effective use<br />
of the MCDM model requires a thorough understanding of the problem and a balanced application of data<br />
for objective weighting of selected criteria. Over abundance of the criteria may lead to the devaluation of<br />
relations among the criteria, while lack of relevant criteria may preclude a consideration of all relevant<br />
aspects and provide an unbalanced and partial solution to the problem, as it does not include all the<br />
relationships between elements and their mutual correlations (Saaty, 1988). Determining criteria<br />
therefore requires accuracy, consistency and detailed knowledge of the nature of the problem. Criteria on<br />
which the outsourcing decisions should be based are rarely studied in the wider context. Some of the<br />
researchers who deal with such topics are listed below.<br />
The most prominent experts and researchers of outsourcing and its wider socio-economic implications<br />
(Bongard, 1994, Chapman and Andrade, 1997, Greaver 1999, Willcocks et al., 1999, Jensen, 2007 etc.)<br />
emphasize the complexity of this phenomenon, which is reflected in the extremely multifaceted and<br />
complicated evaluation of its numerous effects, while the long-term implications of outsourcing are often<br />
527
Dalibor Stanimirovic and Mirko Vintar<br />
very well concealed. Evaluation criteria, which represent the core substantive aspect in the process of<br />
decision making, should be based on organisational strategies, goals and objectives with strict regard to<br />
organization’s strategic, tactical and operational considerations. Considering the numerous studies and<br />
our own research in Slovenian public sector as well as the complexity of the entire field of outsourcing,<br />
we selected the following criteria to be deployed in the practical utilization of constructed model (Figure<br />
4):<br />
1. Costs<br />
2. Competencies<br />
3. Quality<br />
4. Customer satisfaction<br />
5. Risk<br />
6. Organization<br />
7. Development<br />
8. Innovation<br />
It should be noted here that criteria selection, their absolute and relative weighting and their division into<br />
sub criteria should be made on the basis of decision maker’s preferences and must be subordinated and<br />
adapted to the organization’s core business, its needs and long-term goals.<br />
4.2 Model design<br />
Sustainable MCDM model for outsourcing requires integration of both substantive and formal aspects in<br />
order to facilitate a structured and quality decision making (Figure 4). Evaluation criteria represent the<br />
core substantive aspect in the process of decision making, while the formal aspect includes the market<br />
analysis and specifications of project requirements as well as legal compliance with the set of strict<br />
procedural regulations. Only the integration of both aspects in the comprehensive MCDM model can<br />
represent a useful tool for quality decision making in the process of selection and implementation of<br />
outsourcing projects.<br />
The structure of the model (Figure 4) allows the weighting of the criteria according to their importance,<br />
taking into account their impact on strategies, goals and objectives of the organization. However, the<br />
selection of the most relevant criteria and their optimum weighting classification usually represent the<br />
biggest problem which are the users of MCDM models exposed to. Thus, when criteria are selected and<br />
structured according to their importance, the use of the presented model is rather uncomplicated.<br />
5. Conclusion<br />
The obtained results of the survey indicate only a partial, but a valuable insight into the outsourcing of ITprojects<br />
in the Slovenian public sector. Partial, because the survey sample covered only 85 municipalities<br />
of the 212 municipalities in Slovenia, this is 40.09% of the total population. 64 municipalities responded to<br />
the survey, which represents 30.18% in terms of the total population. Relatively small sample precludes<br />
generalization and prevents application of the obtained results to the entire public sector, but is<br />
nevertheless a good indication of the particular problems faced by municipalities and, consequently, the<br />
entire public sector.<br />
Presented multi-criteria decision support model allows the integration of a large number of relevant<br />
factors, which subjected to certain substantive and procedural requirements, provide quality and<br />
comprehensive, while still “easy to use” approach in decision making and offer a good basis for objective<br />
analysis of possible alternatives, as well as highlight some of the hidden aspects and potential problems<br />
that may arise in the phase of selection and implementation of outsourcing projects. Accounting the<br />
results of our own research as well as other relevant studies and literature dealing with the outsourcing<br />
issues, we selected eight quantitative and qualitative criteria, which are in our view, the most relevant.<br />
528
Dalibor Stanimirovic and Mirko Vintar<br />
PROJECT GOAL<br />
Costs Competencies Quality<br />
Customer<br />
satisfaction<br />
Risk Organization Development Innovation<br />
Solution Outsourcing In house provision<br />
Market analysis and identifying potential<br />
providers<br />
Preparation of the request for proposal<br />
Conducting the request for proposal<br />
Comparing and evaluating proposals<br />
Selection of the provider<br />
Signing the contract<br />
Figure 4: Sustainable model for outsourcing in the public sector<br />
Analysis and specification of project<br />
requirements<br />
Clearly presented multi-criteria decision making model do not represent universal solution to important<br />
problems addressed in this paper in the self-sufficient form. However, on the other hand, developed<br />
model may offer due to its simplicity of use and selection of sufficiently objective criteria as well as their<br />
appropriate weighting, a lot of help in setting realistic goals and priorities. It can also provide help in<br />
allocation of project management resources as well as facilitate decision making and reduce risk in<br />
implementation of outsourcing projects. Despite some shortcomings, which can be seen mainly in noncritical<br />
selection of the criteria and their weighting, along with the objective limitations of political,<br />
regulatory and organizational nature within the public sector, such decision support models could become<br />
a standard in the operating and decision making procedures at the municipal level. Application of<br />
sustainable outsourcing MCDM model, despite required upgrading and adaptation to the specific area of<br />
use, could become a novelty within the decision making procedures in the public sector. Even more, the<br />
objective and critical approach to the selection and evaluation of outsourcing projects should, regarding<br />
the context and magnitude of given problems, receive greater support from all stakeholders and become<br />
a necessity. Current practice in this area is based on inertia, intuitive decisions and primarily on the<br />
fabrication of studies evaluating such decisions much unilaterally and without regard to long-term effects<br />
of such strategies in public sector organizations.<br />
The scale of the studied area and numerous factors that affect the quality of decision making confirm the<br />
multiplicity and complexity of outsourcing and its implications in many areas of organizational activity. The<br />
latter substantiates the need for broader and deeper insight into the background and content of overall<br />
business strategy of Slovenian municipalities. Search of primarily short-term solutions and inadequate<br />
business strategy as well as uncritical approaches in recent years have brought municipalities in a very<br />
complex situation, so it is high time for more critical reflection on their role in the future and mechanisms<br />
that will have to ensure selection of appropriate business strategies, effective spending of budget funds<br />
and the successful achievement of long-term goals.<br />
529
References<br />
Dalibor Stanimirovic and Mirko Vintar<br />
Barney, J. (1991) Firm resources and sustained competitive advantage. Journal of Management, 17 (1): 99–120.<br />
Bongard, Stefan (1994) Outsourcing - Entscheidungen in der Informationsverarbeitung. Entwicklung eines<br />
computergestützten Portfolio-Instrumentariums. Wiesbaden. Deutscher Universität Verlag, str. 480.<br />
Corbett, Michael F. (2004) The Outsourcing Revolution: Why It Makes Sense and How to Do It Right. Kaplan<br />
Business, Washington.<br />
Chapman, Robert B., Andrade, Kathleen R. (1997) Insourcing after the Outsourcing: MIS Survival Guide. AMACOM.<br />
Choy K.L., Lee W.B., Lau H.C.W., Choy L.C. (2005) A knowledge-based supplier intelligence retrieval system for<br />
outsource manufacturing, Knowledge-Based Systems, 2005; 18:1-17.<br />
Due, Richard T. (1992) The Real Costs of Outsourcing. Information Systems Management, 9 (1), str. 78-81.<br />
Ellram, Lisa, Maltz, A. (1997) Outsourcing: Implications for Supply Management. CAPS Research. Tempe.<br />
Ford, David, Farmer, David (1986) Make or buy: a key strategic issue. Long Range planning, Vol. 19, str. 54-62.<br />
Greaver, Maurice F. (1999) Strategic Outsourcing: A Structured Approach to Outsourcing Decisions and Initiatives.<br />
AMACOM.<br />
Jacobides, M., G. (2005) Industry change through vertical disintegration: how and why markets emerged in mortgage<br />
banking. Academy of Management Journal, 48 (3), 465–498.<br />
Jensen, Paul H. (2007) Public Sector Outsourcing Contracts - The Impact of Uncertainty, Incentives and Transaction<br />
Costs on Contractual Relationships. VDM Verlag, Dr. Mueller e. K., Saarbrücken.<br />
Johnson, Mike (1997) Outsourcing in Brief. Butterworth-Heinemann, Oxford.<br />
Kaplan, R. S., Norton, D. P. (2001) Stratesko usmerjena organizacija: prakticna uporaba uravnotezenega sistema<br />
kazalnikov v novem poslovnem okolju. GV Zalozba, Ljubljana.<br />
Kavcic, Klemen, Tavcar, Mitja I. (2008) Interesi in razmerja moci med udelezenci outsourcinga: studija primerov.<br />
Organizacija, letnik 41. Razprave, st. 1, str. 2.<br />
Kern, Thomas, Willcocks, Leslie P., van Heck, Eric (2002) The winner's curse in IT outsourcing: Strategies for<br />
avoiding relational trauma. California Management Review, 44 (2), str. 47-69.<br />
Kubr, M. (2002) Management consulting a guide to the profession. Geneva: International Labour Organization.<br />
Linder, C., Jane (2004) Outsourcing for Radical Change: A Bold Approach to Enterprise Transformation. AMACOM,<br />
1st edition, New York.<br />
Lonsdale, Chris, Cox, Andrew (1997) Outsourcing: risk and rewards. Supply Management, Vol. 2, str. 32-34.<br />
Nellore, R., in K. Soderquist (2000) Strategic outsourcing through specifications. Omega, 28 (5): 525–40.<br />
Pandey, Vivek, Bansal, Veena (2003) A Decision-Making Framework for IT Outsourcing using the Analytic Hierarchy<br />
Process.<br />
Peteraf, M. A. (1993) The cornerstones of competitive advantage: a resource- based view. Strategic Management<br />
Journal, 14 (3): 179–191.<br />
Power, Mark J., Desouza, Kevin, Bonifazi, Carlo (2006) The Outsourcing Handbook: How to Implement a Successful<br />
Outsourcing Process. Kogan Page, Chicago.<br />
Quinn, James B., Hilmer, Frederick G. (1994) Strategic Outsourcing. Sloan Management Review, Vol. 35, 4, str. 43-<br />
55.<br />
Saaty, Thomas L. (1988) The Analytic Hierarchy Process. RWS Publications, Pittsburgh.<br />
Schniederjans, Marc J., Schniederjans, Ashlyn M., Schniederjans, Dara G. (2005) Outsourcing and Insourcing in an<br />
International Context. M. E. Sharpe, London.<br />
Taylor, H. (2006) Critical risks in outsourced IT projects: the intractable and the unforeseen. Communications of the<br />
ACM. Vol. 49, (11), str. 75-79.<br />
Thoms, Brian (2004) Outsourcing: Inside Out and Outside in. Stevens institute of technology, Hoboken, New Jersey.<br />
Wasner, R. (1999) The outsourcing process: strategic and operational realities. Doctoral Dissertation, Linköping<br />
University.<br />
Willcocks, Leslie P., Lacity, Mary C. (1995) Information systems outsourcing in theory and practice. Journal of<br />
Information Technology, 10 (4), str. 203-207.<br />
Willcocks, L. P., Fitzgerald, G., Lacity, M. (1999) To outsource IT or not? Research on economics and evaluation<br />
practice. In Beyond the IT productivity paradox. Wiley, Chichester.<br />
530
Closing the Digital Divide gap in <strong>European</strong> Union: A Unique<br />
Solution for Different Tiers?<br />
Virgil Stoica and Andrei Ilas<br />
Alexandru Ioan Cuza University of Iasi, Romania<br />
virgilstoica@gmail.com<br />
andan_i@yahoo,com<br />
Abstract: Over the last two decades, eGovernance has rapidly advanced on the public agendas as it promised to<br />
offer miraculous solutions of quickness and transparency to classic governing dilemmas. While some societies or<br />
parts of them fully embarked for this adventure, others preferred a limited use of the new technologies. The term<br />
“digital divide” has been coined to describe the newly appeared gap in access to or use of information and<br />
communications technology (ICT) devices. As <strong>European</strong> Commission established in 2010 a Digital Agenda and<br />
announced a significant spending on strategic ICT research, a question arises: is it appropriate to develop a unique<br />
strategy for all <strong>European</strong> Union countries or rather a set of strategies to be differently applied for each society or<br />
segment of it? Using a comparative method, our research describes the digital differences between the 27 <strong>European</strong><br />
members based on 2009 year data. The starting point is represented by the observation that in the least<br />
electronically developed <strong>European</strong> states only a part of those having internet access is also using eGovernment. This<br />
would suggest that the mere presence of ICT devices is not enough to trigger a “digital revolution”. Hence, in a<br />
specific social framework, a moderate presence of electronic governance could be determined by other factors such<br />
as: the lack of education, mistrust or absence of a real need. Consequently, the present paper is mapping the digital<br />
divide within the <strong>European</strong> Union as a rapport between ICT devices, their use, and the relevant characteristics of<br />
each society. The findings suggest that the societies under scrutiny are not in the same need of digital services and<br />
closing the digital gap should not be the final goal. Instead, the resources could be directed towards meeting the<br />
specific needs of one society. However, further country in-depth researches are needed to confirm our findings.<br />
Keywords: digital divide, eGovernance, ICT devices, digital agenda, EU countries<br />
1. The age of digital divide?<br />
It is largely accepted today that the information and communications technology (ICT) is reshaping the<br />
world we knew. Under its influence, even the most conservative areas are rapidly transforming (Susskind,<br />
2008) while the very nature of industrial production is changed by users taking part in the products<br />
making or adapting to their needs (Bruns, 2008).<br />
Over the last two decades, eGovernance has rapidly advanced on the public agendas as it promised to<br />
offer miraculous solutions of quickness and transparency to classic governing dilemmas. However, there<br />
is no agreement on the long-term results of this process or on its benefits. On another hand, the change<br />
may be radical and may happen at a very fast pace. For instance, the eGovernance could led to a “reordering<br />
of the state’s administrative structures and of government itself” (Lanzara, 2009) and, depending<br />
on specific socio-political realities, a country may be able to make impressive eGovernment progresses in<br />
a very short period of time (Misuraca et al., 2010).<br />
In analyzing this phenomenon, one should keep in mind that the changes are not determined only by the<br />
ICT mere presence. Thus, the current features of administrations around the world had been drawn by<br />
the fiscal crisis of the 70’s who invited the governments to “work better and cost less” (Denhardt, 2008).<br />
This finally led to the development of the New Public Management (NPM) that focused on providing<br />
public services using a business approach. Recently, the shortcomings of the NPM and the opportunities<br />
offered by ITC encouraged scholars to announce the NPM’s death (Dunleavy et al, 2006) soon to be<br />
replaced by an ‘e-paradigm’. To that, we can confidently add that the current economic crisis will also<br />
take its toll and force further changes on the administrative systems as they are interconnected with the<br />
economic ones.<br />
The eGovernance is actually only one phenomenon in a much larger technological revolution that is<br />
transforming the very structure of our societies. While some societies fully embarked for this new<br />
‘industrial’ adventure, others seem to prefer a limited use of the new technologies. As it has been the<br />
case throughout the entire modern history in the advent of new technologies, new disparities among<br />
societies are created. A new term, digital divide, has been coined to describe the newly appeared ”gap<br />
between individuals, households, businesses and geographic areas at different socio-economic levels<br />
with regard both to their opportunities to access information and communication technologies and to their<br />
531
Virgil Stoica and Andrei Ilas<br />
use of the Internet for a wide variety of activities”(OECD, 2001). Put differently, the digital divide is about<br />
opportunities created or missed by having or using the new technology.<br />
No doubt that in the ”knowledge era” the ICT access is vital, but one should not fall in the trap of a<br />
technological determinism when explaining the digital divide (Malecki and Moriset, 2008). Indeed, when<br />
approaching the digital divide one should not overlook the classic discussion on social inequalities. In<br />
fact, the literature studying the ICT related evolutions has proved that the same ‘old’ factors are playing<br />
the significant in this phenomenon too. For instance, having internet connections at home is influenced by<br />
income, education, age, race and ethnicity (Mossberger, 2003). Also, while the gender is not reflected<br />
into an Internet access divide, the men tend to use more the Internet than the women (Fallows, 2005).<br />
The traditional difference between rural and urban is also reflected especially in developing countries<br />
where the rural access to Internet represents a problem (Mahan, 2007).<br />
Out of the above literature review we may assert at a theoretical level that the tendency should be for the<br />
digital divide to mirror the social inequalities within a society and the differences between societies. This<br />
is why we should probably agree that if the digital divide do not create, perpetuate or exacerbate social<br />
inequalities, the government intervention should not be considered a necessity (Rooksby and Weckert,<br />
2004). In other words, closing the digital divide should be not possible without diminishing other<br />
persistent inequalities.<br />
From this perspective, a comprehensive research on digital divide should always try to correlate the<br />
digital inequalities with other social inequalities. Also, in-depth analyses of digital divides within the<br />
countries are meaningful when explaining this phenomenon. However, none of these types of analyses is<br />
provided by the present paper. Our established goal is to present some of the digital divides between<br />
<strong>European</strong> Union (EU) states from an eGovernance perspective. This should allow us to evaluate if a<br />
unique solution for all <strong>European</strong> states is possible or if the same results may be achieved throughout a<br />
common action plan such as the recently released 2010 Digital Agenda. For a better understanding we<br />
will next briefly present the EU from an administrative point of view and the 2010 Digital Agenda.<br />
2. The targets of the 2010 Digital Agenda<br />
With the Lisbon Treaty EU finally stepped up from the status of an international form of cooperation to an<br />
international organization. Rooted in the three Communities build up in the ‘50s, the creation of the EU<br />
has always been a pragmatic and economic process with envisaged political consequences. Its main<br />
purpose of preventing a new devastating war between <strong>European</strong> nations has been achieved through<br />
innovative solutions. When compared to other similar structures EU is arguably quite different being<br />
comprised of both supranational and inter-governmentalist ingredients. But the complicated EU structure<br />
comes with a cost of an unstable equilibrium in institutional terms, not likely to be change in the near-by<br />
future (Nugent and Paterson, 2010). Being a mixture of rational choices and political compromises, EU<br />
cannot be described from a unitary theoretical perspective. One has to look very close to understand how<br />
things work in a particular area.<br />
This allegation stands true for the <strong>European</strong> administrative system. Even if it has large policies and a<br />
huge amount of legislation, within the EU does not exist a common system of public administration.<br />
Indeed, the EU policies are delivered, to a large extent, by the national administrations of member states.<br />
Without strong central agencies the EU cannot impose a generalized control across its governing system<br />
as a whole. The consequence is that sometimes the public policies do not enjoy the same type of<br />
implementation or results. The gap that appears between an EU policy and its implementation it is<br />
known as the ‘implementation gap’. To bridge this gap within the Union there is a continuous exchange of<br />
formal and informal between various actors.<br />
Still, the EU situation is not entirely unknown for the science of public administration. In fact, any federal<br />
or unitary state with bureaucratically independent regions encounters the same problem of multilevel<br />
governance (Münch, 2010). It has been argued that, in order to be efficient, two related sets of<br />
preconditions should be in place: “(1) administrative capacity in terms of management, programming,<br />
monitoring, evaluating; and (2) political factors in terms of political interference, stability and<br />
accountability” (Milio, 2010).<br />
Unlike the nation-states, the EU lacks the homogeneity brought by the same language, ethnicity, social<br />
ethos, traditions or history. The diversity stands not only in the <strong>European</strong> logo, but also as a fact even if<br />
we look only at the 6 founder states that now have more than fifty years of close interactions. Moreover,<br />
532
Virgil Stoica and Andrei Ilas<br />
19 out of the 27 member states are small states and they have to cope with structural disadvantages in<br />
their day-to-day relations with the big states (Panke, 2010).<br />
The only way to harmonize the different interests and perspectives within an EU without an <strong>European</strong><br />
identity (Vignon, 2008) was to include all the states in the process of the decision making. The key has<br />
always been the simultaneous negotiation of several decisions that finally turned into package deals<br />
(Nedergaard, 2007). However, once a decision is taken it has to be implemented by all states using the<br />
same or different methods but always to achieve similar results.<br />
Precisely about methods and results in closing the digital divide in EU is the communication document<br />
launched in 2010 by the <strong>European</strong> Commission (EC) and entitled A Digital Agenda for Europe (hereafter<br />
Agenda) (EC, 2010). The digital problems identified in this document are: the fragmentation of the digital<br />
markets, the lack of interoperability, the rising cybercrime and risk of low trust in networks, the lack of<br />
investment in networks, the insufficient research and innovation efforts, the lack of digital literacy and<br />
skills and the missed opportunities in addressing societal challenges. The methods and results pursued<br />
by EC in its Agenda are grouped in ‘seven pillars of development’: a digital single market, an increase in<br />
interoperability and standards, an enhanced cyber security, a fast and ultrafast internet access for<br />
citizens, more investments in research and innovation, an enhanced digital literacy, skills and inclusion<br />
and ICT-enabled benefits for EU society.<br />
It is useful to note that in its Europe’s Digital Competitiveness Report 2010 the EC recognized that, on<br />
average:<br />
(...) R&D [Research and Development] investment in relation to GDP is lower in the EU<br />
compared to its main international competitors, and there are large differences between<br />
Member States, with the Nordic countries and Austria and Germany clearly the top EU<br />
investors (in relation to GDP) and most Eastern Member States and Greece having the<br />
lowest ratios.<br />
So the broader result to be achieved through the Agenda would be to close the gap between the EU and<br />
‘its main international competitors’ and between the member countries. Leaving aside the extra-EU gap,<br />
the observation we could make starting from the above theoretical observations is that the digital divide<br />
cannot or should not be bridged if the other divides between <strong>European</strong> countries remain. A more realistic<br />
objective of the Agenda would be to promote the presence and use of ICT to a larger extent in all the<br />
member states. From a different perspective, one could argue that if the gap is too big the goal is not to<br />
make it disappear but rather to shrink it to a size similar to other inequalities between member states.<br />
Taking into the consideration the <strong>European</strong> realities, our research question can be refined as follows:<br />
what kind of digital divide gap exists within EU? In order to respond to this we will examine the digital<br />
divide only from an eGovernance perspective. The assumed goal of our research is both explorative and<br />
descriptive. The goal is explorative from a methodological point of view: the methodology we developed<br />
covers both the demand and the offer related to eGovernance. Hence, the digital divide is the difference<br />
between ‘eGovernance markets’. The goal is also descriptive in the sense that we present the 2009<br />
eGovernance data on EU countries.<br />
3. Methodology<br />
Measuring eGovernance performance in a relevant and reliable way can offer crucial explanations for<br />
digital divide. Despite this, there is no international consensus about how to do it. There are several<br />
measurement instruments developed by public and private sector organizations to meet their own needs<br />
for assessing the state of eGovernance development (UN 2009). Many of these assessments include an<br />
evaluation of governmental e-services, combined with data from national/international statistics.<br />
However, most of the statistics are developed only from supply side indicators and often by websites<br />
assessment alone.<br />
The measurement techniques are also diverse. For example, the United Nations eGovernment<br />
Readiness Index uses a composite formula comprising a web measure index, a telecommunications<br />
infrastructure index and a human capital index (UN EGovernment Survey 2008). International<br />
Telecommunication Union created the ICT Development Index, which has three sub-indices regarding<br />
access, use and skills (ITU 2010).<br />
533
Virgil Stoica and Andrei Ilas<br />
Table 1: Examples of Indexes created for eGovernment evaluation<br />
Index Sub-indices Indicators<br />
United Nations<br />
eGovernment<br />
Readiness<br />
Index<br />
ICT<br />
Development<br />
Index<br />
The Web Measure Index<br />
Telecommunication<br />
Infrastructure Index<br />
Human Capital Index<br />
ICT Access Index<br />
ICT Use Index<br />
ICT Skills Index<br />
Responses on a questionnaire based on the presence/absence<br />
of specific facilities/services of governmental sites<br />
Internet Users/100 persons<br />
PCs/100 persons<br />
Main Telephones Lines/100 persons<br />
Cellular telephones/100 persons<br />
Broad banding/100 persons<br />
Adult literacy rate<br />
Primary, secondary and tertiary gross enrolment ratio<br />
Fixed telephone lines/100 inhabitants<br />
Mobile telephone subscriptions/100 inhabitants<br />
International Internet bandwidth/100 users<br />
Proportion of household with a computer<br />
Proportion of household with Internet access at home<br />
Internet users/100 inhabitants<br />
Fixed broadband Internet subscribers/ 100 inhabitants<br />
Mobile broadband subscriptions/ 100 inhabitants<br />
Adult literacy rate<br />
Secondary gross enrolment ratio<br />
Tertiary gross enrolment ratio<br />
One problem of this kind of measurement relates to the technological innovations. For instance,<br />
indicators such as “fixed telephones lines” or “mobile telephone subscriptions” are considered, even if<br />
they are not directly connected with eGovernance. On the other hand, the introduction of high-speed<br />
mobile Internet access could further boost the number of Internet users and, therefore, “mobile<br />
broadband subscriptions” seems a more adequate indicator in order to catch the technological<br />
innovation.<br />
A second problem relates to the reduced amount of information available on the demand side of<br />
eGovernance. “Adult literacy rate” and “gross enrolment ratio” offer an image of the population degree of<br />
education. However, these indicators are not appropriate measures of digital skills. Computer and<br />
Internet literacy are different concepts from usual literacy, and should be evaluated in a different way.<br />
A third problem of eGovernance measurement relates the total lack of information about citizens’<br />
behavior regarding Internet or about their trust in Internet as a tool that can solve some of their problems.<br />
As we argued, digital divide, as well as eGovernance, is a multifaceted concept, much larger than the<br />
simple “access” to ICT infrastructure. It is also about the citizens’ will and ability to use the infrastructure<br />
and web pages that government and/or market offer them. For this reason we consider that digital divide<br />
should be measured both in terms of offer and demand (Ferr et al, 2005). A single indicator cannot track<br />
different progress in eGovernance development process, thus requiring the construction of a composite<br />
index. Therefore, considering the problems previously mentioned regarding eGovernance measurement,<br />
we are proposing a new indicator, named the Digital Governance Index.<br />
Based on our conceptual framework, the Digital Governance Index is divided into the following four subindices<br />
(Table 2):<br />
Digital Infrastructure Index: reflects the access dimensions and incorporates four indicators (Internet<br />
subscriptions/100 inhabitants, Fixed Broadband subscriptions/100 inhabitants, Mobile Broadband<br />
subscriptions/100 inhabitants, PCs/100 inhabitants).<br />
Governmental Websites Performance Index: reflects the governmental offer in terms of e-services<br />
and incorporates two indicators (EGovernment on-line availability and Web Measure Index).<br />
Digital Skills Index: reflects the citizens’ ability in using computers and access Internet, and<br />
incorporates two indicators (Individuals’ level of computer skills and Individuals' level of Internet skills)<br />
534
Virgil Stoica and Andrei Ilas<br />
Digital Behavior Index: reflects the citizens’ habitude in using Internet and incorporates three<br />
indicators (Individuals regularly using the Internet, Individuals having ordered/bought goods or<br />
services for private use over the Internet, and Individuals using the Internet for interaction with public<br />
authorities).<br />
We note that the offer and the demand sides have an equal influence in the Digital Government Index.<br />
The four sub-indices have also an equal weight, as well as the indicators for the sub-indices.<br />
The source of indicators which reflect the infrastructure has been International Telecommunication Union<br />
while the 2010 United Nations eGovernment Survey has been the source for the “Web Measure Index”.<br />
The web measure survey assessments were based on a questionnaire, which allocated a binary value to<br />
the indicator based on the presence/absence of specific electronic facilities/services available. The<br />
primary site was the national portal or the official government home page. The Survey assessed the<br />
same number of functionalities of the same or similar sites in each country; these are the<br />
Ministries/Departments of Health, Education, Social Welfare, Labor, and Finance, which are<br />
representative of the government services citizens require most. In order to calculate Governmental<br />
Websites Performance Index, this indicator was combined with “eGovernment on-line availability”, which<br />
shows the percentage of the 20 basic services which are fully available online i.e. for which it is possible<br />
to carry out full electronic case handling.<br />
All the information for the demand side of the Index has been collected from Eurostat. “Level of basic<br />
computer skills” is measured using a self-assessment approach, where the respondent indicates whether<br />
he/she has carried out specific tasks related to computer use, without these skills being assessed, tested<br />
or actually observed. Six computer-related items were used to group the respondents into levels of<br />
computer skills in 2006, 2007 and 2009: copy or move a file or folder; use copy and paste tools to<br />
duplicate or move information within a document; use basis arithmetic formula (add, subtract, multiply,<br />
divide) in a spreadsheet; compress files; connect and install new devices, e.g. a printer or a modem; write<br />
a computer program using a specialized programming language. The indicator has been generated by<br />
adding the percentages of respondents which declared 1-2, 3-4, or 5-6 computer abilities. The same<br />
procedure has been used in order to compute “Individuals' level of Internet skills”. Level of internet skills<br />
is measured using also a self-assessment approach, where the respondent indicates whether he/she has<br />
carried out specific tasks related to internet use, without these skills being assessed, tested or actually<br />
observed. Six Internet-related items were used to group the respondents into levels of Internet skills in<br />
2005, 2006 and 2007: use a search engine to find information; send an e-mail with attached files; post<br />
messages to chatrooms, newsgroups or any online discussion forum; use the Internet to make telephone<br />
calls; use peer-to-peer file sharing for exchanging movies, music etc.; create a web page.<br />
“Individuals regularly using the Internet” represent the percentage of persons that use the Internet at least<br />
once a week on average within the last three months before the survey. “Individuals having<br />
ordered/bought goods or services for private use over the Internet” measures these actions within the last<br />
twelve months before the survey, and “Individuals using the Internet for interaction with public authorities”<br />
evaluate any kind of interaction within the last three months before the survey.<br />
In order to have the same unit of measurement for all the indicators, we used a normalization of data: the<br />
country having the highest score was considered the reference measure, and it received 100 points. The<br />
other countries received rescaled scores proportionally with their performances. The sub-indices and the<br />
Digital Governance Index were computed by adding each indicator, using the weights presented in Table<br />
2.<br />
This digital divide analysis follows the methodology proposed by Orbicom (2003). The digital divide was<br />
measured as the relative difference in countries’ Digital Governance Index, benchmarked against EU 27<br />
– obtained as the simple average of all 27 countries members of <strong>European</strong> Union. Those that performed<br />
above-average were assigned a positive number, and those that performed below-average were<br />
identified by a negative number. The same procedure was used for al four sub-indices, in order to<br />
measure the gap in terms of infrastructure, governmental sites, digital skills, and digital behaviors.<br />
4. Data<br />
Applying the methodology explained above, we obtained a ranking of EU countries in terms of<br />
eGovernance quality. Figure 1 shows the scores of member states regarding the Digital Governance<br />
Index. Leader is Denmark, with a score of 89.1, closely followed by Sweden (88.2), Netherlands (86.5),<br />
Luxembourg (83.6), and United Kingdom (80.1). The average of the 27 EU countries stands at a score of<br />
535
Virgil Stoica and Andrei Ilas<br />
60.6. At the other end of the scale stand Cyprus (46.2), Poland (44.7), Greece (38.4), Bulgaria (33.2) and<br />
Romania (31.5). The performance of Denmark is almost three times higher than Romania’s.<br />
Table 2: Digital governance Index and its components<br />
Dimensions Sub-indices Weight Indicators Weight Source of<br />
data<br />
Internet subscriptions/100<br />
inhabitants<br />
25% ITU<br />
Digital<br />
Infrastructure 25%<br />
Fixed Broadband<br />
subscriptions/100 inhabitants<br />
25% ITU<br />
Supply side<br />
Index<br />
Mobile Broadband<br />
subscriptions/100 inhabitants<br />
25% ITU<br />
Digital Government Index<br />
Digital Government Index<br />
Demand side<br />
100,0<br />
90,0<br />
80,0<br />
70,0<br />
60,0<br />
50,0<br />
40,0<br />
30,0<br />
20,0<br />
Denmark<br />
Sweden<br />
Netherlands<br />
Luxembourg<br />
United Kingdom<br />
10,0<br />
0,0<br />
Governmental<br />
Websites<br />
Performance<br />
Digital Skills<br />
Index<br />
Digital Behavior<br />
Index<br />
Finland<br />
France<br />
Austria<br />
Germany<br />
Estonia<br />
Ireland<br />
Belgium<br />
EU (27 countries)<br />
Figure 1: Digital governance index<br />
PCs/100 inhabitants 25% ITU<br />
EGovernment on-line availability 50% Eurostat<br />
25% Web Measure Index<br />
50% UNPAN<br />
25%<br />
Individuals' level of computer<br />
skills<br />
Individuals' level of Internet<br />
skills<br />
50%<br />
50%<br />
Eurostat<br />
Eurostat<br />
Individuals regularly using the<br />
Internet<br />
Individuals having<br />
33,3% Eurostat<br />
25%<br />
ordered/bought goods or<br />
services for private use over the<br />
Internet<br />
Individuals using the Internet for<br />
33,3% Eurostat<br />
interaction with public<br />
authorities<br />
33,3% Eurostat<br />
Spain<br />
Slovenia<br />
Malta<br />
Slovakia<br />
Portugal<br />
Hungary<br />
Italy<br />
Latvia<br />
Czech Republic<br />
Cyprus<br />
Poland<br />
Greece<br />
Bulgaria<br />
Romania<br />
The differences between <strong>European</strong> Union countries can be more easily observed in Figure 2. Twelve<br />
countries are above average, with positive scores in terms of digital divide. The remaining 15 countries<br />
are below average with the biggest gap between Denmark and Romania: 57.6 points.<br />
As it may be observed, the group of countries for which the digital divide takes positive values comprises<br />
the Nordic countries (Denmark, Sweden, and Finland), the Western Europe (United Kingdom, Ireland,<br />
France, Belgium, and Luxembourg) and Central Europe countries (Germany and Austria). The only<br />
"intruder" in this group is Estonia. The lagging behind group comprises the Southern <strong>European</strong> countries<br />
(Spain, Portugal, Italy, Greece, Cyprus and Malta) and the former communist countries.<br />
536<br />
Lithuania
-27,4<br />
-29,1<br />
-22,2<br />
-8,9<br />
-11,7<br />
-11,9<br />
-12,2<br />
-13,6<br />
-14,4<br />
-15,9<br />
Virgil Stoica and Andrei Ilas<br />
Denmark<br />
Sweden<br />
Netherlands<br />
Luxembourg<br />
United<br />
Finland<br />
France<br />
Germany<br />
Austria<br />
Estonia<br />
Ireland<br />
Belgium<br />
EU (27<br />
-0,6 Spain<br />
-0,7 Slovenia<br />
-4,0 Malta<br />
-6,1 Slovakia<br />
-8,1 Portugal<br />
Hungary<br />
Italy<br />
Latvia<br />
Czech Republic<br />
Lithuania<br />
Cyprus<br />
Poland<br />
Greece<br />
Bulgaria<br />
Romania<br />
3,9<br />
3,1<br />
1,9<br />
0,0<br />
28,5<br />
27,6<br />
25,9<br />
23,0<br />
19,5<br />
15,7<br />
12,9<br />
12,0<br />
12,0<br />
-40,0 -30,0 -20,0 -10,0 0,0 10,0 20,0 30,0 40,0<br />
Figure 2: <strong>European</strong> Union digital divide 2009<br />
These data suggest at least two possible explanations. The first is related to the level of economic<br />
development: the most developed EU countries almost invariably belong to the first group. Economic<br />
prosperity has led to the development of digital infrastructure, a high level of education of the population,<br />
to its trust in the Internet both as a medium for economic transactions and as a medium of interaction with<br />
the government. A second possible explanation involves the existence of a socio-cultural factor. In the<br />
countries with a high social capital there is a greater confidence in the Internet as a new way for<br />
strengthening communities while the countries lacking social trust are at the bottom of the list. Of course,<br />
these hypotheses need to be tested.<br />
The analysis of the Digital Government Index components shows a slightly different picture from the<br />
global one. In terms of infrastructure (Figure 3), the same four countries are the leaders, but in a different<br />
order: Luxembourg (87.5), Netherlands (79.4), Sweden (78.3) and Denmark (73.4). The EU infrastructure<br />
average is 50.7. Romania is no longer in last place with a score of 28.9, being up the Czech Republic<br />
(28.6), Poland (27.2) and Bulgaria (24.5).<br />
The highest difference in terms of infrastructure divide is between Luxembourg and Bulgaria: 63 points<br />
(Figure 4).<br />
The <strong>European</strong> average of Governmental Websites Performance Index is 68.3 (Figure 5). Malta, with a<br />
score of 86.3, joins Sweden (96.7) and Denmark (92.0) for the first three places in the rank. The last<br />
places are occupied by Bulgaria (44.2), Romania (43.2) and Greece (43.2). The digital divide’s amplitude<br />
on this index is of 53.5 points (Figure 6).<br />
537
Infrastructure Index<br />
100,0<br />
90,0<br />
80,0<br />
70,0<br />
60,0<br />
50,0<br />
40,0<br />
30,0<br />
20,0<br />
10,0<br />
Luxembourg<br />
Netherlands<br />
Sweden<br />
Denmark<br />
United Kingdom<br />
0,0<br />
France<br />
Germany<br />
Austria<br />
Figure 3: Digital infrastructure index<br />
-10,5<br />
-11,7<br />
-14,2<br />
-14,5<br />
-15,6<br />
-19,6<br />
-21,8<br />
-22,1<br />
-23,5<br />
-26,2<br />
Virgil Stoica and Andrei Ilas<br />
Finland<br />
Ireland<br />
Belgium<br />
Luxembourg<br />
Netherlands<br />
Sweden<br />
Denmark<br />
United Kingdom<br />
France<br />
Germany<br />
Austria<br />
Finland<br />
Ireland<br />
Belgium<br />
Italy<br />
Spain<br />
EU (27 countries)<br />
-0,4 Slovenia<br />
-0,8 Estonia<br />
-5,2 Cyprus<br />
-6,7 Malta<br />
Portugal<br />
Greece<br />
Slovakia<br />
Hungary<br />
Latvia<br />
Lithuania<br />
Romania<br />
Czech Republic<br />
Poland<br />
Bulgaria<br />
Italy<br />
Spain<br />
EU (27 countries)<br />
3<br />
0,7<br />
0,4<br />
0<br />
Slovenia<br />
Estonia<br />
Cyprus<br />
Malta<br />
Portugal<br />
Greece<br />
4,8<br />
9,7<br />
7,6<br />
15,8<br />
13,2<br />
Hungary<br />
Latvia<br />
Lithuania<br />
Romania<br />
Slovakia<br />
22,7<br />
20,9<br />
Czech Republic<br />
28,7<br />
27,6<br />
-30 -20 -10 0 10 20 30 40<br />
Figure 4: Digital infrastructure divide<br />
538<br />
Poland<br />
Bulgaria<br />
36,8
Governmental Websites Performance<br />
100,0<br />
90,0<br />
80,0<br />
70,0<br />
60,0<br />
50,0<br />
40,0<br />
30,0<br />
20,0<br />
10,0<br />
0,0<br />
Sweden<br />
Denmark<br />
Malta<br />
United Kingdom<br />
Austria<br />
France<br />
Estonia<br />
Portugal<br />
Netherlands<br />
Virgil Stoica and Andrei Ilas<br />
Finland<br />
Ireland<br />
Spain<br />
Slovenia<br />
EU (27 countries)<br />
Figure 5: Governmental websites performance index<br />
-24,1<br />
-25,1<br />
-25,1<br />
Sweden<br />
Denmark<br />
Malta<br />
United Kingdom<br />
Austria<br />
France<br />
Estonia<br />
Portugal<br />
Netherlands<br />
Finland<br />
Ireland<br />
Spain<br />
Slovenia<br />
EU (27 countries)<br />
-2,5Germany<br />
-3,9 Luxembourg<br />
-5,9 Hungary<br />
-6,0 Czech Republic<br />
-6,4 Belgium<br />
-7,7 Italy<br />
-7,9 Lithuania<br />
-13,4<br />
Latvia<br />
-14,9<br />
Poland<br />
-17,1<br />
Slovakia<br />
-19,4<br />
Cyprus<br />
Bulgaria<br />
Romania<br />
Greece<br />
0,0<br />
Germany<br />
Luxembourg<br />
Hungary<br />
Czech Republic<br />
Belgium<br />
Italy<br />
18,0<br />
16,3<br />
15,0<br />
13,2<br />
12,3<br />
11,6<br />
10,7<br />
7,8<br />
7,0<br />
6,7<br />
4,3<br />
-30,0 -20,0 -10,0 0,0 10,0 20,0 30,0 40,0<br />
Figure 6: Governmental websites performance divide<br />
539<br />
Lithuania<br />
Latvia<br />
23,7<br />
Poland<br />
Slovakia<br />
28,4<br />
Cyprus<br />
Bulgaria<br />
Romania<br />
Greece
Virgil Stoica and Andrei Ilas<br />
The highest digital divide is on digital behavior: 77.7 points (Figure 8). Compared to a score of 93.9 for<br />
Denmark, Romania (16.2), Bulgaria (22.2) and Greece (25.3) stand out in a negative way with extremely<br />
low percentages in terms of those who regularly use the Internet, buy goods or services or interact with<br />
public authorities over the Internet (Figure 7).<br />
Digital Behavior<br />
100,0<br />
90,0<br />
80,0<br />
70,0<br />
60,0<br />
50,0<br />
40,0<br />
30,0<br />
20,0<br />
10,0<br />
0,0<br />
Denmark<br />
Netherlands<br />
Sweden<br />
Luxembourg<br />
United Kingdom<br />
Figure 7: Digital behavior index<br />
-36,5<br />
Finland<br />
Germany<br />
Austria<br />
France<br />
Belgium<br />
Estonia<br />
Ireland<br />
EU (27 countries)<br />
Denmark<br />
Netherlands<br />
Sweden<br />
Luxembourg<br />
United Kingdom<br />
Finland<br />
Germany<br />
Austria<br />
France<br />
Belgium<br />
Estonia<br />
Ireland<br />
EU (27 countries)<br />
-2,5 Slovakia<br />
-3,9 Malta<br />
-6,3 Slovenia<br />
-7,6 Spain<br />
-12,9 Czech Republic<br />
-13,0 Latvia<br />
-13,0 Hungary<br />
-13,2 Poland<br />
-16,8 Cyprus<br />
-18,5 Lithuania<br />
-20,2 Portugal<br />
-23,4<br />
Italy<br />
-27,4<br />
Greece<br />
-30,5<br />
Bulgaria<br />
Romania<br />
Slovakia<br />
4,2<br />
2,1<br />
1,2<br />
0,0<br />
Malta<br />
Slovenia<br />
Spain<br />
Czech Republic<br />
11,1<br />
10,3<br />
Hungary<br />
Latvia<br />
Poland<br />
Cyprus<br />
Lithuania<br />
Portugal<br />
19,1<br />
Italy<br />
Greece<br />
Bulgaria<br />
Romania<br />
41,2<br />
36,2<br />
34,9<br />
32,8<br />
27,5<br />
25,6<br />
-50,0 -40,0 -30,0 -20,0 -10,0 0,0 10,0 20,0 30,0 40,0 50,0<br />
Figure 8: Digital behavior divide<br />
540
Virgil Stoica and Andrei Ilas<br />
Things are not better for the three Balkan countries regarding the digital skills, at about the half the<br />
<strong>European</strong> average of 71.1, and far away from the <strong>European</strong> leader, Netherlands (98.8) (Figure 9). The<br />
digital divide’s amplitude on this index is of 61 points.<br />
Digital Skills<br />
100,0<br />
90,0<br />
80,0<br />
70,0<br />
60,0<br />
50,0<br />
40,0<br />
30,0<br />
20,0<br />
10,0<br />
Netherlands<br />
Denmark<br />
Luxembourg<br />
Finland<br />
Sweden<br />
0,0<br />
Figure 9: Digital skills index<br />
-25,0<br />
-29,1<br />
-33,3<br />
Germany<br />
United Kingdom<br />
Austria<br />
France<br />
Slovakia<br />
-8,4<br />
-9,0<br />
-12,5<br />
-13,7<br />
-14,3<br />
-16,7<br />
-16,7<br />
Belgium<br />
Estonia<br />
EU (27 countries)<br />
Slovenia<br />
Ireland<br />
Hungary<br />
Spain<br />
-0,7<br />
-1,2<br />
-2,5<br />
-2,5<br />
-6,0<br />
1,7<br />
0,0<br />
Latvia<br />
Czech Republic<br />
12,9<br />
11,7<br />
11,7<br />
8,8<br />
6,4<br />
Lithuania<br />
Poland<br />
Portugal<br />
Malta<br />
Italy<br />
Cyprus<br />
27,7<br />
26,0<br />
25,9<br />
21,2<br />
18,9<br />
17,7<br />
-40,0 -30,0 -20,0 -10,0 0,0 10,0 20,0 30,0 40,0<br />
Figure 10: Digital skills divide<br />
Netherlands<br />
Denmark<br />
Luxembourg<br />
Finland<br />
Sweden<br />
Germany<br />
United Kingdom<br />
France<br />
Austria<br />
Slovakia<br />
Belgium<br />
Estonia<br />
EU (27 countries)<br />
Slovenia<br />
Ireland<br />
Spain<br />
Hungary<br />
Latvia<br />
Czech Republic<br />
Lithuania<br />
Poland<br />
Portugal<br />
Malta<br />
Cyprus<br />
Italy<br />
Greece<br />
Bulgaria<br />
Romania<br />
541<br />
Greece<br />
Bulgaria<br />
Romania
Virgil Stoica and Andrei Ilas<br />
We obtain a more nuanced image by grouping the EU states in a square matrix, depending on their<br />
performance on the two dimensions (Figure 11). We will have thus not only a group of leaders, with high<br />
scores on both the demand and the offer and one of the laggards with low scores on those dimensions,<br />
but also two intermediate groups. One of these groups is composed of Belgium and Slovakia, countries<br />
that scores well in demand (population educated in terms of confidently using digital and internet), but<br />
weak in the government offer dimension. The second group of countries characterized by generous offer,<br />
but with reduced demand, consists of Spain, Portugal, Slovenia, and Malta. The existence of this latter<br />
group seems to support the hypothesis of cultural factor: well-developed infrastructure and official<br />
websites combined with a lack of confidence and of digital skills are triggering a modest eGovernance<br />
performance.<br />
Demand<br />
High scores<br />
Low scores<br />
Supply<br />
High scores Low scores<br />
Sweden<br />
Denmark<br />
Netherlands<br />
Luxembourg<br />
United Kingdom<br />
Finland<br />
Belgium<br />
France<br />
Slovakia<br />
Austria<br />
Germany<br />
Ireland<br />
Estonia<br />
Malta<br />
Spain<br />
Slovenia<br />
Portugal<br />
Italy<br />
Hungary<br />
Cyprus<br />
Lithuania<br />
Czech Republic<br />
Latvia<br />
Greece<br />
Poland<br />
Romania<br />
Bulgaria<br />
Figure 11: EU countries classification according their score on the offer and demand<br />
The differences between the best <strong>European</strong> country in terms of eGovernance, Denmark, and the worst,<br />
Romania, may be seen in Figures 12 and 13. In terms of infrastructure, the divide between the two<br />
countries is 44.5. This difference increases to 48.8 for government websites performance and to 59.3 for<br />
digital skills and becomes huge for the digital behavior, reaching 77.7 points.<br />
Figure 12 presents the four indexes that are making up the Digital Governance Index, while Figure 13<br />
provides a detailed picture of all the 11 indicators. Thus we can see that the smallest difference (6.9<br />
points) between the first and last rank is on Mobile Broadband subscriptions/100 inhabitants – the most<br />
dynamic factor that measures the technological innovation. And the biggest differences are on the factor<br />
measuring the number of individuals that ordered goods or services for private use over the Internet (82.8<br />
points) and especially of individuals that used the Internet for interaction with the public authorities (91<br />
points). These differences suggest that technological differences may be more easily recovered than the<br />
cultural one and points to the trust as a fundamental influence on the eGovernance development.<br />
In Figure 14 we observe the relative homogeneity of the scores obtained by leaders for the 11 indicators.<br />
Only the Mobile Broadband subscriptions performance of Luxemburg subscriptions is to be noted. The<br />
data are more heterogeneous for last countries in the rank (Figure 15). The lowest scores, shared by all<br />
four countries are in the number of PCs per 100 inhabitants, for individuals having ordered/bought goods<br />
or services for private use over the Internet, and individuals using the Internet for interaction with public<br />
authorities. If for Romania and Bulgaria the poverty could be a reason for the reduced number of<br />
computers, this explanation does not seem very appropriate in the case of Greece. The lack of interest in<br />
buying PCs may be related to the fact that they are not used to buy goods on the Internet or to interact<br />
with government. This again points to the importance of the cultural factor in the development of<br />
eGovernance.<br />
542
Digital Skills<br />
Virgil Stoica and Andrei Ilas<br />
Infrastructure Index<br />
100,0<br />
80,0<br />
60,0<br />
40,0<br />
20,0<br />
0,0<br />
Digital Behavior<br />
Figure 12: The four component indexes for Denmark, EU, and Romania<br />
Individuals' level of Internet<br />
skills<br />
Individuals' level of Internet<br />
skills<br />
20,0<br />
0,0<br />
Denmark<br />
EU (27 countries)<br />
Romania<br />
Governmental websites<br />
performance<br />
Internet subscriptinos/100<br />
Individuals regularly using<br />
the Internet<br />
Individuals having<br />
inhabitants<br />
100,0<br />
80,0<br />
60,0<br />
Fixed Broadband<br />
subscriptions/100<br />
inhabitants<br />
Mobile Broadband<br />
ordered/bought goods or<br />
40,0<br />
subscriptions/100<br />
services over the Internet<br />
inhabitants<br />
Individuals using the Internet<br />
for interaction with public<br />
authorities<br />
Figure 13: The eleven indicators for Denmark, EU, and Romania<br />
543<br />
Denmark<br />
PCs/100 inhabitants<br />
E-government on-line<br />
availability<br />
Web Measure Index<br />
EU (27 countries)<br />
Romania
Virgil Stoica and Andrei Ilas<br />
Sweden<br />
Internet subscriptinos/100<br />
inhabitants<br />
Netherlands<br />
Individuals regularly using the<br />
100,0<br />
Fixed Broadband<br />
Internet<br />
80,0<br />
subscriptions/100 inhabitants<br />
Individuals having<br />
ordered/bought goods or<br />
services over the Internet<br />
Individuals using the Internet<br />
for interaction with public<br />
authorities<br />
Individuals' level of Internet<br />
skills<br />
Individuals' level of Internet<br />
skills<br />
60,0<br />
40,0<br />
20,0<br />
0,0<br />
Mobile Broadband<br />
subscriptions/100 inhabitants<br />
PCs/100 inhabitants<br />
E-government on-line<br />
availability<br />
Web Measure Index<br />
Figure 14: The eleven indicators for Denmark, Luxembourg, Sweden, and Netherlands<br />
40,0<br />
20,0<br />
0,0<br />
Denmark<br />
Luxembourg<br />
Internet subscriptinos/100<br />
Poland<br />
Bulgaria<br />
Individuals regularly using the<br />
inhabitants<br />
80,0<br />
Fixed Broadband<br />
Romania<br />
Internet<br />
60,0<br />
subscriptions/100 inhabitants<br />
Individuals having<br />
ordered/bought goods or<br />
services over the Internet<br />
Individuals using the Internet<br />
for interaction with public<br />
authorities<br />
Individuals' level of Internet<br />
skills<br />
Individuals' level of Internet<br />
skills<br />
Mobile Broadband<br />
subscriptions/100 inhabitants<br />
PCs/100 inhabitants<br />
E-government on-line<br />
availability<br />
Web Measure Index<br />
Figure 15: The eleven indicators for Greece, Poland, Bulgaria and Romania<br />
544<br />
Greece
5. Conclusions<br />
Virgil Stoica and Andrei Ilas<br />
The data presented in this research show without doubt that the digital divide is a complex reality in the<br />
EU and cannot be bridged using the same tools across the whole territory.<br />
From an eGovernance point of view, we identified two large groups of countries: the leaders –the Nordic<br />
and Western countries and the laggards – Southern and ex-communist countries. However, while the<br />
differences regarding the infrastructure and the performance of governmental websites are significant,<br />
those related to digital skills and digital behavior are even bigger. The smallest digital difference is in<br />
terms of Governmental Websites Performance where the distance between Sweeden and Greece is of<br />
only 53.5 points. The biggest digital difference is scored in terms of Digital Behavior between Denmark<br />
and Romania: 77.7 points. This suggests that the Agenda should rather concentrate on developing skills<br />
and changing behaviors in the second group of countries.<br />
This observation becomes extremely important if the goal is to make eGovernment accessible to the<br />
majority and not only to an elite. The differences in the governmental sites performance seem the easiest<br />
to overcome because it requests only a technical intervention. The gap between infrastructures could be<br />
also diminished as the smallest difference on this indicator is for the most dynamic factor, Mobile<br />
Broadband subscriptions/100 inhabitants, and that measures the technological innovation. The<br />
Governments may take initiatives in this respect but it’s probably for the market to finally influence the<br />
improvements in performances.<br />
However, closing the gap on only the two mentioned dimensions would probably lead to a greater digital<br />
divide inside the lagging states of our study between those few confidently and adroitly using the Internet<br />
and the others. Hence, a governmental initiative that aims to increase the interconnectivity and the<br />
interoperability of the administration will only improve the best area of these states. Based on our results<br />
we would rather suggest that measures should be taken in order to improve the population’s<br />
eGovernment related literacy and trust.<br />
From a different perspective, it is surprising to find old and developed EU countries like Greece, Italy,<br />
Portugal and Spain within the group of lagers. In our opinion, this finding points to the influence that<br />
social and cultural factors may have on eGovernance development. If this hypothesis is to be confirmed<br />
by future researches then the Agenda should be adapted according to each country cultural and social<br />
environment. In this vein, the lack of an <strong>European</strong> administration could be an advantage in the sense that<br />
the national authorities are better positioned to take the proper actions. But some authorities could lack<br />
the interest of taking steps and in this respect the Agenda could play the major role of transmitting a<br />
much needed initial push.<br />
Out of the ‘seven pillars of development’ of the Agenda only two are targeting the human resources: the<br />
enhanced digital literacy and the skills and inclusion and ICT-enabled benefits for EU society. If the<br />
results of the present research are pointing into the right direction then these two “pillars” should be the<br />
main ones if it is to build a non digitally divided Europe.<br />
Acknowledgments<br />
This work was supported by the strategic grant POSDRU/89/1.5/S/62259, Project „Applied social, human<br />
and political sciences. Postdostoral training and postdoctoral fellowships in social, human and political<br />
sciences” cofinanced by the <strong>European</strong> Social Fund within the Sectorial Operational Program Human<br />
Resources Development 2007 – 2013.<br />
References<br />
Bruns, Axel (2008), Blogs, Wikipedia, Second Life, and Beyond, New York, Peter Lang.<br />
Denhardt, Robert B. (2008), Theories of Public Organization, 5 th edition, Belmont, Thomson Wadsworth.<br />
Dunleavy, P., Margetts H., Bastow S. &Tinker J. (2006), Digital Era Governance: IT Corporations, the State, and<br />
EGovernment. New York: Oxford University Press.<br />
Ferr Enrico, Marco Cantamessa, Emilio Polucci (2005), “Urban Versus Regional Divide: Comparing and Classifying<br />
Digital Divide”. In Michael Bohlen, Johann Gamper, Wolfgang Polasek, Maria Wimmer (eds.) EGovernment:<br />
Towards Electronic Democracy, Proceedings of TCGOV, Springer, Berlin<br />
Fallows, Deborah (2005), How Women and Men use the Internet. Available at<br />
http://www.pewinternet.org/Reports/2005 (accessed November 19, 2010).<br />
545
Virgil Stoica and Andrei Ilas<br />
Lanzara G.F. (2009), “Building digital institutions: ICT and the rise of assemblages in government”. In F. Contini &<br />
G.F.Lanzara (Eds.) ICT and innovation in the public sector. <strong>European</strong> studies in the making of eGovernment,<br />
New York: Palgrave Macmillan.<br />
Nedergaard, Peter (2007), <strong>European</strong> Union Administration: Legitimacy and Efficiency, Leiden, Martinus Nijhoff<br />
Publishers.<br />
Mahan, Amy (2007), “Conclusion: ICT and Pro-poor Strategies and Research”. In Hernan Galperin & Judith Mariscal<br />
(Eds.) Digital Poverty. Latin American and Caribbean Perspectives, Ottawa, International Development<br />
Research Center.<br />
Malecki, Edward J. & Bruno Moriset (2008) The Digital Economy. Business organization, production processes, and<br />
regional developments, London, Routledge.<br />
Milio, Simona (2010) From Policy to Implementation in the <strong>European</strong> Union. The Challenge of a Multi-level<br />
Governance System, London, Tauris <strong>Academic</strong> Studies.<br />
Misuraca, G, Rossel P. & Glassey, O. (2010), “Overcoming barriers to innovation in eGovernment. The Swiss way”.<br />
In P.G. Nixon, V.K. Koutrakou & Rawal R. (Eds.) Understanding eGovernment in Europe. Issues and<br />
challenges, New York, Routlegde.<br />
Mossberger, K., C. Tolbert & M. Stansbury (2003), Virtual Inequality: Beyond the Digital Divide, Washington, DC,<br />
Georgetown University Press.<br />
Münsch, Robert (2010), <strong>European</strong> Governmentality. The Liberal drift of multilevel governance, London, Routledge.<br />
Nugent, Neil & William E. Paterson (2010), “The <strong>European</strong> Union’s Institutions”. In Michelle Egan, Neil Nugent<br />
&William E. Paterson, Research Agendas in EU Studies, Basingstoke, Palgrave Macmillan.<br />
OECD (2001) Understanding the Digital Divide, Paris, Organisation for Economic Co-operation and Development.<br />
Panke, Diana (2010) Small States in the <strong>European</strong> Union. Coping with Structural Disadvantages, Farnham, Ashgate.<br />
Rooksby, Emma & John Weckert (2004), “Digital Divides : Their Social and Ethical Implications”. In Linda L. Brennan<br />
& Victoria E. Johnson, Social, Ethical and Policy Implications of Information Technology, Hershey, Information<br />
Science Publishing.<br />
Susskind, Richard (2008) The End of Lawyers? Rethinking the Nature of Legal Services, Oxford, Oxford University<br />
Press.<br />
Vignon, Jérôme (2008), “Après Lisbonne: encore Lisbonne?” In Philippe Herzog (Ed.) À la recherche de l’intérêt<br />
européen, Paris, Éditions Le Manuscrit.<br />
*** (2010) - A Digital Agenda for Europe, <strong>European</strong> Commission, Brussels. Available at http://eur-lex.europa.eu<br />
(Accessed November 19, 2010).<br />
*** (2010) - Europe’s Digital Competitiveness Report 2010 <strong>European</strong> Commission, Brussels. Available at<br />
http://ec.europa.eu/information_society/digital-agenda (Accessed November 19, 2010).<br />
*** (2008) - United Nations eGovernment Survey 2008. From eGovernment to Connected Governance. United<br />
Nations, New York<br />
*** (2009) - Report of the Expert Group Meeting the EGovernment Survey; Getting to the next level. New York:<br />
United Nations, Department of Economics and Social Affaires<br />
*** (2010) – Measuring the Information Society. International Telecommunication Union, Geneva<br />
*** (2003) - Monitoring the Digital Divide … And beyond, Orbicom, Montreal.<br />
546
Towards Estimating Users’ Opinion Strength in Forum Texts<br />
Regarding Governmental Decisions<br />
George Stylios 1, 2 , Christos Katsis 2, Vasiliki Simaki 1 , Sofia Stamou 1 and Dimitris<br />
Christodoulakis 1<br />
1<br />
University of Patras, Greece<br />
2<br />
Technical Educational Institute of Ionian Islands, Lefkada, Greece<br />
gstylios@yahoo.gr;<br />
ckatsis@teiion.gr;<br />
simaki@ceid.upatras.gr;<br />
stamou@ceid.upatras.gr;<br />
dxri@upatras.gr<br />
Abstract: The growth of Web 2.0 has facilitated interactive information sharing and interoperability on the World<br />
Wide Web, allowing users not only to retrieve information, but also the opportunity to interact or articulate their<br />
opinions on different topics. Numerous works on various social and political objectives devoted to the formation of<br />
open Internet sources of information monitoring systems, in order to prepare digests and reports on keywords as well<br />
as thematic queries regarding opinions on government decisions. Moreover, analysis of rubrics associations as well<br />
as primary semantic and statistical interpretation of the texts is usually carried out. Therefore experts can accomplish<br />
an intellectual data analysis and forecast. On the other hand, it is rather difficult to get punctual predicts and estimate<br />
sufficiency forum users’ opinion strength. In this work we present a methodology in order to automatically estimate<br />
the strength of users’ opinions on text forums regarding governmental decisions. According to our methodology,<br />
quantitative features are automatically extracted from forum posts and then passed to a Support Vector Machine<br />
based classifier where the users’ opinion strength is estimated. The proposed methodology has been validated in<br />
real data. The initial experimental results are presented. Our schema could also be used in a wide range of<br />
applications such as: scenario analysis of important events for political, social, and commercial tasks, public opinion<br />
monitoring, forecasting of tendencies of public opinion and marketing research.<br />
Keywords: eGovernment, knowledge extraction, linguistic analysis, machine learning, opinion strength mining,<br />
support vector machines.<br />
1. Introduction<br />
Electronic government, or eGovernment, is correlated with the use of digital technology in the<br />
management and delivery of public services, by enhancing the efficiency of the public sector and<br />
developing more personal, customized relations between citizens and their government. EGovernment<br />
indicates that management services and functions are transferred onto the internet. Thus, it is a way for<br />
governments to use the most innovative information and communication technologies to offer citizens<br />
efficient access to information and services (Hayat 2009). The Semantic Web plays a crucial role in<br />
automatic delivery of customized eGovernment services. It extends the existing Web by providing a<br />
framework for technologies that give meaning to data and applications for automatic processing. (Gribble<br />
D.S.et al., 2000). Web 2.0 enhances the creativity, collaboration, information sharing and functionality of<br />
the web. Wikis, social networking and folksonomies are often focused on personal life, and many on<br />
professional life. In the professional or business environment, both private and public sectors are very<br />
interested in offering the best services to the users. (Decman, 2009). With the explosion of the Web 2.0<br />
platforms such as blogs, discussion forums, peer to peer networks, and various other types of social<br />
media citizens have at their disposal a soapbox of unprecedented reach and power by which to share<br />
their experiences and opinions positive or negative, regarding any product or service. (Zabin and<br />
Jefferies, 2008).<br />
It is well known that “What other people think” has always been an important piece of information for most<br />
of us during the decision making process. Long before awareness of the World Wide Web became<br />
widespread, many of us asked our friends who they were planning to vote for in local elections, requested<br />
reference letters regarding job applicants from colleagues, or consulted Consumer Reports to decide<br />
which product to buy. But the internet and the Web have now (among other things) made it possible to<br />
find out about the opinions and the experiences of those in the vast pool that are neither our personal<br />
acquaintances nor well known professional critics – that is, people we have never heard of. And<br />
conversely, more and more people are making their opinions available to strangers via the internet.<br />
(Pang and Lee, 2008). On the other hand, businesses firms have used data mining, for years, to analyze<br />
customer demographics and transaction history to better target direct marketing efforts. Recent advances<br />
547
George Stylios et al.<br />
in computer speed and the collecting of data by many businesses have inspired the improvement of<br />
software to achieve today’s mining abilities. As parallel processing and the use of artificial intelligence<br />
have met with improvements in software and growing business awareness of the benefits of database<br />
analysis, DM and related fields, based on both statistical tools and computer science, have emerged.<br />
Opinion mining has recently become a topic of interest trying to combine statistics, Artificial Intelligence<br />
and Data Mining technologies in a unified framework. (Pang and Lee, 2008). Negative and positive<br />
opinions can be used as guidelines for companies to change their strategies toward specific target<br />
groups, customers to decide on the purchase of a product or destination place for their holidays and<br />
lately for governments to improve services, launch campaigns etc (Ku et al, 2007). Traditionally opinion of<br />
the people was acquired through Gallup polls and questionnaires. The latest trend however is to extract<br />
public opinion expressed in text documents in the web (blogs, forums), information that might be more<br />
objective since it is expressed without any “pressure”. On the other hand the tendency of a person for or<br />
against an argument, a product etc is not as easily extracted as in the case of specific questionnaires. It<br />
is therefore somewhat subjective posing an extra difficulty in the analysis of this information.<br />
2. Related work<br />
As is well known, opinions matter a great deal in politics. Some work has focused on understanding what<br />
voters are thinking, whereas other projects have as a long term goal the clarification of politicians’<br />
positions, such as what public figures support or oppose, to enhance the quality of information that voters<br />
have access to. The field of web opinion mining and sentiment analysis is well-suited to various types of<br />
intelligence applications e.g. Government intelligent. Web opinion mining aims to extract, summarize, and<br />
track various aspects of subjective information on the Web. Ku, (Ku et al, 2007) applied web mining<br />
techniques to mine positive and negative sentiment words and their weights on the basis of Chinese word<br />
structures. Xu (Xu and Ramnath, 2009) proposed a system for opinion mining using poll results on the<br />
web dealing with opinion answering question, opinion mining on a single object and opinion mining on<br />
multiple objects. Furuse (Furuse et al., 2007) developed a search engine that can extract opinion<br />
sentences relevant to an open-domain query -based not only on positive or negative measurements but<br />
also on neutral opinions, requests, advice, and thoughts- from Japanese blog pages. Miao (Miao et al,<br />
2009) proposed AMAZING, a sentiment mining and retrieval system which mines knowledge from<br />
consumer product reviews by utilizing data mining and information retrieval technology based on a<br />
ranking mechanism taking temporal opinion quality and relevance into account to meet customers’<br />
information needs. Zhai (Zhai et al, 2011) developed Opinion Observe to compare consumer opinions of<br />
different products based on online reviews, while Sun (Sun et al., 2006) created BlogHarvest which is a<br />
blog mining and search framework that extracts the interests of the blogger, finds and recommends blogs<br />
with similar topics and provides blog-oriented search functionality. An opinion utility named Jodange was<br />
builted in the Leveraging Cornell University. Jodgane identifies opinion holders on issues, organizations,<br />
or people of interest. It can track the impact of an issue via publication, region, opinion holder, tonality or<br />
any other measurement, uncover important sentiment trends on key issues and correlate opinions<br />
against specific outcomes. VIStology's IBlogs (http://www.vistology.com/about/about.html) project, funded<br />
by the Air Force Office of Scientific Research’s Distributed Intelligence provides blog analysts a tool for<br />
monitoring, evaluating, and anticipating the impact of blogs by clustering posts by news event and<br />
ranking their significance by relevance, timeliness, specificity and credibility, as measured by novel<br />
metrics. This technology allows analysts to discover, from the bottom up, the important/critical issues in a<br />
local blogosphere, by providing measurements particular to that locale alone. The need for identifying<br />
opinions has motivated a number of automated methods for detecting opinions or other subjective text<br />
passages (Wiebe, Bruce, & O’ Hara, 1999; Hatzivassiloglou & Wiebe 2000; Wiebe 2000; Wiebe et al<br />
2002; Yu & Hatzivassiloglou 2003) and assigning them to subcategories such as positive and negative<br />
opinions (Pang, Lee, & Vaithyanathan 2002; Turney 2002; Yu & Hatzivassiloglou 2003). A variety of<br />
machine learning techniques have been employed for this purpose, generally based on lexical cues<br />
associated with opinions. However, current approaches share a common pattern. They focalize on an<br />
entire document (Pang, Lee, & Vaithyanathan 2002; Turney 2002) or an complete sentences (Wiebe,<br />
Bruce, & O’Hara 1999; Hatzivassiloglou & Wiebe 2000).<br />
Although all the above mentioned research deals with web opinion extraction, according to our<br />
knowledge there is no previous work reported regarding automated assessment of blog or post user’s<br />
opinion strength. Apparently, it is of great importance not only to extract someone’s opinion (positive or<br />
negative), but also to estimate if someone supports his/hers opinion with arguments or epicheiremas (i.e<br />
opinion strength). In the following sections, initially we describe our methodology which automatically<br />
estimates post/blog users opinion strength. The proposed methodology is validated using real data<br />
548
George Stylios et al.<br />
coming from the website of a newspaper. The initial results are provided next in the experimental<br />
evaluation section. Finally, our conclusions and future work are described in the concluding remarks<br />
section.<br />
3. Proposed methodology<br />
Text materials from many web sources (e.g., posts, blogs) usually mix facts and opinions. Automatically<br />
determining posts provided from users using arguments to support their personal opinion (positive<br />
opinion strength) would help in selecting the appropriate type of information given an application and in<br />
organizing and presenting that information. In this work, we provide a methodology that automatically<br />
classifies user’s opinion strength into two classes, high or low, using quantitative features being extracted<br />
from posts or blogs. For that reason a Support Vector Machine (SVM) classi er is employed (Vapnik,<br />
1995) A classification task based on SVM usually involves training and testing data, which consist of a<br />
number of data instances. Each instance in the training set contains one ‘‘target value’’ (class labels) and<br />
several ‘‘attributes’’. The goal of the SVM is to produce a model, that predicts a target value of data<br />
instances in the testing set in which only the attributes are given. Let a training set of instance-label pairs<br />
be<br />
(xi, yi ), i = 1, . . ., p (1)<br />
where xi is the training vector of original data belonging to one of two classes (high opinion strength, low<br />
opinion strength), p is the number of the blogs/posts and indicates the (one of the two) class<br />
of xi . The support vector machine requires the solution of the following optimization problem:<br />
subject to ,<br />
(2)<br />
(3)<br />
where b is the bias term, w is a vector perpendicular to the hyperplane , ξ the factor of classification<br />
error and c>0 is the penalty on parameter of the error term. The training vectors xi are mapped into a<br />
higher dimensional space by the function , where is a feature space where the data are<br />
separable. SVM finds a separating hyperplane with the maximal geometric margin and minimal empirical<br />
risk in this higher dimensional space. is defined as<br />
where is the decision function defined as<br />
, (4)<br />
(5)<br />
with (6)<br />
being the kernel function, the weighting factors and the bias term. In our case the kernel is a radial<br />
basis function (RBF), which is defined as<br />
where<br />
, , (7)<br />
(σ is the standard deviation) is a parameter on the kernel. The RBF kernel non-linearly maps samples<br />
into a higher dimensional space, so it can handle cases when the relation between class labels and<br />
attributes is non- linear. The parameters γ and C were defined heuristically. In our application we have<br />
used the SVM training algorithm provided by the LIBSVM library (Chang and Lin, 2001).<br />
In order to increase our classification results, a Correlation Feature Selection (CFS) procedure is used to<br />
rank the extracted features. The CFS algorithm, proposed by Hall (Hall, 2001) is based in the central<br />
hypothesis that good feature sets contain features that are highly correlated with the class (valid, not<br />
valid), yet uncorrelated with each other. CFS is a filter approach independent of the classification<br />
algorithm by considering the individual predictive ability of each feature along with the degree of<br />
549<br />
(8)
George Stylios et al.<br />
redundancy between them. Subsets of features that are highly correlated with the class while having low<br />
intercorrelation are preferred.<br />
4. Experimental evaluation<br />
To evaluate the proposed methodology we have gathered data derived from 297 users’ comments<br />
(posts) published on the Nafteboriki newspaper’s blog (http://www.naftemporiki.gr/debates/). The<br />
comments were written about a certain subject about the issue of publishing the names of people who<br />
don’t pay their taxes or not, and they concern a two months time period, during which the Greek<br />
government would decide if the decision would be implemented. A comment can be added by any user,<br />
anonymously or not, even when he is not a subscriber for the newspaper. An experienced sociologist<br />
after reading carefully all posts, annotated each one of the as “high opinion strength” if the user support<br />
his/her opinion using arguments or “low opinion strength” otherwise. The expert’s opinion is used as a<br />
golden standard for our classification schema. A freely available tagger software initially created by<br />
¨Natural Language Processing Group Department of Informatics - Athens University of Economics and<br />
Business (http://nlp.cs.aueb.gr/software.html), is used to characterize every part of each post as noun,<br />
adjective, verb or punctuation symbol. This software automatically tags nouns, adjectives, articles, verbs,<br />
conjunctions and adverbs using different colors as shown in Figure. 1a<br />
Figure 1: (a) The Tagger software automatically tags nouns, adjectives, articles, verbs, conjunctions and<br />
adverbs using different colors. (b) A script is used to count the total number of nouns,<br />
adjectives, verbs and punctuation symbols per post<br />
In order to count (for every post) the total number of nouns, adjectives, verbs and punctuation symbols a<br />
script is prepared (Figure. 1b). Finally, word count of Microsoft office Word software is used to count the<br />
number of words in each post. Using the above described procedure the following features are extracted<br />
for each post (Table 1):<br />
The constructed dataset consists of the above mentioned features extracted for 297 posts. 186 of them<br />
are classified by the expert as “high opinion strength” and 111 are classified as “low opinion strength”.<br />
Having applied the RBF kernel SVM algorithm in our dataset the initial classification accuracy is 73.06%.<br />
The confusion matrix of the classification problem is provided in Table 2.<br />
550
Table 1: Extracted features<br />
George Stylios et al.<br />
Feature # Feature description<br />
1. # of words per comment.<br />
2 # of nouns divided by the # of words per comment.<br />
3 # of adjectives divided by the # of the words per comment.<br />
4 # of verbs divided with the # of the words per comment.<br />
5 The spelling mistakes divided with the # of the words per comment.<br />
6 Usage of uppercase letters or not (usage designated as 1, where lack of usage was designated as<br />
0).<br />
7 Usage of punctuation symbols i.e. dots, commas, interrogation marks etc (usage designated as 1,<br />
where lack of usage was designated as 0).<br />
Table 2: Confusion matrix produced using all available features<br />
Class Classified as<br />
low opinion strength<br />
Classified as<br />
high opinion strength<br />
Low opinion strength 62 49<br />
High opinion strength 31 155<br />
To enhance our classification results we have applied the CFS feature selection algorithm. The best<br />
ranked features are shown in Table 3.<br />
Table 3: Best ranked features according to CFS algorithm<br />
Ranking # Feature<br />
1 # of words per comment.<br />
2 # of nouns divided by the # of words per comment.<br />
3 # of verbs divided with the # of the words per comment.<br />
4 Usage of uppercase letters or not<br />
After selecting only the top ranked features we apply again the SVM classifier. The obtained accuracy is<br />
78.11%. Table 4 provides the new classification problem confusion matrix. Finally Figure 2 provides a<br />
graphical representation of the two classification schemas comparative results in terms of accuracy.<br />
Table 4: Confusion matrix produced using CFS selected features<br />
Class Classified as<br />
low opinion strength<br />
Classified as<br />
high opinion strength<br />
Low opinion strength 65 46<br />
High opinion strength 19 167<br />
5. Concluding remarks<br />
We have presented an innovative methodology that is able to automatically extract quantitative features<br />
from text web sources (e.g blogs) and classify the user’s opinions strength as “high” if the user supports<br />
his opinion using arguments or “low” otherwise. To validate the proposed methodology we have<br />
constructed a database consisting of seven features (described in Table 1) extracted of 297 posts arising<br />
from a Greek newspaper blog. A Radial Basis Function kernel Support Vector Machine algorithm has<br />
been trained and tested with the above mentioned database. To minimize bias error we have used 10<br />
fold cross validation. The overall classification accuracy achieved from the RBF-SVM was 73,06%. To<br />
increase the classification results we have applied a CFS feature selection method, which provided the<br />
features describe best the classification problem (Low opinion strength, High opinion strength). The best<br />
ranked features according to CFS algorithm are provided in Table 3. The RBF-SVM algorithm overall<br />
classification results using the CFS selected features is 78.11%. Our future works includes the<br />
enrichment of our dataset, the employment of more advanced classifiers in order to increase our<br />
551
George Stylios et al.<br />
classification accuracy and the testing of our methodology into real world posts dealing with different<br />
topics.<br />
Figure 2: Classification comparative results in terms of accuracy.<br />
References<br />
Chih-Chung Chang and Chih-Jen Lin, 2001, LIBSVM : a library for support vector machines.<br />
Decman. Mitja, 2009. “Web 2.0 in eGovernment: The challenges and opportunities of Wiki in Legal Matters”.<br />
Proceedings of the 9th <strong>European</strong> <strong>Conference</strong> on eGovernment, pp 229-236.<br />
Furuse O., Hiroshima N. Yamada S.and Kataoka R., 2007, “Opinion sentence search engine on open-domain blog”,<br />
Proceedings of the 20th international joint conference on Artifical intelligence in Hyderabad, India, pp.2760-<br />
2765<br />
Gribble D. S.et al., 2000 “Scalable, Distributed Data Structures for Internet Service Construction,” Proc. 4th Symp.<br />
Operating Systems Design and Implementation, Usenix Assoc., pp. 319–332.<br />
Hall M.A., 1998, “Correlation-based Feature Subset Selection for Machine Learning” Hamilton, New Zealand, 1998.<br />
Hatzivassiloglou, V., and Wiebe, J. 2000. “Effects of adjective orientation and gradability on sentence subjectivity.” In<br />
proceedings of the <strong>Conference</strong> on Computational Linguistics.<br />
Hayat. Ali, Linda Macaulay and Liping Zhao. 2009. “A Collaboration Pattern Language for e-Participation”:A Strategy<br />
for Reuse”. Proceedings of the 9th <strong>European</strong> <strong>Conference</strong> on eGovernment, pp 29-39.<br />
Jian-Tao Sun, Xuanhui Wang, Dou Shen, Hua-Jun Zeng, and Zheng Chen. 2006 “Cws: A comparative web search<br />
system.” In International <strong>Conference</strong> on World Wide Web (WWW), 2006<br />
Ku LW Chen H.H 2007 “Mining opinions from the Web: Beyond relevance retrieval Source”, Journal of the American<br />
Society for Information Science and Technology Volume 58, Issue 12,October 2007<br />
Pang Bo and Lee Lillian, 2008. “Opinion Mining and Sentiment Analysis.” Foundations and Trends in information<br />
Retrieval. Vol 2 Nos. 1-2, pp1-135. DOI:10.1561/1500000001.<br />
Pang, B.; lee, L.; and Vaithyanathan, S. 2002. “Thumps up? Sentiment classification using machine learning<br />
techniques”. In Proceedings of the 2002 <strong>Conference</strong> on Empirical Methods in Natural Language Processing<br />
(EMNLP-02)<br />
Qingliang Miao, Qiudan Li and Ruwei Dai, 2009 “AMAZING: A sentiment mining and retrieval system”, Expert<br />
Systems with Applications<br />
Turney, P. 2002. “ Thumps up or thumbs down? Semantic orientation applied to unsupervised classification of<br />
reviews. In Proceedings of the 40th Annual Meeting of the association for Computational linguistics.<br />
V. Vapnik,1995, “The nature of statistical learning theory”, Springer, New York.<br />
Wiebe, J., Wilson, T.; Bruce, R.; Bell, M.; and Martin, M 2002. “Learning subjective language.” Technical Report TR –<br />
02-100, Department of Computer Science, university of Pittsburgh, Pittsburgh, Pennsylvania.<br />
Wiebe, J.; Bruce, R.; and O’Hara, T. 1999. Development and use f a gold standard data set for subjectivy<br />
classifications. In Proceedings of the 37th Annual Meeting of the Association for Computational Lingyistics<br />
(ACL-99), 246-253.<br />
Wiebe, J.2000. “Learning subjective adjectives from corpora”. In Proceedings of the 17th National <strong>Conference</strong> on<br />
Artificial Intelligence (AAAI -2000).<br />
Xu Z.and R. Ramnath, 2009 “Mining Opinion from Poll Results in Web Pages,” WWW2009, April 20-24, 2009, Madrid<br />
Spain<br />
Yu, H., and Hatzivassiloglou, V 2003. “Towards answering opinion questions: Separating facts from opinions and<br />
identifying the polarity of opinion sentences”. In Proceedings of the <strong>Conference</strong> on empirical Methods in Natural<br />
language Processing<br />
Zabin J and Jefferies A, 2008 “Social media monitoring and analysis: Generating consumer insights from online<br />
conversation”, Aberdeen group Benchmark Report.<br />
Zhongwu Zhai, Bing Liu, Hua Xu and Peifa Jia, 2011 "Clustering Product Features for Opinion Mining." to appear in<br />
Proceedings of Fourth ACM International <strong>Conference</strong> on Web Search and Data Minin, Hong Kong, China.<br />
552
An Efficient, Effective eGovernment Enterprise Resource<br />
Planning Model<br />
John Douglas Thomson<br />
RMIT University, Melbourne, Australia<br />
doug.thomson@rmit.edu.au<br />
Abstract: The purpose of this empirical research by two public servants over twelve months was to develop an<br />
efficient and effective generic ERP database model and to minimize its impact on their agency. The ERP database<br />
so developed met agency performance requirements, did not require adjustment of agency structures, systems or<br />
processes, or any additional resources, change management or special training. The model, which may be suitable<br />
for adoption by others (particularly developing countries), was based on the agency’s existing data across almost all<br />
industry sectors over a period of six financial years. Contrary to vendor developed and imposed ERP models, the<br />
impact of this model on the agency was minimal.<br />
Keywords: ERP; agency; performance; impact<br />
1. Introduction<br />
The purpose of this empirical research by two public servants over twelve months was to develop an<br />
efficient and effective generic Enterprise Resource Planning (ERP) database model and to minimize its<br />
impact on their agency. The ERP database so developed met agency performance requirements, did not<br />
require adjustment of agency structures, systems or processes, or any additional resources, change<br />
management or special training. The model, which may be suitable for adoption by others (particularly<br />
developing countries), was based on the agency’s existing data across almost all industry sectors over a<br />
period of six financial years. Contrary to vendor developed and imposed ERP models, the impact of this<br />
model on the agency was minimal.<br />
ERP is an agency wide computer software system used to manage and coordinate all the resources,<br />
information and functions of a business from shared data stores (Esteves and Pastor, 2004). An ERP<br />
system can facilitate the smooth flow of common functional information and reduce cycle times. However,<br />
without top management support and an appropriate business strategy, plan and vision, the reengineering<br />
of business processes, effective project management, user involvement and education and<br />
training, eGovernment agencies cannot embrace the full benefits of such complex systems. The risk of<br />
failure might be at a high level (Al-Fawaz, Zahran and Tillal, 2008). Due to the complexities of most ERP<br />
systems and the negative consequences of a failed ERP implementation, most ERP vendors have<br />
included ‘best practice’ in their software. These are what the ERP vendor may deem as the most efficient<br />
way to carry out a particular business process in an integrated enterprise-wide system (Monk and<br />
Wagner, 2009) – that is, from the ERP vendor’s point of view and not necessarily from an agency’s point<br />
of view.<br />
Most ERP vendor systems were initially designed to be used by discrete manufacturing companies rather<br />
than for government (Khosrow-Pour 2006). While this is changing, agencies have variously struggled with<br />
different ERP vendors to modify core ERP vendor programs to their needs (Khosrow-Pour 2006).<br />
Vendors have only recently begun to offer specially tailored ERP application sets, but there is still much<br />
customization work to do (Khosrow-Pour 2006). Packaged applications now target agencies including<br />
higher education (Khosrow-Pour 2006). Thus it is necessary for agencies to perform a thorough business<br />
process analysis before selecting an ERP vendor and undertaking ERP implementation. Such analysis<br />
should map current structures, systems and operational processes to enable the selection of an ERP<br />
vendor whose standard modules are most closely aligned with the established agency’s (King 2005;<br />
Yusuf, Gunasekaran and Abthorpe, 2004). ERP implementation is difficult and can be politically charged.<br />
Agencies are often structured into nearly independent functions, each having different processes,<br />
business rules, data semantics, authorization hierarchies and decision centres (Daneva and Wieringa,<br />
2008). ERP implementation can cause significant centralization of arrangements, such that once<br />
implemented may then limit the freedom and flexibility of agencies to adapt quickly to environmental<br />
changes without incurring significant costs, lengthy duration delays, significant change management and<br />
agency turmoil.<br />
While the adoption of ERP has been viewed as a means of reducing costs, in practice such<br />
implementation often increases costs (Cordella & Simon 97, Cordella 2001, Cordella 2006). Such costs<br />
553
John Douglas Thomson<br />
vary from agency to agency. The ICT Development Index provides IT benchmarking information across<br />
nations indicating that ‘large disparities remain among countries’ (ITU, 2009). Low income countries are<br />
low on the index, with an important element being ‘the cost of ICT services’ (ITU, 2009).<br />
ERP data is often spread throughout different agency functions such as accounting, project management,<br />
purchasing and procurement, and supply logistics. Wittmann & Cullen (2000) suggest that such data is a<br />
key value driver. In many agencies it remains an untapped source of core government business data. It<br />
could be that this is because its value is not recognised or is deliberately obsfuscated by agencies (eg<br />
recent anti-corruption initiatives by the UK government), or that some or all of these functions have been<br />
outsourced to an external provider and so have become opaque to an agency’s management. Whilst it<br />
may be an attractive option, outsourcing such core functions may lead to becoming dependent upon<br />
external, often rent seeking, ERP vendors. Such rent seeking can take the form of demands for system<br />
and software adoption and subsequent upgrades, specialist training for staff, ongoing license fees on a<br />
per user basis (so limiting the number of users within the agency because of the cost per user),<br />
consultancy fees, special service fees and so on. Once committed to such ERP arrangements, it is<br />
difficult for an agency to break out of such contracts without suffering heavy costs. But to remain in the<br />
arrangement is also very costly – it becomes a most effective monopoly for the ERP vendor.<br />
It is critical for agencies to determine if their way of doing business will fit a standard ERP vendor<br />
package (Khosrow-pour, 2006) before contracts are signed. There are options – agencies can change<br />
their business structure, systems and processes to accommodate the ERP vendor software, or they can<br />
modify the software to fit their structure and processes. ERP vendors argue that modifying their software<br />
will ‘slow down the project, introduce dangerous bugs into the system and make upgrading the software<br />
to the ERP vendor’s next release excruciatingly difficult because the customizations will need to be torn<br />
apart and rewritten to fit with the new version’ (Khosrow-pour, 2006).<br />
2. Case Illustrations<br />
Waste Management announced in March 2008 that it was suing SAP, seeking the recovery of US$100m<br />
in project expenses that related to a failed ERP vendor implementation started in 2005. In the complaint,<br />
Waste Management alleges that SAP executives participated in a fraudulent sales scheme and that<br />
SAP's Waste and Recycling ERP product was actually fake software that was still not ready for Waste<br />
Management's use by Spring 2008 (Financial Times HE Supplement 2008).<br />
An ERP study conducted by Lugwigshafen University of Applied Science (Ludwigshafen University 2004)<br />
surveyed 192 companies. It concluded that companies which implemented SAP’s industry best practices<br />
decreased mission-critical project tasks such as configuration, documentation, testing and training.<br />
In a Deloitte Consulting survey of 64 Fortune 500 companies (Deloitte, 2008; Khrosrow-Pour 2006;<br />
Saleh, Abdullaziz and Alkattan, 2006), one in four admitted they suffered a drop in performance when<br />
their ERP vendor system went live - the most common reason for the performance problems was that<br />
everything looked and worked differently from the way it did before, which occurs when people can’t do<br />
their jobs in the familiar way and haven’t yet mastered the new way.<br />
RMIT University, an Australian top 200 global university in 2007 (Financial Times HE Supplement 2008)<br />
undertook to integrate basic student administration (and related financial) tasks with web-enrolments, the<br />
alumni system and other peripheral tasks. It went live in October 2001. According to Gray (Gray, 2003),<br />
the PeopleSoft ERP implementation was subsequently the subject of a Victorian Government Auditor<br />
General's Report (Victorian Auditor General, 2003) following the ERP vendor system's failure to deliver.<br />
The problems that followed cost RMIT University more than AU$47m, or 3.7 times the original budget<br />
(Victorian Auditor General, 2003).<br />
The hidden vendor costs of ERP most likely to result in budget overrun are training (expensive);<br />
integration and testing (high risk); customization (expensive); data conversion (from old systems to new<br />
ERP vendor systems); data analysis (combined with data from external systems for analysis purposes);<br />
consultants (ad infinitum); retaining the agency’s trained ERP employees; implementation (never stops);<br />
waiting for the agency’s ROI; post-ERP depression; and adjusting to the new ERP vendor system.<br />
Similar examples abound. Gray (2003) suggests that rather than trying to modify the ERP vendor<br />
software systems to suit an agency’s business processes, there is a need to look at ways of modifying<br />
the business’s processes to suit the ERP vendor system. However, this may lead to other acute and<br />
554
John Douglas Thomson<br />
expensive complications in writing software variations and revising and adjusting business structures and<br />
processes. Is this ‘the tail wagging the dog’? Is an ERP system a tool of management or vice versa?<br />
3. The story in brief<br />
Why do ERP projects fail so often? At its simplest level, Wailgum (2007) suggest that ERP is a set of<br />
‘best practices’ for performing different functions including e-procurement, logistics, finance, HR, and<br />
other processes. To get the most from the ERP vendor software, they argue that employees need to<br />
adopt the work methods outlined in the software. If public servants in the different agencies that will use<br />
ERP don’t agree that the work methods embedded in the software are better than the ones they currently<br />
use, they will resist using the software or will want IT to change the software to match the ways they<br />
currently do things. This can be where ERP vendor projects break down. Political fights break out over<br />
how, or even whether, the ERP vendor software should be installed. IT becomes involved in long,<br />
expensive customization efforts to modify the ERP vendor software to fit the business requirements.<br />
Customizations make the software more unstable and harder to maintain when it is implemented.<br />
Because ERP covers so much of what an agency does, a failure in the software can bring an agency to a<br />
halt.<br />
Every agency is different, with unique work methods that an ERP vendor cannot account for when<br />
developing its software. Further, changing a public servant’s work processes and habits will also create<br />
difficulties, and getting them to use the ERP vendor’s software to improve the ways they do their jobs<br />
may be a harder challenge, particularly if it means that on success, many will lose their jobs through<br />
‘productivity benefits and efficiency gains’. If the government agency is resistant to change, then an ERP<br />
project is more likely to fail.<br />
So rapid have been software and hardware improvements that strategy developing and decision making<br />
senior public servants are sometimes unaware of the inherent latent usable potential available to<br />
prosecute their interests – there may also be generational issues here. In some agencies, existing public<br />
servant ICT expertise may not be being realized or valued. Since 2000, there have been significant<br />
improvements in the computing power of generic hardware and software database tools for which there<br />
are ‘at no cost’ upgrades. Inexpensive training in the use of generic database software is accessible at<br />
low cost. Such may be the skill and curiosity of many public servants about ICT that no additional training<br />
is necessary. These ICT skills may be applicable to ICT challenges such as ERP, which function through<br />
establishing central databases. Standardization of software code makes it possible for agencies to<br />
develop their own ERP arrangements using their own employees who are already familiar with their<br />
agency’s structure, agency and culture.<br />
4. The challenge<br />
There has been at least one agency which used its internal resources to develop an efficient and<br />
effective ERP model at low cost over a period of 12 months. The innovation challenge was to implement<br />
government ICT policy through the internal development of an agency wide central ERP e-procurement<br />
database using standard generic database software, existing resources and data at lowest cost, in<br />
minimum time with maximum agency acceptance. This became an evidence based, longitudinal action<br />
research for a complex, high tech Australian Federal Government Department of around 90,000<br />
employees. In F/Y 2008-09 the agency procured more than AU$9.6 billion equipment and services, and<br />
employed over 7,500 people in more than 40 locations around Australia and overseas (DEF 09).<br />
Hundreds of small to large enterprises are dependent on the agency for orders, so whatever software is<br />
adopted would have an impact on them also. The more generic the software, the less cost and more<br />
efficient and effective for suppliers. The selection of Microsoft Access software (MIC 07) was made<br />
because the agency was already committed to generic Microsoft software as its standard and it was<br />
readily available to suppliers.<br />
The ERP design performance specification was determined after lengthy fieldwork discussions with many<br />
internal and external stakeholders. These were:<br />
First: it had to be simple, reliable, accurate and timely and kept current with new data entry as eprocurement<br />
transactions occurred;<br />
Second: it had to respond to internal customer’s many and varied needs on an established work<br />
priority basis but be capable of modification or adjustment should these needs change;<br />
555
John Douglas Thomson<br />
Third: it had to be user friendly, easy and intuitive to use with minimal if any training, simple to<br />
understand in concept and structure, and be perceived and accepted by authorized users as of value<br />
and not as a threat to their jobs; and<br />
Fourth: it needed to be developed, installed and maintained using existing data and resources at no<br />
additional resource, transaction or capital cost to the agency.<br />
To achieve these performance criteria, the boundaries of the model were based on existing financial data<br />
for each financial year’s transactions. This data was readily available, but spread throughout various<br />
functional areas such as accounting, project management, procurement and supply logistics. Initial<br />
exploratory research found there were around 250,000 electronic procurement transactions per annum,<br />
around 200,000 of which were under AU$2,000 in individual value. The ERP data for these less than<br />
AU$2,000 commodity purchases, large in number (greater than 90% of the total number of transactions)<br />
but individually very small in value (less than 10% of the annual spend), was already available through<br />
bank card statements and could be added to the database later if necessary. Details of the remaining<br />
(approximately) 50,000 e-procurement transactions, each above the agency bank card delegation of<br />
AU$2,000, were publicly available through the Federal Government Gazette and formed the basis of the<br />
initial generic ERP database model. These data were collected from a range of internal and external<br />
stakeholders.<br />
5. One unique field required<br />
For the ERP database model development, an unique attribute common to every transaction was<br />
necessary. This unique field, the Purchase Order number, provided the means by which data within and<br />
across each financial year was identified. This unique attribute thus provided the basis for the individual<br />
records of related data to be selected, interrogated, dissected, grouped and extracted in many shapes<br />
and forms. A ‘flat file’ structure made access to all data in the database easy and quick to access by<br />
authorized employees with very limited training. This approach ensured every authorized employee was<br />
able to intelligently determine the usefulness of the database to their own particular needs. Any masking<br />
of the ‘flat file’ data restricted and limited the usefulness of the database. Usually ERP vendors do not<br />
advocate such transparency of the entire database to all authorized users, but instead advocate ‘reports’.<br />
This was found to be an inefficient and much less effective approach than keeping the data open and<br />
transparent to all authorized users. Vendors also argue that a simple database such as MS Access is<br />
inadequate to cope with such a challenge. Again this was found not to be the case. The simple MS<br />
Access relational database ‘flat file’ structure used did not overload or make the database complicated or<br />
difficult to interrogate by authorized users. In fact, other relational database fields were subsequently<br />
added as ‘pull down’ menus, such as Zip Codes and Industry Codes (ANZIC). Pull down menus for buyer<br />
and supplier attributes, such as address, contact person, email addresses, telephone numbers and so on<br />
were also added. Any user that had a need for reports were able to design and develop them themselves<br />
as necessary, because of their access to the ‘flat file’ database, simplicity of the software and the easily<br />
understood database infrastructure.<br />
6. Intuitive use<br />
The structure of the extended relational database fields with each individual record tied to its unique<br />
Purchase Order (P/O) number was based on the chronology of the capability acquisitions ie in the order<br />
in which the processes occurred - from the agency buyer to product/price to supplier to delivery to final<br />
location – no changes to existing agency structure, systems or processes were required. Data included<br />
fields for the buyer’s name, buyer’s address and contact details, contract, contract type, account number,<br />
purchase order number and date, portfolio, department, division, branch, agency, and postcode, and<br />
details of payment arrangements and progress; product description and ANZIC industry code (Australian<br />
Bureau of Statistics, 1998), value and industry sector; supplier company number, name and address, and<br />
contact details. Other data required by specialist agency areas could be added as required (Figure 1).<br />
In this systems format, the data was able to be intuitively understood and interrogated by authorized<br />
users of the database, who were able to draw upon accurate and timely procurement, financial, project<br />
and supply records continuously updated with new information at the end of each month. Thus the<br />
AU$3b to AU$4b per annum history of strategic capability acquisition over six financial years was<br />
established on a part time basis by two employees over a twelve month period. Good relations with all<br />
stakeholders were maintained during the development period, no consultants, or expensive vendor<br />
software, or special training or ongoing license fees were necessary in the development and<br />
establishment of this ERP infrastructure.<br />
556
Figure 1: The chronology of capability acquisition<br />
John Douglas Thomson<br />
Some of the many possible fields in and uses of the database are shown in Table 1. These fields reflect<br />
the nature of the ERP business of the agency, which are largely common to most agency procurement<br />
activities. The ‘flat file’ database structure can be readily and rapidly ‘cut and diced’ by any authorised<br />
user to obtain desired data or develop reports. No change management or adjustments to systems or<br />
processes were required, no changes to agency or structure, and no threat of job losses to employees.<br />
Table 1: An example of some few of the possible database attributes (columns) and records (rows).<br />
P/O<br />
no<br />
Date 2008 Value<br />
(AU$K)<br />
A/P to date<br />
AU$K)<br />
Agency Cost<br />
Centre<br />
Supplies<br />
description<br />
446 18Dec 9,103 8,197 DCPM PINTAIL<br />
radios<br />
Qty Supplier<br />
20 Stanilite<br />
Electronic<br />
447 25Dec 7,557 6,000 DNSDC Lep’chaun lease 1 Dan Murphy<br />
448 01Jan 6,320 0 MM Goods 65 Disney<br />
Land<br />
7. Corrupt practices<br />
With this ERP database, the coordination and knowledge management problems associated with<br />
incomplete supply and transaction information and corporate governance issues are reduced. With<br />
accurate scrutiny of historical e-sourcing data over several financial years, an agency is better able to<br />
choose the most efficient and effective e-sourcing arrangements so reducing its transaction and other<br />
costs. It is also able to better synchronize the motivation of its agencies and its suppliers by reducing the<br />
differences of interest and information between the two, with panoptican transparency and trust<br />
(Bentham, 1785). This reduces the opportunities for internal or external rent seeking activities. The ERP<br />
database immediately provides accurate details of each product (good or service) purchased, by whom<br />
and from which supplier in which industry, when and where, at what cost, as well as the current status of<br />
the account. This transparency in itself reduces the potential for, or possibility of, corrupt practices.<br />
8. Need to know, now<br />
Government agencies, for a wide range of reasons, need to know with whom they are doing business,<br />
what business, and what financial exposure they have at any particular point of time. They need to know<br />
now, not in a month, or a week, or tomorrow, but now. Access to this ERP database enabled the agency<br />
to know immediately the number and value of transactions, and with whom it was doing business over<br />
the six financial years the database covered. This is demonstrated across two financial years of the ERP<br />
database (Figure 2).<br />
9. Benchmark buyer delegation limit<br />
Figure 3 demonstrates both the value of notifications of value greater than the agency’s (then) bank card<br />
delegation limit of AU$2,000 and the number of the notifications in this category. This information is<br />
useful if the level of delegations is to be reconsidered, particularly as each product (good or service)<br />
557
John Douglas Thomson<br />
comprising the data can be identified. Such information can also be used to benchmark an agency’s<br />
performance.<br />
AU$m<br />
10000<br />
1000<br />
100<br />
10<br />
1<br />
Figure 2: Value brackets of e-Transactions<br />
AU$m<br />
60000<br />
50000<br />
40000<br />
30000<br />
20000<br />
10000<br />
0<br />
$150m and over<br />
$100m to $150m<br />
$50m to $100m<br />
$20m to $50m<br />
$10m to $20m<br />
$5m to $10m<br />
$1m to $5m<br />
$100k to $1m<br />
$30k to $100k<br />
$2k to $30k<br />
Less than $2k<br />
Value Bracket of Procurement<br />
3768 4054 3768 4159<br />
Value of Notifications<br />
>AU$2,000 (in then year<br />
$m)<br />
Value of Notifications<br />
(AU$m ) at constant<br />
prices<br />
50989<br />
Total greater than $2k<br />
48995<br />
Number of Notifications<br />
>AU$2,000<br />
Figure 3: eProcurement values – global summary<br />
10. Strategic sourcing policy: technology transfer<br />
Major agency contracts, often high tech projects, are a focus of strategic management policy because of<br />
the potential for technology transfer, local high tech industry development and the national benefits to be<br />
derived therefrom. Figures 4 and 5 provide an indication of whether a local high tech strategic sourcing<br />
policy was working or not.<br />
558<br />
Number<br />
F/Y1<br />
F/Y2<br />
F/Y1<br />
F/Y2
FY1<br />
FY2<br />
0<br />
60<br />
52<br />
52<br />
40<br />
John Douglas Thomson<br />
Total number of contracts<br />
Total number of contracts<br />
Awarded to local suppliers<br />
50 100<br />
Figure 4: Number of eProcurement contracts greater than $5m & awarded to local suppliers<br />
FY1<br />
FY2<br />
0<br />
2209<br />
1074<br />
2383<br />
1528<br />
1000 2000<br />
Total Value AU$m<br />
Figure 5: Value of eProcurement contracts greater than $5m awarded to local suppliers<br />
11. Offshore sourcing vulnerability<br />
Total value of contracts<br />
Awarded value to local<br />
suppliers<br />
If there was a major disaster such as a tsunami, earthquake or epidemic, then it is necessary for an<br />
agency to be quickly aware of the possible effects on its offshore suppliers. Figures 6 and 7 provide<br />
examples of aggregated data of country of origin from which the agency was obtaining supplies. The data<br />
from each country can of course be broken down into individual supplier details, products being supplied<br />
by each supplier, and contract progress details.<br />
12. Agency business centre comparative performance<br />
Figures 8 and 9 provide a summary of the activities being undertaken by each of the agency’s business<br />
unit each financial year. Resourcing efficiency and effectiveness across agency business centres is a key<br />
issue and such data can indicate the relative efficiency and effectiveness with which each business unit is<br />
undertaking its business. Resources can then be justified or reallocated as appropriate, particularly useful<br />
when contracts end and new contracts are let in other locations.<br />
13. Top ten DoD industry sector spend<br />
Each of an agency’s e-procurements can be placed in an industry sector (Figure 10). This extends into<br />
other internal and external data base information relating to that particular industry sector. For example,<br />
other industry agencies such as the Australian Bureau of Statistics has a variety of data for specific<br />
industry sectors (trend, growth, location, demographic etc). These data extensions can be most valuable<br />
for a multitude of agency purposes, and particularly for the development of strategic industry policy.<br />
559<br />
3000
Number<br />
1000<br />
100<br />
10<br />
1<br />
Belgium<br />
Canada<br />
Denmark<br />
Fiji<br />
France<br />
John Douglas Thomson<br />
Country of Origin<br />
Germany<br />
Greece<br />
Indonesia<br />
Ireland<br />
Israel<br />
Italy<br />
Netherlands<br />
Norway<br />
NZ<br />
Singapore<br />
Spain<br />
Sweden<br />
Switzerland<br />
UK<br />
USA<br />
Figure 6: Number of agency eProcurements greater Than $100,000 from non local suppliers<br />
Value AU$<br />
$10,000,000,000<br />
$1,000,000,000<br />
$100,000,000<br />
$10,000,000<br />
$1,000,000<br />
$100,000<br />
$10,000<br />
$1,000<br />
$100<br />
$10<br />
$1<br />
Belgium<br />
Canada<br />
Denmark<br />
Fiji<br />
France<br />
Germany<br />
Greece<br />
Indonesia<br />
Ireland<br />
Israel<br />
Country of Origin<br />
Italy<br />
Netherlands<br />
Norway<br />
NZ<br />
Singapore<br />
Spain<br />
Sweden<br />
Switzerland<br />
UK<br />
USA<br />
Figure 7: Value of agency eProcurements greater than $100,000 from non local suppliers<br />
14. Top ten suppliers by value<br />
A summary of the top ten agency suppliers by number and by value each F/Y was also readily available<br />
from the database. This data is significant from political, industrial, national and international perspectives<br />
(Figures 11 and 12), as the data reveals agency conne4ctions and possible supply and supply chain<br />
vulnerabilities.<br />
DoD Program<br />
Unstated<br />
Washington<br />
London<br />
Science and Technology<br />
Budget and Management<br />
A cquis ition<br />
Strategy and Intelligence<br />
Air Force<br />
Army<br />
Navy<br />
Forces Executive<br />
Figure 8: Number of notifications by business unit<br />
0 2000 4000 6000 8000 10000 12000 14000 16000<br />
Number of Notifications<br />
560<br />
F/Y1<br />
F/Y2<br />
F/Y1<br />
F/Y2
DoD Program<br />
Unstated<br />
Washington<br />
London<br />
Science and Technology<br />
Budget and Management<br />
Acquisition<br />
Strategy and Intelligence<br />
Air Force<br />
Army<br />
Navy<br />
Forces Executive<br />
Figure 9: Number of notifications by value<br />
11%<br />
7%<br />
7%<br />
7%<br />
19%<br />
John Douglas Thomson<br />
0 200 400 600 800 1000 1200 1400 1600 1800<br />
4% 1%<br />
Value of Notifications AU$m<br />
12%<br />
18%<br />
14%<br />
Figure 10: Top ten DoD Industry sector spend for one F/Y<br />
26<br />
55<br />
4<br />
490<br />
14<br />
1730<br />
36<br />
646<br />
Number of Procurements<br />
Figure 11: Top ten suppliers by number of contracts awarded<br />
9<br />
561<br />
3<br />
Transport equipment (12%)<br />
Construction and Construction services (14%)<br />
Consultancy, Property and Business services<br />
(18%)<br />
Computer, office Equipment and Electrical<br />
equipment not elsewhere classified (19%)<br />
Chemicals, Petroleum and Coal Products (7%)<br />
Industrial machinery and equipment (7%)<br />
Electrical equipment,hardware,household<br />
appliances (11%)<br />
Photographic, Professional and Scientific<br />
equipment (7%)<br />
Textiles, clothing and footwear (4%)<br />
Communication services (1%)<br />
Lockheed Martin (14)<br />
Civil and civic (9)<br />
NQEA (36)<br />
ADI (646)<br />
Raytheon (3)<br />
DAS (1730)<br />
Rockwell (55)<br />
CSP (26)<br />
Forgacs (4)<br />
Shell (490)
156<br />
165<br />
99<br />
63 50<br />
77<br />
91<br />
188<br />
John Douglas Thomson<br />
239<br />
Value AU$m<br />
916<br />
Lockheed Martin (916)<br />
Civil and civic (240)<br />
NQEA (188)<br />
ADI (165)<br />
Raytheon (156)<br />
DAS (100)<br />
Rockwell (91)<br />
CSP (77)<br />
Forgacs (63)<br />
Shell (50)<br />
Figure 12: Top ten suppliers by value<br />
15. Price setting and competitive bids<br />
Supplier data can quickly reveal different or in some cases the same suppliers supplying an agency with<br />
the same ‘off the shelf’ product at significantly different prices. This knowledge can be used to re-arrange<br />
competitive bids by fewer suppliers at better prices and so lower an agency’s overall prices and<br />
transaction costs. Alternatively, because ERP data is accurate, timely and easy to access, there may be<br />
no need to limit the number of suppliers of a particular product but price setting may be to a buyer’s and<br />
supplier’s advantage. Such technological innovation enables an agency to review, revise and renew its<br />
existing buyer-supplier strategic sourcing relationships.<br />
16. Conclusion<br />
Many eGovernment agencies are taking advantage of the efficiency and effectiveness gains which can<br />
result from the evolution of new e-business models (Panayiotou, Gayialis and Tatsiopoulos, 2004). Such<br />
agencies are attempting to adopt and adapt the new technologies for public e-procurement in order to<br />
achieve the benefits being realised by entities in the private sector (Panayiotou, Gayialis and<br />
Tatsiopoulos, 2004). In the private sector, this is usually undertaken through the adoption of enterprise<br />
resource planning (ERP).<br />
This empirical research by two public servants over a twelve month period gave rise to an efficient and<br />
effective generic ERP database for their agency. The database did not require any adjustment of existing<br />
agency structures, systems or processes, or any additional resources, change management or special<br />
training. The model, which may be considered for adoption by others, was based on the agency’s existing<br />
data across almost all industry sectors. The model indicates that it is possible for ERP development to be<br />
undertaken by internal resources, so providing both centralized and decentralized functionality, high<br />
amenity, search sensitivity and speed to data by authorized users. The information is transparent,<br />
arranged systematically and logically and can be easily searched intuitively by IT aware authorised public<br />
servants. The high quality, timely data provides a routine basis for the collection, collation and<br />
dissemination of both strategic and detailed e-procurement data. This established one central ERP<br />
database using available generic database software with many uses and users. The model enabled the<br />
sharing and networking of information and provided an accurate historical corporate memory which may<br />
be used for many strategic, operational and audit/anti-corruption purposes.<br />
References<br />
Al-Fawaz, K., Zahran, A., and Tillal, E., (2008) Critical Success Factors in ERP Implementation: a Review, <strong>European</strong><br />
and Mediterranean <strong>Conference</strong> on Information Systems, may 25-26;<br />
Bentham, J., (1785) The Panopticon Writings. Ed. Miran Bozovic (London: Verso, 1995). p. 29-95<br />
Brown, C., and I. Vessey, (2003) Managing the Next Wave of Enterprise Systems: Leveraging Lessons from ERP,<br />
MIS Quarterly Executive, 2(1).<br />
562
John Douglas Thomson<br />
Carayannis, Eg., and Popescu, D., 2005, Profiling a methodology for economic growth and convergence: Learning<br />
from the EU e-procurement experience for central and eastern <strong>European</strong> countries, Technovation pp 1-14<br />
Cordella, A. and Simon, K.A. (1997), The Impact of Information Technology on Transaction and Coordination Cost,<br />
<strong>Conference</strong> on Information Systems Research in Scandinavia (IRIS 20), Oslo, Norway, August 9-12;<br />
Cordella, A. (2001), Does Information Technology Always Lead to Lower Transaction Costs?, The 9th <strong>European</strong><br />
<strong>Conference</strong> on Information Systems, Bled, Slovenia, June 27-29;<br />
Cordella, A (2006), Transaction costs and information systems: does IT add up?, Journal of Information Technology,<br />
21, 195–202;<br />
Daneva, M., and Wieringa, R., (2008) Requirements Engineering for Cross-agencyal ERP Implementation:<br />
Undocumented Assumptions and Potential Mismatches, University of Twente;<br />
Dehning, B., and Stratopolous, T., (2003), 'Determinants of a Sustainable Competitive Advantage Due to an ITenabled<br />
Strategy,' Journal of Strategic Information Systems, Vol. 12, 2003]<br />
Deloitte (2008) ‘In fighting shape? 2008 survey of cost-improvement trends in the Fortune 500’, Deloitte;<br />
Department of Defence, (2009) Defence Materiel Agency, Australian Government;<br />
Esteves, J., and Pastor, J., (2004), Enterprise Resource Planning Systems Research: An Annotated Bibliography,<br />
Communications of AIS, 7(8) pp. 2-54.<br />
Financial Times Higher Education Supplement, (2008) University Rankings, Financial Times Higher Education<br />
Supplement;<br />
Finkle, J., and Chernikoff, H., (2008) ‘Waste Management sues SAP over software quality’, Reuters, Mar 26;<br />
Gray, P, (2003) ‘In depth: RMIT's PeopleSoft disaster’, 30 September, ZDNet Australia<br />
International Association For Impact Assessment, B (1999), Principle of Environmental Impact Assessment Best<br />
Practice, <strong>European</strong> Union.<br />
ITU, (2009) ‘Measuring the Information Society: The ICT Development Index’, International Telecommunication<br />
Union, Geneva, Switzerland;<br />
King. W., (2005) "Ensuring ERP implementation success," in "Information Systems Management", Summer.<br />
Khosrow-Pour, M., (2006) Emerging Trends and Challenges in Information Technology Management, Information<br />
Management Association, International <strong>Conference</strong>, Idea Group Inc;<br />
Ludwigshafen University of Applied Sciences, (2004), Enhanced Project Success Through SAP Best Practices –<br />
International Benchmarking Study, Ludwigshafen University,Germany<br />
Moe, CE., (2004) Public e-Procurement – Determinants of Attitudes Towards Adoption, Electronic Government,<br />
Proceedings Lecture Notes in Computer Science pp 278-282;<br />
Monk, E and Wagner, B, (2009), "Concepts in Enterprise Resource Planning" 3rd.ed.Course Technology Cengage<br />
Learning.Boston, Massachusetts.<br />
Puschmann T and Alt R, (2005) Successful use of e-procurement in supply chains, Supply Chain Management: an<br />
International Journal, (2) pp 122-133;<br />
Saleh, K., Abdulaziz, A., and Alkattan, I., (2006) ‘A Services – Oriented Approach to Developing Security Policies for<br />
Trustworthy Systems’, in Emerging Trends and Challenges in IT Management’, Idea Group Icc;<br />
Turban, A., (2008). Information Technology for Management, Transforming Agencys in the Digital Economy.<br />
Massachusetts: John Wiley & Sons, Inc., pp. 300-343.<br />
Victorian Auditor General, (2003) Report of the Auditor General on RMIT’s Finances, June, State Government of<br />
Victoria, Australia;<br />
Wailgum, T., 2007, ERP Definitions and Solutions, CIO;<br />
Wittmann, C., and Cullen, M., (2000) B2b Internet, First Union Securities.<br />
Yusuf, Y., A. Gunasekaran, And Abthorpe, M., (2004) Enterprise Information Systems Project Implementation: A<br />
Case Study of ERP in Rolls-Royce, in International Journal of Production Economics, 87(3), February.<br />
563
Citizen-Government Interaction in Russia: eGovernment as<br />
Tradition Bearer<br />
Anna Trakhtenberg<br />
Institute of Philosophy and Law, Ural Branch of Russian Academy of Sciences<br />
Yekaterinburg, Russia<br />
cskiit@yandex.ru<br />
Abstract: This paper contains information about the results of sociological study in Urals federal district of Russia<br />
(2010). The study shows that the traditional model of citizen-government interaction based on a desire to move from<br />
formal to informal interaction with the authorities and to appeal directly to the top powers service demand is still<br />
preserved in large scale. Thus, while a state eGovernment proposal is based on the rational bureaucracy ideal and<br />
seeks to maximize the anonymity of service delivery and reduce the number of citizen-official personal contacts the<br />
public demand, on the contrary, is formed on the strategy which aims to convert a bureaucrat into «just a person».<br />
Keywords: eGovernment, statist discourse, interaction with officials, strategy of weak<br />
eGovernment transition, precisely, state and municipal service delivery in an electronic form, is one of the<br />
prior points in the political agenda of the Russian public administration.<br />
Russia is following the global trends. High expectations associated with the radical enhancement of the<br />
quality of governance are set on eGovernment around the world. Therefore, eGovernment transition is<br />
defined as one of the priorities of the UN within the larger process of a global information society<br />
construction.<br />
The statist discourse of eGovernment seems to be in the process of formation. EGovernment is defined<br />
in terms of normative objectives tending to be achieved by «… public administration revitalizing, public<br />
management overhauling, inclusive leadership fostering and moving civil service towards higher<br />
efficiency, transparency and accountability» (United Nations United Nations EGovernment Survey<br />
2010:1).<br />
This is a classical progress discourse within which eGovernment is not an upgraded version of existing<br />
control systems, but the embodiment of an ideal one that, by analogy with the Bill Gates’ term «friction<br />
free capitalism» can be described as «friction free bureaucracy». eGovernment is claimed to ensure free<br />
circulation of information within and between administrative bodies, as well as between authorities and<br />
citizens. This phenomenon is to result in the replacement of hierarchical, inactive and closed bureaucracy<br />
by flexible, horizontally interrelated, open service frameworks, providing services to citizens quickly,<br />
anonymously and without a glitch at 7 / 24 format (seven days a week, twenty-four hours a day). In other<br />
words, eGovernment will allow for a radical reform of administration which leads to elimination of<br />
bureaucracy evils and maintenance of its benefits.<br />
Certainly, there are skeptics, expressing doubt that a technological reform may entail such large-scale<br />
socio-political changes. Few of them articulate their claims with such harshness, as Bradshaw-Lynne,<br />
who described eGovernment policy as largely shaped by hype, rhetoric and normative arguments (2000).<br />
Nevertheless, much attention is paid to the fact that administrative structures obtain strong inertia while<br />
their employees acquire strong resistance to technological innovations and ability to exploit them in their<br />
own interests. Hence, the problem of whether a latent logic of IT development is able to reform existing<br />
governance practices has been reformulated by us in the problem of definition of a discursive practices<br />
complex accompanying the IT emergence in public administration.<br />
In some ways, the procedure of this discursive complex formation was reverse to the initial one. There is<br />
a detailed analysis of how a computer being a soulless tool of bureaucratic control over the masses has<br />
been transformed after discourse processing in the counterculture into an instrument of deliverance from<br />
this control and formation of new, alternative sociality.<br />
In the global statist discourse computers and the Internet once again are included in the dominant<br />
ideology as a synthesis of countercultural democratic discourse with administrative discourse. In this new<br />
discourse the watchword for eGovernment is «citizen-centered practice».<br />
564
Anna Trakhtenberg<br />
The core categories of an eGovernment discourse were formulated in the framework of New Public<br />
Management (NPM) - the movement for public administration modernization under the slogan «process<br />
above hierarchy». The attempt to increase efficiency and quality of public services via transformation of<br />
the government to a large corporation and citizens to customers failed, partly because of ignoring the<br />
values broadcasted in the governance process. As Noordhoek and Saner noted the democratic process<br />
has more goals than the delivery of services (2004). The fact that eGovernment supporters use a NPM<br />
efficiency discourse causes suspicions that they would face the same problem: big promises and<br />
disappointed citizens.<br />
Even now the initiatives on eGovernment matters are constantly hampered by lack of understanding of<br />
those who eGovernment is intended for and who are intended «to be empowered».<br />
According to the UN survey this failure takes the form of divergence of state proposals and public<br />
demand. Despite the fact that an increasing number of countries are making efforts to provide citizens<br />
with electronic content and services and establish on-line dialogue with them a chronic discrepancy<br />
between government offers and citizens’ expectations is noted (United Nations United Nations<br />
eGovernment Survey 2010:5).<br />
Unfortunately, there are relatively few surveys that examine citizens’ perception of eGovernment.<br />
Nevertheless, they display that citizens’ opinion on electronic services is determined by their traditional<br />
perception of the state. Thus, Jae Moon and Welch (2005) while analyzing the citizens and officials’<br />
understanding of the USA eGovernment, highlighted the fact that authorized representatives think within<br />
the bureaucratic (Hamiltonian) tradition while citizens are oriented on democracy (Jeffersonian) tradition.<br />
For this reason, citizens are first of all concerned with the problems of security and privacy while officials<br />
thinking primarily about eGovernment’s ability for provision greater convenience and more information do<br />
not realize that these advantages are of little importance for citizens. The two groups are proved to have<br />
fundamentally different mental practice within a single socio-cultural space.<br />
This conclusion is true for Russia almost as much as for the USA. However, one should mind a radically<br />
different tradition of citizens-officials interaction where the state is both «strict but fair father» and «the<br />
only <strong>European</strong>» implementing a «catch-up» modernization in Russia.<br />
Though international statist eGovernment discourse in Russia is used in a number of top government<br />
documents, such as «Strategy for Information Society Development in Russia» (2008) and its derivative<br />
«Concept of RF eGovernment formation by 2010» (2008), none of the documents speaks about «citizen<br />
empowerment». These are partly consequences of Russian bureaucracy not being involved into<br />
fascination for NPM in the 90-ies (for obvious reasons related to severe systemic crisis), hence, the<br />
corresponding Russian equivalents for «citizen empowerment» and «inclusive leadership» were not<br />
formed). When speaking about eGovernment authorities special attention must be laid to the problem of<br />
eliminating «friction» in the functioning of administrative structures: «it is necessary to achieve<br />
transparency, clarity and simplicity in everyday relations between the state and the citizens» (Medvedev,<br />
2010). The above quote from the Message of the President D. Medvedev in 2010 outlines clearly an<br />
eGovernment discourse framework in its Russian version. The term «e- government» is defined as «a<br />
new form of public entities’ activities which via wide-spread application of ICT is to provide citizens and<br />
organizations with a qualitatively new level of effectiveness and comfort in public service» (Strategy for<br />
Information Society Development in Russia, 2008). Оne of the most important and logical functions of<br />
eGovernment is the fight against corruption because it allows for breaking the direct relationship between<br />
officials and citizens and moving to an anonymous service. In technical documents eGovernment is<br />
regarded simply as an ICT system used for coordination and monitoring state entities’ activities at various<br />
levels through the creation of a unified telecommunication infrastructure. Naturally, such technical<br />
definitions coexist with more citizen-oriented. For example, the developers of the recently approved<br />
«System Project of the RF eGovernment infrastructure formation» (2010) have placed a citizen back in<br />
the discourse of «friction free bureaucracy». The System Project defines eGovernment as the<br />
arrangement of functions of federal, regional and local executive authorities which provides:<br />
Implementation of formal procedures for gathering information, preparing and making decisions<br />
based on remote electronic interaction in all cases where there is no proven need for applicant’s<br />
personal presence or paper documents;<br />
Governance quality improvement measured as the rate of state bodies activities’ compliance with<br />
legitimate interests of the RF citizens.<br />
565
Anna Trakhtenberg<br />
However, there is a significant gap between eGovernment infrastructure developers’ idea of the<br />
legitimate interests of citizens and how citizens themselves understand their needs (not much concern of<br />
their legitimacy).<br />
Numerous opinion polls have revealed a distinctive preference of customary personal communication<br />
with the authorities to the online interaction. For example, the results of opinion poll conducted by the<br />
Russian Public Opinion Research Centre in spring, 2010 are as follows: approximately three-quarters<br />
(73.0%) of respondents aged 25 to 59 years are aware of public services being converted into electronic<br />
form, whereas, only a quarter (25,0%) stated that they would prefer online addressing to the state bodies<br />
to the traditional personal one. 42.0% of the respondents expressed their satisfaction with exceptionally<br />
personal appeal while the others had no definite opinion on this issue (Russians are not accustomed to e-<br />
government officials, 2010).<br />
This conclusion was confirmed during a comprehensive survey conducted by us in the Urals Federal<br />
District in June 2010. (Sample size - 1,500 people. Territorial multi-stage sampling was implemented by a<br />
standardized telephone interview in the six regions: Kurgan region, Sverdlovsk region, Tumen region,<br />
Chelyabinsk region, Hanti-Mansyisk autonomous region-Yugra, Yamalo-Nenezki autonomous region).<br />
Nearly half of respondents over 18 years old (48.2%) stated that in the event of choice they would contact<br />
the authorities in person rather than on the Internet. Other 30.3% would like to have a choice of how to<br />
address- through the Internet or in person and only 16.5% unequivocally indicated they would prefer<br />
exceptionally online interaction.<br />
The highest level of readiness to use electronic services was typical for top management respondents: in<br />
this group, the proportion willing to receive such services amounted to 80.0% of the total number of<br />
respondents, while 34.7% expressed a desire to interact with the authorities only on the Internet.<br />
The weakest readiness was demonstrated by pensioners: in this group 78.8% of the respondents were<br />
focused on personal appeal to the authorities, 7.5% considered for a possible appeal both in person and<br />
online and only 5.8% stated that the electronic form of an appeal was quite suitable.<br />
In other words, eGovernment developers - young, highly educated, wealthy men in managerial positions<br />
or highly qualified specialists meet the full understanding and willingness to use new possibilities in the<br />
same social layer which they belong to and in this sense work on themselves.<br />
Why did the representatives of other social strata show markedly less interest in electronic services? To<br />
find it out we have conducted a series of focus groups on eGovernment transition. (This article uses the<br />
results of focus groups conducted in the cities Ekaterinburg, Nizhny Tagil and Pervouralsk, Sverdlovsk<br />
region. Similar results were obtained in other five major cities of the Urals Federal District).<br />
Focus groups have revealed that there is a clear discrepancy between the statist eGovernment discourse<br />
and the types of discursive structures which eGovernment is inscribed by citizens. This discrepancy is not<br />
too much alike to that described by Jae Moon and Welch (2005).<br />
The security and privacy concerns are not typical for Russian citizens. More precisely, when asked<br />
whether they fear for their personal information being used without their permission they replied like this:<br />
«Why should I care? What can I conceal?» Moderator’s arguments about the dangers of universal<br />
electronic control provoked laughter and replies: «They [state authorities] will do it all the same» and<br />
older participants even approved such control.<br />
Fears of Russian citizens were concentrated in another sphere. The participants agreed that the<br />
transition to online public service delivery can reduce the «bureaucratic friction» and will permit to avoid<br />
queuing at reception to the official. Here is a quotation of an elderly participant who is a skilled user of<br />
computers and the Internet (she acquired skills at work):<br />
«No need to go anywhere, no need to stand in a queue. You may stay at home, sit down,<br />
think a little, type, load and mail. That is all. And then, you get a mark that your enquiry is<br />
registered and dated. (Nizhny Tagil, female, former accountant, 60 years old).<br />
However, such positive assessments are usually accompanied by specific stipulations. We give an<br />
utterance of a middle-aged woman (a confident computer and the Internet user):<br />
566
Anna Trakhtenberg<br />
«Of course, if you do not have to queue, then it is very well. But is this possible? I mean, that<br />
my application could be lost. Could it get wherever needed? Would it be answered instead of<br />
being deleted and then said to be never sent! Or they may say: «The server is badly working<br />
and your e-mail has not come yet» and so on. There is some distrust left. Yet. Now ».<br />
(Pervouralsk, a woman employee at a municipal institution, 44 years old).<br />
Evidently, the participant has no doubt that «they / officials» could exploit new opportunities in their own<br />
interests and find the way to shirk their duties whereas she could not feedback and protect her interest.<br />
The idea «when online they (officials) can not be controlled» was articulated by younger and middle aged<br />
men involved in a dialogue:<br />
It is bad that you can not track how your application is being considered. It cannot be tracked<br />
anyhow. You just e-mail it and never learns if it will be read at least! (Nizhny Tagil, a male,<br />
student, 26 years old.)<br />
Well, there will be a notification...(Nizhny Tagil, a male watchmaker, aged 36)<br />
Notification is a pure notification, it is simply an automated issue. And they may not read, just<br />
put a tick and delete it! (Nizhny Tagil, a male, student, 26 years old).<br />
While traveling from one office to another you, at least, can supervise the process. (Nizhny<br />
Tagil, a male worker, 40 years old)<br />
The «control» here means a traditional «strategy of weak» - the desire for direct personal contact with an<br />
official in order to create an informal atmosphere which will encourage him to fulfill his direct duties and<br />
perhaps, even admit certain violations. The electronic form does not suggest such a strategy, therefore,<br />
causes some mistrust (applicants do not know how to behave in the environment where contact with an<br />
officer becomes mediate and impersonal).<br />
Meaningfully, that the focus group participants tended to this strategy, regardless of sex or age. It was<br />
important for them to have a chance to communicate with an officer «as a human being» rather than a<br />
formal function performer. Here is a general reasoning given by a twenty-year old student, an active IT<br />
user:<br />
«In case you need something specific, well, eMailing on the Internet seems to be ineffective<br />
- it is less likely that you will be replied and that your problem will actually be considered.<br />
Because when you just ask someone for something … It is harder to refuse when you<br />
communicate with a person face to face than like this (electronically). It generally can be<br />
ignored, moreover, not replied. Оfficials are people of another sort. It makes no difference to<br />
them - on line or alive addressing. But, nevertheless. At least you can remember the human<br />
face when you are refused. May be helpful on occasion! » (Pervouralsk, a female student,20<br />
years old).<br />
It is noteworthy how much of this opposition is expressed by saying «we - they» («officials are different<br />
people»). The fact that «eye to eye» contact gives an ordinary visitor at least some chance in<br />
administrative entities was reasoned by both a middle-aged teacher and an elderly worker:<br />
«I'll enter an office. And meet «face to face». With emotions expressed. I must see him and<br />
his eyes. This is what communication means to me; senses are the most important matters...<br />
How you should say, how to persuade and to convince, something like this. And eMailing is<br />
just dry, emotionless. And I need alive communication! » (Pervouralsk, a female teacher of<br />
sports, 40 years old).<br />
«Man, probably, is arranged so that he might wish to get online answer but so far it is<br />
soulless. You typed in, send and sit down guessing if it will get the office or not. And here, at<br />
a visual contact you can see if the answer will be given or not. As for e-mail, we still have not<br />
been developed enough.» (Nizhny Tagil, a male ex-worker at the city-forming enterprise,<br />
aged by 59).<br />
All these statements reflect a supplicant’s behavior at his interaction with officials when he applies a wide<br />
range of strategies designed to induce an informal (not official) response to his application, and<br />
consequently, gets focused on the most thorough «reading» interlocutor’s emotions, then a petitioner<br />
makes attempts to manipulate these emotions (as another participant formulated: «…at least you can let<br />
a tear»). The Internet interaction with authorities makes it impossible to use this basic strategy, hence,<br />
the fear for finally losing control over the official interaction process arises. Here is a gloomy<br />
567
Anna Trakhtenberg<br />
summarization made by a 26 year-old manager at Yekaterinburg IT-company: «Actually, they [officials]<br />
will stop communicating with us at all. They have nothing to speak to us».<br />
The focus group participants were not much inclined to believe the promise that eGovernment transition<br />
will reduce corruption. They proceeded from the premise that «…insignificant [corrupt] may stop whereas<br />
the more significant corrupt will remain, of course» (Ekaterinburg, a male engineer, 34 years old).<br />
Thus, proponents of online interaction with government officials were mostly highly educated men,<br />
residents of large cities who successfully and effectively use information technologies in everyday life.<br />
Therein, the emphasis was placed on the fact that with no need to communicate with petitioners the<br />
officials will contribute into their work effectiveness growth:<br />
«I am for the Internet, just to get rid of this personal contact. When you sit and concentrate,<br />
type faster and end up faster. Many people are executive in nature. They do not need<br />
dialogue. They get annoyed of communication. But they are able to quickly and efficiently<br />
perform their work».<br />
(Yekaterinburg, a male solicitor in a commercial organization, aged 32)<br />
Thus, while a state proposal is based on the «rational bureaucracy» ideal and seeks to maximize the<br />
anonymity of service delivery and reduce the number of «citizen-official» personal contacts the public<br />
demand, on the contrary, is formed on the strategy which aims to convert a bureaucrat into «just a<br />
person» having nothing in common with this ideal.<br />
There is another traditional «strategy of weak» that has been repeatedly described by specialists in<br />
Russian and Soviet history. V. Kozlov, who devoted a special study to this strategy, pointed out that the<br />
petition was an essential element of Russian culture management because it replaced the missing<br />
institutions of civil society to a large extent: «the denunciation, along with petitions of complaint to the big<br />
bosses over the heads of the bureaucrats and officials… gave the population a final hope that justice<br />
would be done, preserved for the central power an aura of infallibility and righteousness, and redirected<br />
the population dissatisfaction down the channel of «local criticism» (Kozlov, 2000: 118). In the XX<br />
century, the term « denunciation» acquired a negative connotation, hence, for the description of true and<br />
fair reports the term «signal» was introduced instead (Fitzpatrick, 1996), however, the essence remained<br />
the same: any citizen must be provided with the possibility to directly contact with a senior person in the<br />
hierarchy and complain to him on the arbitrariness of his subordinates. Traditionally, the Russian core<br />
belief is that the authority does not extend upwards - from citizens to government (Jeffersonian tradition),<br />
but top- down from some higher authorities center (empowered by God) to the periphery. This conception<br />
of powers can be combined with a deep sense of alienation of lower and top classes («we - they»<br />
scheme). However, this alienation does not exclude but even supposes an absolute power bearer at the<br />
very top who is able to restore order and discipline at subordinate levels.<br />
Characteristically, the discussion on eGovernment in all focus groups spontaneously passed into<br />
«electronic petitions» subject. We present a conversation with residents of Yekaterinburg who on their<br />
own tried to define what «eGovernment» is like, where a typical transition from online services to<br />
personal apply to a «superior they» was performed:<br />
I learnt about eGovernment! I guess, yesterday there was a TV broadcast on that subject in<br />
some city, I do not remember ... I am not sure about the city name. There was an<br />
eGovernment introduced, I think. Yes, they said you could receive a reply to your inquiry<br />
very fast! (Yekaterinburg, a female, housewife, 35 years old)<br />
Perhaps, we will have something like an online mayor. There could be any complaints<br />
submitted. (Yekaterinburg, a female nurse, 39 years old)<br />
Well, we can write to our mayor right now, no problem. But who is writing to you back on<br />
behalf? (Yekaterinburg, a female housewife, 35 years old)<br />
No one is writing on behalf. You answer will never come. (Yekaterinburg, a female nurse, 39<br />
years old)<br />
In the focus groups this idea was repeated and repeated, even by younger participants:<br />
«There is a site «Russian President» with his blog created, where you can leave a comment,<br />
write your opinion for something. On the one hand you are pleased to know that anyway it<br />
568
Anna Trakhtenberg<br />
gets the President, at least, his Secretary and that is great. And the fact that anyone can<br />
write is also very nice. That is, there are no restrictions, any person of our country is free to<br />
write. Of course, everything will pass the censorship, but still it seems to be a positive sign».<br />
(Nizhny Tagil, a male student, 26 years old).<br />
Participants in the older age groups formulated their position more traditionally (and dramatically):<br />
«The main thing for me is that I could send a complain myself! Otherwise, where is justice?<br />
Do you agree with this? As for the President I would better use the Internet to mail to him, of<br />
course. If I meet him face to face, I will not be able to say a word. He is the President indeed!<br />
» (Pervouralsk, a male former worker at the city-forming enterprise,70 years old).<br />
The older focus groups participants’ fears and expectations related to obtaining government services<br />
online resulted in a utopia of absolute control over the officials and citizens’ behavior (utopia actually not<br />
dystopia as might be expected):<br />
«If we were entirely (100 per cent) computerized and everyone could estimate the officials’<br />
work, then after summing up we would see the results: the quality of their work, the<br />
effectiveness of it, someone should supervise this. Only that way could we enjoy the<br />
efficiency» (Nizhny Tagil, a male former worker at the city-forming enterprise, 59 years old).<br />
«Everybody must be under control. You are an official, for example, the chief. You should<br />
swallow this pill. So that we can be aware of everything he is doing, with his whole life being<br />
transparent. And the same if you are a bandit -then take the pill, as well. As soon as you<br />
intend to commit something we are being reported without delay and we could get you in<br />
advance and take to jail! » (Pervouralsk,<br />
a male ex-worker at the city-forming enterprise, 70 years old).<br />
Thus, according to the latter viewpoint the total control is equally obligatory for both a government official<br />
and a gangster. In fact, the speaker puts no difference between them, he perceives them as similar<br />
figures.<br />
Another elderly member reinterpreted eGovernment in the spirit of utopia / dystopia «techno power»<br />
popular in the 60-ies, which used to be a part of a closed computer discourse at the Cold War times.<br />
According to his utterance an emotionless power machine is replacing the leaders guided in their<br />
decisions by pure personal likes and dislikes. In other words, we are talking about the destruction of the<br />
strategy that is acknowledged to be the only effective one on «citizen- official» interaction matters.<br />
«I see the subject like this. At present, a human factor is playing a great role. For example,<br />
there arrives the head of some region and asks: «Everything is getting from bad to worse in<br />
our location. Give us a hundred billion (rubles)! As he is a good and respectable person, he<br />
is given that money. Another leader comes with the similar or, perhaps, even worse<br />
problems but may be refused because he does not please them, maybe he is too rough. He<br />
might have said something wrong to someone. And eGovernment, I recon, is a huge<br />
computer which makes totally impartial decisions .It works independently, distributes money<br />
on itself. As for the legacy-then it follows the laws.» (Yekaterinburg, a male, an employed<br />
pensioner, 62 years old).<br />
Thus, for the focus group participants it is important both to get an opportunity for «softening» a<br />
government official and to complain about him if necessary. In Russia the traditional model of «citizengovernment»<br />
interaction with a «strategy of weak» based on a desire to move from formal to informal<br />
interaction with the authorities and to appeal directly to the top powers is still preserved in large scale and<br />
defines public eGovernment service demand. Prompt, high quality, but anonymous eGovernment<br />
services do not fit into this scheme. Focus group participants concerns about controlling the government<br />
activities are not similar to those of official eGovernment projects developers, because this control has<br />
little to do with the bureaucratic «supervision on implementation». Nevertheless, the eGovernment<br />
transition is hoped to encourage the modernization of traditional «citizen-government» relations.<br />
Acknowledgements:<br />
The materials used for writing are obtained with the support of the Sinara Charity Foundation<br />
(Ekaterinburg).<br />
569
References:<br />
Anna Trakhtenberg<br />
Bradshaw-Lynne D. (2000) ‘Technology Launch in EGovernment’, Handbook of Public Information Systems, N.Y.,<br />
Marcel Dekker, pp. 113 – 125.<br />
Commission of <strong>European</strong> Communities (COM (2003) 567) (2003). The Role of EGovernment for Europe's Future.<br />
Brussels. [Electronic]. Available:<br />
http://ec.europa.eu/information_society/eeurope/2005/doc/all_about/egov_communication_en.pdf. Last<br />
updated11/15/2010.<br />
Concept of EGovernment Formation in the Russian Federation until 2010 (2008). [Electronic]. Available:<br />
http://www.ifap.ru/ofdocs/rus/egovconc.pdf. Last updated: Last updated11/15/2010.<br />
Fitzpatrick S. (1996) ‘Supplicants and Citizens: Public Letter-Writing in the Soviet Russia in the 1930’, Slavic Review,<br />
vol. 55, no 1, pp. 78 – 105.<br />
Jae Moon M., Welch E.W. (2005) ‘Same Bed, Different Dreams? A Comparative Analysis of Citizen and Bureaucrat<br />
Perspectives of EGovernment’, Review of Public Personnel Administration, vol. 25, pp. 243 – 264.<br />
Kozlov V.A. (2000) ‘Denunciation and its Functions in Soviet Governance. From the Archive of the Soviet Ministry of<br />
Internal Affairs, 1944 – 1953’, Stalinism. New Directions, L., Routledge, pp. 117 – 141.<br />
Medvedev D.A. The President of the Russian Federation Message to the Federal Assembly of the Russian<br />
Federation. [Electronic]. Availvable: http://kremlin.ru/news/9637. Last updated11/15/2010.<br />
Noordhoek P., Saner R. (2004) ‘Beyond New Public Management: answering the claims of both politics and society’,<br />
IX Congreso Internacional del CLAD sobre la Reforma del Estado y de la Administración Pública, Madrid, 2-5<br />
November. 2004. [Electronic]. Available<br />
mode:http://unpan1.un.org./intradoc/groups/public/documents/Other/unpan021304.pdf. Last<br />
updated11/15/2010.<br />
‘Russians are not accustomed to eGovernment officials’ (2010). [Electronic]. Available:<br />
http://rumetrika.rambler.ru/review/2/4226. Last updated11/15/2010.<br />
Strategy for Information Society development in Russia (2010). [Electronic]. Available:<br />
http://www.rg.ru/2008/02/16/informacia-strategia-dok.html. Last updated11/15/2010.<br />
System project of EGovernment Infrastructure Formation in Russia (2010). [Electronic]. Available: mode<br />
[http://www.bftcom.com/upload/smi/Systemniy%20proekt.pdf. Last updated 11/15/2010.<br />
UN Department of Economic and Social Affairs (2010) United Nations EGovernment Survey 2010: Leveraging<br />
EGovernment at a Time of Financial and Economic Crisis. [Electronic]. Available:<br />
http://unpan1.un.org./intradoc/groups/public/documents/un/unpan038851.pdf. Last updated 11/15/2010.<br />
570
eGovernment Openness Index<br />
Nataša Veljković, Sanja Bogdanović-Dinić and Leonid Stoimenov<br />
University of Niš, Serbia<br />
natasa.veljkovic@elfak.ni.ac.rs<br />
sanja.bogdanovic.dinic@elfak.ni.ac.rs<br />
leonid.stoimenov@elfak.ni.ac.rs<br />
Abstract: We live in the era of rapid web technologies development that affects the growth and transformation of<br />
eGovernment. These new technologies impact leads to the re-evaluation of eGovernment, re-focusing of target<br />
characteristics and changing of general approach in eGovernment viewpoint. In today's electronic environment, the<br />
concept of eGovernment 1.0 has been overcome and a new eGovernment concept is being created, known as Open<br />
Government. Within this new concept, the focus is set on open public data, transparency, collaboration and citizen<br />
participation. Benchmarking eGovernment is an important task that indicates the level of implementation of<br />
eGovernment policies as well as eGovernment progress. Benchmarks of eGovernment concepts, eGovernment 1.0<br />
and eGovernment 2.0, are not suitable for Open Government. In this paper we will evaluate different methodologies<br />
for Open Government benchmarking and try to define eGovernment Openness Index (eGOVI) as a global measure<br />
that indicates to which extent one government is open.<br />
Keywords: open government benchmarking, eGovernment evolution, eGovernment openness index<br />
1. Introduction<br />
During the last decade, the concept of eGovernment has drastically evolved. It was firstly considered as<br />
the use of information and communication technologies (ICT) for delivering more effective and proficient<br />
government services to citizens, businesses or government agencies by various communication means<br />
such as the Internet, telephone, wireless devices or other communication systems. ICT provides various<br />
ways for integrating information systems into one compact entity, offers relatively inexpensive<br />
infrastructure for data interchange and the possibility of accessing information and eGovernment services<br />
from any place and at any time. Over the years, as the ICT evolved, eGovernment model changed. Web<br />
2.0 technologies provided new possibilities for eGovernment to become less service- and more useroriented.<br />
By incorporating Web 2.0 technologies, eGovernment can facilitate communication with users<br />
and improve the coordination of authorities within the different tiers of government. Web 2.0 brought new<br />
concepts, such as interactive information sharing, interoperability, user orientation and collaborative work.<br />
These concepts have led to creating tools and applications (blog, wiki, RSS, social networks, video<br />
networks) that enable an average user to create, publish and change content on Web. More and more<br />
people all over the globe are being drawn to the virtual world of Web 2.0. Social networks, blogs and<br />
wikis are virtual places where people are together and where governments can reach them.<br />
Governments have embraced Web 2.0 technologies, which enabled them to build a more close<br />
relationship with users and ensure their place in this new virtual era. EGovernment concept has evolved<br />
under Web 2.0 influence into eGovernment 2.0. But this was not the end of the road. Soon after adapting<br />
to new technology concepts governments were able to achieve more open and transparent relations with<br />
users. This influenced the creation of a new concept named Open Government. Opening governments<br />
towards citizens is one of the major goals recognized all over the world. Participation, collaboration and<br />
transparency are recognized as the most important features of Open Government.<br />
Various benchmarks exist for each phase of eGovernment development and are suited for measuring<br />
specific government goals. In eGovernment 1.0 focus was put on twenty basic public services and a set<br />
of indicators that reflect the levels of services development. As eGovernment evolved and started its<br />
transition towards eGovernment 2.0, new benchmarks appeared that were more oriented to user<br />
experience and specific government services. When the transition to eGovernment 2.0 was finished, new<br />
focus was brought to user's needs and public data. This caused the necessity for new changes in<br />
benchmarking models. For eGovernment 2.0 evaluation, Osimo proposed a model in which twenty basic<br />
public data should be evaluated against reusability and transparency, giving the final assessment of data<br />
availability (Osimo 2008b). Open data movements rising in the United States and in Europe soon after,<br />
caused further improvements of the eGovernment concept in which open data is set in the focus and the<br />
opening of governments towards citizens became a new flagship goal around the world. In order to<br />
evaluate the implementation of Open Government concept we need a new benchmark that will be<br />
shaped well enough to express the level of government readiness to become more transparent,<br />
collaborative and participatory. The overall goal of this paper is to present the eGovernment Openness<br />
Index (eGOVI) as a measure of the extent one government is open. The model is developed according to<br />
571
Nataša Veljković et al.<br />
the basic characteristics of Open Government concept and according to the authors’ experience in<br />
eGovernment assessment. It should be emphasised that the model is not final, but there need to be a lot<br />
of work on its improvements. The discussion on that subject is given in the final section of this paper.<br />
2. Open government<br />
Since the development of the Internet and understanding of its impact on society, eGovernment has<br />
started entering the virtual scene and making its place in virtual community. At first, eGovernment meant<br />
simple presence of state government on the Web, in the form of an informative web site, but in time the<br />
concept of eGovernment has evolved. Ever since, we can track its development from eGovernment 1.0 to<br />
Open Government.<br />
eGovernment, when it first emerged, posed the why questions. Why do we need electronic government,<br />
why do we need electronic services? As the digital world progressed, eGovernment has been refreshed<br />
and modernized and eGovernment 2.0 has entered the scene. EGovernment 2.0 is more related with the<br />
how and not why. How to provide better services, how to serve citizens faster and more efficiently, how to<br />
use contemporary technology in order to meet citizens’ needs? The shift from services to citizens has<br />
happened and technologies played the wheeler role. Web 2.0 provided answers for eGovernment 2.0<br />
how questions. Governments have recognized the potential of the Web 2.0 environment in building<br />
relationships with citizens and businesses.<br />
Schellong and Girrger explain that Government 2.0 is two-fold term, it veils the new form of governance<br />
and citizen-government interaction as well as the use of Web 2.0 application in Government (Schellong<br />
and Girrger 2010). However, the prevailing opinion is that eGovernment 2.0 is a technical enhancement<br />
of eGovernment. Eggers characterized eGovernment 2.0 as the application of Web 2.0 and Enterprise<br />
2.0 applications and concepts in the public sector (Eggers 2005) and Osimo as the use of Web 2.0<br />
applications in eGovernment (Osimo 2008a). EGovernment 2.0 is more oriented to technological aspects<br />
of government. The 2.0 suffix comes from web 2.0. EGovernment 2.0 reflects government attempts to<br />
renew and modernize eGovernment and its relationship with public sector using web 2.0 technologies.<br />
eGovernment 2.0 uses the technology and innovation of Web 2.0 to address the needs of government.<br />
Open Government is the new governmental concept, set to replace eGovernment 2.0 (e-Gov 2.0). There<br />
are many implications on what the concept of Open Government represents and how it is related to<br />
e-Gov 2.0. Di Maio (2010) sees Open Government as a subset of Government 2.0. Many authors argue<br />
on this statement. Jenn Gustetic explains that Open Government wouldn't be possible without the<br />
outcomes of eGovernment 2.0 (Gustetic 2010). From his perspective Open Government is the evolution<br />
of e-Gov 2.0. Tim O’Reilly delivers the vision of 'government as a platform' and in this vision e-Gov 2.0 is<br />
the next release (O’Reilly 2010). According to Microsoft Open Government is interoperable government<br />
in which people and systems communicate freely (Microsoft 2010).<br />
Open Government and eGovernment 2.0 relate to each other more than it seems at first. Open<br />
Government is two-dimensional eGovernment, where one dimension is certainly technical, it refers to<br />
technologies that will enable its development. The other is, we can say, social and it concerns citizens<br />
and their relations to government and governmental data. Open Government is related to achieving<br />
government accountability, open records and open access to public information. Openness, as the main<br />
feature of this concept, is reflected through the notion of open data, open access to governmental<br />
information and data transparency. Open Government is about information freely available to everyone,<br />
about participation and transparency. Government is becoming more oriented towards citizens who have<br />
the possibility to interact with the government and tell the government their opinion. They are becoming<br />
requestors and creators of electronic services and moreover they are participating in government<br />
decisions by giving their opinion and attitude toward important matters. Open data is an important<br />
transparency indicator, and a must in an Open Government. Open data is governmental data of public<br />
interest that can be easily found, it is accessible and available without restrictions. Government data of<br />
public interest should be made available bit not just in any format. Given that reusable data format<br />
enables data transformation suitable to citizens’ needs, governments should turn towards publishing data<br />
in those formats.<br />
In 2009, Open Government gained more significance in the light of new events. Starting with 2009, the<br />
President of the United States of America, Barak Obama (2009), set creating an unprecedented level of<br />
openness in government as a primary goal. This goal will be achieved when the government is<br />
transformed into a transparent, participatory and collaborative entity. Following the USA government<br />
572
Nataša Veljković et al.<br />
steps, the <strong>European</strong> countries are starting their own initiatives for government openness. The EU<br />
Member states have ratified the Malmoe Declaration on the joint eGovernment strategy until 2015. A year<br />
after signing the Malmoe declaration, the EU Member State ministers responsible for eGovernment<br />
agreed on an Action Plan that will set out the path for the field of e Government up until 2015. This<br />
Action Plan aims at transition from current eGovernment to a new generation of open, flexible and<br />
collaborative eGovernment services at local, regional, national and <strong>European</strong> levels that will empower<br />
citizens and businesses. The <strong>European</strong> Commission’s main responsibility in conveying this plan will be to<br />
improve the conditions for development of cross-border eGovernment services provided to citizens and<br />
businesses regardless of their country of origin. This further requires establishing pre-conditions<br />
(interoperability, e-Signature, e-Identification) which will help strengthen the internal market and<br />
complement EU legislative acts and their effectiveness in domains such as procurement, justice, health,<br />
environment and others. In order to achieve these highly set goals, the Action Plan defines four political<br />
priorities: user empowerment, internal market, efficiency and effectiveness of government and<br />
administrations and preconditions for developing eGovernment, followed by actions identified as means<br />
for their achievement. According to this Plan, the main focus of eGovernment for the next four years will<br />
be on increasing user involvement, improving transparency and data reusability, and most importantly<br />
improving internal markets and implementing cross-border eGovernment services. From this point of<br />
view, the definition of Open Government can again be rephrased, and now we can say that Open<br />
Government represents not two, but three-dimensional eGovernment, where one dimension is technical,<br />
the second one is social, and the third one refers to collaboration between different state governments<br />
through cross-border eGovernment services. Taking this definition into further consideration, we can<br />
conclude that Open Government, analyzed on the one state government level, can be seen as a 2D<br />
eGovernment, but on the Europe, or even the World level, from the aspect of collaboration among<br />
governments, it definitely can be considered as a 3D eGovernment. So, at the same time we can talk<br />
about 2D and 3D Open Government, just from the different perspectives.<br />
In order to measure efforts put in government transformation into transparent, participatory and<br />
collaborative government we cannot use the existing benchmarks that were designed according to the<br />
old government perspective. In the next section we will analyze the possible indicators that will lead to a<br />
notion of how much one government is open, a notion we have named eGovernment Openness Index.<br />
3. Benchmarking eGovernment<br />
Benchmarking eGovernment is a very important task. According to (Schellong 2009) it indicates the<br />
progress in reaching eGovernment goals and can be used as a tool for learning, information sharing, goal<br />
setting or supporting performance management. The eGovernment benchmarks have evolved over time<br />
as the eGovernment concept changed. For each eGovernment evolution stage there is a suitable<br />
benchmark with a different set of indicators. Figure 1 illustrates indicators used for benchmarking<br />
eGovernment during its evolution.<br />
The <strong>European</strong> Commission’s “eGovernment Benchmark” (EUeGovBe), together with the UN’s<br />
“eGovernment survey” and West’s “Global eGovernment report”, belongs to the longest running efforts to<br />
track the development of eGovernment (Bullivant 1994). Since its inception in 2001, EUeGovBe has<br />
proven to be a policy accelerator among the EU Member States and beyond (Capgemini 2010). It is<br />
applied on the yearly basis in order to provide review of twenty basic public services and eGovernment<br />
progress in terms of core indicators. Over time, the EUeGovBe core indicators have changed, since it<br />
was necessary to create a dynamic measurement instrument that will retain the existing comparability<br />
and the principle of open collaboration with participating countries (Capgemini 2009). From the time when<br />
the seventh measurement was taken, back in 2007 EUeGovBe has experienced a major enhancement in<br />
measuring criteria and core indicators. In 2007 EUeGovBe benchmark consisted of a set of four<br />
indicators (Capgemini 2007): sophistication, availability of services, user orientation and national portal.<br />
In 2009 EU Member States and the <strong>European</strong> Commission decided that the benchmark had to move<br />
away from its original supply-side focus. New benchmark focus is put on the high impact service areas as<br />
well as on the usage side of eGovernment which was neglected in the previous measurements. Two of<br />
the core indicators: national portal and user-centricity are removed and instead e-Procurement and User<br />
experience have been added, reflecting a shift in policy priorities towards outcomes and impact.<br />
573
Figure 1: eGovernment benchmark evolution<br />
Nataša Veljković et al.<br />
eGovernment data was somehow left behind in the process of eGovernment 1.0 benchmarking that<br />
defined twenty basic public services upon which full online availability and sophistication were measured.<br />
From the eGovernment benchmarking perspective, the focus is slowly shifting from electronic services to<br />
transparency and reusability of open public data. Therefore in eGovernment 2.0 (Osimo 2008b) proposes<br />
a set of basic public data upon which reusability and transparency will be measured. He recommends<br />
using five level scale for evaluation of public data in eGovernment 2.0. His scale shows the extent to<br />
which public data is available on the web. Levels overview is given in Table 1, they gradually change<br />
from no data to sheer data availability and reusability.<br />
Table 1: Availability of public data<br />
Level Meaning<br />
0 No information available<br />
1 Description of the procedure to obtain the information through FOI<br />
2 Information available in non reusable, non-machine readable format<br />
3 Information available in reusable and machine readable format such as xml or dbase<br />
4 Information available as per stage 3 and visualizable through predefined tools<br />
Benchmarking Open Government is something that will have to be addressed in the light of new policies<br />
and action plans. The existing Open Government benchmarking frameworks focus only on data<br />
reusability but there are also several other aspects for assessing government openness that need to be<br />
addressed. Indicators for measuring government openness should reflect three main principles of Open<br />
Government: transparency, participation and open data. In the following section, will propose a model for<br />
benchmarking Open Government. The model will result with a measure which will determine government<br />
openness.<br />
4. eGovernment openness index<br />
For assessing the extent of openness of a government, there should be introduced a new measure,<br />
flexible enough to adapt to the constantly changing nature of government. We propose a government<br />
openness benchmark model, depicted in Figure 2. The model uses four indicators: basic data set,<br />
transparency, participation and maturity for calculating eGovernment Openness Index (eGOVI). First<br />
three indicators are directly derived from open governmental concepts, while maturity represents the<br />
efficiency of embracing these new concepts. The model is two-dimensional, where vertical dimension<br />
leads towards eGovernment Openness Index while horizontal towards government maturity. Further in<br />
this section we will explain in detail each indicator and dimension as well as the final measure –<br />
eGovernment Openness Index.<br />
574
Nataša Veljković et al.<br />
Figure 2: Open government benchmark model<br />
Open data published on government's web sites is used as a data source for basic data set and<br />
transparency indicators. Basic data set is the predefined set of high value data categories. These<br />
categories can vary in different countries, but in order to establish a standard assessment model it is<br />
crucial for a basic data set to be defined and adopted. Since this is a new concept, a unique basic data<br />
set still does not exist. Upon analysis of the current government portals around the world we have singled<br />
out eight most common data categories: Finance and Economy, Environment, Health, Energy, Education,<br />
Transportation, Infrastructure and Population. Data belonging to these categories could form the basic<br />
data set. Each category should be well defined so the user could know what kind of data can be found in<br />
each of them. This basic set can be modified and improved over time according to user and government<br />
needs. The assessment of this indicator requires analyses of available data on governments’ portals.<br />
Governments' portals should publish all data categories from a basic data set along with corresponding<br />
data types for each category. In that case a government can be maximally scored for the basic data set<br />
indicator.<br />
Transparency indicator is seen as authenticity, understandability and reusability of data made available<br />
on the government website. Authenticity relates to data sources, data accuracy and integrity and the<br />
degree of trust in data publishers. Non-governmental institutions and agencies that publish data should<br />
be well known, with good reputation in order for users to utilize data safely and without prejudice. For this<br />
purpose eGovernment portal should provide online catalogues of trusted data sources and allow users to<br />
rate their authenticity.<br />
Understandability of each data set as well as of contained raw data must be provided. This can be done<br />
by publishing textual descriptions of data categories which in detail explain types of data that are<br />
published under each category. Data reusability is the last transparency aspect that we are addressing. It<br />
refers to providing data in open formats so that a user can search, index and download data using<br />
common tools without any prior knowledge of data structures. Osimo proposes five level scale for<br />
measuring data availability in eGov 2.0 (Osimo 2008b) which can be slightly modified and so used for<br />
measuring data reusability in Open Government context.<br />
User involvement is a data source upon which participation indicator is used. Participation reflects the<br />
possibility for users to have impact on published data by sending feedback as well as opinion about<br />
provided data sets and data sets for future publication. This further means that users become equally<br />
significant participators in shaping legal framework and action plans of their country. Accepting the<br />
concept of openness means accepting a user whose opinion matters and can influence government<br />
decision making. Participation can be assessed based on two key aspects: user feedback and feedback<br />
influence. User feedback relates to the possibility for users to leave comments and opinions on actual<br />
575
Nataša Veljković et al.<br />
matters (laws, data sets, published data, etc.). This can be achieved via online forms, polls and content<br />
ratings. Feedback influence is reflected through considering user feedbacks by government during the<br />
process of making important decisions, law making and e-services provision. User feedback must be<br />
considered as a people's voice in the government. A government is maximally scored for this indicator<br />
only if both, user feedback and feedback influence are satisfied.<br />
Basic data set<br />
Transparency<br />
Participation<br />
Time<br />
Maturity<br />
eGOVI<br />
Finance and Economy<br />
Health<br />
Energy<br />
Education<br />
Transportation<br />
Infrastructure<br />
Population<br />
Authenticity<br />
Understandability<br />
Reusability<br />
User feedback<br />
Feedback influence<br />
E-government openess index<br />
eGOVI<br />
Figure 3: Detailed open government benchmark model<br />
The fourth indicator for measuring government openness, named maturity, is related to government<br />
readiness for changing and embracing open concepts. Timely identification of necessary changes and<br />
their application for the purpose of government evolvement is an essential element of maturity. Maturity is<br />
an indicator that is calculated using eGOVI and time necessary for government to make same change<br />
and improve its openness. This further means that government which progresses in short period is more<br />
mature than government that makes the same amount of progress but much more slowly. It can be<br />
expected that mature government makes larger progress in the upcoming period.<br />
Based on these four indicators, eGovernment Openness Index (eGOVI) is calculated. EGovernment<br />
Openness Index indicates the progress of government over time, the efficiency of recognizing and<br />
implementing new concepts, as well as the willingness of government to recognize and embrace<br />
innovative ideas. It is expressed in percentage, where 100% indicates total openness, while 0% a<br />
complete lack of openness. Indicators and their belonging aspects, used for eGOVI calculation, are<br />
presented in Figure 3.<br />
The proposed model is certainly not final. Still a lot of work can be done regarding its improvement, yet<br />
only after applying this model on governments around the world, that will be a part of our future work.<br />
5. Future work discussion<br />
Open Government benchmark model that we have proposed covers main aspects of Open Government:<br />
transparency, participation and basic data set. Besides those aspects we have included the maturity<br />
feature as government readiness to open towards new concepts. Based on those four aspects<br />
eGovernment Openness Index is calculated as a percentage of government openness. EGovernment<br />
Openness Index gives the final estimation of government's state regarding governmental efforts,<br />
readiness to timely publish open data sets, orientation towards user needs and user participation. The<br />
576
Nataša Veljković et al.<br />
maturity of eGOVI will be reached after its detailed elaboration through our future work and application on<br />
Open Government implementations. We have explained all four indicators used for determining eGOVI,<br />
but each of them needs further exploration and clarification. At first, we plan to develop metric scale for<br />
each indicator in order to obtain a numeric value indicating the degree of accomplishment of Open<br />
Government regarding that aspect. Afterwards, we will develop the final metric with percentage share of<br />
each indicator in eGOVI. With the developed metric system this model can find real world application.<br />
Our future plan is to apply the developed benchmarking model on governments around the world.<br />
However, our main concern, regarding this model, is its application on evaluating Open Government in<br />
different countries. Although this model covers every important aspect of Open Government, not many<br />
countries in the world have achieved a satisfactory level of openness in order for this model to be applied.<br />
Since the Open Government concept is in the early stages of its development it can be expected that in<br />
the short period more countries will start to embrace the concept and lift off towards Open Governments.<br />
The Serbian government is progressing very slowly towards Open Government, in fact it hasn't yet<br />
achieved e-Gov 2.0 stage (Stomenov and Veljkovic 2010). We hope that the research presented in this<br />
paper, will be a wakeup call for Serbian and other less developed governments to raise the issue of<br />
governmental development to a higher priority level.<br />
References<br />
Bullivant, J. R. N. (1994) Benchmarking for continuous improvement in the public sector, Longman, London<br />
Capgemini (2007) "The User Challenge Benchmarking The Supply Of Online Public Services",<br />
http://ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/egov_benchmark_2007.pdf<br />
Capgemini (2009) "Smarter, Faster, Better eGovernment",<br />
http://ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/egov_benchmark_2009.pdf<br />
Capgemini (2010) "Method Paper: Preparing the 9th Benchmark Measurement",<br />
http://ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/eGovernment_Benchmarking_Metho<br />
d_paper_2010.pdf<br />
Di Maio, A. (2010) September 3, "How Do Open Government and Government 2.0 Relate to Each Other?", Gartner<br />
Blog [online], Available: http://blogs.gartner.com/andrea_dimaio/2010/09/03/how-do-open-government-andgovernment-2-0-relate-to-each-other<br />
[5 Feb 2011].<br />
Eggers, W. (2005) Government 2.0: Using Technology to Improve Education, Cut Red Tape, Reduce Gridlock, and<br />
Enhance Democracy, Lanham MD: Rowman & Littlefield Publishers<br />
Gustetic, J. (2010) "E-Gov versus Open Gov: The Evolution of E-democracy", [online],<br />
http://www.phaseonecg.com/docs/egov-opengov-whitepaper.pdf [5 Feb 2011]<br />
Microsoft (2010) U.S. Government white paper: Democratizing data for open government Meeting the goals of the<br />
Open Government Directive: The national strategy for improving adult literacy and numeracy skills, Microsoft<br />
Corporation.<br />
Obama, B. (2009). "Memorandum for the Heads of executive Departments and Agencies: Transparency and Open<br />
Government", White House, [online], Available:<br />
http://www.whitehouse.gov/the_press_office/Transparency_and_Open_Government [5 Feb 2011].<br />
O'Reilly, T. (2010) "Government as a platform", In D. Lathrop & L. Ruma, eds. Open Government: Collaboration,<br />
Transparency, and Participation in Practice, O'Reilly Media.<br />
Osimo, D. (2008a) "Web 2.0 in Government - Why and How?", JRC Scientific Technical Reports, Seville.<br />
Osimo, D. (2008b) "Benchmarking eGovernment in the Web 2.0 era: what to measure, and how", <strong>European</strong> Journal<br />
of ePractice, No. 4, August 2008<br />
Punie, Y., Misuraca, G. and Osimo, D. (Ed.) (2009) Public Service 2.0 – The Impact of Social Computing on Public<br />
Services, JRC Scientific and Technical Reports; EUR 24080 EN, Seville.<br />
Schellong, A and Girrger P. (2010) "Government 2.0 in BetaPhase", CSC, [online], Available:<br />
http://assets1.csc.com/de/downloads/CSC_policy_paper_series_06_2010_government_20_beta_phase_Englis<br />
h.pdf [5 Feb 2011].<br />
Schellong, A. (2009) "EU eGovernment Benchmarking 2010+: General remarks on the future of benchmarking Digital<br />
Government in the EU", [online], Available:<br />
http://www.iq.harvard.edu/blog/netgov/papers/schellong_2009_wp_eu_egovernment_benchmarking_future_met<br />
hodology.pdf [5 Feb 2011].<br />
Stoimenov, L., Veljkovic, N. (2010) "E-Local self-government in Serbia", EGOV 2010 <strong>Conference</strong> Proceedings,<br />
August 29-September 2 2010, Lausanne, Switzerland<br />
577
Exploring Facilitators and Challenges Facing ICT4D in<br />
Tanzania<br />
Jim Yonazi<br />
The Institute of Finance Management, Dar Es Salaam, Tanzania<br />
yonazijim@gmail.com<br />
Abstract: The success of implementing information and communication technologies for development (ICT4D)<br />
requires an informed understanding of the context of application. This helps to inform decision making during<br />
identification, planning, and evaluation of ICT projects. In the African context, this is of paramount importance.<br />
However, empirical studies regarding ICT4D in Africa are still limited. This study aimed at identifying issues<br />
underlying the implementation of ICT4D in Tanzania. Specifically, it focused at identifying key priorities on ICT4D,<br />
facilitators, and challenges facing ICT4D implementation in Tanzania. The study also attempts to suggest possible<br />
measures to be taken to facilitate the progress of ICT4D for next 10 years. The results show that it is imperative to<br />
streamline ICT into the areas of i) Production and service provision ii) government iii) Health iv) Education, v)<br />
Business, and vi) the growth of SMEs. This is facilitated by i) Tax relief in ICT equipment, particularly computers and<br />
peripherals, ii) availability of low cost ICTs, iii) supportive social infrastructure, and iv) Government commitment. On<br />
the other hand, ICT4D in Tanzania is challenged by i) unsupportive connectivity infrastructure, ii) inadequate content<br />
quality, iii) unsupportive organisational issues such as policies, laws, and established systems and procedures, and<br />
iv) people related issues including inadequate ICT skills, mindset, and awareness. We observe that successful<br />
implementation of ICT4D in Tanzania is possible if facilitators can be exploited and challenges addressed. Specific<br />
issues that can be addressed are i) improving ICT connectivity, ii) enhancing content quality, iii) addressing<br />
leadership and organisational inertia, iv) emphasising on ICT effective strategic planning for ICT, v) enhancing ICT<br />
skills, awareness and mindset, and vi) cultivating innovative the culture at organisation level.<br />
Keywords: ICT, ICT4D, eGovernment, Tanzania, Africa<br />
1. Introduction<br />
In the past twenty years, we have witnessed the increasing pervasiveness ICT in our social and<br />
economic development activities (Kramer, Jenkins, & Kats, 2007). As a commodity and a facilitator, ICT<br />
is embedded in products and services we use and consume in our daily lives. As a result ICT influences<br />
all aspects of development including social and industrial development (Cole & Roman, 2003). Currently,<br />
various stakeholders including governments, international organisations, practitioners and civil societies<br />
appreciate and engage in advocating for the utilisation of ICT in the development of the human race<br />
(Yusof & Lim, 2003).<br />
Cognizant of the role of ICT in development, the Government of Tanzania and other stakeholders have<br />
embarked on various initiatives that aim at increasing the facilitation role of ICT4D activities. Typical<br />
examples have been noted in various sectors including the government, business, health, and education<br />
(IICD, 2008, Sawe, 2007). Progress in infrastructure improvement and local contents development has<br />
also been noticed (Yonah, 2005). The government plans to streamline and implement more ICT4D<br />
initiates across the country (URT, 2003).<br />
Although Tanzania is continuing to invest in ICT4D, the country has not made significant progress in this<br />
direction (UN, 2008). However, few studies (e.g. Mutagayhwa, Kinyeki, Ulanga, 2007) have assessed the<br />
ICT4D situation and provided relevant recommendations relevant to the country. We could not notice a<br />
study regarding facilitators and challenges of ICT4D in the country. Accordingly, this aimed at exploring<br />
the current ICT4D priorities in Tanzania; and establishing key areas, potential to determine the success<br />
or failure of ICT4D in the country. Recommendations will also be given on how the identified issues can<br />
be approached in Tanzania.<br />
2. Method<br />
This research adopted a grounded theory approach - GTA (Strauss & Corbin, 1990). In GTA a researcher<br />
is facilitated to inductively derive meanings from data by systematically utilizing a set of procedures<br />
(Strauss & Corbin, 1990, p.24). Several reasons were considered to influence this choice. First the ICT4D<br />
concept is still new in Tanzania. Therefore, the actual meaning of what respondents and other data<br />
sources inferred needed to be interpreted rather than predetermined. Secondly, we anticipated to<br />
encounter data availability challenges especially from the government organizations. Thirdly, the study is<br />
was intended to identify issues typical to Tanzania. Therefore, it was wise to study the context inductively<br />
rather than imposing theoretical propositions.<br />
578
Jim Yonazi<br />
Various sources contributed data into this study. These include ICT practitioners, non-ICT practitioners<br />
and ordinary ICT users. We also collected data through observation and analysed various documents.<br />
ICT practitioners provided us with insights of how ICT is being currently applied in development<br />
initiatives. Other sources provided us with referential information concerning ICT4D in Tanzania.<br />
Interviews, workshops, and focus group discussions (FGDs) were used to collect opinions and<br />
experiences from both experts and users. Observations were made during researcher’s site 1 visits and<br />
participation in a government meeting 2 . Literature-based sources such as policies, and reports and other<br />
recorded evidences were analysed at the beginning of the study and at the end of data collection.<br />
Interviews were useful for capturing personal accounts of the respondents, while FGDs were instrumental<br />
in revealing and discussing new issues and clarifying doubts. Literature based sources were consulted to<br />
provide us with recorded and historical evidences.<br />
Data were collected from four regions in Tanzania; Dar es Salaam, Morogoro, Mwanza and Zanzibar. We<br />
selected Dar es Salaam because it is the main business city of Tanzania, while Morogoro and Mwanza<br />
were relevant sources to represent other regions in Tanzania with less business activities as compared to<br />
Dar es Salaam. Zanzibar provided us with information from the other side of the Union of the United<br />
Republic of Tanzania (URT)3.<br />
The selection of potential respondents was done by first contacting professionals from the President’s<br />
Office Public Services Management, Tanzania Global Development Learning Centre, and SWOPNET 4 .<br />
The professionals were interviewed and requested to suggest other potential respondents. This method<br />
helped to reduce researcher’s biasness in selecting respondents because the researcher had no control<br />
of who will be invited hence minimise biasness.<br />
2.1 Data capturing procedures<br />
We interviewed ICT experts as well as ordinary users. Interviews were arranged to take place at<br />
respondents’ most convenient locations, while those in distant places (e.g. in the diasporas) were<br />
contacted by various ICT means (e.g. phone or skype). We used semi structured interview guides to<br />
facilitate the flow of the interviews. All interviews were recorded except when respondents felt<br />
uncomfortable with this approach. We conducted 29 (Table 1) interviews, and each had an average<br />
duration of 80 minutes.<br />
Table 1: Interview respondent profile<br />
Category Number<br />
Government 13<br />
Private Sector 6<br />
Diaspora 5<br />
NGOs 3<br />
International organisations 2<br />
Total 29<br />
We conducted three main workshops during this research. Additionally, we organised one purposeful<br />
FGD with respondents from the Commission of Science and Technology (COSTECH). At the beginning<br />
of each workshop and FGD we provided an introductory presentation to familiarise the participants with<br />
the research topic, aim, and the information they were expected to contribute. We then divided the<br />
participants into smaller discussion groups, and given them 40 to 60 minutes for discussion. Each group<br />
was given an FGD guide to facilitate the discussion. Later, a joint group discussion was convened,<br />
whereby groups presented their findings. This approach was useful because it facilitated active<br />
participation, probing, and clarification of unclear concepts.<br />
2.2 Data analysis<br />
We used the Straus and Corbin’s (1990) framework of data analysis. The process was facilitated by<br />
means of qualitative data analysis software, Atlas.ti. The software was used to manage data, code,<br />
1<br />
Site visits to TGDLC, Mwanza Municipal Council, Internet cafes in Dar es Salaam, Morogoro, and Zanzibar<br />
2 rd<br />
E-government Meeting held at Utumishi on 3 March, 2009<br />
3<br />
Tanganyika and Zanzibar united in 1961 and formed URT<br />
4<br />
Sharing With Other People Network<br />
579
Jim Yonazi<br />
analyse, and relate the emerging themes. Figure 1 shows an example on how the category ‘challenges’<br />
was arrived at.<br />
Table 2: Workshop participants profile<br />
Category Number<br />
Government 9<br />
Private Sector 14<br />
Academia 10<br />
UN 3<br />
Coos 4<br />
Total 40<br />
Figure 1: Example of coding in Atlas.ti<br />
3. Results<br />
3.1 Facilitators of ICT4D<br />
We define the facilitators as factors which provide a favourable environment for the successful application<br />
of ICT4D in a particular context. Understanding such factors informs ICT4D practitioners on issues that<br />
can be exploited or influenced when planning or evaluating ICT4D related initiatives. In this study we<br />
identified that the current facilitators of ICT4D in Tanzania are (1) affordability, availability, and adoption<br />
of ICTs, (3) Supportive social infrastructure (levels of literacy and Kiswahili as a homogenous national<br />
language), and (4) presence of government will.<br />
3.1.1 Affordability, availability and adoption of ICTs<br />
The government removed the Value Added Tax (VAT) on computers in July 2000 (Miller et al, 2004).<br />
VAT was 20% until July 2009 when the government reduced it to 18% (UTR, 2009). As a result the cost<br />
of computers decreased and facilitated the uptake of ICTs in the country. This is especially evident in the<br />
urban areas where the number of internet access points (e.g. cybercafés), and the ownership of personal<br />
computers has increased. Second-hand computers can be bought from a price of TSh. 150,000 (about<br />
USD 150). This price can allow ordinary people, particularly in urban areas, to own a computer at home.<br />
However, it is still too expensive for the poor in rural regions, and low income people in the urban areas.<br />
580
Jim Yonazi<br />
The availability of low cost mobile phones, with a basic model from as little as TSh. 20,000 (about USD<br />
20) has also resulted in widespread penetration.<br />
“I recall there were hardly any cybercafés back in June 2000 which is when the tax on<br />
computers was lifted. It was an ethinkTankTZ initiative during our first year of existence. We<br />
sent a small delegation to meet the Minister of Finance around April or so that year. We<br />
prepared a paper describing the advantages of increasing the penetrationn of IT as opposed<br />
to targeting IT for Taxation. The boom of cybercafés is one of the advantages of the VAT<br />
relief on computers.” R.1.<br />
3.1.2 Availability and adoption of technologies<br />
Technologies with high domestication potential are those which ordinary households can acquire and<br />
own. Currently, technologies such as TVs, radio and mobile phones are widely available in Tanzania<br />
(TCRA, 2009). Many citizens have demonstrated that they are willing to adopt new technologies as seen<br />
in the sharp increase of mobile phones between 2000 and 2008 (Table 3). We noticed the increase of<br />
TVs, and radios in rural areas. The availability of such technologies, and the willingness to use them,<br />
allows more citizens to access information. They also facilitate users to advance their lifestyle and<br />
economic activities. This plays an important role in development as evidenced below.<br />
“Advancement in technologies is a facilitating factor. People have been fast in adopting<br />
technologies. For instance, currently we have more than 10 million mobile phone<br />
subscribers. Many people including secondary school pupils have and use mobile phones”.<br />
R2.<br />
3.1.3 Supportive social infrastructure: literacy and language<br />
Although illiteracy is still a challenge to Tanzania, 64% of the adult population can read and write (CIA,<br />
2009) and most can read, speak, and write Kiswahili. The existence of one national language has<br />
contributed to political and economical stability (Mukuthuria, 2006). If adequately exploited, the use of<br />
ICTs and content development and advocacy in Kiswahili could reach a wider audience who could benefit<br />
from the utilization of ICT in their social activities.<br />
“Tanzania uses one language, it is easy to communicate, advocate and develop contents in<br />
a language that everyone understands. A typical example is the AIDS awareness campaign.<br />
They mainly use Kiswahili. This makes it possible to reach people even in remote areas. I<br />
think it is time that we have to shift from using English in ICT to localisation through<br />
Kiswahili.”. R.3.<br />
Table 3: Voice telecommunication subscribers (2000 - 2009)<br />
YEAR<br />
BENSO<br />
N CELTEL TIGO<br />
TTCL<br />
Fixed<br />
TTCL<br />
MOBIL<br />
E<br />
VODAC<br />
OM<br />
ZANTEL<br />
MOBILE<br />
ZANTEL<br />
Fixed TOTAL<br />
2000 - - 56511 173591 - 50000 4007 - 284109<br />
2001 - - 89056 177802 - 180000 6501 - 453359<br />
2002 - 120089 160000 161590 - 300000 26770 - 768449<br />
2003 - 320000 210000 147006 - 700000 68000 - 1445006<br />
2004 - 504000 303000 148360 - 1050000 85000 - 2090360<br />
2005 - 882693 422500 154420 - 1562435 96109 - 3118157<br />
2006 - 1516832 760874 150897 6390 2975580 355246 747 5766566<br />
2007 3300 2505546 1191678 157816 72729 3870843 678761 5453 8486126<br />
2008 3000 3862371 2569527 116265 105804 5408439 1057652 7544 13130602<br />
2009 3101 4910359 4178089 157321 115681 6883661 1378595 15601 17642408<br />
Source: TCRA (as at December, 2009)<br />
3.1.4 Presence of government will and support<br />
Several aspects which indicate the presence of government will were observed. These include high-level<br />
policies and support, and establishment of coordination and implementation government organs. We<br />
summarise the indicators in table 4.<br />
581
Jim Yonazi<br />
Table 4: Indicators of the presence of government will and support on ICT4D in Tanzania<br />
Indicator Example<br />
Recognition of the value of ICT<br />
at the national top priority<br />
policies and strategies<br />
Establishment of ICT<br />
coordination and regulatory<br />
machinery<br />
Involvement of top level<br />
leadership<br />
3.2 Challenges facing ICT4D in Tanzania<br />
The value of ICT in Strategy for Growth and Reduction of Poverty (2005),<br />
National ICT policy (2003) and other sectoral policies such as the ICT policy<br />
for basic education (URT, 2007).<br />
Ministry of Universal Communications Services Access Fund, Ministry of<br />
Communications, Science, and Technology, Commission of Science and<br />
Technology (COSTECH), and Tanzania Communications Regulatory<br />
Authority<br />
Memorandum of understanding signed by H.E. Jakaya Mrisho Kikwete, the<br />
President of Tanzania, and the Chairman of Microsoft, Mr. Bill Gates in 2006<br />
We identified four categories of issues possible to challenge ICT4D in Tanzania. These include<br />
connectivity, content (service) issues, organisational, and people related challenges.<br />
3.2.1 Inadequate connectivity<br />
Connectivity challenges relate to the difficulties that organisations or individuals encounter when<br />
deploying or accessing ICT enabled initiatives. We related this issue to the inadequacy of the current ICT<br />
networks and other supporting in the country (Table 5). Typical examples are the lack of availability and<br />
the spread of broadband, the lack of electricity, and even the limited coverage of mobile phone networks.<br />
ICT equipment, especially computers, are still not widely available, particularly in the rural areas. This<br />
impedes the possibility of stimulating demand and deployment of ICT4D initiatives across the country.<br />
Table 5: Tanzania Infrastructure Index, 2008<br />
Element<br />
Value<br />
Internet per 100 users 1.00<br />
PC per 100 users 0.93<br />
Cellular subscribers per 100 users 14.78<br />
Main telephone lines per 100 0.40<br />
Users broadband per 100 users …<br />
E-readiness index 0.2929<br />
Regional average e-readiness index 5<br />
0.2879<br />
World average e-readiness index 0.4514<br />
World leader e-readiness index 6<br />
0.9157<br />
Source: Source: UN, 2008<br />
3.2.2 Content quality<br />
The quality and quantity of the existing ICT enables services are yet to meet user expectations. For<br />
instance much of the content, except news websites and blogs, is infrequently updated and also is not<br />
local. Specific examples include the obsolescence of links and tender information on government<br />
websites. These elements are often left unattended even when they are no longer useful. Other possible<br />
content quality issues include insufficiency and fragmentation of the provided services or information.<br />
Additionally, most of the websites, including government websites, are written in English. While English is<br />
the official language, most ordinary Tanzanians speak Kiswahili. Consequently, the available content is<br />
not perceived to be local. Other service related issues include lack of responsiveness, incompleteness,<br />
lack reliability and dependability.<br />
3.2.3 Organisational challenges<br />
Organisational challenges refer to the characteristics or issues which determine the aggressiveness and<br />
progress of an organisation towards ICT initiatives. Issues related to this category are the lack of<br />
leadership, organisational inertia, inadequate planning, and unsupportive processes. Projects with strong<br />
leadership conviction and commitment were succeeded (e.g. the Sengerema community centre project).<br />
5 East Africa<br />
6 Sweden<br />
582
Jim Yonazi<br />
Other projects stagnated when committed leadership ceased (e.g. the Kilosa community centre project).<br />
This situation is evidenced below:<br />
“Leadership is another important challenge. I will also give you an example. The District<br />
Executive Director for Kilosa went to Sengerema and wanted a similar project in her area.<br />
That was done successfully. However, after she was transferred to another area support<br />
problems started. People started calling even the local radio by her name. Madiwani 7 were<br />
divided such that diwanis from distant areas where the community radio cannot be heard did<br />
not want to contribute to the sustainability of the radio”. R.4.<br />
Equally, inadequate planning; unsupportive policies, practices and processes; and organisational inertia<br />
affect the application of ICT in development activities. These issues have also been observed by other<br />
researchers (e.g. Mutagahywa, et al., 2007). For example; inadequate planning has lead to lack of<br />
implementation of the National ICT Policy (URT, 2003). Consequently, no responsibility was assigned to<br />
any government body. The NIP remains a legacy document with minimal interpretation and<br />
implementation. The situation is similar at sectoral levels with exception of the Ministry of Education and<br />
Vocational Training (URT, 2007). We could not identify other sectoral strategy was available on how NIP<br />
will be implemented. One of our respondents cites this issue:<br />
“I think many people are yet to be knowledgeable about ICT projects. For this reason they do<br />
not know even how to write good ICT policies. The unsupportive ICT policies that we have<br />
are results of such poor skills.” R.5.<br />
3.2.4 People-related issues<br />
Three people-related issues were identified to be important for the application of ICT4D- adequacy of ICT<br />
skills, ICT awareness, and mindset. Although various initiatives are being deployed in Tanzania, many<br />
Tanzanians, especially in the rural areas, do not have adequate skills and awareness to operate ICT<br />
equipment, especially computers. Equally, organisations including the government do not have sufficient<br />
skilled people to drive the application of ICT in development initiatives.<br />
The third issue relates to unsupportive mindsets particularly among the older generation presently in<br />
decision-making positions. This may have a historical reason as the Government of Tanzania banned the<br />
use and importation of ICTs (e.g. TVs, computers) in the early 1970s. As a result, the ownership and use<br />
of these technologies was perceived to be illegal and luxury. The long term effect has been that decision<br />
makers lack the power to conceptualise and exploit the potential of ICT in development. This culminates<br />
in a limited number of ICT initiatives, limited utilisation of ICTs in development initiatives, and inadequate<br />
support, prioritisation and advocacy of ICT from the policy, implementation, and use levels.<br />
“The perception of people as well as the general public has to change. Tanzania is yet to<br />
grasp the importance of ICT. It is mostly regarded as a luxury rather than an important<br />
developmental tool. Many leaders are not aware of ICT potentials. This makes it difficult for<br />
them to put ICT as one of the priority issues in their activities. As a result ICT initiatives face<br />
some difficult bureaucracies. This is one of the major problems.” R.6.<br />
4. Recommendations<br />
Tanzania’s Vision 2015 has the country’s overarching development ambition for about 10 to 15 years.<br />
The vision is intended to be delivered through country’s MDGs, MKUKUTA, MKURABITA, national and<br />
sectoral policies, e-Government strategies and the Universal Communications Services Access Fund.<br />
Accordingly, we use our findings to synthesize recommendations to facilitate such efforts. Our<br />
recommendations include the identified ICTD facilitators, and the need to overcome the highlighted<br />
challenges. Although, the government has the sole responsibility for harnessing ICT4D, it may not<br />
achieve this goal alone. Joint efforts and collaborations from other stakeholders are necessary. Hence,<br />
our recommendations are relevant to the government, others current and future stakeholders of ICT4D in<br />
Tanzania.<br />
4.1 Exploiting existing opportunities<br />
Tanzania can benefit from the production and utilisation of ICTs. While utilisation of ICT in various sectors<br />
has been increasing, production of ICT is still underdeveloped. We therefore recommend that the<br />
government should strategise and encourage local production of ICTs. Although hardware production is<br />
7 Madiwani means local councillors<br />
583
Jim Yonazi<br />
time and investment intensive, software and applications development can be prioritised. Experiences in<br />
attracting investors in other sectors (e.g. tourism) can be used to benefit the ICT sector.<br />
At a national level the government has demonstrated its intent and willingness towards ICTs through the<br />
establishment of policies, strategies and coordination structures. These efforts need to be propagated<br />
more widely. Awareness should be raised at the community, organisational and local government levels<br />
where ICT implementation has to take place. This will facilitate the incorporation of ICTs into various<br />
development initiatives.<br />
Various development projects are being deployed across the country. However ICT deployment is still<br />
limited. The government can take the advantage of the existing coordination and regulatory structures to<br />
influence the integration of ICT into development initiatives. For instance, by collaborating with other<br />
ministries, departments, agencies and others, the MCST can foster the integration of ICTs into other<br />
large-scale projects such as road construction, and water supply. A road project may include the laying<br />
down of fibre cable to expand connectivity. Other collaborative strategies such as shared infrastructure<br />
and shared ICT skills training could also be considered.<br />
The VAT relief on computers has contributed to increased availability of ICTs and related services in<br />
Tanzania. The possibility of extending such measures to other areas of ICT should be considered,<br />
particularly those with high domestication potential. This will facilitate the spread, availability, and<br />
adoption of ICT in many other development activities. In addition, awareness should be raised about the<br />
VAT relief presently available. This can help to stimulate the use of ICT4D across the country.<br />
Existing educational levels and Swahili homogeneity were contextual facilitators identified during the<br />
research. Such and other similar factors need to be identified and exploited.<br />
4.2 Tackling the challenges<br />
The government has the responsibility for constructing reliable and adequate ICT access for the country.<br />
This relates to ICT networks and supporting infrastructure such as electricity and roads. However,<br />
because such initiatives may take a long time and resources are scarce, we recommend that ICT4D<br />
stakeholders should start integrating existing infrastructure for channelling services and advance the<br />
reach of ICT4D to a larger population. Specific emphasis should be put on the use of widely available<br />
technologies such as mobile phones, TV and radio. In addition, the use of alternative sources of energy,<br />
e.g. solar energy, should be considered.<br />
Service delivery needs to be adapted to meet the needs of local communities in an appropriate manner.<br />
Simplicity is required in terms of language and ease of use, usefulness and comprehensiveness.<br />
Responsiveness and reliability should also be promoted. The quality of websites needs to be improved<br />
through contents localisation, specifically in the use of Kiswahili. Existing content provision is limited and<br />
fragmentary - efforts should be made to increase the quantity of ICT based services. This will contribute<br />
to the completeness, sufficiency, and usefulness of the provided services, mainstreaming ICTs into<br />
citizen’s social-economic activities.<br />
ICT4D initiatives require strong, persuasive, and committed leadership. However, it may not be easy to<br />
achieve such leadership in every project. Mentoring and incentive schemes should be used to promote<br />
innovation in ICT4D. Mentoring combines training and coaching of stakeholders to understand and<br />
practise ICT4D. Incentive schemes can be used to coerce or attract stakeholders to adopt ICT4D<br />
activities. Schemes can take the form of sanctions or rewards towards ICT utilisation and innovation. This<br />
will attract and encourage leaders to engage and adopt ICT in development initiatives, and reduce<br />
organisational inertia.<br />
Other issues which may cause organisational inertia need to be identified and addressed. Issues such as<br />
unsupportive policies, regulations and procedures need to be reformed. Models used in other<br />
crosscutting issues such as gender advocacy and reforms can also be studied and used to highlight and<br />
fast track such reforms.<br />
As ICT4D is a crosscutting issue, more emphasis should be placed on intra- and inter-organisational<br />
collaborative planning involving a broad range of stakeholders. This will allow the identification of needs<br />
and priorities, as well as available opportunities for collaboration (e.g. standards, services, and<br />
584
Jim Yonazi<br />
infrastructure development). Multi-stakeholder models applied in other successful sectoral projects can<br />
be used where appropriate.<br />
Addressing these issues will require a combination of approaches. In the short term, ease of use should<br />
be prioritised. This may involve designing simplified and ease to use services which people can use to<br />
build their skills and encourage adoption. However, in the longer term, the government needs to<br />
emphasise ICT training into the country’s education system and workforce training. This will enhance<br />
citizens’ ICT skills, and ensure availability of skilled ICT labour to facilitate ICT4D. The government needs<br />
to establish a sustained ICT awareness campaign for mindset change, as has been done in other sectors<br />
such as health in fighting HIV/AIDS. People need to be reminded, convinced, and continually persuaded<br />
about the benefits of ICTs. Spontaneous and periodic campaigns will not produce expected results.<br />
More innovative research is required to understand and develop the most relevant solutions for<br />
communities. The establishment of centers of excellence in ICT is recommended as one possible<br />
approach. Such centers can be useful for providing advice and practical solutions concerning ICT4D.<br />
5. Conclusion<br />
In this study we have identified issues possible to facilitate and challenge ICT4D in Tanzania. We<br />
conclude that it is possible to successfully implement ICT4D in Tanzania. However, it is important to<br />
understand and exploits the facilitators, while addressing the challenges in favor of ICT4D. This is can be<br />
achieved though joint efforts of the government and other stakeholders of ICT in Tanzania. A specific<br />
attention need to be paid on collaborative planning between government Ministries, Departments, and<br />
agencies. This will facilitate the integration of ICT projects in other development projects. Otherwise,<br />
fragmentation and duplication of initiatives will continue and cause unnecessary over expenditure and<br />
loss of public resources.<br />
6. Appendix 1: Open coding list from Atlas.ti<br />
Administrative inertia challenge<br />
Appropriate technologies<br />
Challenge - Appropriate Financial Allocation<br />
Challenge - Awareness<br />
Connectivity<br />
Corruption<br />
Equipment<br />
Expertise<br />
Financial<br />
ICT literacy<br />
Illiteracy<br />
Leadership<br />
Local content<br />
Mindset<br />
Organizational inertia<br />
Planning<br />
Policy<br />
Political will<br />
Procurement process<br />
Resistance to change<br />
Updating<br />
Viruses<br />
585
Current ICTs<br />
Facilitating access<br />
Facilitator - Cheapness of technology<br />
Coordinating ministry<br />
Education<br />
high adoption rate<br />
One language Kiswahili<br />
Tax relief<br />
technology-need fit<br />
ICT applications<br />
Information Management<br />
Key responsibility<br />
Less use in agriculture<br />
education<br />
financial services<br />
Government<br />
health<br />
ICT application<br />
in manufacturing<br />
private sector<br />
in rural development activities<br />
specialized social services<br />
Less utilization<br />
Less utilization in SME<br />
Most relevant technologies<br />
Purpose of ICT<br />
Recommending - ICT R & D<br />
Access Fund<br />
adoption factors<br />
Benchmarking<br />
Business Process<br />
Outsourcing (BPO)<br />
coordination<br />
government commitment<br />
human capacity development<br />
ICT Curriculum<br />
ICT education and training<br />
ICT supportive policy<br />
implementation plan (planning)<br />
Jim Yonazi<br />
586
incentives<br />
infrastructure improvement<br />
leadership commitment<br />
Local content<br />
Mindset change<br />
on advocacy style<br />
Open Source<br />
prioritization of ICT communication<br />
relevant application<br />
sharing of infrastructure<br />
simple initiatives<br />
stakeholder involvement<br />
tax rate cut<br />
top leadership buy in<br />
Respondent information<br />
Jim Yonazi<br />
Unable to own ICT<br />
Agriculture<br />
business transaction<br />
commerce<br />
Communication<br />
development<br />
education<br />
Entertainment<br />
financial services<br />
governance<br />
health<br />
information management<br />
infrastructure development<br />
job creation<br />
land management<br />
Marketing<br />
Media<br />
Mining<br />
office productivity<br />
security and safety<br />
Social life<br />
travel and tourism<br />
References<br />
CIA, 2009, ‘The World Fact Book: Tanzania. CIA, Retrieved February 14th 2009, from<br />
https://www.cia.gov/library/publications/the-world-factbook/geos/tz.html<br />
CIA., 2006 ‘The World Fact Book: Tanzania’. CIA, Retrieved November, 21, 2006, from<br />
https://www.cia.gov/library/publications/the-world-factbook/geos/tz.html<br />
587
Jim Yonazi<br />
Cole, R.P., Roman, R., 2003, ‘ICT4D : a frontier for higher education in developing nations’, Journal of Africa and<br />
Asia Studies, Vol. 2, pp. 381 – 420<br />
IICD, 2008, ‘IICD supported programme: Telemedicine – Tanzania’. IICD. Accessed, 12 th Feb, 2009, from:<br />
http://www.iicd.org/projects/tanzania-telemedicine<br />
Kramer, W.J, Jenkins, B., Kats, R.S., 2007, The role of Information and Communication Sector in Expanding<br />
Economic Opportunity. Corporate Social Responsibility Initiative Report No. 2. Cambridge MA, Kennedy<br />
Schools of Government, Harvard University<br />
Miller, J., Kartano, K., Ntiro, S., 2004, ‘ICT investment Opportunities in East Africa: Country Specific Market Analysis<br />
– Tanzania’, International Finance Corporation. Accessed November 20, 2006, from<br />
www.trigrammic.com/downloads/new2005/Tanzania%20Report.pdf<br />
Mukuthuria, M., 2006, ‘Kiswahili and Its Expanding Roles of Development in East African Cooperation: A Case of<br />
Uganda’, Nordic Journal of African Studies, Vol. 15, No. 2, pp. 154–165<br />
Mutagayhwa, B., Kinyeki, C., Ulanga, J., 2007, A Review of E-Government Related Interventions in PSRP Phase I<br />
and Advice on a Strategy Framework Towards PSRP Phase II, POPSM, Dar Es Salaam, Tanzania<br />
Sawe, D., 2007, Serikali Mtandao; madhumuni, matatizo, mafanikio, na changamoto, POPSM, Dar Es Salaam,<br />
Tanzania<br />
Straus, A & Corbin J. 1990, Basics of Qualitative Research: Grounded theory Procedures and Techniques, SAGE<br />
publications, USA<br />
UN, 2008, E-Government Survey 2008: From E-Government to Connected Governance, United Nations, New York.<br />
URT., 2009, ‘Hotuba ya Waziri wa Fedha na Uchumi Mhe. Mustafa Haidi Mkulo (Mb.), Akiwasilisha Bungeni<br />
Mapendekezo ya Serikali Kuhusu Makadirio ya Mapato na Matumizi kwa Mwaka 2009/2010.’Accessed on 3 rd<br />
July, 2009, from:<br />
http://www.mof.go.tz/mofdocs/budget/Hotuba%20ya%20Bajeti%202009%208.06.2009%20FINAL%20text.pdf<br />
URT., 2008, ‘Telecommunication Statistics as at 30th September 2008’, Tanzania Communications Regulatory<br />
Authority, Accessed on 12, January, 2009, from; http://www.tcra.go.tz/publications/telecom.html<br />
URT. 2007, Information and Communication Technology (ICT) Policy for Basic Education, URT, Dar Es, Salaam,<br />
Tanzania<br />
URT. 2006, ‘Universal Communications Service Act’, Available at:<br />
http://www.parliament.go.tz/bunge/act.php?search=2006&imageField.x=0&imageField.y=0&select2=0<br />
URT., 2005, National Strategy for Growth and Reduction of Poverty, URT, Dar es Salaam, Tanzania<br />
URT. 2003, National ICT Policy, URT, Dar es Salaam, Tanzania<br />
URT., 2000, National Poverty Reduction Strategy, UTR, Dar Es Salaam, Tanzania<br />
URT., 1998, National Poverty Eradication Strategy, Dar Es Salaam, Tanzania<br />
Walsham, G., 1993, Interpreting Information Systems in Organizations, Chichester, Wiley.<br />
Yonah, Z. (2005). ICTs as Tools for Poverty Reduction, Proceeding of the Discourse on Engineering Contribution in<br />
Poverty Reduction<br />
Yusoff, A. Y., Lim, S.Y.P. (2003). Understanding ICT4D Thematics in Malaysia: A Sourcebook, UNDP<br />
588
PhD<br />
Research<br />
Papers<br />
589
590
Maturity Models Transition from eGovernment<br />
Interoperability to T-Government: Restyling Dynamic Public<br />
Services Through Integrated Transformation of Service<br />
Delivery<br />
Mohamed Mohyi Eddine El Aichi 1, 2 and Mohamed Dafir Ech-Cherif El Kettani 1<br />
1<br />
ENSIAS, University Mohamed V, Rabat, Morocco<br />
2<br />
Information Software Development Entity, Intelcom S.A., SATEC Group, Rabat,<br />
Morocco<br />
melaichi@intelcom.co.ma<br />
dafir@ensias.ma<br />
Abstract: Transforming public services through a global, common, measurable, achievable vision and clear<br />
objectives, the use of Information and Communication Technology and referral to services focused on the citizens<br />
needs have an important effect on economic, social and cultural life across the country that extends globally. The aim<br />
of this paper is to outline the part of the transformation of government services by defining the guidelines for<br />
implementation and monitoring procedures necessary to support any model of maturity to ensure the successful<br />
transformation of public services in a safe flexible and adaptable. The model we seek to build is based on best<br />
practices in service management, governance, enterprise architecture, and implementation of Information<br />
Technology.<br />
Keywords: maturity, t-government, service management, interoperability<br />
1. Introduction<br />
The requirement to provide citizen-oriented services in a controlled manner, easy, secure, flexible and<br />
integrated approach has resulted in the presence of several maturity models that define the stages of<br />
eGovernment evolution and use various frameworks to evolve from a maturity level to the next one or<br />
within a same stage improvement. However, the absence of a shared relationship between maturity<br />
models, used frameworks and key indicators had two major consequences: ranking in eGovernment<br />
remains dependent on technological change, which compromises the convergence of transformational<br />
services. In fact, public services represent a very large scale enterprise whose mission is to provide<br />
citizen-oriented transactional services that invoke multiple canal, multiple processes, require the<br />
solicitation of several entities and respond to citizen incentives and constraints. However, they suffer from<br />
absence of a generic maturity model that all countries can adopt and the presence of numerous<br />
eGovernment maturity models which have neither procedures for ensuring systemic transformation of<br />
public services nor the motivations for the adoption of a specific model. We can notice also the absence<br />
of key performance indicators to validate the evolution from one level to another, which presents a real<br />
ambiguity with respect to the convergence of t-government models. (Mecum 2001)<br />
Another problem related to t-Government progression is the presence of various Enterprise Architectures<br />
-EA- that have been adopted and adapted by governments. Those Enterprise Architectures are<br />
systematically adapted to a specific context. They faithfully reproduce a specific model of governance<br />
and also depend on technological factors in the implementation phase. This paper is organized as<br />
follows. After this introduction, we present in the second section a synthesis on eGovernment existing<br />
maturity models, which lead to a proposed projected model that contains five stages as for standardized<br />
maturity models related to other areas. The third section presents the Government Enterprise<br />
Architectures as implemented by some countries. The fourth section discusses the transformational<br />
government approach, and our perception to implement it within the context of a service management life<br />
cycle. The forth section presents a case study for two eGovernment implementations on Morocco, in<br />
connection with the proposed model. We finnish the paper with some concluding remarks concerning the<br />
main contributions of the paper, the main deficiencies and directions for future work.<br />
2. State of art: eGovernment maturity models<br />
2.1 Research method<br />
The goal of this research is to adopt a standard approach concerning eGovernment maturity models,<br />
especially in terms of levels, in order to prospect the Transformation aspect of eGovernment. Indeed,<br />
591
Mohamed Mohyi Eddine El Aichi et al.<br />
eGovernment seems to be constantly evolving, and a number of stage models have been developed and<br />
published (Lee 2010). The methodology used in this paper consists in synthesizing most important<br />
eGovernment developmental models produced during the last decade, in order to propose a maturity<br />
model that integrates stages that will facilitate the use of a common frame of reference for eGovernment<br />
development. As this is a relatively new area, these models are presented as results of qualitative studies<br />
rather than quantitative and empirical. Maturity models are defined as “A method for judging the maturity<br />
of the processes of an organization and for identifying the key practices that are required to increase the<br />
maturity of those processes”. The eGovernment Maturity Model is a model that measures public<br />
institutions' readiness to manage and implement eGovernment (Al khatib 2009). In this section, we<br />
summarize some recognized eGovernment maturity models, then we try to map them to a standard<br />
maturity model levels like CMMI, Cobit, … and attach it to Key Performance Indicators (KPI) referenced<br />
in section 4.<br />
2.2 eGovernment developmental models<br />
Table 1 summarizes a list of developmental models recognized and adopted by government to evolve<br />
within eGovernment vision. This table doesn’t contain the exhaustive list but the most used around the<br />
world and covered at this time by my research. (Saha 2009) (Lee 2010)<br />
Table 1: eGovernment developmental models and stages (Lee 2010)<br />
Author<br />
s<br />
Gartner<br />
Group<br />
Deloitte<br />
Research<br />
Layne and<br />
Lee<br />
Hiller and<br />
Belanger<br />
United<br />
Nations<br />
Accenture Siau and<br />
Long<br />
Anderson<br />
and<br />
Henriksen<br />
Year 2000 2000 2001 2001 2001-2008 2003 2005 2006<br />
# of<br />
stages<br />
4 6 4 5 4 5 5 4<br />
1 Culti<br />
2 Web<br />
presence<br />
Info<br />
publishing &<br />
disseminat<br />
ion<br />
3 Interaction Official twoway<br />
transaction<br />
4 Transaction Transacti<br />
on<br />
5 Multi<br />
-<br />
purp<br />
Portals<br />
person<br />
nalizati<br />
on<br />
Catalog Info<br />
dissemination<br />
& catalog<br />
Two-way<br />
communication<br />
Service and<br />
financial<br />
transaction<br />
Emerging<br />
presence &<br />
enhanced<br />
presence<br />
Interactive<br />
presence<br />
Transactional<br />
presence<br />
Online<br />
presence<br />
Basic<br />
capability<br />
Service<br />
availability<br />
6<br />
7<br />
ose<br />
port<br />
als<br />
Vertical<br />
integration<br />
Vertical and<br />
horizontal<br />
integration<br />
Seamless<br />
presence<br />
networked<br />
Mature<br />
delivery<br />
Clustering<br />
presence<br />
of common<br />
services<br />
connected<br />
8 Fullintegrat Horizontal<br />
ion &<br />
enterprise<br />
transaction<br />
integration<br />
9 Transformat<br />
ion<br />
10 Political<br />
participation<br />
Service<br />
transformati<br />
on<br />
Eparticipation<br />
index<br />
Web<br />
presence<br />
Interaction<br />
Transaction<br />
Transformat<br />
ion<br />
E-<br />
Democracy<br />
vatio<br />
n<br />
Exte<br />
nsion<br />
Maturity<br />
Revolution<br />
These models present the developmental models as a sequence of stages. The numbers of stage can<br />
vary from four to six stages. The sick of those models is the absence of the manner that explains how<br />
citizen oriented service can be managed (Kim 2009). Some of those models combine the state of<br />
eGovernment evolution and the eGovernment finality. For example, E-democracy (Siau Long model), or<br />
592
Mohamed Mohyi Eddine El Aichi et al.<br />
E-participation (Hiller and Belanger model) can be considered as goals of eGovernment vision rather<br />
than the last stage in eGovernment life cycle. EGovernment evolution can be obtained through Web<br />
presence (information need), transactions level (customer need) and transformation (citizen earned<br />
value).<br />
2.3 Standardization of eGovernment maturity model<br />
One needs to have a generic eGovernment maturity model that matches 5 levels like other standards<br />
maturity models applied to all kinds of government and under a governance vision (Tamara 2010). Each<br />
level is defined with some required processes and attached KPIs to ensure the real classification and<br />
ranking. The targeted capability maturity levels are defined below:<br />
Level 1 “Government Presence”: it is an evidence that the government has recognized that the<br />
Business alignment needs to be addressed through ICT. However, there are neither actions nor<br />
approaches that tend to be applied. There are no formal actions to communicate the eGovernment<br />
initiatives to its context. This level contains web site initiatives for each department. The goals,<br />
design, content depend on persons. The web site can be static or dynamic. The customer must be<br />
adapted to each web site navigation, information and vocabulary.<br />
Level 2 “Online Services”: The eGovernment Vision is defined and it is integrated to the business<br />
strategy. Defined and documented online services are provided to customers through ICT<br />
implementation. The eGovernment vision, policies and strategy have been communicated and<br />
understood by all employees. The web site presence is organized, standardized and enforced with<br />
multiple digital services (applications centric). Customers must be adapted to digital service structure<br />
and can get their need through services solicitation.<br />
Level 3 “Consolidate Transformational Services”: The eGovernment Vision is fully citizen concentric.<br />
The need to optimize citizen requests requires restyling public services design and architecture by<br />
enabling the transformation. This transformation implies a radical architecture review by making<br />
integrated horizontal and vertical public’s services architecture. In this level, governments must<br />
document the motivation for citizen oriented services, define clear objectives and scope, the<br />
dependence and constraints related to each new service. Another related Key to this level is the<br />
importance to redefine transaction scope by making more offering service and less requested<br />
service. The government in this level manages the citizen needs (Service centric). Citizen has<br />
motivation, empowerment, knowledge and competence to use new transformed services based on<br />
unique government portal. At this stage, the use of adopted Enterprise Architecture models is<br />
required.<br />
Level 4 “Rethought Government”: The vision, objectives and deployed public services are periodically<br />
inspected and verified through Key Performance Indicator (KPI) and Service Level Agreement (SLA).<br />
The goal is to measure the deviation between the offer and demand of transformed services and the<br />
new citizen requirements. This stage can use the e-participation services, other shared services like<br />
social and collaborative services and dashboard to manage the whole cooperation between<br />
governing and governed person.<br />
Level 5 “T-Gov improvement”: The vision is periodically reviewed according to citizen needs,<br />
bottleneck and technologies evolution. The strategy and policies are periodically updated according<br />
to feedback through e-participation and other shared or social services. The strategy process is<br />
continuously compared with the industry standards and improved. Resources assigned to the t-Gov<br />
initiatives are periodically adjusted according cost/benefit analysis (ROI) and citizen satisfaction. The<br />
final goal of this level is to transfer the public services knowledge to the citizen (Citizen<br />
Empowerment). Citizens can develop their own services (contributors), optimize the service’s<br />
utilization, share learned lessons and experience with others, and tell governments how they can<br />
improve services efficiency.<br />
3. eGovernment from an Enterprise Architecture view point<br />
Architecture at the level of an entire organization is commonly referred to as “Enterprise Architecture<br />
(EA)”. An “enterprise” can be defined as any collection of organizations that has a common set of goals. It<br />
consists in people, information, and technologies that perform business functions and has a defined<br />
organizational structure. (Lathrop 2010)<br />
Enterprise architecture is a conceptual framework that describes how an enterprise is constructed by<br />
defining the components and their relationship. It is a coherent set of principles, methods, and models<br />
593
Mohamed Mohyi Eddine El Aichi et al.<br />
that are used in the design and realization of an enterprise’s organizational structure, business<br />
processes, information systems, and infrastructure. Figure 1 schematizes the Enterprise Architecture<br />
Components relationship.<br />
Figure 1: Enterprise Architecture relationship<br />
3.1 Government Enterprise Architecture<br />
Government Enterprise Architecture (GEA), according to the main government objectives, aims to<br />
improve the quality of public services by understanding, defining, illustrating the new services, and<br />
clarifying how the information resources will contribute. This architecture is a model of references<br />
(guidelines, tools) that are made available to government entities, enabling them to position their projects<br />
and anticipate opportunities for resources share and reuse (Dyer 2009). Therefore, the objectives of the<br />
government enterprise architecture are:<br />
Improve coherence in government and facilitate the transformation;<br />
Provide guidance on four components Affairs, Information, Applications and Technology<br />
Infrastructure and Security.<br />
Allow the identification of elements that are common or can be shared or re-used by departments and<br />
agencies;<br />
Understand, define, illustrate and integrate new services to citizens.<br />
3.2 Scope of the architecture<br />
The government enterprise architecture is intended to clarify the structure of the following elements:<br />
Description of service model delivery and general principles;<br />
Definition of specific principles, concepts and approaches;<br />
Identification of potential combinations of products or services;<br />
Representations in the form of models, components, business information and Applications;<br />
594
Mohamed Mohyi Eddine El Aichi et al.<br />
Sharing and reusing identified components and accuracy of critical success factors for<br />
implementation of the GEA.<br />
The life cycle of business is summarized on the figure 2:<br />
Run the business by planning one or more service ;<br />
Grow the business by extending the scope of existing service and creating more services;<br />
Transform the business to respond to new requirements and optimization. Optimize the service<br />
portfolio and processes solicitation.<br />
Governm& ent M anagem ent<br />
Business<br />
Opportunities<br />
Planning<br />
D es ign & D eliv ery<br />
Run the Business<br />
Business Strategy IT St r ate gy<br />
Enterprise Architecture<br />
Business Architecture<br />
Processes<br />
In fo r ma tio n<br />
People<br />
Locations<br />
BusineRun ss Othe perating Bu siness Environment and IT<br />
Run infrastructure<br />
the Business<br />
G row the B u siness<br />
IT So lutions<br />
IT A r ch itec tu r e<br />
Information<br />
A pplication<br />
Technology<br />
T ransition Plann ing a nd G o uvernance<br />
Tran sfo rm the B usiness<br />
TechnologyA vailabi<br />
li ty<br />
Figure 2: Enterprise Architecture components<br />
This life cycle is based on two components:<br />
A clear business strategy (Business maturity)<br />
An adapted IT strategy (IT capabilities) that responds to business opportunities.<br />
Enterprise Architecture is the manner to align business vision to Technology availability by planning<br />
Business Architecture and IT Architecture Items, planning and delivering Business Environment through<br />
IT infrastructure.<br />
3.3 Summary of the GEA implementation<br />
This section summarizes the Government Enterprise Architecture as implemented by top ranking<br />
countries in eGovernment. There are two major adoptions to achieve eGovernment evolution (Saha<br />
2009):<br />
Transforming e-gov by designing interoperability architecture (UK example). The problem with this<br />
approach is the growth of architecture complexity and investment on time while the main goal of t-gov<br />
is the resource’s optimization.<br />
Transforming e-gov by adopting combined enterprise architecture with Maturity models (USA, ...).<br />
This approach depends on technologies adoption and capabilities evolution. A clear vision<br />
(eGovernment maturity) is a predominate key to success with this approach (Singapore as an<br />
example)<br />
595
Mohamed Mohyi Eddine El Aichi et al.<br />
Table 2 presents a description of the most known Government Enterprise Architecture.<br />
Table 2: eGovernment Enterprise Architecture<br />
Country Description<br />
Singapore There are four elements in Singapore Government Enterprise Architecture (SGEA):<br />
Business Architecture, Information Architecture, Solution Architecture and Technical<br />
Architecture.<br />
The BA provides common terminology for government business, while the IA and SA<br />
provide the data standards and ICT solutions for supporting the business functions<br />
identified in BA. The TA defines standards and provides guidelines on the use of<br />
technology components to support SA.<br />
The Enterprise-Wide Architecture for Value Enhancement (eWAVE) is the next evolution of<br />
the Singapore GEA efforts. The main objectives are:<br />
Better alignment between business and ICT.<br />
Increased communications and integration.<br />
Increased reuse of business and ICT assets.<br />
USA In September 1999, the Federal CIO Council published the "Federal Enterprise<br />
Architecture Framework" (FEAF) for developing an Enterprise Architecture within any<br />
Federal Agency for a system that transcends multiple inter-agency boundaries. It builds on<br />
common business practices and designs that cross organizational boundaries, among<br />
others the NIST Enterprise Architecture Model. The FEAF provides an enduring standard<br />
for developing and documenting architecture descriptions of high-priority areas.<br />
In 2001, the Federal Architecture Working Group (FAWG) was sponsoring the<br />
development of Enterprise Architecture products for trade and grants Federal architecture<br />
segments. The FEAF partitions a given architecture into business, data, applications, and<br />
technology architectures.<br />
The FEA develops a common taxonomy and ontology for describing IT resources. These<br />
include:<br />
Performance Reference Model,<br />
Business Reference Model,<br />
Service Component Reference Model,<br />
Data Reference Model and<br />
Technical Reference Model.<br />
UK UK eGovernment Interoperability Framework defines the essential prerequisites for joinedup<br />
and web enabled government. Adherence to the e-GIF specifications and policies is<br />
mandatory: they set the underlying infrastructure, freeing up public sector organizations so<br />
that they can concentrate on serving the customer through building value added<br />
information and services. The main thrust of the framework is to adopt the Internet and<br />
World Wide Web specifications for all government systems. There is a strategic decision to<br />
adopt XML and XSL as the core standards for data integration and management of<br />
presentational data. This includes the definition and central provision of XML schemas for<br />
use throughout the public sector. The e-GIF is a pragmatic strategy that aims to reduce<br />
cost and risk for government systems whilst aligning them to the global Internet revolution<br />
Canada The FEA is composed of five reference models: Performance, Business, Service, Data,<br />
and Technical. Each of the reference models represents specific aspects of the FEA, and<br />
provides a framework, or a shared language, for departments and agencies to develop<br />
technology solutions that can be used by the federal government collectively. The<br />
reference models are updated as needed to reflect changes in applications and services.<br />
596
Mohamed Mohyi Eddine El Aichi et al.<br />
Australia The AGA aims to assist in the delivery of more consistent and cohesive service to citizens<br />
and support the more cost-effective delivery of ICT services by government, providing a<br />
framework that:<br />
Provides a common language for agencies;<br />
Supports the identification of duplicate, re-usable and sharable services;<br />
Provides a basis for the objective review of ICT investment by government; and Enables<br />
more cost-effective and timely delivery of ICT services.<br />
AGIMO has adapted the established and proven Federal Enterprise Architecture<br />
Framework (FEAF) developed by the United States Government.<br />
Country Description<br />
Chile The eGov-MM model allows the evaluation of public agencies against international best<br />
practices in the area of eGovernment, including the formulation of organizational strategies<br />
and policies, management of ICT, operative management, and organizational capabilities<br />
of the organization and human resources. It also proposes specific roadmaps for capability<br />
improvement, directives about where the financial and human resources of an organization<br />
should be allocated to improve its ability to carry out eGovernment initiatives.<br />
EGov-MM and its assessment methodology were evaluated, provided with feedback and<br />
validated by expert public officials from several government agencies through a pilot study<br />
and several workshops.<br />
The absence of generic models that dress eGovernment evolution and architecture contributes to<br />
different ranking points of view. Each one takes some KPI as repository and those KPI are generally<br />
based on technological evolution, innovation and government investment. The need to get eGovernment<br />
evolution as transformation matrix is important. The next section presents this point and our perception to<br />
do design the transformation.<br />
4. Transformational Government<br />
4.1 What Is Transformational Government?<br />
Transformational Government is the use of Information and Communications Technologies (ICT) to<br />
enable thought, global and radical improvement to the public services delivery with full citizen and Market<br />
centric and results oriented. The term is commonly used to describe a government reform strategy<br />
(citizen centric) which aims to avoid the limitations which have come to be seen as associated with a<br />
traditional eGovernment strategy (application concentric).<br />
Organization for the Advancement of Structured Information Standards [OASIS] define t-Gov as :<br />
“Transformational Government…. encompasses a new "virtual" business layer within government which<br />
allows an integrated, government-wide, citizen-focused service to be presented to citizens across all<br />
channels, but at no extra cost and without having to restructure government to do so.”<br />
4.2 Why Transformational Government?<br />
Traditional eGovernment investments tend to under-deliver because they overlay technology onto the<br />
existing business model of government, based around unconnected departmental silos (i.e. with policymaking,<br />
budgets, accountability, decision-making and service delivery all embedded within a verticallyintegrated<br />
delivery chain based around specific government functions). The result of this has been<br />
duplicated IT expenditure, wasted resources, low levels of customer satisfaction, no critical mass of users<br />
for online services, and limited impact on core, cross-silo public policy objectives (Sahraoui 2009).<br />
A recent study concluded that government transformation programs differ from traditional eGovernment<br />
programs in those major ways:<br />
T-gov takes a whole-of-government view of the relationship between the public sector and the citizen<br />
or business.<br />
T-gov takes a whole-of-government view of the most efficient way of managing the cost base of<br />
government.<br />
T-gov focuses on the “citizen” not the “customer”. It seeks to engage with the citizens as owners or<br />
participants in the creation or rethinking of public services, not as passive service’s recipient.<br />
597
Mohamed Mohyi Eddine El Aichi et al.<br />
The OECD defines this change as a paradigm shift “Governments are shifting towards this broader view<br />
rather than focusing on the tools themselves. They are shifting from a government-centric paradigm to a<br />
citizen-centric paradigm….”<br />
4.3 Transformation guidelines<br />
The transformational government (t-Gov) is an eGovernment stage which seeks a new direction of<br />
offered services to citizens by focusing on their needs through a horizontal and vertical integration and<br />
rethinking government as Service Management life cycle.<br />
All service solutions and activities should be driven by citizens and businesses needs and theirs<br />
requirements. Within this context they must also reflect the strategies and policies of the service provider<br />
organization. The service life cycle is initiated from a change in requirements (transformation needs,<br />
developing new citizen centric service).<br />
Those requirements are identified and agreed within the Service Strategy stage (Business Level) within a<br />
Service Level Package and a defined set of business outcomes. The SLP must address some SLA like<br />
availability of service, capacity management, security, disaster recovery …<br />
This passes to the Service Design stage where a service solution is produced together with a Service<br />
Design Package (SDP) containing everything necessary to take this service through the remaining stages<br />
of the life cycle. In this stage we must decide or vote Government Enterprise Architecture to drive the<br />
implementation.<br />
The SDP passes to the Service Transition stage, where the service is evaluated, tested and validated,<br />
the Service Knowledge Management System (SKMS) is updated, and the service is transitioned into the<br />
live environment, where it enters the Service Operation stage.<br />
Wherever possible, Continual Service Improvement identifies opportunities for the improvement of<br />
weaknesses or failures anywhere within any of the life cycle stages. This stage is conduct by<br />
eGovernment Maturity Models (Cartlidge 2007)<br />
Those guidelines will be developed while the research advancement. The objective is to define, for each<br />
stage the prerequisite, constraints and deliverable. It’s important to rely those guidelines with a voted<br />
Government Enterprise Architecture to implement and trace the life cycle and especially the design<br />
phase. Those guidelines must be also integrated with generic maturity model that we start to define in<br />
section 2 as presented in figure 3.<br />
Figure 3: Guidelines for T-Government<br />
598
Mohamed Mohyi Eddine El Aichi et al.<br />
We try to summarize in table 3 the relationship between stages and maturity levels, through a mapping<br />
between recognized maturity models, standard maturity models and actual technological evolution based<br />
on guidelines indicated in this section. The actual statement and market needs must have a minimum<br />
prerequisite: it must be action governed. That’s why Web site presence must be attached to interaction.<br />
Table 3: eGovernment maturity models compared with a standard maturity Model<br />
EGovernment<br />
Maturity Models<br />
Initial Repeatable Defined Managed Optimized<br />
Gartner Group (2000) - Web Presence<br />
- Interaction<br />
- Transaction - Transformation<br />
UN’s Five (2001) - Emergence presence<br />
- Enhanced presence<br />
- Interactive presence<br />
Deloitte (2001) - Information publishing /<br />
dissemination<br />
Layne and Lee<br />
(2001)<br />
Hiller and Belanger’s<br />
(2001)<br />
- Transactional<br />
presence<br />
- Official two why<br />
transaction<br />
- Seamless or fully<br />
integrated presence<br />
- Multi-purpose portals<br />
- Portal Personalization<br />
- Clustering of common<br />
service<br />
- Full integration and<br />
enterprise transaction<br />
- Catalog - Transaction - Vertical Integration<br />
- Horizontal integration<br />
- Information<br />
- Two way<br />
communication<br />
Moon (2002) - Simple information<br />
dissemination (one way<br />
communication)<br />
- Two way<br />
communication (request<br />
and response)<br />
Siau, Long (2005) - Web presence<br />
- Interaction<br />
Andeson, Henriksen<br />
(2006)<br />
- Cultivation<br />
- Extension<br />
- Transaction<br />
- Service and<br />
financial<br />
transaction<br />
- Integration<br />
- Participation<br />
- Vertical and horizontal<br />
integration<br />
- Political Participation<br />
- Transaction - Transformation<br />
- E-democracy<br />
- Maturity - Revolution<br />
The remark is that all maturity models actually present in the government market tend to reach just the<br />
third level, compared the standard proposed eGovernment maturity model. These models must be<br />
extended or consolidated to get generic models that are implemented by all governments.<br />
4.4 Key performance Indicator<br />
A Key Performance Indicator (KPI) is a kind of parameter intended to measure the performance of<br />
eGovernment. KPIs are commonly used by an organization to evaluate its success of a particular activity<br />
in which it is engaged. Success is defined in terms of making progress toward strategic goals, or the<br />
repeated achievement of some level of operational goal. Accordingly, choosing the right KPIs is relevant<br />
upon having a good understanding of what is important to the organization. The performance indicator<br />
selection is often closely associated with the use of various techniques to assess the present state of the<br />
business, and its key activities. A KPI can follow the SMART criteria. This means the measure has a<br />
Specific purpose for the business, it is Measurable to really get a value of the KPI, the defined norms<br />
have to be Achievable, the improvement of a KPI has to be Relevant to the success of the organization,<br />
and finally it must be Time phased, which means the value or outcomes are shown for a predefined and<br />
relevant period. It’s important to define a repository of eGovernment and T-government KPI to unify the<br />
eGovernment ranking. For 2010, while Wadesa University put Singapore in the top ranking, the United<br />
Nation Survey 2010 makes the Republic of Korea in this place. Table 4 presents a non-exhaustive list of<br />
KPI that will be extended across the evolution of this research. It’s based on some domains and strongly<br />
599
Mohamed Mohyi Eddine El Aichi et al.<br />
attached to service management and enterprise architecture. It will be extend under the point of view of<br />
maturity models.<br />
Table 4: Key performance indicators<br />
Domain KPI<br />
Organization Clear vision and Objectives<br />
Quality of stakeholders<br />
Number of involved entity<br />
Number of involved citizen in the life cycle<br />
Defined role<br />
Organization maturity<br />
Services Number of Services in the catalogs<br />
Number of Services centric citizen<br />
Number of Services solicited by Citizen<br />
Number of pushed Services<br />
Number of service created by citizen<br />
Number of ACID Service<br />
Reliability<br />
Availability<br />
Service maturity<br />
Processes Number of defined Process<br />
Defined role and Actors<br />
Number of SMART activities<br />
Process maturity<br />
Data Accountability<br />
Security<br />
Integrity<br />
Data governance Maturity<br />
Availability<br />
Storage<br />
Recovery disaster<br />
Evolution Capacity Management<br />
Service Level Agreement<br />
Availability<br />
Reliability<br />
Evolution maturity<br />
Infrastructure Networking capabilities (capacity, availability, reliability)<br />
Systems and Application capabilities<br />
Standardization<br />
Interoperability<br />
Infrastructure maturity<br />
Services Management Defined process for service management<br />
Defined role for service management<br />
Certified process for service management<br />
Scope of service management process on the organization.<br />
5. Case study: eGovernment in Morocco<br />
Based on UN indicators for 2010, Morocco is ranked on the 126 th place with 0.29. One year ago,<br />
Morocco launched its IT 2013 Vision. This Moroccan digital project aims at strengthening its<br />
eGovernment structure. This section presents the main components of this vision and two projects<br />
characterized by their added value for citizens and transparency.<br />
The National Strategy for Information Society and the Digital Economy "Numeric Morocco 2013 " aims to<br />
make information technology (IT) "a vector of human development". This strategy tries to "make available<br />
to the public broadband Internet and promote access to knowledge."<br />
It also aims to bring government closer to citizen needs in terms of efficiency, quality and transparency<br />
through an "ambitious eGovernment". In this context, he indicated that the implementation of 89 projects<br />
and services identified eGovernment "will achieve a UN eGovernment index of 0.8 in 2013"<br />
Through this strategy, the government tries also to upgrade and strengthen the legislative framework and<br />
establish the appropriate organizational structures, including the Center for coordination and response to<br />
600
Mohamed Mohyi Eddine El Aichi et al.<br />
incidents involving the security of information systems and the national commission for the protection of<br />
personal data.<br />
5.1 Ministry of Justice: SAJ<br />
SAJ is an integrated software solution for handling criminal, civil matters and fund management in 1st<br />
and 2nd Instance according to the needs of courts and Department of Justice. The project objective is to<br />
contribute to the improvement of the performance of the judiciary aspires to a higher level of ethics and<br />
dispute resolution with transparency, independence and efficiency.<br />
5.1.1 Requirements for internal use<br />
First, the "Business Management" meets internal needs to improve productivity, efficiency and<br />
responsiveness of different entities in the implementation and execution of their activities within the same<br />
jurisdiction. This is possible by creating a centralized space that is the Intranet of the court which will<br />
include everything a magistrate or an officer needs to perform its responsibilities: update and consult the<br />
status of files or components on which they depend (hearing, diligence, notice, appeals, etc..) research in<br />
historical records, access to news, dashboards and synthesis of applications, filing parts, etc.. This<br />
intranet should be the primary tool in each jurisdiction.<br />
5.1.2 Needs of citizens<br />
The main need is the full transparency of information with the Moroccan citizens. Indeed, the main activity<br />
of courts is citizen-oriented. It provides quick access to information and clarity. Under this vision, the<br />
citizen needs:<br />
To receive enough education and awareness to follow the evolution of civil and criminal cases.<br />
To know at any time the involvement of different parts of a file (court appointment date, time<br />
designations expert, disqualification of a judge, etc.)<br />
This relationship can be established and maintained through communication and accessibility to<br />
information and for the general public. The courts must give the citizen a place where he can find<br />
answers to his questions.<br />
5.2 Custom project: BADR<br />
BADR is the result of Custom computerization process over fifteen years with the real-time processing of<br />
summary statements and declarations. BADR includes many objectives:<br />
The desire for greater openness between the Custom operators and partners;<br />
The increased transparency of customs procedures through the use of ICT and the progressive<br />
dematerialization of the clearance process to better control performance versus fluidity of customs<br />
clearance;<br />
The establishment of a system based on market standards (open, scalable and maintainable);<br />
The computerization of customs clearance system to speed up operations and operators avoid costly<br />
and unnecessary travel.<br />
Providing a good visibility, a better integration and greater research possibilities;<br />
Simplification the treatment of cases which now monopolize;<br />
The integration of all partners (government, operators, ...) into a platform for trade policy;<br />
BADR system is designed for:<br />
Importers<br />
Exporters<br />
Forwarding<br />
Maritime Consignees<br />
Consignees air<br />
Carriers<br />
etc…<br />
601
Mohamed Mohyi Eddine El Aichi et al.<br />
In point of view of eGovernment, those applications offer an interest to government and citizen but they<br />
must be reviewed depending on service management policies and maturity models.<br />
6. Conclusion<br />
T-government is more than a stage of maturity models; it’s a state of art that permits to government a<br />
radical empowerment of its organization and citizen centric services. Using ITIL to promote a much more<br />
“joined up government as value added services”, approach as IT service management replacing the<br />
‘technology silos’ and isolated ‘islands of excellence’ by ‘service silos’ are the goals of the next step of my<br />
research with conceptualize a generic maturity model based on 5 stages as described briefly in section 2.<br />
The focus of IT management has been changing for some time and in the future management will be<br />
even less focused on technology and still more integrated with the overall needs of the business<br />
management and processes.<br />
The goal is to define a light-motive to fill those objectives: first, it should be more focused on business<br />
needs (citizen needs), more closely integrated with the business processes (permanent transformation),<br />
less dependent on specific technology and more “service centric”, and more integrated with other<br />
management tools and processes as the management standards evolve. Restyling dynamic public<br />
services through integrated transformation of service delivery will be accomplished through three<br />
components (triangle): first, through the adoption of ITIL as a service management life cycle, second the<br />
extension of EGovernment Maturity models as defined in section 2, and at last the adoption of a<br />
standardized Government Enterprise Architecture<br />
References<br />
Al khatib, H. (2009) “A Citizen Oriented EGovernment Maturity Model”, Brunel University,. London<br />
Almarabeh, T., AbuAli, A. “A general Framework for EGovernment: Definition, Maturity, Challenges, Opportunities,<br />
and Success, <strong>European</strong> Journal of Scientific Research”,Vol 39, No:1, Austria,2010.<br />
Cartlidge, A. Hanna, A Rudd, C. Macfarlane, I. Windebank, J. Rance, S. (2007) “An introductory overview of ITIL V3”,<br />
ISBN 0-9551245-8-1, itSMF .<br />
Dyer, A. (2009). “Measuring the Benefits of Enterprise Architecture: Knowledge Management Maturity”, In Saha, P.<br />
(Ed.), Advances in Government Enterprise Architecture<br />
Kim, H. (2009) “Maturity Model Based on Quality Concept of Enterprise Information Architecture “ (EIA). In Saha, P.<br />
(Ed.), Advances in Government Enterprise Architecture<br />
Lathrop, D. Ruma, L. (2010) “Open Government: Collaboration, Transparency, and Participation in Practice”, O'Reilly<br />
Media, ISBN: 0596804350<br />
Land, M. Proper, E. Waage, M., Cloo, J. Steghuis, C. (2009) “Enterprise Architecture: Creating Value by Informed<br />
Governance (The Enterprise Engineering Series)” , Springer<br />
Lee, J. (2010) "10 year retrospect on stage models of eGovernment: A qualitative meta-synthesis", Government<br />
Information Quarterly, InPress, pp 220-230.<br />
Mecum, V. (2001) Les clés de l’e-administration.<br />
Saha, P. (2009) “A Methodology for Government Transformation with Enterprise Architecture”. In Saha, P. (Ed.),<br />
Advances in Government Enterprise Architecture<br />
Sahraoui, S., Ghoneim, A., Irani, Z. and Özkan, S. (2008) “t-Government for benefit realization: A research agenda”.<br />
Zahir Irani and Peter Love (Eds.) Evaluating Information Systems. Elsevier: London<br />
602
Quality of Services and Citizen Profiling in eGovernment<br />
Guillaume Gronier 1 , Sandrine Reiter 1 and Mélanie Becker 1,2<br />
1 Public Research Centre Henri Tudor, Luxembourg, Luxembourg<br />
2 University Paul Verlaine, Metz, France<br />
guillaume.gronier@tudor.lu<br />
sandrine.reiter@tudor.lu<br />
melanie.becker@tudor.lu<br />
Abstract: This research, still in progress, aims at increasing eGovernment services (eGov services) appropriation<br />
through recommendations for design of adaptive interface for eGov services. In order to reach this goal, we propose<br />
to focus our research on eGov services quality, considering the fact quality is one of the most critical dimension<br />
which influences website usage. This is particularly true when website addresses eGovernment services, where<br />
confidentiality, quality and information authenticity are crucial. The eGov services quality measure is then a major<br />
stake for public administrations if they want to promote eGov services use to citizens. The paper proposes a<br />
methodology in several steps. At the end, we must be able to propose a quality model for eGovernment which will be<br />
derived into several set of perceived quality models, trust models and acceptance models, corresponding to different<br />
user’s profiles. Moreover, we propose to identify interaction way that is the most suitable for user regarding their<br />
profile. To do that, we will define some interaction characteristics that have to be taken into account, such as<br />
interface form, dialogue structure, manipulation preferences, errors treatment… and then propose interaction<br />
typologies depending on user’s typology model. In the mid-term, our objectives are to provide tools and<br />
methodologies to support <strong>European</strong> eGovernment. This research could help designers and developers in producing<br />
better quality services regarding the eGovernance objectives and to benefit from recommendations closer to reality.<br />
Keywords: quality, e-services, eGovernment, user profile, appropriation, adaptive interface, interaction<br />
1. Introduction<br />
Deploying online administrative services, already begun in the early 2000 in several countries, is actually<br />
a main stake for all governments (Lu, Bai & Zhang 2007). EGovernment goals are hugged and a number<br />
of individual, social as well as political perspectives is often mentioned (Jaeger & Thompson 2003).<br />
Since a few years, it is possible for numerous administrative procedures to be performed remotely over<br />
the Internet. The benefits can be considerable for governments that want to increase their process<br />
efficiency as well as for citizens that can interact with public administrations more easily and comfortably.<br />
For example, eGov services enable people with disabilities and people living in rural areas to improve<br />
their living conditions by enhancing access to information and services. Based on the use of information<br />
and technological communication increase, the Commission of <strong>European</strong> Communities (CCE) proposed<br />
in 2006 (Commission of The <strong>European</strong> Communities 2006), a EGovernment action plan putting forward 5<br />
main goals for 2010:<br />
Carry on efforts regarding eGovernment, in order to allow everyone, including socially disadvantaged<br />
groups, having access to online services;<br />
Increase users’ satisfaction regarding public services, and reduce significantly administrative tasks<br />
for businesses as well as for individuals;<br />
Give the opportunity to any public administration in Europe to spend 100% of their procurement<br />
electronically;<br />
Give the opportunity to any businesses and individuals, in Europe to benefit from electronic means,<br />
secure and convenient, in order to be able to identify themselves to public services in their own<br />
country or in any other member state;<br />
Reinforce the participation and the democratic process in Europe through electronicvoting.<br />
Today, in 2011, results seem to be positive, even if all objectives have not been reached. This is<br />
particularly shown through a study conducted by the “Caisse des depots et de l’Association de<br />
l’Economie Numérique” (l’Acsel), published in 2010. According to this study, 60% of French internet<br />
users are using online service to do their tax return and 46% of them consult their social security account<br />
online. Moreover, 96% declare that they trust eGovernment services, which represent a higher score<br />
than for online bank services (69%) or e-commerce (only 51%). However, this study also show that these<br />
results are mainly positive for certain users’ profile, and that other profile are on the contrary more<br />
reticent, and that specific studies have to be conducted in their direction, in order to promote eGov<br />
services use.<br />
603
Guillaume Gronier et al.<br />
Therefore, since both governments and citizens have a shared interest in eGov services, it is important to<br />
ensure that services provided meet citizens’ needs with maximum efficiency and satisfaction. In other<br />
words, the issue of eGov services appropriation seems fundamental. By appropriation, we mean “the<br />
process by which people incorporate advanced technologies into their (work) practices” (DeSanctis &<br />
Poole 1994).<br />
In order to answer to this question (eGov services appropriation for the largest number of citizens), and<br />
based on a previous literature review (Gronier & Lambert 2010), we propose to consider the quality of<br />
eGov Services as a starting point. According to (Halaris, Magoutas, Papadomichelaki & Mentzas 2007),<br />
quality of eGov services could be define as “all the features of digital services in Public Administrations<br />
that influence their capability to satisfy declared or implied citizens and firms’ needs”. In the proposed<br />
approach we will target the eGovernment websites adaptation to different users’ classes, through citizens<br />
profiling. Sometimes called e-Profile, user profiles can improve eGov services with the delivery of trusted<br />
and personalized services (Pettenati, Pirri & Giuli 2010).<br />
2. eGovernement service quality<br />
Satisfaction and loyalty to a website are in response to a number of criteria for the individual. While<br />
visiting a site, it is possible to distinguish several stages which the individual passes through before<br />
deciding whether or not he/she will return to this site. At each moment during navigation, different<br />
cognitive processes will sequentially occur in the individual, which will lead him (or her) to decide at the<br />
end of the visit if the site has or has not met his/her expectations.<br />
The concepts such as acceptance, trust, usability of the site or perceived quality are all variables that will<br />
be involved in assessing the online service.<br />
Figure 1 illustrates these different points of navigation and the main cognitive mechanisms involved by<br />
the user. The review of literature that we are presenting therefore aims at showing how they can improve<br />
the adoption, use and appropriation of eGovernment services.<br />
Figure 1: Illustrates different points of navigation and the main cognitive mechanisms involved by the<br />
user<br />
2.1 Acceptance and e-trust as factors in the use and adoption of eGovernment services<br />
System acceptability is often considered a key factor in the success or failure of a development project<br />
for a new technology, and more specifically for an eGovernment service (Hamner & Qazi 2009). In fact,<br />
technology is external to humans, and it is necessary to accept it in order to use it.<br />
Acceptance refers to the attitude and intention that will decide whether or not to implement an usage<br />
behaviour for a technology. The first to have modelled this concept are (Davis, Bagozzi & Warshaw<br />
1989), with the TAM, "Technology Acceptance Model". The TAM predicts the individual acceptability of<br />
new information systems by future users, and diagnoses problems that may hinder the system being<br />
adopted.<br />
The authors started with the premise that the perceived usefulness and ease of use of technology were<br />
influencing our attitudes, which themselves were influencing our usage intentions, and are therefore a<br />
prediction of our actual use. Fishbein and Ajzen's (1975) theory of reasoned action laid the foundation for<br />
this model.<br />
604
Guillaume Gronier et al.<br />
However, according to (Legris 2003), many criticisms are raised regarding this model, such as the fact<br />
that it only takes into account the subjective aspects while omitting the importance of usability, or that it is<br />
too deterministic and not social enough. These flawed aspects have fostered other models.<br />
Thereby, the P3 model "Power, Perception and Performance" (Dillon & Morris 1996) aims to meet the<br />
same objectives as the TAM, but takes into account both subjective and objective aspects, such as users'<br />
perception of the actual usefulness and usability of technology. At present, according to (Brangier,<br />
Hammes-Adelé & J.-M. C. Bastien 2010), the model that combines the most of other models, and best<br />
explains the usage intention of a technology, is the UTAUT - "Unified Theory of Acceptance and Use of<br />
Technology" (Venkatesh 2000).<br />
Trust in the online service, often called "e-trust" or "digital trust", is also a factor influencing the use and<br />
adoption of a site. According to (Bélanger & Carter 2008), we define trust as "an expectancy that the<br />
promise of an individual or group can be relied upon". The authors add that trust in eGovernment is<br />
therefore composed of the traditional view of trust in a specific entity (trust of the government) as well as<br />
trust in the reliability of the enabling technology (trust of the Internet). (McKnight, Choudhury & Kacmar<br />
2002) demonstrated that consumer trust in electronic services influenced their transaction intentions.<br />
Trust depends on a combination of factors, such as the level of use, the use of standards, reputation, and<br />
past user experience with e-services.<br />
2.2 Quality as a factor in the adoption and use of eGovernment services<br />
Service quality is a fundamental marketing element to understand customer satisfaction. Specifically,<br />
individuals will evaluate the perceived quality, which can be defined as a subjective assessment, in the<br />
same way that a consumer will make about the superiority of a product.<br />
Measuring the quality of online services has been the subject of many models. The SERVQUAL model<br />
(Iwaarden van 2004) is perhaps one of the most widely used to measure the quality of online public<br />
services. Based on a dichotomy between the service offered by a client and the service perceived by the<br />
user-consumer, SERVQUAL has been applied to many industries and has undergone some<br />
modifications (Li, Tan & Xie 2002).<br />
Other models have also been proposed to evaluate commercial sites (Webqual, Sitequal, E-Qual, EtailQ,<br />
ES-Qual, etc.). However, the criteria that define the quality of services offered by these models<br />
seem too generic, and do not sufficiently take into account, for example, the interface quality or elements<br />
that promote interaction. Furthermore, no scale of the perceived quality of e-services has specifically<br />
been developed for eGovernment services. However, (Liu, Du & Tsai 2009) emphasize that a model<br />
developed for one type of service is not necessarily applicable to another type. Also, eGovernment<br />
services have several characteristics of their own:<br />
They respond to a social demand (United Nations 2008) and therefore must be particularly attentive<br />
to peoples' expectations;<br />
They are the extension of an existing physical service. Therefore, people are still able to choose<br />
whether to use the physical service or online service;<br />
In addition to the efficiency principle, eGovernment services incorporate the equity principle by<br />
remaining accessible to all citizens, consequently, the public sector cannot exclude any category of<br />
the population;<br />
The physical government service cannot be abolished. This comes from the fairness principle. The<br />
eGovernment service should therefore be considered as related to the physical service;<br />
eGovernment services have no competition. Therefore users cannot compare the quality of several<br />
eGovernment services (Wang & Liao 2008);<br />
Users of eGovernment services would be more heterogeneous in terms of socio-demographic<br />
characteristics than users of commercial websites.<br />
Consequently, eGovernment services differ from other types of e-services by the nature of the service<br />
offered, their intrinsic characteristics and the characteristics of their users.<br />
605
Guillaume Gronier et al.<br />
2.3 The concept of usability and satisfaction as a factor in the long term use and<br />
adoption of eGovernment services<br />
Although often underestimated, usability plays a major role in the adoption and use of e-services<br />
(Corradini, Polzonetti, Re & Tesei 2008). Usability (Norm ISO 9241-11) is defined as: "the degree to<br />
which a product can be used, by specified users, to achieve defined goals with effectiveness, efficiency<br />
and satisfaction in a specified context of use". Ease of learning and memory were subsequently<br />
incorporated into that definition by (Scapin & J. M. C. Bastien 1997).<br />
Literature thereby puts forward the following observation: the ease of using a human-machine interface<br />
or a website influences the use of this technology (Brangier, Hammes-Adelé & J.-M. C. Bastien 2010).<br />
Usability problems that may be encountered could influence his/her use.<br />
Usability is therefore a key element, which promotes individual performance, error reduction, technology<br />
acceptance and user satisfaction (Corradini, Polzonetti, Re & Tesei 2008). When applied to government<br />
services online, usability is described as "an assessment of the relative “ease with which a novice user<br />
interacts with a public agency website to accomplish the user’s goal(s)” (Baker 2009). According to<br />
(Corradini, Polzonetti, Re & Tesei 2008), the quality of eGov sites is largely a product of usability and the<br />
effectiveness and efficiency provided by the site.<br />
3. Adaptive interfaces<br />
In the previous part, we have proposed a literature review on quality models definition in order to be able<br />
to better take into account users’ needs. However, as the research proposed here intends to have an<br />
impact on the development of adaptive interfaces; we have to complete our state of the art, by a study of<br />
existing researches in this domain.<br />
3.1 General approach to personalisation, adaptive interface and profiling<br />
Applications or services personalisation proposes a user adaptation, targeting his preferences, interests<br />
and needs, as well as his own characteristics. Any personalisation process first needs a profiling stage,<br />
i.e. a user model and its instantiation to each specific user representing then its profile.<br />
In a second step, the adaptation itself consists in providing the user with relevant information at the right<br />
time and in an adapted format. This adaptation stage is generally separated into two main classes:<br />
information filtering and application modification. Current systems are more specifically developed for<br />
general public, and mainly concern recommending systems, or information retrieval (on the internet or for<br />
training courses (Mitchell, Caruana, Freitag, McDermott & Zabowski 1994).<br />
Concerning the profiling approach, researches mainly focus on the way to identify user profile during the<br />
interaction. This profiling could be either explicit, i.e. edited by the user, either implicit, i.e. determined by<br />
behaviour and interaction analysis (Teevan, Dumais & Horvitz 2005). An explicit profiling can be obtained<br />
through electronic questionnaires or interviews, while implicit profiling requires logging user activity,<br />
analyzing it and deduct useful behavioural patterns, interests or preferences.<br />
The explicit approach is intrusive and suffers from the bias of the evaluation doubts. The implicit<br />
approach is more effective than an explicit profiling and does not need human intervention (at least only a<br />
little). However, this approach suffers from “the cold start” problem and needs a large amount of data in<br />
order to converge towards an effective user profiling.<br />
Several approaches are proposed in the literature concerning data collection and analysis regarding<br />
users’ profiling. Mainly (Gauch, Speretta, Chandramouli & Micarelli 2007) propose an interesting state of<br />
the art on recent approaches as well as an overview of classical profile formalisation modalities.<br />
A good compromise can be achieved by using both explicit and implicit approaches. Additionally, an<br />
interesting solution can be found in the use of stereotypes (Rich 1979). Stereotyping allows to group<br />
users by broad categories of similar profiles. As a consequence, regarding computer implementation, two<br />
approaches are possible:<br />
Create these stereotypes by grouping similar users’ profile after an implicit profiling;<br />
Determine a priori stereotypes, and then use them as an initialisation of the implicit profiling process,<br />
overcoming then the “cold start” problem.<br />
606
Guillaume Gronier et al.<br />
These two approaches can also be combined in a loopback, the initialization being based on a priori<br />
stereotypes, refined through a posteriori stereotypes grouping. In addition, a posterior stereotypes<br />
grouping can also be performed through methodologies used in collaborative filtering, such as clustering,<br />
neural networks or evolutionary approaches (Adomavicius & Tuzhilin 2005).<br />
In the project, the profiling stage will be conducted focusing on the evaluation of parameters defined by<br />
the perceived quality model through priori stereotypes, as well as by the definition of interaction<br />
typologies, explicitly and implicitly as we will now describe in the following paragraphs.<br />
3.2 Personalisation and interaction<br />
Nowadays, Human-Computer Interactions are part of our everyday life, from computers to mobile<br />
phones, and in the near future, they will be practically in every artifact. There is a proliferation of devices,<br />
acting in more and more different contexts and interacting with more and more users, thanks to the evergoing<br />
technical breakthroughs. This propagation of electronic devices tends to complicate interaction<br />
paradigms and leads to lose users’ attention.<br />
In order to make the user focus on his task among a set of devices, new interaction paradigms came as a<br />
response, such as the “pervasive computing” (a.k.a. “ubiquitous computing” abbreviated “ubicomp”).<br />
Introduced for the first time by (Weiser 1995), this interaction paradigm describes seamless interactions<br />
between the user and his surrounding electronic devices to an extent that the devices’ presence is<br />
omitted by the user. While “pervasive” and “ubiquitous” literally means “manifesting throughout<br />
everything”, by speaking of pervasiveness or ubiquity, Weiser is also referring to the seamless aspect of<br />
interactions.<br />
3.2.1 User interface adaptation<br />
Interfaces adaptability is not a new subject. During the last years, a lot of studies have been carried out<br />
on the subject, but they was mostly oriented on Adaptive Hypermedia Systems (AHS). (Brusilovsky 2001)<br />
works focused on what can be adapted (content and navigation) and on adaptation methods and<br />
techniques. Since, these works have evolved and multiplied (especially applied to web sites). Besides the<br />
generic context, interface adaptation can be executed at different levels, namely at the user and device<br />
ones. According to tour research, we will focus only on the user.<br />
3.2.2 Interface adaptation according to the user profile<br />
One important source of interface adaptation perspectives consists in the study and modeling of the user<br />
profiles. It includes his identity information, his preferences and interests as well as his capacities. The<br />
user profile can also be useful to define user disability, as an example a visual interface will be adapted<br />
into an audio interface for a blind; or some set of colors will be never used for a color-blind. Adaptation<br />
work will focus on the different interaction channels now available on mobile devices (e.g. entry:<br />
keyboard or tactile screen, vocal command, body movements).<br />
Adaptation to user profile implies modeling the user and profiling it, explicitly by asking for his personal<br />
data or preferences, or implicitly. As it relies on an analysis of the user behavior, implicit profiling is more<br />
efficient in the sense it is not biased by the inherent uncertainties of human assumptions.<br />
3.3 eGovernment problematic<br />
However, we can notice that these researches focus mainly on the software architecture and algorithms<br />
(Calvary et al. 2002). (Thevenin & Coutaz 2002) have proposed taxonomy related to Human Computer<br />
Interface adaptation, where notions such as « interaction », « presentation » « dialogue controller » are<br />
mentioned. However, these aspects are only put forward in a software architecture perspective.<br />
For their part, (Hariri, Lepreux, Tabary & Kolski 2009) mentioned the concept of « database design<br />
patterns », fundamental to any adaptation process. As shown through these studies, having interaction<br />
model is then a base for adaptive algorithm. The underlying question is then: on which bases these<br />
concepts of “interaction, presentation, dialogue controller,” as well as “design patterns” should rely on?<br />
Indeed, before constituting these databases, we must still identify the data that would be stored in.<br />
In order to answer to this problematic, it seems essential to identify the interaction types corresponding to<br />
users’ needs. This means, that we should be able to link user’ profile to interaction profile, and then<br />
607
Guillaume Gronier et al.<br />
identify underlying characteristics that should be present for eGov services and more specifically in our<br />
case for eGov services.<br />
The study proposed in the present project eProfiler, will mainly be based on such an approach; drawing<br />
interaction typologies adapted to eGov services which could then be used as inputs for the adaptive<br />
interfaces domain. Our study will be based here on literature references in the interaction domain and<br />
which mainly concern:<br />
Dialog mechanisms (menus, natural command languages, question/answer, direct manipulations,<br />
forms, etc.) (Sears & Shneiderman 1994);<br />
Way to manage the dialog (information filtering, information flow management, interaction objects<br />
management, environment management, etc.);<br />
Information presentation (visual characteristics – size, position, colours – notation conventions, data<br />
format);<br />
Help functions: Out of error (comprehension help, feedback, online help, navigation, warning) or in<br />
case of error (When, why, task performed percentage, task backup, cancellation, etc.);<br />
Tasks type (selection, positioning, orientation, path, quantification, text acquisition, images<br />
acquisition);<br />
Metaphor use (Carroll, Mack & Kellogg 1988). This domain is not new, and establishes Human<br />
Computer Interaction bases since a long time and is always subject to actual studies, which will need<br />
to be carefully analysed.<br />
4. Methodology proposed<br />
In order to improve the quality of eGov services, we propose a methodology based largely on the user, in<br />
this case, the citizen. The main objective is to understand the factors that determine the appropriation of<br />
eGov sites and to ultimately be able to increase the appropriation and use of online government services,<br />
through adaptive interfaces.<br />
We describe bellow each step of our methodology, which will be applied to Belgium and Luxembourgish<br />
eGov services.<br />
4.1 Identify user’s profiles and classes<br />
The first step of our methodology consists of a preliminary study that will identify different profiles of<br />
potential users of eGov sites. The data needed to characterize user profiles will be collected through an<br />
online questionnaire, which will gather the following data:<br />
Demographics (age, gender, socio-professional status, etc.);<br />
Data on frequency of use;<br />
Data on their experience of Internet use in general, and eGov sites in particular;<br />
Statistical analysis (Hierarchical) with SPSS software.<br />
Three classes of potential users may be identified a priori:<br />
Regular users of eGov sites;<br />
Infrequent users, for instance those who have visited an eGov site at least once but who did not<br />
return, following, for example, a bad experience or low satisfaction;<br />
Individuals who have never visited a government website.<br />
4.2 Understand use and not-use of eGov services<br />
The second stage is to collect qualitative data in order to understand what may or may not influence the<br />
use and acceptance of eGov services. These interviews will be conducted by taking into account<br />
previously identified user types and the reasons that motivate or do not motivate them to use these online<br />
services:<br />
Semi-structured interviews;<br />
Flanagan's critical incident technique following interviews. This technique (1954) in its original context<br />
can detect incidents that operators have deemed critical to a stage of their work. This methodology<br />
will include potential bad experiences with eGov services;<br />
608
Focus groups.<br />
4.3 Model of eGov services quality<br />
Guillaume Gronier et al.<br />
The third step is to substantiate questionnaires from the existing models (models for perceived quality,<br />
usability, acceptance, trust, etc.). In order to do this, the methodology aims to:<br />
Review literature and select several scales from different models;<br />
Identify an eGov site;<br />
Administer online questionnaires, relating to an identified eGov site;<br />
Statistical analysis (linear regression).<br />
4.4 Perceived quality and interaction typologies validation<br />
This step will propose some recommendations for the adaptive interaction domain declined for eGov<br />
services. However, we think that such recommendations should at least be validated through concrete<br />
experiments. Since some years now, the Wizard of Oz paradigm has been used with success in complex<br />
natural-language systems study and more recently in spoken dialog systems (Winterboer, Tietze, Wolters<br />
& Moore 2010). This technique can be viewed as a rapid prototyping technique where the system<br />
answers are implemented but simulated by human actors.<br />
This technique consist to propose to the user a system which answers are simulated by a human (the<br />
wizard), but, in order to study real situation, to let the user think that he is interacting with a real system.<br />
4.5 Recommendations for adapting e-services interfaces<br />
The main objective of our project is to improve quality of eGov services, through several<br />
recommendations for adapting e-services interfaces. Using the previous steps, we will have two essential<br />
types of information in order to improve e-services: on one hand, user’s profiles and on the other hand,<br />
different types of interfaces in accordance with profiles. Thus, it will be possible to provide exact<br />
information about what information and how to propose them to a particular type of user. In other words,<br />
we can provide recommendations for adapted interfaces, and to a longer-term for adaptive interfaces.<br />
For example, these recommendations will take the form: "if the user is a male over 45 years, with little<br />
Internet experience, the interface must include elements which increases his trust with the e-service, and<br />
must be reduced to only essential information needed to service for which he is connected”. Of course,<br />
this example is not based on any experience and is given as illustration. These recommendations will<br />
take the form of guidelines, which will be freely available to eGov services.<br />
5. Expected results and conclusion<br />
The research aims at facilitating eGov services and to improve their appropriation. The appropriation<br />
concept is here proposed as the cognitive, organisational and social mechanisms that lead a user to<br />
integrate a technology (eGov services in our case) in his practices, through spontaneous answer. The<br />
main idea is to provide citizens with online services that better meet their expectations in terms of quality.<br />
Three main results can be put forward:<br />
The first result aims at establishing a citizens’ classification in relation to eGov services quality. Many<br />
ergonomics recommendations addresses Web interfaces, works on this subject are consistent and<br />
many heuristics and criteria have been defined (Scapin & J. M. C. Bastien 1997). However these<br />
recommendations, like quality models, are formulated for the benefit of all internet users,<br />
independently from their profiles. We propose to cover this gap, by identifying citizens’ profiles, in<br />
order to develop a set of quality models as well as recommendations for designers.<br />
The second result will lay the foundation for the design of a dynamic interface dedicated to eGov<br />
services. As shown in the state of the art, the problematic of adaptive interface is mainly concerned<br />
by software architecture considerations but less is mentioned about interaction model underlying this<br />
question. The underlying objective is to propose an interaction model as well as interaction typologies<br />
adapted to eGov services which would be used as inputs for adaptive interfaces;<br />
The third result concerns the improvement of perceived quality and appropriation of egovernment<br />
websites and online eGovernment services, through a new model of e_gov services quality included<br />
trust, acceptance and usability aspects. In fact, very little research to date focuses on the concerns of<br />
609
Guillaume Gronier et al.<br />
public administration and in particular on increasing the use of eGov services. New elements of<br />
understanding relating to the reluctance towards or adoption of government sites will be identified<br />
from the user-centred approach that will be adopted. Moreover in recent years the concept of<br />
acceptation, trust, perceived quality have not been rehabilitated or reworked.<br />
The following table shows an example of what could be our result. We will identify the quality criteria of<br />
their respective eGov service and the interaction will be adjusted according to these criteria. In this case,<br />
we illustrate the example of post-users. The table will be completed and is in progress.<br />
Table 1: An example of what could be our result<br />
Pre user<br />
Post user with<br />
good<br />
experience<br />
Post user with<br />
bad<br />
experience<br />
Quality<br />
criteria<br />
Interaction<br />
element<br />
Quality<br />
criteria<br />
Interaction<br />
element<br />
Quality<br />
criteria<br />
Interaction<br />
element<br />
Profile 1 Profile 2 Profile 3 Profile 4 Profile n…<br />
i.e : usability, i.e : trust in<br />
eGov<br />
i.e : limit the<br />
amount of<br />
information<br />
on screen<br />
i.e:<br />
strengthen<br />
the<br />
perception of<br />
safety data<br />
i.e: perceived<br />
usefulness,<br />
usability<br />
i.e: highlight<br />
the services<br />
available<br />
i.e :<br />
perceived<br />
quality<br />
i.e :<br />
efficiency,<br />
usability,<br />
design of the<br />
web site<br />
i.e:<br />
availability of<br />
information<br />
i.e: citizen<br />
support,<br />
availability of<br />
system<br />
in progress in progress in progress in progress in progress<br />
in progress in progress in progress in progress in progress<br />
in progress in progress in progress in progress in progress<br />
in progress in progress in progress in progress in progress<br />
The objectives are numerous; nevertheless the main goal is to provide tools and elements for assessing<br />
and improving the appropriation of eGovernment services. To finish, the interest of this research is that<br />
results may be extended to other sectors that also have this type of organisation (e-commerce, eservices,<br />
etc.).<br />
References<br />
Adomavicius, G. & Tuzhilin, A. (2005) 'Toward the Next Generation of Recommender Systems: A Survey of the<br />
State-of-the-Art and Possible Extensions', IEEE Trans. on Knowl. and Data Eng., vol. 17, no. 6, pp. 734-749.<br />
Baker, D. (2009) 'Advancing EGovernment performance in the United States through enhanced usability<br />
benchmarks', Government Information Quarterly, vol. 26, no. 1, pp. 82-88.<br />
Brangier, É., Hammes-Adelé, S. and Bastien, J-MC. (2010) 'Analyse critique des approches de l’acceptation des<br />
technologies : de l’utilisabilité à la symbiose humain-technologie-organisation', Revue Européenne de<br />
Psychologie Appliquée/<strong>European</strong> Review of Applied Psychology, vol. 60, no. 2, pp. 129-146.<br />
Brusilovsky, P. (2001) 'Adaptive Hypermedia', User Modeling and User-Adapted Interaction, vol. 11, no. 1-2, pp. 87-<br />
110.<br />
Bélanger, F. and Carter, L. (2008) 'Trust and risk in eGovernment adoption', Journal of Strategic Informations<br />
Systems, vol. 17, no. 2, pp. 165-176.<br />
Calvary, G., Coutaz, J., Thevenin, D., Limbourg, Q., et al. (2002) 'Plasticity of User Interfaces: A Revised Reference<br />
Framework', in Proceedings of the First International Workshop on Task Models and Diagrams for User<br />
Interface Design, INFOREC Publishing House Bucharest, pp. 127-134.<br />
Carroll, JM., Mack, RL. and Kellogg, WA. (1988) 'Interface metaphors and user interface design', in Handbook of<br />
Human-Computer Interaction. Amsterdam; New York: Elsevier Science Publishers B.V.,pp. 67-85.<br />
Commission of The <strong>European</strong> Communities (2006) 'i2010 eGovernment action plan: Accelerating eGovernment in<br />
Europe for the benefit of all', Brussels.<br />
Corradini, F., Polzonetti, A., Re, B. and Tesei, L. (2008) 'Quality of service in eGovernment underlines the role of<br />
information usability', International Journal of Information Quality, vol. 2, no. 2, pp. 133-151.<br />
Davis, FD., Bagozzi, RP. and Warshaw, PR. (1989) 'User Acceptance of Computer Technology: A Comparison of<br />
Two Theoretical Models', Management Science, vol. 35, no. 8, pp. 982-1003.<br />
DeSanctis, G. and Poole, MS. (1994) 'Capturing the Complexity in Advanced Technology Use: Adaptive<br />
Structuration Theory', Organization Science, vol. 5, no. 2, pp. 121-147.<br />
Dillon, A. and Morris, MG. (1996) 'User acceptance of information technology : Theories and models', Annual review<br />
of information science and technology, vol. 31, no. 1, pp. 3-32.<br />
Gauch, S., Speretta, M., Chandramouli, A. and Micarelli, A. (2007) 'The adaptive web', in P Brusilovsky, A Kobsa, &<br />
W Nejdl (eds), Springer-Verlag, Berlin, Heidelberg, pp. 54-89.<br />
Gronier, G. and Lambert, M. (2010) 'A model to measure the perceived quality of service in eGovernment', in 10th<br />
<strong>European</strong> <strong>Conference</strong> on eGovernment, Ireland, 17-18 June 2010,pp. 527-531.<br />
Halaris, C., Magoutas, B., Papadomichelaki, X. and Mentzas, G. (2007) 'Classification and synthesis of quality<br />
approaches in eGovernment services', Internet Research, vol. 17, no. 4, pp. 378-401.<br />
610
Guillaume Gronier et al.<br />
Hamner, M. and Qazi, R. (2009) 'Expanding the Technology Acceptance Model to examine Personal Computing<br />
Technology utilization in government agencies in developing countries', Government Information Quarterly, vol.<br />
26, no. 1, pp. 128-136.<br />
Hariri, A., Lepreux, S., Tabary, D. and Kolski, C. (2009) 'Principes et étude de cas d’adaptation d’IHM dans les SI en<br />
fonction du contexte d’interaction de l’utilisateur', Ingénierie des Systèmes d’Information (ISI), Networking and<br />
Information Systems, vol. 14, no. 3, pp. 141-162.<br />
Iwaarden van, J. (2004) 'Perceptions about the quality of web sites: a survey amongst students at Northeastern<br />
University and Erasmus University', Information & Management, vol. 41, no. 8, pp. 947-959.<br />
Jaeger, PT. and Thompson, KM. (2003) 'EGovernment around the world: lessons, challenges, and future directions',<br />
Government Information Quarterly, vol. 20, no. 4, pp. 389-394.<br />
Legris, P. (2003) 'Why do people use information technology? A critical review of the technology acceptance model',<br />
Information & Management, vol. 40, no. 3, pp. 191-204.<br />
Li, YN., Tan, KC. and Xie, M. (2002) 'Measuring web-based service quality', Total Quality Management & Business<br />
Excellence, vol. 13, no. 5, pp. 685-700.<br />
Liu, C-T., Du, TC. and Tsai, H-H. (2009) 'A study of the service quality of general portals', Information &<br />
Management, vol. 46, no. 1, pp. 52-56.<br />
Lu, J., Bai, C. and Zhang, G. (2007) 'E-Service cost benefit evaluation and analysis', Studies In Computational<br />
Intelligence, vol. 37, pp. 389 - 409.<br />
McKnight, DH., Choudhury, V. and Kacmar, C. (2002) 'Developing and Validating Trust Measures for e-Commerce:<br />
An Integrative Typology', Information Systems Research, vol. 13, no. 3, pp. 334-359.<br />
Mitchell, TM., Caruana, R., Freitag, D., McDermott, J. and Zabowski, D. (1994) 'Experience with a learning personal<br />
assistant', Communications of the ACM, vol. 37, no. 7, pp. 80-91.<br />
Pettenati, MC., Pirri, F. and Giuli, D. (2010) e-Profile Management as a Basic Horizontal Service for the Creation of<br />
Specialized eGov services', in First International <strong>Conference</strong> on Exploring ServicesSciences, 17-18-19<br />
February 2010, Geneva, Switzerland,<br />
Rich, E. (1979) 'User modelling via stereotypes', Cognitive Science: A Multidisciplinary Journal, vol. 3, no. 4, pp. 329-<br />
354.<br />
Scapin, D. and Bastien, JMC. (1997) 'Ergonomic criteria for evaluating the ergonomic quality of interactive systems',<br />
Behaviour & Information Technology, vol. 16, no. 4, pp. 220-231.<br />
Sears, A. and Shneiderman, B. (1994) 'Split menus: effectively using selection frequency to organize menus', ACM<br />
Trans. Comput.-Hum. Interact., vol. 1, no. 1, pp. 27-51.<br />
Teevan, J., Dumais, S. and Horvitz, E. (2005) 'No Personalizing search via automated analysis of interests and<br />
activities', in Proceedings of the 28th annual international ACM SIGIR conference on Research and<br />
development in information retrieval SIGIR ’05 (August 2005), ACM, New York, NY, USA, 2005, pp. 449-456.<br />
Thevenin, D. and Coutaz, J. (2002) 'Adaptation des IHM : Taxonomies et architecture logicielle', in Actes IHM02,<br />
ACM Press, pp. 207-210.<br />
United Nations (2008) 'U.N. eGovernment survey 2008'.<br />
Venkatesh, FD. (2000) 'A theoretical Extension of the Technology Acceptance Model: Four longitudinal Field<br />
Studies', Management Science, vol. 46, no. 2, pp. 186-204.<br />
Wang, Y. and Liao, Y. (2008) 'Assessing eGovernment systems success: A validation of the DeLone and McLean<br />
model of information systems success', Government Information Quarterly, vol. 25, no. 4, pp. 717-733.<br />
Weiser, M. (1995) 'Human-computer interaction', in RM Baecker, J Grudin, WAS Buxton, & S Greenberg (eds),<br />
Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, pp. 933-940.<br />
Winterboer, AK., Tietze, MI., Wolters, MK. and Moore, JD. (2010) 'The user model-based summarize and refine<br />
approach improves information presentation in spoken dialog systems', Computer Speech & Language, Vol. 25,<br />
no. 4, pp. 175-191.<br />
611
A Quest for an Applicable Model of Growth for Directgov<br />
Panos Hahamis<br />
University of Westminster, London, UK<br />
P.Hahamis01@wmin.ac.uk<br />
Abstract: This paper presents research towards the Henley Doctor of Business Administration (DBA) Programme<br />
which is in progress. The purpose of the paper is to review the most well known models of growth for<br />
eCommerce/eBusiness and in particular eGovernment to date, on a quest to identify an applicable model for<br />
mapping the progress made by the most prominent state-of-the-art eGovernment initiative of the UK government, the<br />
Directgov portal.<br />
Keywords: eGovernment, eBusiness, models of growth, portals, Directgov<br />
1. Introduction<br />
Even though the computerisation of organisations started over four decades ago, it is only since the<br />
evolution of information and communication technologies (ICT) and, later on, their convergence with<br />
Internet technologies, that dramatic change was brought into the landscape of conducting business.<br />
The Internet and the hyperbole surrounding it brought new dimensions and consequently new<br />
terminology in to the use of technology by organisations. Two concepts, those of eCommerce and<br />
eBusiness entered every day business language and remained prominent ever since. Governments<br />
followed suit soon after, hence a new term of jargon, or buzzword, was born, that of eGovernment.<br />
Much has been written about both the benefits and drawbacks brought by this evolution for the<br />
organisations that invested in these technologies and systems. With the advent of the Internet in<br />
particular and its impact on business and the public sector, various maturity models have been developed<br />
in order to predict the growth and development of the organisation and facilitate an understanding of the<br />
changes caused by these technologies.<br />
This paper presents research towards the Henley Doctor of Business Administration (DBA) Programme<br />
which is in progress. The purpose of the paper is to explore the most well known models of growth for<br />
eCommerce/eBusiness and in particular eGovernment to date, on a quest to identify an applicable model<br />
for mapping the progress made by the most prominent state-of-the-art eGovernment initiative of the UK<br />
government, Directgov.<br />
For that reason, a discourse on the impact of the Internet will be conferred first, followed by a literature<br />
review and critique of maturity models in both the private and public sectors. An attempt will be made to<br />
map the development maturity of Directgov to the most appropriate model or models of growth, followed<br />
by recommendations and concluding with the acknowledgement of any limitations of this study.<br />
2. The impact of the internet<br />
The advent of the Internet provided business at first, and later on, the public sector with enhanced<br />
opportunities, enabling them to gain competitive advantages and allowing them to establish better<br />
strategic positions than those of previous generations of information technology (IT) (Porter, 2001). Whilst<br />
early proponents of the Internet tried to predict its likely technological evolution, Angehrn (1997) argued<br />
that “the Internet may accelerate certain trends whilst revoking others”. Porter (2001, p. 64) suggested<br />
that the Internet is “an enabling technology – a powerful set of tools that can be used wisely or unwisely,<br />
in almost any industry and as part of almost any strategy” and always as a complement to traditional<br />
ways of conducting business.<br />
2.1 Businesses go online<br />
Although the term eCommerce literally “refers to the conduct of commerce or business electronically -<br />
essentially using Internet technologies” (Ward & Peppard, 2002, p. 5), it had emerged before the Internet,<br />
notably in the 1980s, with the use of Electronic Data Interchange (EDI) in the financial sector, initially for<br />
intra-company trading and consequently used for the exchange of documents and so on (Swatman,<br />
1993).<br />
612
Panos Hahamis<br />
eBusiness, on the other hand, has come to refer to the automation of an organisation’s internal business<br />
processes using web-based technologies and interfaces (Ward & Peppard, 2002). ECommerce is a key<br />
component of eBusiness which includes “not just the buying and selling of goods and services, but also<br />
servicing customers, collaborating with business partners, and conducting electronic transactions within<br />
an organisation” (Turban, King, Lee, & Viehland, 2006, p. 4).<br />
According to Earl (2000, p. 33), “It was in about 1994/95 that the cry let’s have a home page began to<br />
ring out across corporations”. The prospect that the utilisation of the Internet and the World Wide Web<br />
could increase their market presence and share, boost communications, reinforce their relationships with<br />
customers and finally enhance their supply chain and other processes and operations, sounded very<br />
attractive. Some businesses retained their physical high street presence but embraced these<br />
technologies, thus becoming clicks and mortar incumbents, whilst on the other hand new business startups<br />
became pure play dot-coms, with the notable example of Amazon.com.<br />
2.2 Governments follow suit<br />
Despite the antecedents of the dot-com boom and subsequent crash, there is no Chinese wall between<br />
the private and public sectors preventing stakeholders’ expectations in one from informing their attitudes<br />
and behaviour in another. Moreover, in the name of efficiency and effectiveness - the most perceptible<br />
and intangible benefits - along with the aim of cost cutting, governments started to realise the potential of<br />
going online.<br />
A simple definition of eGovernment is offered by West (2004, p. 16): “eGovernment refers to the delivery<br />
of government information and services online through the Internet or other digital means”. Curtain,<br />
Sommer, & Vis-Sommer (2004) however, argue that is far more than simply making some information<br />
and services for the citizens available publicly online. It is a transforming agent for all layers of<br />
government, each providing a variety of different services.<br />
3. Models of growth<br />
Remenyi, Williams, Money, & Swartz (1998, p. 285) define a model as “a representation of an artefact, a<br />
construction, a system or an event or a sequence of events” and it may consist of a picture or a drawing,<br />
symbols, numbers, words or a combination of these depictions.<br />
3.1 In eCommerce<br />
The theories of growth first emerged in the mid-1970s well before the evolution of the Internet (Chan &<br />
Swatman, 2004; Ghachem, 2006; McKay, Marshall, & Prananto, 2000; Prananto, McKay, & Marshall,<br />
2001; Ward & Peppard, 2002). Computerisation prompted scholars such as Nolan (1973), amongst<br />
others, to study the computing evolution within organisations. He developed a model to “determine the<br />
degree of computing maturity of a company by taking into account the evolution of information<br />
technologies as an organisational learning process” (Ghachem, 2006, p. 1). He is also “the first to have<br />
presented a theoretical description of the phases dealing with the planning, the organisation and the<br />
control of activities in association with the management of computer resources in the organisation”<br />
Ghachem (2006, p. 1). Nevertheless, although Nolan consequently amended and expanded his model to<br />
six stages in order to accommodate two new stages, namely integration and administration (of data), it<br />
relied mainly on the organisation’s spending on computing to determine the different stages of the<br />
computer evolution. Thus, it was deemed inadequate, by critics such as Galliers & Sutherland (1991) and<br />
Swatman (1993) cited in Ghachem (2006), to represent the reality of implementation of information<br />
systems.<br />
Ghachem (2006) found a number of similar maturity models outlining the phases through which<br />
organisations evolve in relation to the use of information and communication technologies and systems.<br />
However, these models did not take into consideration the advancement of the Internet, its technologies<br />
or other factors, as they were proposed long before the emergence of eCommerce. McKay et al. (2000,<br />
p. 29) argue that among these models, the Galliers & Sutherland (1991) model appears to be the most<br />
sophisticated of all, as most early models were criticised as being IT-centric.<br />
Ghachem (2006) also conducted a review of the new maturity models, better tailored to the realities of<br />
electronic commerce. In particular, he has focused on four models of growth. The models he reviewed<br />
and are worth mentioning, are Earl’s (2000), McKay et al’s. (2000), Rayport & Jaworski’s (2001) and Rao<br />
et al’s. (2003).<br />
613
Panos Hahamis<br />
In the late 1990s, an important contribution was made by Angehrn (1997). Instead of trying to predict the<br />
likely technological evolution of the Internet, he proposed a generic framework (the ICDT model) for<br />
understanding the opportunities and threats posed by the Internet to businesses, and for developing a<br />
strategy to leverage these (See Figure 1 below).<br />
Source: (Angehrn, 1997)<br />
Figure 1: The ICDT model<br />
According to Angehrn (1997, p. 2), the model takes its name from “the four virtual spaces created by the<br />
Internet: a Virtual Information Space, a Virtual Communication Space, a Virtual Distribution Space, and a<br />
Virtual Transaction Space. The four spaces are treated separately because they correspond to different<br />
strategic objectives and require different types of investment, and organisational adjustments”. The Visual<br />
Information Space (VIS) is about visibility, the Visual Communication Space (VCS) is about interaction,<br />
the Virtual Distribution Space (VDS) is about service delivery and the Virtual Transaction Space (VTS) is<br />
about trading. Although the ICDT model is generic, it has been used to diagnose Internet maturity and<br />
strategies of whole sectors, such as banking. Furthermore, the model could be used in the context of<br />
Intranets to highlight the space of opportunities available to companies internally and how they can utilise<br />
this to their advantage (Angehrn, 1997).<br />
3.2 In eGovernment<br />
It was only after the advancement of the Internet, when the concept of eGovernment had emerged, that<br />
practitioners and scholars alike started studying “the new face of government” (Andersen & Henriksen,<br />
2006). Beside the impact, evaluation and good practices, a number of maturity models have also been<br />
developed and proposed. The three most prominent models are examined below.<br />
In 2001, Hiller & Belanger (2001) proposed an eGovernment framework that consists of six constituent<br />
relationships and five stages of eGovernment (see Figure 2). Although it is supposed to be an adaptation<br />
and/or an improved version of a model or models suggested earlier by other scholars, it is not clear as no<br />
citations were made nor any references provided.<br />
Hiller & Belanger (2001, p. 14) suggested that “eGovernment can be considered through two lenses: the<br />
type of relationship and the stage of integration”. As far as the relationships are concerned, they<br />
endeavoured to offer a broader view of the multidimensional relationships between the government and<br />
all the entities they interact with. These are: Government Delivering Services to Individuals (G2IS), ie<br />
delivering services or benefits directly to citizens, Government to Business as a Citizen (G2BC), ie filing<br />
or paying taxes online, Government to Business in the Marketplace (G2BMKT), ie electronic procurement<br />
(e-procurement), Government to Employees (G2E), ie providing information to their employees via an<br />
Intranet and Government to Government (G2G), allowing collaboration between agencies at many levels<br />
and aggregating various public sector websites.<br />
614
Panos Hahamis<br />
Source: Hiller & Belanger (2001)<br />
Figure 2: Electronic government framework<br />
The stages of eGovernment they suggest in their model are Information, Two-way Communication,<br />
Transaction, Integration and Participation. At the Information stage, there is only provision of information<br />
in a static form; however, content does not update itself and thus they stress the need for accurate and<br />
timely information. At the Two-way Communication stage, there is supposed to be some interaction<br />
between government and its constituents, allowing communication, simple requests and changes. At the<br />
Transaction stage, constituents should be allowed to interact and transact fully online, through a webbased<br />
interface without the need for human intervention. At the Integration stage, all services should be<br />
integrated and offered through a single portal no matter which agency provides them. Portals are similar<br />
to websites with the difference that they act as gateways and aggregators to many services offered by<br />
various agencies/providers. Nonetheless, this requires another integration to take place first, that of both<br />
back-office and front-office systems. At the final Participation stage, constituents should be allowed to<br />
comment on/participate in the democratic process and to register and vote online. Although Hiller &<br />
Belanger (2001) conceded that this stage could have been a sub-category of the Two-way<br />
Communication stage, they considered it significant enough to merit a separate category altogether.<br />
At the same time, Layne & Lee (2001) proposed a four stage model which outlines the complex<br />
transformation within government as it makes its transition to eGovernment through each stage. Thus,<br />
the model incorporates the complexity involved at each stage and the different levels of integration (See<br />
Figure 3). Their discussion includes definition, functionality and challenges that arise at each stage.<br />
In stage one of cataloguing, government websites are mainly static and limited, just for the sake of<br />
establishing a web presence. There is limited functionality at this stage and among the challenges are<br />
website development and ownership and maintenance of the information. In the second stage of<br />
transaction, citizens are allowed to interact and transact online, again without – or with minimum – human<br />
intervention as per Hiller & Belanger’s (2001) model, discussed above. At this stage, two-way<br />
communication adds to functionality and along with organisational challenges, the issue of transaction<br />
fulfilment should be taken seriously. Integration starts at this stage and governments are forced to go<br />
further by integrating the “underlying processes not only across different levels of government but also<br />
different functions of government” (Layne & Lee, 2001, p. 125). They argue that integration may happen<br />
615
Panos Hahamis<br />
in two ways, vertically and horizontally, and thus the next two stages correspond to these types of<br />
integration. It is expected however that the vertical integration “within the similar functional walls but<br />
across different levels of government will happen first, because the gap between levels of government is<br />
much less than the difference between different functions” (p. 130). At this stage, the point of service<br />
must be at local level as the citizen would feel more familiar and thus local portals connected to central<br />
government and so on will add to functionality. This in its turn presents challenges as several<br />
technological issues emerge, ie signal authentication, format compatibility of electronic data interchange,<br />
exposure level of internal system to the outside etc. (p. 131). The last stage of horizontal integration<br />
refers to integration of government services across different functional walls or silos. They foresee that<br />
from the citizen’s perspective this would be ideal as such integration would facilitate the one stop shop<br />
concept and serve their needs in one go. At this stage functionality is characterised by efficiency and<br />
effectiveness, driven by citizens’ demands for a move towards more service oriented functions. The<br />
challenges presented here are not only technical but also managerial; most importantly, “it requires a<br />
change in the mindset of government agency directors” (p. 133). Among the technological and<br />
organisational challenges Layne & Lee (2001) presented, they also pointed out three major issues ie<br />
universal access, privacy and confidentiality and citizen focus in government management (p. 134), thus<br />
the re-conceptualisation of government in order to achieve citizen-focused changes and development.<br />
Source: (Layne & Lee, 2001)<br />
Figure 3: Dimensions and stages of eGovernment development<br />
After examining both Hiller & Belanger’s (2001) and Layne & Lee’s (2001) models, Reddick (2004)<br />
proposed a two stage, combined with three different governmental relationships, model of eGovernment<br />
growth. As his study examined eGovernment growth in American municipalities at the time, he conceded<br />
that the two first phases of the Layne & Lee (2001) model, the cataloguing and transaction stages, would<br />
be applicable as there was no evidence suggesting otherwise. He has also used Hiller & Belanger’s<br />
(2001) model of major types of eGovernment relationship, Government to Citizen (G2C), Government to<br />
Business (G2B) and Government to Government (G2G) as they “represent the heart of the governmental<br />
relationships” (Reddick, 2004, p. 4), (See Figure 4).<br />
Similar to Hiller & Belanger’s (2001) and Layne & Lee’s (2001) models, the first stage of growth,<br />
cataloguing, is all about maintaining a web presence - merely a static web site that allows no<br />
transactions. The second stage of transaction allows citizens and the business to interact and transact<br />
directly online by paying taxes, fines and so on. With regard to eGovernment relationships, the results of<br />
the Reddick (2004) study showed that the G2C relationship was mainly still in Stage I, whilst the G2G<br />
616
Panos Hahamis<br />
relationship was somewhat advanced with the application and use of intranets in government. The G2B<br />
relationship was the most advanced, especially with the emergence of e-procurement and the realisation<br />
of the cost savings via this innovative procurement channel. Similar results were obtained by Hahamis,<br />
Iles, & Healy’s (2005) study of Greek municipalities, applying Reddick’s (2004) model of growth, although<br />
to a smaller sample than the one he used for his study.<br />
Source: As adapted from Reddick (2004)<br />
Figure 4: Model of eGovernment growth<br />
4. Critique of the models<br />
All of the eBusiness/eCommerce models which were reviewed, with the exception of Angehrn’s (1997),<br />
are somewhat linear, assuming progress through their stages of growth over time. In most cases<br />
however, it was recognised that an organisation can leap over stages to accelerate its development,<br />
assuming that previous issues were addressed. Also, the models are either descriptive, prescriptive, or<br />
half and half.<br />
As far as the strategy is concerned, although Angehrn’s (1997) model, was proposed prior to the rest of<br />
the aforementioned models, it was a precursor and quite different in many respects. The aim was to<br />
identify and understand the opportunities and threats that arise from the emergence of the Internet so<br />
appropriate strategies could be developed in order to leverage these.<br />
The relationships and stages in eGovernment are more complex than in eCommerce. As far as the<br />
relationships are concerned, Hiller & Belanger (2001) stress that they are multi-dimensional. Although<br />
Reddick (2004) used only the major types of eGovernment relationships, they are core to the model he<br />
proposed. There is no mention of relationships between government and its entities in Layne & Lee’s<br />
(2001) model. All of the eGovernment models examined here incorporate similar stages of growth, such<br />
as cataloguing or information, two-way communication, transaction and integration. Due to the nature of<br />
his study, Reddick (2004) used only two of the stages described above, cataloguing and transaction. At<br />
the stage of integration, Hiller & Belanger (2001) suggested portals, whilst Layne & Lee (2001), in<br />
addition to portals, suggested both vertical and horizontal integration, bringing to the fore back-office and<br />
front-end processes and the issue of bringing down the silos. Hiller & Belanger (2001) went further than<br />
the integration stage and proposed a participation stage, taking the argument to a higher level.<br />
Furthermore intranets are discussed extensively by all scholars and the concept of the one stop shop<br />
emerges as crucial to providing services to the citizen (Hiller & Belanger, 2001; Layne & Lee, 2001;<br />
Reddick, 2004). They also attempt to map at each stage the challenges, both technological and<br />
organisational, that the transition from government to eGovernment presents.<br />
5. The case of Directgov<br />
Directgov (www.direct.gov.uk) was launched in 2004 as the third generation British government portal. It<br />
followed open.gov.uk which was just an online directory and UK Online, launched in 2000. UK Online<br />
was the first citizen portal, at least in the UK, to group information into life events (Cross, 2004), and was<br />
617
Panos Hahamis<br />
part of the Modernising Government white paper’s strategy and eGovernment vision by the then Prime<br />
Minister Mr Blair (HM Government, 1999).<br />
Portals also act as hubs for other websites and on many occasions replace and aggregate a number of<br />
these. “Cabinet Office figures show that 762 of the 1,649 targeted central government websites have<br />
been closed, and a further 599 are expected to close this year” (Grant, 2009). Following a web<br />
rationalisation policy endorsed by minsters in 2006 to rationalise content, the plan is to move the content<br />
of most of government websites to two portals by 2011, Directgov and Business Link<br />
(www.businesslink.gov.uk). “The rationale is that services enabled by IT, must be designed around the<br />
citizen or business, not the provider, and provided to modern, co-ordinated delivery channels” (Saxby,<br />
2007a, p. 214). It was part of the Cabinet Office’s Transformational Government Agenda which aimed to<br />
improve return on investment of IT projects and inter, extra and intra-departmental information sharing<br />
(HM Treasury, 2007; Norton, 2008; Pickering, 2009; Saxby, 2007b).<br />
In the years since its inception, the Directgov supersite (and agency) had an interesting journey. Primarily<br />
‘owned’ by the Cabinet Office, then the Department of Work and Pensions (DWP) and most recently,<br />
ownership was moved back to the Cabinet Office. Directgov joined the powerful new Efficiency and<br />
Reform Group in the Cabinet Office since last summer. Meanwhile, a strategic review of Directgov was<br />
undertaken by Martha Lane Fox, co-founder of Lastminute.com who was appointed as the UK Digital<br />
Champion. Her recommendations included advice on how the Government can use the internet to both<br />
communicate and interact better with citizens whilst also delivering significant efficiency savings from<br />
channel shift and by converging Directgov with Business Link into a single domain (Fox, 2010;<br />
Transform, 2010). Indeed, most of her proposals were accepted by the Minister for the Cabinet Office,<br />
Francis Maude in his response letter last November (Cabinet Office, 2010).<br />
Directgov offers the user fairly sophisticated administrative, legal, regulatory and social public services,<br />
and a number of online tools. Furthermore, its availability in the Welsh language and in many accessible<br />
formats as well as via other media, such as digital television and mobile phones, enhances outreach to a<br />
wider audience and broadens accessibility (Directgov, 2009; Kolsaker & Lee-Kelley, 2008; Norton, 2008;<br />
Pickering, 2009). In addition, the introduction of the Connect to your Council (mycouncil.direct.gov.uk)<br />
service offers seamless access, acting as a single point of contact instead of going through many layers,<br />
directly to the local council’s service the user requires (Directgov, 2009; King & Cotterill, 2007; Kolsaker &<br />
Lee-Kelley, 2008; Sarikas & Weerakkody, 2007).<br />
On the participation front, it promotes public consultation by linking directly to the e-petitions section of<br />
the 10 Downing Street (petitions.number10.gov.uk) website but it does not offer e-voting or any other<br />
form of interactivity and participation, nor has it embraced Web 2.0 or social networking technologies.<br />
Contrary to the service provision to both citizens and business which has been a success, improving<br />
citizen engagement, input and participation have been minimal and of little benefit. Thus, citizens turn to<br />
sites unaffiliated with government websites, such as YouGov (www.yougov.co.uk) to have a say and try<br />
to influence politics and policy alike (Kolsaker & Lee-Kelley, 2008; Norton, 2008; Pickering, 2009).<br />
If we were to apply any of the maturity models from either the eCommerce/eBusiness or eGovernment<br />
areas examined above, in order to map Directgov’s maturity and stages of growth, these would be<br />
Angehrn’s (1997) in synergy with Hiller & Belanger’s (2001) model. Angehrn (1997) was a pioneer of his<br />
time and his model stands out from the rest as diachronic over time; in addition, its flexibility and<br />
adaptability makes it applicable to many cases, levels and instances. The four virtual spaces Angehrn<br />
(1997) proposed apply to Directgov, which with the creation of new channels within all of those spaces,<br />
fulfils visibility, interaction, service delivery and multi-dimensional transactions at many levels,<br />
accompanied by strategic planning and clear objectives. In particular, Directgov’s strong brand could be<br />
mapped on the Visual Information Space (VIS) which is about visibility. Moreover, according to Directgov<br />
Strategic Review which was published recently, the brand can be stretched to cover news,<br />
announcements/press releases; corporate information from departments, campaigns and e-democracy.<br />
This could be achieved by shared web services and a single domain (Transform, 2010). This move in<br />
turn, will enhance citizens and business alike to engage in relationship, ideas and opinion-building<br />
activities such as lobbying inter alia, which could be mapped to the Visual Communication Space (VCS)<br />
which is about interaction. The distribution of information and transactional services via a multitude of<br />
digital channels could be mapped to the Virtual Distribution Space (VDS) which is about service delivery.<br />
The high quality user-friendly transactions that take place on Directgov, although in need of improvement,<br />
618
Panos Hahamis<br />
as they need to be more user-centred, along with more guidance to be provided (Transform, 2010), could<br />
be mapped to the Virtual Transaction Space (VTS) which is about trading.<br />
Hiller & Belanger’s (2001) model on the other hand, offers an integrated approach to map Directgov’s<br />
evolution, maturity and sophistication of services. It covers all possible relationships Directgov is<br />
designed to serve and the extra stage other models do not offer, that of participation. Directgov has bypassed<br />
the Information stage by default, as it was not designed with the provision of information in a<br />
static form. On the Two-way Communication stage, where there is supposed to be some interaction<br />
between government and its constituents, we could map not only the tools provided on the portal for a<br />
two-way communication, but also the feedback forms on each page containing the actual information<br />
sought. Directgov also fulfils the Transaction stage where constituents are allowed to interact and<br />
transact fully online, through a web-based interface without the need for human intervention. With regard<br />
to the Integration stage, it is worth noting that Directgov had reached the integration stage which was<br />
complex, as not only back-office processes and systems were integrated with front-end interfaces, the<br />
integration of central and local government systems had to be achieved too. On the final Participation<br />
stage, we could map some initiatives, such as the e-petitions and recent consultations with regard for<br />
example the Directgov review, which was made public. However, citizens are still not allowed to comment<br />
on/participate in the democratic process in various ways and to register and vote online. The recently<br />
published Government ICT Strategy (Cabinet Office, 2011) pledges for a creation and delivery of policy in<br />
an open and accessible forum which through digitally engagement and collaboration, it “will enable<br />
citizens to influence, comment on and contribute to the decision-making process” (p. 19).<br />
6. Conclusions<br />
This paper presents research towards the Henley Doctor of Business Administration (DBA) Programme<br />
which is in progress. An attempt was made to map the development maturity of the Directgov portal on<br />
applicable models of growth by means of content observation and review of the literature. This effort is<br />
certainly not complete or holistic as the literature review is by no means exhaustive and a further<br />
empirical study needs to be conducted.<br />
Ideally there should not be a need to use a synergy of models as suggested above, but to build a new<br />
model taking into account not only the relationships and the stages outlined by previous studies and<br />
proposed frameworks, but also a new set of constructs. In the case of Directgov, issues such as full<br />
democratic participation and engagement as well as e-inclusion, in order to tackle the digital divide, have<br />
not been taken into account satisfactorily. Furthermore, it lags behind in embracing Web 2.0 and social<br />
networking technologies, although the latest Government ICT Strategy and Directgov Strategic Review<br />
promise more use and incorporation of social media (Cabinet Office, 2011; Transform, 2010). The citizen<br />
is now served as a customer, not as a citizen, and so far it could be said that the project is successful,<br />
mainly as a cost cutting exercise. For joined-up government, you need to have joined-up citizens.<br />
References<br />
Andersen, K. V., & Henriksen, H. Z. (2006). EGovernment maturity models: Extension of the Layne and Lee model.<br />
Government Information Quarterly, 23(2), 236-248.<br />
Angehrn, A. (1997). The Strategic Implications of the Internet. Paper presented at the 5th <strong>European</strong> <strong>Conference</strong> on<br />
Information Systems. Retrieved 30 April 2009, from<br />
http://www.calt.insead.edu/Publication/ICDT/strategicImplication.htm<br />
Cabinet Office. (2010). Response by Minister for the Cabinet Office Francis Maude to the Directgov 2010 and<br />
Beyond Report. London: Cabinet Office.<br />
Cabinet Office. (2011). Government ICT Strategy. London: Cabinet Office.<br />
Chan, C., & Swatman, P. M. C. (2004). B2B eCommerce stages of growth: the strategic imperatives. Paper<br />
presented at the System Sciences, 2004. Proceedings of the 37th Annual Hawaii International <strong>Conference</strong> on<br />
System Sciences.<br />
Cross, M. (2004). Direct to your destination. The Guardian 4 March. Retrieved 17 July 2009, from<br />
http://www.guardian.co.uk/technology/2004/mar/04/internet.egovernment<br />
Curtain, G. G., Sommer, M. H., & Vis-Sommer, V. (2004). The World of EGovernment: Haworth Press.<br />
Directgov. (2009). About Directgov. Retrieved 1 August 2009, from<br />
http://www.direct.gov.uk/en/SiteInformation/DG_4004497<br />
Earl, M. J. (2000). Evolving the eBusiness. Business Strategy Review, 11(2), 33-38.<br />
Fox, M. L. (2010). Directgov 2010 and Beyond: Revolution Not Evolution. London: Race Online 2012.<br />
Galliers, R. D., & Sutherland, A. R. (1991). Information systems management and strategy formulation: the'stages of<br />
growth'model revisited. Information Systems Journal, 1(2), 89-114.<br />
Ghachem, L. (2006). Maturity of electronic commerce: A review of the principal models. Paper presented at the<br />
FEBR 2006.<br />
619
Panos Hahamis<br />
Grant, I. (2009). UK government shuts down half its websites, 600 more to close. Computer Weekly 5 August 2009.<br />
Retrieved 8 August 2009, from http://www.computerweekly.com/Articles/2009/08/05/237197/uk-governmentshuts-down-half-its-websites-600-more-to.htm<br />
Hahamis, P., Iles, J., & Healy, M. (2005). eGovernment in Greece: Bridging the gap Between Need and Reality.<br />
Electronic Journal of eGovernment Volume, 3(4), 185-192.<br />
Hiller, J., & Belanger, F. (2001). Privacy Strategies for Electronic Government. In M. A. Abramson & G. E. Means<br />
(Eds.), EGovernment (pp. 162-198). Oxford: Rowman and Littlefield Publishers.<br />
HM Government. (1999). Modernising Government. White Paper. London: The Stationery Office.<br />
HM Treasury. (2007). Service Transformation Agreement. Retrieved 30 July 2009, from<br />
www.eurim.org.uk/.../Service_Transformation_Agreement.pdf<br />
King, S., & Cotterill, S. (2007). Transformational Government? The role of information technology in delivering<br />
citizen-centric local public services. Local Government Studies, 33(3), 333 - 354.<br />
Kolsaker, A., & Lee-Kelley, L. (2008). Citizens' attitudes towards eGovernment and e-governance: a UK study.<br />
International Journal of Public Sector Management, 21(7), 723-738.<br />
Layne, K., & Lee, J. (2001). Developing fully functional EGovernment: A four stage model. Government Information<br />
Quarterly, 18(2), 122-136.<br />
McKay, J., Marshall, P., & Prananto, A. (2000). Stages of maturity for eBusiness: The SOG-e model. Paper<br />
presented at the PACIS 2000, Hong Kong.<br />
Nolan, R. L. (1973). Managing the computer resource: a stage hypothesis. Communications of the ACM (16), 399–<br />
405.<br />
Norton, P. (2008). Directgov: The Right Direction for EGovernment or a Missed Opportunity? The Journal of<br />
Information, Law and Technology (JILT)(1).<br />
Pickering, A. (2009). New Labour’s Digital Vision: A Survey of EGovernment in the UK Since 1997. Knowledge<br />
Politics Quarterly, 2(1).<br />
Porter, M. E. (2001). Strategy and the Internet. Harvard Business Review, 79(3), 62-79.<br />
Prananto, A., McKay, J., & Marshall, P. (2001). Frameworks to support eBusiness growth strategy. Proceedings of<br />
the Global Cooperation in the New Millenium, ECIS, 1254–1263.<br />
Rao, S. S., Metts, G., & Monge, C. A. M. (2003). Electronic commerce development in small and medium sized<br />
enterprises. Business Process Management Journal, 9(1), 11-32.<br />
Rayport, J. F., & Jaworski, B. (2001). Introduction to eCommerce: McGraw-Hill Higher Education.<br />
Reddick, C. G. (2004). A two-stage model of eGovernment growth: Theories and empirical evidence for U.S. cities.<br />
Government Information Quarterly, 21(1), 51-64.<br />
Remenyi, D., Williams, B., Money, A., & Swartz, E. (1998). Doing research in business and management: an<br />
introduction to process and methods. London: Sage.<br />
Sarikas, O. D., & Weerakkody, V. (2007). Realising integrated eGovernment services: a UK local government<br />
perspective. Transforming Government: People, Process and Policy, 1(2), 153-173.<br />
Saxby, S. (2007a). News and comment on recent developments from around the world. Computer Law & Security<br />
Report, 23(3), 211-226.<br />
Saxby, S. (2007b). News and comment on recent developments from around the world. Computer Law & Security<br />
Report, 23(2), 125-137.<br />
Swatman, P. M. C. (1993). Integrating Electronic Data Interchange into existing organisational structure and internal<br />
application systems: the Australian Experience. School of Computing.<br />
Transform. (2010). Directgov Strategic Review. London: Transform Innovation Ltd.<br />
Turban, E., King, D., Lee, J., & Viehland, D. (2006). Electronic commerce 2006 : a managerial perspective (4 ed.).<br />
Upper Saddle River, N.J. ; [London]: Pearson Prentice Hall.<br />
Ward, J., & Peppard, J. (2002). Strategic planning for information systems (3rd ed. / John Ward and Joe Peppard.<br />
ed.). Chichester: Wiley.<br />
West, D. M. (2004). EGovernment and the Transformation of Service Delivery and Citizen Attitudes. Public<br />
Administration Review, 64(1), 15-27.<br />
620
Non<br />
<strong>Academic</strong><br />
Papers<br />
621
622
Providing Public Services Through Digital Postal Networks:<br />
A Position Paper<br />
Liam Church and Maria Moloney<br />
Escher Group Ltd, Dublin, Ireland<br />
Liam.Church@eschergroup.com<br />
Maria.Moloney@echergroup.com<br />
Abstract: Extant government literature shows that, in recent decades, many western democracies have pursued a<br />
program of liberalisation of public services. The once predominantly public telecommunications sector has seen<br />
considerable privatisation. Postal systems have undergone multiple restructuring and streamlining programs to<br />
ensure their continued viability. This privatisation trend has been largely driven by three factors influencing<br />
government policy: a concern to lower costs in the provision of public services, the belief that private sector<br />
companies tend to be more efficient, and the conviction that competition increases efficiency and effectiveness in the<br />
delivery of public services. Additionally, as a result of the technological revolution, postal systems that were once<br />
viewed as efficient, trusted and inclusive have rapidly come to be seen as outdated, expensive and slow. Even<br />
though Posts are still recognised as essential to citizens, they are showing evidence of decline. A direct effect of this<br />
decline is that the ability of posts to fulfil their universal service obligation (USO) is slowly being eroded. The aim of<br />
this paper is to present a digital postal solution to counteract this decline. The new system restores, in digital format,<br />
the full gamut of traditional universal services afforded by Posts to citizens in earlier times. The new system gives<br />
every citizen a private digital space, where they can securely access, process and store official, personal and private<br />
information such as bills, employment records, academic records, health and dental records and postal mail. From<br />
this space, citizens can fully interact with digital society: privately on a one to one basis, socially, commercially and<br />
politically. In addition, the system provides new services, such as informational privacy protection and the supply of<br />
‘anonymised’ online statistical data which will provide information on online behaviour and trends. Currently, this type<br />
of statistical data is largely in the hands of private companies and therefore of no benefit to the public good. A digital<br />
postal system based on the concept described in this paper is proposed to be rolled out in Ireland over the next few<br />
years.<br />
Keywords: postal services, freedom of information, eDemocracy, informational privacy, digital government,<br />
technology artefact, socio-technical design<br />
1. Introduction<br />
In recent years, and arguably as a result of governmental policy and rapid technological innovation, there<br />
have been a number of fundamental shifts in the communications market that have affected the postal<br />
industry. Since the 1970s, governments across Europe, and indeed elsewhere, have held the belief that<br />
public service organisations were best managed as if they were 'businesses' (Cordella & Willcocks, 2010;<br />
Hambleton, 1994). This resulted in a number of key government policy shifts to replace state services<br />
with numerous competing providers. To a large extent, these providers took on the traditional role of the<br />
public service, which in turn was portrayed as ‘enabling, not providing’ public services. The fundamental<br />
driver of these reforms was the assumption that public services were better managed in the interest of<br />
efficiency through private sector economic drivers as opposed to the ‘inclusive’ interest of citizens<br />
(Cordella & Willcocks, 2010). The culmination of this trend, in the postal sector, was a political agreement<br />
at the <strong>European</strong> level for the full opening of the postal services market to competition by the end of 2010.<br />
In reaction to these neo-liberal policies, and to replace revenues lost by falling mail volumes, posts are<br />
employing new technologies and business strategies not only to improve, and make more cost effective,<br />
their provision of a universal service, but also to expand and develop their core competencies to<br />
encompass expertise in the fields of ecommerce, e-government and hybrid mail. In fact, Posts are<br />
particularly well placed to become key players in these fields because they are traditionally regarded as<br />
Trusted Intermediaries (TIs) and are obligated to all citizens of a nation by their universal service<br />
obligation (USO). Therefore posts have an advantage in that they have an established brand that is<br />
recognised by the entire population of a state as that of an organisation that is controlled and regulated.<br />
De Reuck and Joseph (1999) posit that the concept of a USO is relative to the historical moment in which<br />
the USO occurs. That is to say that it is not a rigid concept but rather a dynamic one, which requires<br />
continual revisiting in light of changing technological innovations and social needs (De Reuck & Joseph,<br />
1999). For example, in Great Britain, the provision of broadband services to all households in the country<br />
has recently become a universal service (Carter, 2009). Therefore, it can be argued that Posts are only in<br />
decline because they are being allowed to decline.<br />
623
Liam Church and Maria Moloney<br />
Posts have a valuable exploitable asset in that they have an established and trusted brand. Research<br />
has shown that given the profit-driven and competitive nature of our digital society and individuals’<br />
concerns surrounding issues like the protection of their personal information online, individuals prefer to<br />
entrust their personal information to familiar and trusted brands. When individuals 'trust' an online brand,<br />
it increases the likelihood of those individuals actually interacting with that brand because trust alleviates<br />
concerns regarding possible negative consequences (Kim & Prabhakar, 2000). The challenge now facing<br />
posts is to use their trusted brand to their advantage by extending it to encompass an inclusive,<br />
affordable and high-quality electronic service.<br />
In section two of this document, an historical snapshot of the postal system and the democratic<br />
importance of its USO is presented. This is used to emphasise how the USO has been eroded over the<br />
last number of decades, to the detriment of citizens. A comparison between past and present postal<br />
systems is also outlined and in section three, a description of a proposed digital postal solution is given.<br />
Section four concludes the paper.<br />
2. The historical impact of privatisation on public services<br />
Historically, in the paper-based world of three decades ago, posts played a significant societal role. Every<br />
citizen, business and government depended on the Post for safe delivery of mail. The Post enabled<br />
citizens to establish and maintain business relationships and links with emigrants. It helped them save<br />
and send money, and connected them with information about their health, education and employment.<br />
Given that the pace of business and of life in general was much slower at this time, the post had a very<br />
safe, reliable and efficient system. The local post office and the postman were central to the lives of all<br />
citizens regardless of location, age, gender or socio-economic status.<br />
2.1 The government transparency and privatisation paradox<br />
After World War II, the notion of ensuring transparency in government started to gain momentum<br />
internationally (Braman, 2006). However, it took considerable time for many nations to actually implement<br />
government transparency. In the mid-1980s, only 11 nations had freedom of information laws, but by the<br />
end of 2004, 59 nations had implemented such laws (Relly & Sabharwal, 2009; Roberts, 2006).<br />
Privatisation, on the other hand, became popular in the 1970s and 1980s in reaction to what had often<br />
become, by that time, costly and bureaucratic public services. It was believed that privatising<br />
governmental services would lead to greater efficiency and competition, which would in turn benefit the<br />
citizen (Aman, 2005; Cordella & Willcocks, 2010).<br />
In the last three decades, these two movements, privatisation and government transparency have grown<br />
in parallel. Many governments have worked to increase openness and transparency in their actions,<br />
through ongoing process improvements and the implementation of freedom of information acts.<br />
Transparency in government and the right to access government information are now internationally<br />
regarded as essential to democratic participation, prevention of corruption, informed decision-making,<br />
and provision of accurate information to the public, companies, and journalists (Cullier & Piotrowski,<br />
2009; Mulgan, 2007; Quinn, 2003; Reylea, 2009; Shuler, Jaeger, & Bertot, 2010).<br />
Privatisation usually entails handing over to the market, the provision of services that were traditionally<br />
provided by government. This political decision to move a service or governmental responsibility from the<br />
public sector to the private sector has many consequences. Privatisation subjects the activity in question<br />
to the forces of the market while freeing it from both substantive and procedural forms of regulation that<br />
apply to public bodies. The privatisation of an industry or a social service means, by and large, that the<br />
administrative laws of a country no longer apply to that industry or service, nor do any Freedom of<br />
Information Acts (FOIA) (Aman, 2005).<br />
Paradoxically, as governments strive for transparency, they are at the same time handing over public<br />
services to private companies who are not publicly accountable. Traditionally, governments were in<br />
charge of providing vital public services to all its citizens. Examples of such services that citizens enjoyed<br />
at one time were the provision of:<br />
The opportunity for every citizen to post their mail in their local post office and receive mail to their<br />
door at least once every working day.<br />
National maps. All maps of the country were owned by the state. This was considered a vital role of<br />
the government to ensure that all citizens had access to maps of their nation;<br />
624
Liam Church and Maria Moloney<br />
A national public directory to all households and businesses in the country, containing the contact<br />
details of all the businesses and residences in the country;<br />
Freely available books to all citizens through a nationwide network of public libraries.<br />
Free post office savings accounts for all citizens<br />
A central statistics office to provide information on economic, social and general activities and<br />
conditions in the State, such as the productivity of school and hospitals.<br />
In the last decade or so, all these services have either been completely or partially digitalised:<br />
Every citizen, with access to a computer, has a means of written communication through the use of<br />
Internet email applications, again most of which are privately owned.<br />
Even though ordinance survey maps are now digitally available, they are not interactive. Interactive<br />
maps of a nation and the world, detailing information on residential and business locations are<br />
available through the Internet application, Google Maps, which is privately owned by Google Inc;<br />
Access to public directories containing all the businesses and residences in the country is available<br />
through Internet search engines such as Yahoo and Google, all of which are privately owned<br />
companies;<br />
Books are still freely available to citizens through public libraries but the digital versions of books are<br />
available to citizens - at a price - through Internet applications like privately owned Google Books,<br />
and wireless reading devices like Kindle privately produced by Amazon.com;<br />
Free banking is still available through post offices but they do not offer online banking. Banks charge<br />
for banking services which include online banking.<br />
The central statistics office website has become the main information dissemination vehicle for the<br />
office in recent decades. All their statistical data are now available in digital form on their website.<br />
However, any statistical data regarding society’s online behaviour is held by private companies<br />
usually for the sole benefit of that company and not benefiting society at large.<br />
There are two noteworthy differences between these two scenarios. The first difference is the method of<br />
communication for all these services has changed from physical to digital form. The second difference is<br />
that many services once provided by the government are now being replaced by digital equivalents in the<br />
hands of private companies. A significant consequence of this is that, unlike regulated governmental<br />
bodies, private enterprise cannot be held accountable; they are not subject to national administrative law<br />
or to the freedom of information act. As a result, all transparency within the service is either non-existent<br />
or can potentially be eliminated.<br />
In addition, all personal information these private companies aggregate about citizens or how they are<br />
using it does not have to be disclosed. There are multiple consequences of this but two major<br />
consequences are now discussed. Citizens have growing privacy concerns regarding their personal<br />
information which is in the hands of private companies and secondly, the publicly owned central statistics<br />
office does not have access to vast quantities of information pertaining to the online behaviour of the<br />
nation’s population. These private companies have as their motivation, maximisation of profit not the<br />
provision of efficient, publicly inclusive services.<br />
Even though governments provide digital equivalents for some of the services previously outlined, given<br />
the profit motivation and advertising strength of private companies, the privately owned digital equivalents<br />
are developing faster and capturing a larger portion of the market. As a result, governments are no longer<br />
competitive. However, in allowing a private monopoly to develop, citizens’ basic democratic rights to vital,<br />
affordable, inclusive public services are under threat. In reaction to this situation, various approaches to<br />
reforming public services have been proposed whereby public bodies can deliver efficient services, while<br />
still remaining publicly accountable (Cordella & Willcocks, 2010; Hambleton, 1994; Mintzberg, 1996;<br />
Osborne & Gaebler, 1993; West, 2005).<br />
In the next section, a description is provided of how reliable provision of at least some of these services<br />
can be restored to the public through a trusted third party or a government-owned corporation such as a<br />
national postal operator.<br />
625
Liam Church and Maria Moloney<br />
3. Co-networking: The networking of the future<br />
Currently, the trend dominating the Internet is towards mass socialisation of services. That is to say,<br />
individuals are looking to the Internet to take part in social activities. Social networking, a process of<br />
forming online communities, is the most rapidly growing area of social online activity (Chubb, 2010).<br />
However, social networking only covers the online social lives of individuals. As individuals begin to<br />
spend more time online, their physical world becomes more intrinsically linked with their digital world.<br />
Now everything that defines individuals, such as their identity and relationships, communications,<br />
financial data, health data, academic and employment records can now be found both in physical form<br />
and digital form. In light of this, it is only a matter of time before individuals start to look to the Internet for<br />
networking sites that allow them to carry out not only their social activities but their financial, economic<br />
and political activities as well.<br />
3.1 The proposed solution<br />
The proposed digital postal system will provide a de jure system which will allow citizens to have a<br />
protected digital representation of themselves and of their community. What is meant by the term “a<br />
protected digital representation” is that the proposed system will allow each citizen to register on the<br />
system as a digital citizen with a digital private space, equivalent in many ways to a virtual home. From<br />
this space, they will be able to securely access, process and store all their official, personal and private<br />
information such as bills, employment records, academic records, health and dental records and official<br />
and unofficial mail. Additionally, each citizen will be able to interact with the digital society on all levels.<br />
That is to say, citizens will not just be allowed to communicate socially with friends and family but to also<br />
communicate with government, business and other citizens just like the traditional postal system allows.<br />
This is in effect, a progression from social networking to a more cohesive or fully communicative<br />
networking or co-networking.<br />
The significant difference between this proposed cohesive network and current networks on the Internet<br />
is that, this network will be a protected network where private enterprise will not be allowed to access,<br />
track or aggregate individuals’ personal information. As a result, all the personal information of a citizen<br />
will remain their own and they will possess the choice of accessing the Internet privately and<br />
anonymously through the secure postal network or ‘stepping outside’ their safe network and accessing it<br />
freely as they do now. With this system and for the first time since the advent of the Internet, citizens will<br />
have a layered level of privacy protection ranging from being fully in control of their actions and the<br />
information generated by those actions to being fully and publicly available to the forces of the Internet.<br />
Figure 1 shows this layered level of privacy protection within the postal system.<br />
Figure 1: The layered privacy protection infrastructure<br />
626
Liam Church and Maria Moloney<br />
Social communication conducted over the electronic postal system will be similar to the services offered<br />
by social networking sites. One extra benefit is that the system will facilitate information sharing on a local<br />
level. Additionally, for a fee, local businesses will be able to send Direct Mail through the system to all<br />
local residents.<br />
Formal communication over the system will allow all members of the community to send invoices, bills,<br />
payments and official notices over a secure, digital channel. The local city/county council will be able to<br />
send notifications in the form of bulk mail to all residents of the city or region, notifying them of issues of<br />
public interest such as road closures and public meetings. Likewise, local politicians will be more<br />
accessible to their constituents. Residents will be confident that such notifications are genuine as they<br />
are delivered through and therefore authenticated by, the secure digital postal system. Residents looking<br />
to find information on local businesses, services and community events will have a central reference point<br />
for all such information.<br />
This type of secure, formal co-networking within the system could easily scale from a local level to a<br />
national, <strong>European</strong> and international level. A public directory stored within the system would provide a<br />
lookup service, similar to the traditional White Pages, which residents could use to find contact details of<br />
other residents, local businesses or governmental offices. A geo-location application would then pinpoint<br />
the address of the service being sought on an interactive map which could provide extra information<br />
about the service such as opening times and range of services offered. This free look-up service could be<br />
a vital tool to local businesses in attracting back revenue lost to large online shopping stores.<br />
Services like a national public directory, a national mapping service and secure transfer of electronic mail<br />
are again provided to the public for the benefit of citizens and society rather than economic gain for<br />
private enterprise. Figure 2 shows the various services offered by the proposed system.<br />
Figure 2: A regulated electronic postal service benefiting all citizens of a nation.<br />
Due to the fact that posts are based in the country where they offer their services, national governments<br />
will be able to regulate the network with their own legislation as opposed to most social networks and ecommerce<br />
sites that are frequently based in the US and thus governed by US law. National governments<br />
can thus decide on how much legislation is required for their own electronic postal system as they have<br />
done with their posts for centuries. This facilitates the existence of a trusted intermediary at the core of<br />
the digital postal system like that at the core of the traditional post.<br />
627
Liam Church and Maria Moloney<br />
The fact that this network could be governed and controlled by each individual country would be<br />
particularly important when conducting secure transactions through the system. Online banking and bill<br />
payments could be facilitated through the postal network and, for a fee, receipts of financial transactions<br />
and other sensitive information, such as credit card details, account numbers, would be stored in secure<br />
encrypted databases within the network. These secure databases that contained individuals’ private<br />
information would be protected by the posts that manage the network. In effect, the posts would offer a<br />
privacy management service to their customers.<br />
Private enterprise would pay for the privilege of accessing ‘anonymised’ personal information. The notion<br />
of ‘anonymised’ personal information means that all personally identifiable information that could link the<br />
information back to specific individuals would be stripped prior to it becoming available to private<br />
enterprise. This method of information exchange would allow private enterprise access valuable personal<br />
information while still protecting individuals’ informational privacy and allowing them to monetise the<br />
information they generate.<br />
In the proposed postal system, all citizens, small and large businesses, government departments and<br />
large enterprises would be entitled to an electronic Post Office (PO) box once they supplied proof of their<br />
identity and their physical address. Each PO box in the system would require users’ authentication in<br />
order to access it. All mail sent from a PO box, either business or personal, would be securely and<br />
confidentially enclosed in electronic envelopes, through the use of encryption, while still in the PO Box<br />
and then passed along a secure closed network. It would not be decrypted until it reached its destination.<br />
If the mail was lost and needed to be handled by postal employees, the contents of the mail could not be<br />
viewed, just like in the traditional system.<br />
The infrastructure of the electronic postal system is set up in such a way that citizens could either access<br />
their PO boxes at home through the use of a traditional browser or if they did not have a computer at<br />
home, they could call to their local post office to access it. In this respect, the postal system would help<br />
to bridge the digital divide within society. Citizens who cannot afford a personal computer or those who<br />
are computer illiterate would have access, with the help of the post office, to digital society. Just like three<br />
decades ago, the main function of the new postal system is their USO, to provide an inclusive system<br />
which collects and delivers post privately and securely to every citizen’s (virtual) home. However in this<br />
system, customers could also avail of all the traditional services offered by posts such as:<br />
Protection of citizens’ personal information within communications;<br />
Bill pay services;<br />
Public directory lookup services;<br />
Registered mail and other traditional postal services;<br />
Free savings accounts<br />
In addition, Post could offer other services traditionally provided by government such as:<br />
Geo-location and mapping services which could include any information that businesses wish to<br />
impart to their customers; A service similar to combining access to ordinance survey maps with<br />
business directory services for citizens.<br />
Provision of anonymised statistical data, gathered from the network, to the central statistics office for<br />
the benefit of the public good.<br />
The proposed digital postal system would facilitate the digitalising of the entire community, regardless of<br />
age, gender, education level or socio-economic status. Additionally, it would digitalise a nation’s<br />
communities on three significant fronts: the political, commercial and social fronts. The fact that this can<br />
be achieved by one system makes the digital transition less complex for everyone. All citizens could<br />
experience a complete digital community life, either at home or at their local post office. Citizens would<br />
also have fewer concerns about privacy due to the secure and regulated nature of the network. With this<br />
system, citizens could continue to interact and communicate locally, nationally and internationally as has<br />
always been true of communications via the postal network.<br />
In addition, by providing digital postal services throughout an entire nation, the proposed system supports<br />
EU policy for e-Government and encourages the fair and balanced deployment of ecommerce<br />
nationwide. It could be operated and managed by either national postal operators or state-sponsored<br />
bodies regulated by law.<br />
628
4. Summary and conclusions<br />
Liam Church and Maria Moloney<br />
Posts have used many strategies over recent decades in an attempt to survive in the current competitive<br />
communications market. Over the last two or three decades, governmental policies of prioritising market<br />
competition over democratic goals have subtly but progressively affected both citizens and posts alike.<br />
Many countries in Europe and worldwide have implemented certified electronic mail solutions to bring<br />
their postal system into the digital age. However, if there is to be a truly international digital postal service<br />
similar to the traditional postal service, a series of national digital postal solutions that work together is<br />
required along with the implementation of legislation both at a national and international level.<br />
This paper proposes a system that will establish posts in digital society and will also provide a holistic<br />
solution to bridging the growing digital social divide. It achieves this by allowing citizens access their<br />
electronic mail and the digital postal network at their local post office regardless of whether they have a<br />
computer at home and if necessary, with the assistance of postal staff. In this way, young, old, computer<br />
literate and computer illiterate citizens have access to the digital world through their postal system.<br />
By bringing public services into the digital world, citizens can experience the benefits of publicly inclusive<br />
services in digital form. Posts will also reap benefits in the form of increased market share and a renewal<br />
of their role in modern society. The entire community will benefit through full and safe engagement with<br />
their digital society. A solution based on the system outlined in this paper is proposed to be rolled out in<br />
Ireland over the next number of years.<br />
References<br />
Aman, A. C. (2005). Privatization, Prisons, Democracy, and Human Rights: The Need to Extend the Province of<br />
Administrative Law. Indiana Journal of Global Legal Studies (Volume 12, Issue 2), pp. 511-550.<br />
Braman, s. (2006). Change of state: Information, policy, and power. . Cambridge, MA: Massachusetts Institute of<br />
Technology Press.<br />
Carter, S. (2009, June 16). A User's Guide to Digital Britain. (A. Chitty, Interviewer)<br />
http://www.illumina.co.uk/projects/showreels.php.<br />
Chubb, P. (2010, March 4th). Mobile Social Networking Statistics: 2010 Growth. Retrieved January 13th, 2011, from<br />
http://www.onlinesocialmedia.net/20100304/mobile-social-networking-statistics-2010-growth/<br />
Cordella, A., & Willcocks, L. (2010). Outsourcing, bureaucracy and public value: Reappraising the notion of the<br />
'contract state'. Government Information Quarterly , Volume 27 (Issue 1), pages 82-88.<br />
Cullier, D., & Piotrowski, S. J. (2009). Internet information-seeking and its relation to support for access to<br />
government records. Government Information Quarterly , Volume 26, pages 441−449.<br />
De Reuck, J., & Joseph, R. (1999). Universal Service in a Participatory Democracy: A Perspective from Australia.<br />
Government Information Quarterly , Volume 16 (Issue 4), Pages 345-352.<br />
Hambleton, R. (1994). The Contract State and the Future of Public Management. The Employment Research Unit<br />
<strong>Conference</strong>. Cardiff: Cardiff Business School.<br />
Kim, K., & Prabhakar, B. (2000). INITIAL TRUST, PERCEIVED RISK, AND THE ADOPTION OF INTERNET<br />
BANKING. International <strong>Conference</strong> on Information Systems (pp. 537 - 543 ). Brisbane, Queensland, Australia :<br />
Association for Information Systems Atlanta, GA, USA .<br />
Mintzberg, H. (1996, May-June). Managing government, governing management. Harvard Business Review, , pages<br />
75−85.<br />
Mulgan, R. (2007). Truth in government and the politicization of public service advice. Public Administration , Volume<br />
85, pages 569−586.<br />
Osborne, D., & Gaebler, T. (1993). Reinventing government. How the entrepreneurial spirit is transforming the public<br />
sector. New York: Plume.<br />
Quinn, A. C. (2003). Keeping the citizenry informed: Early congressional printingand 21st century information policy.<br />
Government Information Quarterly , Volume 20, pages 281−293.<br />
Relly, J. E., & Sabharwal, M. (2009). Perceptions of transparency of government policymaking: A cross-national<br />
study. Government Information Quarterly , Volume 26, pages 148−157.<br />
Reylea, H. C. (2009). Federal freedom of information policy: Highlights of recent developments. Government<br />
Information Quarterly , Volume 26, pages 314−320.<br />
Roberts, A. (2006). Blacked out: Government secrecy in the information age. New York: Cambridge University Press.<br />
Shuler, J. A., Jaeger, P. T., & Bertot, J. C. (2010). Implications of harmonizing e-government principles and the<br />
Federal Depository Library Program (FDLP). Government Information Quarterly , Volume 27, pages 9-16.<br />
West, D. (2005). Digital Government. . Oxford: Princeton University Press.<br />
629
An Evaluation of Expression of Doubt in the context of<br />
Self-Assessment<br />
(Section 955(4) Taxes Consolidation Act 1997) – Irish Revenue Commissioners<br />
Anne Corbett and Francis Rossney<br />
Irish Revenue Commissioners, Ireland<br />
University of Limerick, Ireland<br />
ancorbet@revenue.ie<br />
frank.rossney@ul.ie<br />
Abstract:: Revenue has always been at the forefront of change in Ireland. 1988 saw a major change with the<br />
introduction of Self-Assessment for taxpayers. This brought new levels of trust and a user-friendly operation into<br />
the relationship between Revenue and taxpayer. It also brought a requirement for new levels of knowledge of the<br />
tax system by practitioners and taxpayers. Ireland is one of the few EU countries to introduce a facility whereby<br />
the taxpayer can express doubt on filing their tax return. This enables the taxpayer to file on time and remain<br />
compliant despite having a doubt about a matter in their return. The facility in Ireland is referred to as an<br />
Expression of Doubt (EOD), provided for under Section 955(4) Taxes Consolidation Act 1997. Ireland’s<br />
interactive internet-based filing system, Revenue Online Service (ROS) used by taxpayers to submit their tax<br />
returns is enhanced by the availability of this facility. A taxpayer expresses doubt by ticking a box on the tax<br />
return and providing an explanation of the doubt. Revenue then examines the doubt, and because the taxpayer<br />
has disclosed the matter, he/she will avoid interest and penalties should the doubt give rise to a liability of tax.<br />
The author, using software and discussion with practitioners and Revenue personnel, examines the EOD facility<br />
in a systematic way by asking: after many years, is it used and still valuable? Does it achieve the goal of aiding<br />
voluntary compliance? What are the doubts of taxpayers? Are there patterns to its use, and are there common<br />
issues arising?. This 2010 study looks at all Irish Income Tax and Corporation Tax returns filed for years 2007<br />
and 2008 where an EOD was indicated. Whilst some issues arise regarding the general use of the system and<br />
require to be addressed, this paper concludes that the introduction of this legislation is significant in aiding,<br />
encouraging and facilitating voluntary compliance of the taxpayer. The recommendations and conclusions draw<br />
together the data, the views of practitioners and Revenue officials in a systematic analysis of the EOD.<br />
Keywords:Self-Assessment, Voluntary Compliance, Interrogative software, Income Tax, Corporation Tax, Anti-<br />
Avoidance<br />
1. Introduction<br />
One of the most fundamental changes in Irish taxation and Revenue structures came with the<br />
introduction of Self-Assessment for Income Tax in 1988, followed by Self- Assessment for Corporation<br />
Tax. Under the Self-Assessment system, taxpayers are required to lodge a tax return containing<br />
detailed information and calculations of their taxable income. The fundamental difference between<br />
this new regime and the original system is that the onus of responsibility is now on the taxpayer to<br />
prepare an accurate return, which is normally accepted by Revenue at face value. Previously, income<br />
tax returns were examined by Revenue officials and assessments issued without input by the<br />
taxpayer.<br />
By 2008, over half of OECD member countries had evolved their systems of administration of income<br />
tax to one based on Self-Assessment principles. (OECD 2008)<br />
Acutely aware of the vital role played by practitioners and taxpayers in the success of the new regime,<br />
Irish Revenue introduced various measures to assist compliance for taxpayers and their agents. The<br />
EOD came into effect, accommodating situations where taxpayers and practitioners have a genuine<br />
doubt about the application of the law to, or the treatment for tax purposes of, any matter included in<br />
their tax return. The benefit to the taxpayer is the avoidance of interest and penalties should tax<br />
become due arising from the doubt. The surcharge applying to late filing is also avoided, as the<br />
taxpayer is deemed to have made a full and true return on time.<br />
The purpose of this study is to examine the Expressions of Doubt of Irish taxpayers for years 2007<br />
and 2008. The overall aim is to establish if the EOD facility is successful in aiding voluntary<br />
compliance and to address the question of whether or not complexity of tax legislation is the driving<br />
force for taxpayer to express doubt. The paper attempts to establish the value of the EOD facility to<br />
taxpayers: to explore areas of doubt where Revenue might focus attention: to define areas where<br />
630
Anne Corbett and Francis Rossney<br />
further support is required to maintain voluntary compliance, and to contribute to best practice in the<br />
future.<br />
2. Background<br />
Irish Revenue collects taxes and duties, which fund the provision of public services for the benefit of<br />
all citizens.<br />
Its primary goal as set out in its Statement of Strategy (Revenue 2008) is:<br />
“to ensure, as far as possible, that everyone complies with their tax and customs<br />
responsibilities – that they pay the right tax and duty at the right time and meet the<br />
obligations set out in tax and customs law”<br />
Prior to 1988, administrative assessment involved the examination of all tax returns by Revenue<br />
officials prior to issuing assessments to taxpayers. On receipt of the Inspector of Taxes’ assessment,<br />
the taxpayer would pay the tax due by certain deadlines. If in disagreement the taxpayer would<br />
appeal against it.<br />
However, this system became “bogged down in an endless paper chase of estimated assessments<br />
and appeals.” (Department of Finance 1998).<br />
The introduction of Self-Assessment for taxpayers and businesses in 1988 heralded a new regime for<br />
taxpayers, giving them greater control over their tax affairs. Arguably, imposing the Self-Assessment<br />
regime on taxpayers had the effect of forcing them to gain knowledge about tax laws, requiring them<br />
to be sufficiently familiar with tax legislation such that they complete the return correctly.<br />
For taxpayers to comply with Tax Law involves adhering to certain legislative provisions. One<br />
involves submitting the tax return providing and full and true disclosure of all material facts pertaining<br />
to the income, credits and allowances due. It is contended that the EOD aids voluntary compliance in<br />
the context of the Self-Assessment regime, in enabling taxpayers and practitioners to fulfil their filing<br />
obligations, knowing that they will not be penalised if wrong. A taxpayer expresses doubt by simply<br />
ticking a box on the tax return and/or providing an explanation of the doubt. Revenue then examines<br />
the doubt, and because the taxpayer has disclosed the matter, he/she will avoid interest and<br />
penalties, which might otherwise apply, should Revenue rule that further tax is due.<br />
During each of the years under examination, in excess of 450,000 Income Tax returns and 120,000<br />
Corporation Tax returns were submitted in Ireland. The level of EOD included in those returns was<br />
present in .5% of Income Tax and .3% of Corporation Tax returns (on average). To put these levels<br />
into context, it is useful to examine the level of exchequer receipts for the same period, amounting to<br />
in excess of 13 billion and 5 billion respectively (Tables IT2 and CT1)<br />
3. Self-Assessment- the definition<br />
There are two generally accepted systems of tax assessment applied by OECD countries –<br />
Administrative Assessment and Self-Assessment. (OECD 2008) Self-Assessment gives the taxpayer<br />
greater control and responsibility over their tax affairs, and brings with it a new level of trust in the<br />
taxpayer.<br />
The essential feature of the self-assessment system is the obligation on the taxpayer<br />
company to estimate its liability to the tax concerned and to ensure that it makes a sufficient<br />
preliminary tax payment, usually before any assessment is made by the inspector. (Feeney<br />
2010, p. 2172)<br />
The Australian Tax office introduced this regime in 1986, and noted that trust in the taxpayer is key to<br />
the system working effectively. Self-assessment is premised on a tenet of trust. There is no way we<br />
would have moved to self assessment if we did not have the conviction that returners, predominantly<br />
tax agents, could be trusted to prepare returns with a high degree of integrity. If there is no trust,<br />
there can be no self-assessment regime. (Michael D’Ascenzo, 1993)<br />
Murphy and Torgler (2004) refer to literature reviews which argue that voluntary compliance improves<br />
in those allowed to self-regulate, and contend that trust “appears to be a resource like no other: it is<br />
not depleted through use but rather through lack of use”. By 2008, over 50% of all OECD countries<br />
had abandoned the Administrative Assessment procedures, in favour of Self-Assessment on the<br />
631
Anne Corbett and Francis Rossney<br />
grounds of efficiency and effectiveness (OECD 2008). Under this system, tax is collected earlier, the<br />
number of disputed assessments is reduced as they are taxpayers’ own calculations, and verification<br />
of the returns is targeted based on risk<br />
Source Irish Revenue Commissioners<br />
3.1 The Expression of Doubt – the Legislation – Section 955 (4) TCA 97<br />
(4) (a) Where a chargeable person is in doubt as to the application of law to or the treatment<br />
for tax purposes of any matter to be contained in a return to be delivered by the chargeable<br />
person, that person may deliver the return to the best of that person’s belief as to the<br />
application of law or the treatment for tax purposes of that matter but that person shall draw<br />
the inspector’s attention to the matter in question in the return by specifying the doubt and, if<br />
that person does so, that person shall be treated as making a full and true disclosure with<br />
regard to that matter.<br />
(b) This subsection shall not apply where the inspector is, or on appeal the Appeal<br />
Commissioners are, not satisfied that the doubt was genuine and is or are of the opinion that<br />
the chargeable person was acting with a view to the evasion or avoidance of tax, and in such<br />
a case the chargeable person shall be deemed not to have made a full and true<br />
disclosure with regard to the matter in question.<br />
632
Source Irish Revenue Commissioners<br />
Anne Corbett and Francis Rossney<br />
4. Tax Compliance and the Complexity of Tax Laws<br />
The primary focus of tax administrations is to ensure compliance with tax laws. Compliance is the<br />
willingness of taxpayers to fulfil their tax obligations to register, file and pay. It is generally believed<br />
that there is huge complexity in Tax Law.<br />
As Braithwaite (2007) observes “most people do not have much understanding of what tax laws<br />
mean”.<br />
Davies et al. (2001) citing William Stromsem, AICPA tax director, believes that in attempting to make<br />
tax treatment fair for all taxpayers, the effect is to further complicate the legislation.<br />
“simplicity and fairness are tradeoffs. The fairer you make the tax code the more<br />
complex it becomes. The simpler you make the tax code, the rougher the justice”.<br />
Martindale et al. (1992) commenting on the complexity of the US tax Laws, contends that it is feasible<br />
to improve the readability of Tax laws by removing the complexity of the text. Citing Duffy and<br />
Kabance (1982) the most important criteria in the usability of text is comprehensibility. The two<br />
factors affecting the latter are the complexity of both the content and text. It is their contention that<br />
President Reagan, during his term of office, criticised the fact that the Income Tax laws were too<br />
complicated, resulting in the IRS revising their schedules and regulations in an effort to improve<br />
readability.<br />
Doyle et al. (2008 p. 177) contributing to the debate on ethics in tax practice suggests that tax<br />
complexity has led to a change in the role of general practitioner.<br />
Tax, once the remit of the ‘general practitioner’ accountant and considered an offshoot of<br />
accounting has grown in complexity and importance and has become a distinct and highly<br />
specialised profession in itself.<br />
Is the Expression of Doubt the necessary counterbalance?<br />
633
5. Methodology of the Study<br />
Anne Corbett and Francis Rossney<br />
Data was extracted from the Central Revenue Database, interrogated and analysed using a software<br />
tool. This data includes information from tax returns filed on Revenue Online Service together with<br />
paper returns filed. The latter are input manually to Revenue’s database. Following export of the data<br />
to Microsoft Excel, it was imported to the software tool IDEA. This tool was used to analyse,<br />
interrogate and where possible aggregate the data over various categorisations. The extent of the use<br />
of the EOD, the submissions by district, region, industry type, practitioner and size of business was<br />
analysed for any trends or patterns. The profile of the submitter and the general nature of issues<br />
arising were established. An initial examination of sample data revealed a mismatch, due to the<br />
number of taxpayers who tick the box without providing narrative (or where no narrative is available),<br />
and others providing narrative who fail to tick the box. The selection criterion therefore involved<br />
extracting details for those taxpayers who ticked the box as appropriate and/or where only the<br />
narrative field was populated. This data formed the basis of the analysis. Data was examined for the<br />
whole country to obtain the complete perspective. This is facilitated with the use of area codes for<br />
each taxpayer. Industry type was facilitated by the NACE code. Views of tax practitioners, revenue<br />
personnel were sought and other EU administrations were requested to confirm the availability of<br />
such facility in their administrations, to complete the study.<br />
5.1 Revenue Online Service (ROS)<br />
The ROS is regarded as the flagship of e-Government services in Ireland. ROS is a self-service<br />
process, removing the requirement for the taxpayer or practitioner to make direct contact with<br />
Revenue when filing the tax return. Mandatory electronic payments and filing using ROS is part of<br />
Revenue’s strategy to establish the use of electronic channels as the normal way of conducting tax<br />
business, with mandatory electronic filing for many categories of taxpayer from 1 st June 2011.<br />
5.2 The Software<br />
The file interrogation software used for this study was Interactive Data Extraction & Analysis (IDEA).<br />
IDEA is a computer-based file interrogation tool for use by auditors, accountants, investigators, and IT<br />
staff. It analyses data in many ways and allows extraction, sampling, and manipulation of data in<br />
order to identify errors, problems, specific issues, and trends. It is capable of performing analyses,<br />
checking calculations, cross matching data between systems, testing for gaps and duplicates and<br />
sampling.<br />
5.3 The Data<br />
Full data on EOD was received for years 2007 and 2008. This included:<br />
o Business description<br />
o Nature of Doubt<br />
o Level of turnover<br />
o Types of income involved<br />
o Capital allowances and deductions claimed<br />
o Tax district dealing with the individual and business taxpayer<br />
o Tax region<br />
The data which was evaluated for this work was extracted from the Central Register, where each<br />
individual taxpayer or taxpayer company has a unique identification number or personal public service<br />
number (PPS) and the full gamut of data returned on their tax returns, including address, nature and<br />
size of business, local inspector of taxes, and NACE code. In addition to the use of this software,<br />
manual sampling was carried out, although the sheer volume of data could not be checked in its<br />
entirety by manual sampling.<br />
5.4 NACE codes<br />
NACE codes are of primary importance in producing statistical analysis for Revenue reports. NACE<br />
code classifications in tax records are compiled by reference to the primary area of economic activity<br />
reported by individual and corporate taxpayers on their own behalf.<br />
The maintenance of accurate NACE codes contributes to the effectiveness of Revenue’s system<br />
analysis tools, such as the risk ranking tool, REAP, and in the selection of cases by sector through<br />
various other systems.<br />
634
Anne Corbett and Francis Rossney<br />
Charts in this study are dependent on the accuracy of the NACE codes on our records.<br />
6. Data Analysis and Discussion<br />
(a) Volumes of EODs<br />
EODs represent 0.55% or less of all returns (Table 3)<br />
Table 3: Expression of Doubt as Percentage of Tax Returns Filed<br />
2007 Income Tax Corporation Tax<br />
Number of returns filed 466,692 126,698<br />
No. of Expressions of Doubt 2,549 451<br />
% of Returns with EOD 0.55% 0.36%<br />
2008 Income Tax Corporation Tax<br />
Number of returns filed 493,306 139,546<br />
No of Expressions of Doubt 2546 374<br />
% of Returns with EOD 0.52% 0.27%<br />
(b) Geographical Spread across Regions<br />
The regional distribution is examined. As can be seen below, the figures are consistent between the<br />
two years for Income Tax (Figure 1).<br />
Figure 1: Expressions of Doubt – Income Tax - Comparison by Region 2007/2008<br />
The spread of Corporation Tax doubts over the regions was inconsistent, with Large Cases Division<br />
seeing a sharp rise in cases in 2008 (Figure 2).<br />
635
Anne Corbett and Francis Rossney<br />
Figure 2: Expressions of Doubt - Corporation Tax – Comparison by Region 2007/2008<br />
(c) District Analysis<br />
Dunlaoghaire/Rathdown district receives the most Income Tax (IT) expressions of doubt, followed by<br />
Fingal district. A sharp rise in Galway’s figures in 2008 draws attention, together with smaller rises in<br />
Kildare and Meath. Interestingly, the figures are fairly standard year on year. Figure 3 provides a<br />
visual comparison.<br />
Figure 3: Expressions of Doubt – Income Tax – Comparison by District<br />
The corporation tax graph in figure 4 shows a completely different trend. Galway, Westmeath/Offaly,<br />
Cavan/Monaghan, Kildare and Cork South West had a much larger volume of doubts in 2007 than in<br />
2008. This may be due to duplication of the same doubt across a number of taxpayers, but requires<br />
further examination. A sharp rise in 2008 is noted in Large Cases Financial Services and<br />
636
Anne Corbett and Francis Rossney<br />
Construction/Property/Mining areas. This is in line with information provided by tax practitioners, as<br />
will be seen later in the study.<br />
Figure 4: Expressions of Doubt – Corporation Tax – Comparison by District 2007/2008<br />
(d) Nature of Business<br />
To establish the trend in business types indicating doubts, the data was interrogated for percentages<br />
across business descriptions. As can be seen from Figure 5, for Income Tax, individuals involved in<br />
rental and property submitted the most doubts. Significant numbers came from PAYE workers and<br />
various types of farming business.<br />
Figure 5: Expressions of Doubt – Income Tax – by Business Description 2008<br />
Businesses submitting doubts for Corporation Tax show a different trend. The Financial Services<br />
sector is the highest submitter of Expressions of Doubt followed by brokers, retailers, property<br />
development, investment holding companies and construction. See figure 6.<br />
637
Anne Corbett and Francis Rossney<br />
Figure 6: Expressions of Doubt – Corporation Tax – by Business Description 2008<br />
(e) How valid are the Expressions of Doubt?<br />
A manual exercise on 300 individuals’ ROS returns sought to establish if they could be regarded as<br />
valid doubts as opposed to informational. This was based on a general belief within Revenue from<br />
those officers working them that there are a considerable number of informational items included as<br />
expressions of doubt. Each “doubt” was examined separately and categorised. A limitation should be<br />
noted here as only one auditor carried out the sampling. A random sample of Income Tax 2008 cases<br />
was used and a common-sense approach to analyse them. They were divided into four categories as<br />
follows:<br />
1.EOD – not completed by taxpayer or just no details available<br />
2.Informational items only<br />
3.Some degree of complexity, but not regarded as technical<br />
4.Could be regarded as technical and complex.<br />
Table 4: Sample Level of Complexity noted in examination of 300 Income Tax returns for 2008<br />
Level of Complexity Number of Cases % of Total<br />
1 38 13%<br />
2 128 43%<br />
3 77 26%<br />
4 57 19%<br />
(f) Nature of issues arising for Income Tax<br />
The data was examined for types of issues giving rise to the doubts. Certain key broad words were<br />
used to make extractions from the data in an effort to find common issues. Table 5 tabulates the most<br />
common issues noted for Income Tax.<br />
Table 5: Sample of Expressions of Doubt received for Income Tax 2008<br />
Income Tax 2008 – Type of Doubt No. of Cases % of Total Doubts<br />
Rental Income 212 8.32%<br />
Interest 85 3.33%<br />
Losses 69 2.71%<br />
Partnerships 61 2.39%<br />
Capital Allowances 58 2.27%<br />
Medical Expenses 56 2.19%<br />
Farming 47 1.84%<br />
Retirement 35 1.37%<br />
Total 623 24.46%<br />
638
(g) Tax Practitioners/Agents<br />
Anne Corbett and Francis Rossney<br />
The level of EOD, which included an agent name, was established (Table 6). It does not suggest that<br />
all others were submitted by individuals privately. It may be that the agent omitted to provide details<br />
or that details are not available.<br />
Table 6: EOD Returns Showing Agent for IT and CT 2007 and 2008<br />
Year Income Tax Corporation Tax<br />
2007 35% 90%<br />
2008 30% 96%<br />
However, 47 cases, which were remitted for Corporation Tax without an agent, were examined to see<br />
if they had an agent per Revenue’s records. 80% of them did not.<br />
6.1 Tax Practitioners’ Views<br />
Interviews were held with three of the ‘big four’ tax practitioner firms in Ireland, as well as a<br />
representative from one of the Accountancy Bodies. The questions were designed primarily to<br />
establish the value of the EOD to their clients, the level of interaction arising with Revenue regarding<br />
the issues involved and the outcomes.<br />
Contributor’s confidentiality and ethical considerations have been fully complied with.<br />
The findings proved interesting. Satisfaction with the EOD facility was high. The attitude of tax<br />
practitioners was very favourable toward the EOD, and confirmation was received in all discussions<br />
that it provides comfort to taxpayers and practitioners and helps them meet the filing deadlines. Some<br />
issues arose on both sides, with timing of responses to doubts by Revenue being considered too<br />
long. Practitioners rarely pursued a response from Revenue, considering it not to be in their client's<br />
best interest since the tax has generally not been paid. The taxpayer is not always looking for an<br />
answer to the doubt. They are merely using the Legislation provided and believe it is Revenue’s<br />
responsibility to pursue the matter if they wish. Some practitioners will not express doubt, fearing loss<br />
of face with a client. Agents would like a timeframe from Revenue, which will allow the matter to<br />
“wither on the vine.<br />
Some of the issues giving rise to EOD according to practitioners were as follows:<br />
o Financial Services sector – types of income and other issues<br />
o Whether 12.5% or 25% applies to various income streams<br />
o Capital versus Revenue items<br />
o Interest on borrowings to fund dividends<br />
o Land dealing – trade or non trade<br />
o <strong>European</strong> Law issues.<br />
6.2 Tax Officials’ Approach and Views<br />
30 Revenue districts spread throughout the country were contacted for their views. The response rate<br />
was 60%.<br />
Large Cases Division has responsibility for businesses with tax payments in excess of 16 million<br />
annually. The EOD on the annual tax return for these taxpayer individuals and businesses is<br />
reserved for very complex situations. This is due to the fact that LCD engages in a process called Cooperative<br />
Compliance, in which a relationship is built between taxpayer and a Revenue official<br />
assigned to the case. A significant number of queries raised by taxpayers during the course of the<br />
year, are dealt with eliminating in some instances the requirement for an EOD. All EODs of these<br />
taxpayers are referred to Revenue Legislation Section (RLS) for consultation. A number of cases<br />
where an EOD was received have been challenged by Revenue and have been appealed. Due to<br />
taxpayer confidentiality rights, details cannot be provided. Cases, which were settled in Revenue’s<br />
favour did not attract interest or penalties, in accordance with Legislation. Due to complexity of issues<br />
the timeframe can span 2-3 years in having the matter settled.<br />
639
Anne Corbett and Francis Rossney<br />
Districts outside of LCD provided a different experience. Here, turnover and levels of tax are on a<br />
smaller scale. All officers interviewed in these customer service areas considered that between 50%<br />
and 90% of EOD could not be regarded as being in the spirit of the Legislation, by their interpretation,<br />
with many being merely informational. Tax in dispute is usually small, with a mere 2 out of 10 EOD<br />
relating to complex issues. The timeframe for dealing with them ranged from 10 days to 6 months.<br />
Very little abuse of the system was noted.<br />
6.3 Intra-<strong>European</strong> Organisation of Tax Administrations (IOTA)<br />
To obtain an international perspective, the IOTA facility (an enquiry service for member tax<br />
administrations) was used to establish whether similar facilities are available to taxpayers in other<br />
jurisdictions.<br />
Of those countries providing a response, two countries were identified as having a similar facility.<br />
Table 7: EU Countries - Expressions of Doubt Responses<br />
Country responding Yes No Country responding Yes No<br />
The Netherlands X Azerbaijan X<br />
Austria X Belarusian X<br />
Luxembourg X Estonia X<br />
Belgium X Finland X<br />
Bulgaria X Hungary X<br />
Denmark X Moldova X<br />
Cyprus X Norway X<br />
Portugal X Poland X<br />
Spain X Serbia X<br />
Czech Republic X Sweden X<br />
France X Slovenia X<br />
UK X Slovakia X<br />
France has indicated that it has an EOD facility. The procedure is named “rescrit fiscal”. This allows<br />
taxpayers to ask the Administration for the interpretation of legal conditions (Articles L. 80-A and L 80-<br />
B of “Livre des procedures fiscales”). In this case, penalties cannot be applied under special<br />
conditions listed in the articles L.80-A and L80-B of “Livre des procedures fiscales”. The legislation<br />
about the expression of doubt is:<br />
>Mention express: article 1727 –ll 0 2e du Code general des impost:<br />
>Rescrit fiscal : l. 80-a ET l.80-b DUE Livre des procedures fiscales.<br />
It is not clear whether this facility compares with the EOD or has properties similar to the Advance<br />
Private Rulings. The difference between the EOD and the Advance Ruling is that the transaction<br />
giving rise to the doubt has been completed, whereas the Advance Ruling must be applied for, in<br />
advance of the transaction taking place.<br />
6.4 Advance Private Rulings<br />
The purpose of the advance tax ruling service is also to promote voluntary compliance. However, it is<br />
not the same as the Expression of Doubt. In line with many EU and non-EU countries, Ireland<br />
provides the facility to make an advance private ruling. Application is limited and can be made to the<br />
Revenue Technical Service where strict guidelines apply. The matter must be complex, clarification<br />
not already in the public domain, and detailed research carried out prior to submission. There is no<br />
charge.<br />
Poland, Germany, Australia, New Zealand and South Africa also provide advance tax rulings at the<br />
request of the taxpayer. In some instances the applicant is required to make a full disclosure of all<br />
relevant facts and intentions and to set out his/her own legal analysis in their application. The<br />
applicant must conclude with their view of the law, and usually the matter relates to specific schemes<br />
or circumstances in respect of transaction not yet implemented by the taxpayer.<br />
The IRS has private letter rulings, issued by their national office to the taxpayer, interpreting and<br />
applying the tax laws to a specific set of facts. The IRS charges fees for ruling, opinion letters, and<br />
similar requests.<br />
Fees are also charged by Canada’s Revenue Agency, (CRA) who issue advance income tax rulings<br />
indicating how the CRA will interpret and apply specific provisions to a definite transaction, which the<br />
640
Anne Corbett and Francis Rossney<br />
taxpayer is contemplating. The provision of advance income tax rulings is an administrative service<br />
and there is no legal requirement to issue them.<br />
7. Recommendations<br />
Recommendations based on the data findings and interviews with key personnel within Revenue and<br />
practitioners are as follows:<br />
• The use of the software tool used in this paper is highly recommended, to filter expressions of<br />
doubt received by Revenue. This is capable of highlighting key areas of difficulty, following<br />
trends and picking up fluctuation across districts, noting sharp increases or decreases in<br />
sectors, on which they could focus attention. Duplication of the same doubt amongst groups,<br />
for example, partnerships, can be located and perhaps the response from Revenue<br />
streamlined. It many be possible to detect incidences of anti-avoidance.<br />
• A drop down menu on the tax return should be provided. This would allow the taxpayer to<br />
select the reason most appropriate to their doubt. Using a key word, the taxpayer would then<br />
be guided to an area on the website which corresponds with the item selected, enabling them<br />
to check the matter to find the answer. This would reduce Revenue staff time in dealing with<br />
items for which the information is already available.<br />
• Specific legislation causing difficulty could also be highlighted, and estimate of tax at issue be<br />
provided. Where multiples of cases have the same difficulty responses could be streamlined<br />
by Revenue, or global guidelines issued to clarify.<br />
• New guidelines should be given to Revenue staff regarding the urgency of dealing with valid<br />
Expressions of Doubt, to ensure that, in the event that Revenue requires to tax the matter,<br />
interest is not lost.<br />
• Genuine expressions of doubt should receive priority treatment, to avoid loss of interest to<br />
Revenue in the event that tax is due, and to allow practitioners to close off their books for the<br />
accounts year when the matter is resolved.<br />
The EOD facility has real potential, and requires rejuvenation. In the early years after 1988 Revenue<br />
issued regular notices to taxpayers and practitioners regarding its correct use, and what to expect<br />
from Revenue in response. Literature relating to it is now outdated and needs immediate refreshing,<br />
for taxpayers, practitioners and Revenue personnel. There should be a re-launch of the service.<br />
8. Conclusion<br />
This study examined the value of the EOD facility. The research confirms the belief that it provides<br />
comfort for practitioners and their clients enabling them to file on time, therefore aiding voluntary<br />
compliance. It provides certainty that they will not be pursued for interest and penalties in the event<br />
that the treatment of a matter included in the return is incorrect. There is considerable value to<br />
Revenue also, as it fosters the desire by the taxpayer to remain compliant.<br />
However, there is strong evidence to suggest that full value is not being received from it. The findings<br />
relating to years 2007 and 2008 raised concerns over the high level of expressions of doubt received<br />
that were informational only. In some instances no response was required from Revenue, and this<br />
could not be regarded as being in the spirit of the Legislation.<br />
Complexity of the law is not the main driving force for most of the doubts. However, it clearly exists<br />
for some.<br />
The danger of interest being lost for Revenue in situations where the expression of doubt is not<br />
resolved quickly, needs to be balanced with the benefits gained from encouraging and facilitating<br />
voluntary compliance.<br />
Following a thorough review of the internal process and a re-launch of the service, taxpayers and<br />
Revenue should, in a combined effort, enable the EOD to reach its full potential.<br />
References<br />
Braithwaite,V. (2007) Responsive Regulation and Taxation: Introduction. Law & Policy [serial online]. January<br />
2007;29(1):3-10. Available from:<strong>Academic</strong> Search Complete, Ipswich, MA. [Accessed August 8,2010]<br />
Davies, Thomas, Carpenter, Jon, Inverson, Gene. (2001) Issues in Federal IncomeTax Complexity. South<br />
Dakota Business Review, 00383260, Mar 2001, Vol. 59, Issue 3 Database: Regional Business News<br />
http://web.ebscohost.com.proxy.lib.ul.ie [Accessed 14th September 2010 at 3p.m.]<br />
641
Anne Corbett and Francis Rossney<br />
D’Ascenzo, M. (1993) Assistant Commissioner : Speech to the ASCPA, 13 February 1992.<br />
http://www.ato.gov.au/individuals/PrintFriendly.aspx?ms=individuals&doc=/content/74841.htm&p<br />
age=1<br />
Doyle, E., Frecknall Hughes, J., Glaister, K. (2008) ‘Linking Ethics and Risk Management in Taxation: Evidence<br />
from an Exploratory Study in Ireland and the UK’, Journal of Business Ethics, 86:177-198.<br />
Feeney, M. (2010) The Taxation of Companies 2010 Chapter15, 14 th Edition. Bloomsbury Professional 2010,<br />
West Sussex. ISBN 978 1 84766 384 9.<br />
Ireland, Department of Finance (1998) Self Assessment, [online], Available: http://www.finance.gov.ie [5 July<br />
2010]<br />
Ireland, Revenue Commissioners (2008) Revenue Statement of Strategy 2008- 2010<br />
http://www.revenue.ie/en/about/publications/statement/sos08-10/mission_and_goals.html<br />
[accessed on 06/08/2010].<br />
Martindale, B., Koch, B., Karlinsky, S. (1992) “Journal of Business Communication”<br />
Oct92, Vol. 29 Issue 4, p383-400, 18p, 5 Charts http://web.ebscohost.com.proxy.lib.ul.ie [accessed 14 th Sept.<br />
2010 @12.50pm]<br />
Murphy, K., Torgler, Benno. (2004) “Tax Morale in Australia” [2004] JIA Tax 9; (2004) 7(2) Journal of Australian<br />
Taxation 298 http://www.austlii.edu.au/cgibin/sinodisp/au/journals/JlATax/2004/9.html?stem=0&synonyms=0&query=torgler,benno:%20murphy%20kri<br />
stina<br />
OECD (2006) Information Note Strengthening Tax Audit Capabilities: General Principal and Approaches. Forum<br />
on Tax Administration: Compliance Sub Group. Centre for Taxation Policy and Administration, OECD<br />
publication. http://www.oecd.org/dataoecd/46/18/37589900.pdf<br />
OECD (2008) Tax Administration in OECD and Selected Non-OECD Countries: Comparative Information Series<br />
(2008.) Forum on Tax Administration. Centre for Tax Policy and Administration, OECD publication.<br />
http://www.oecd.org/dataoecd/57/23/42012907.pdf<br />
Taxes Consolidation Act 1997 (2009) Irish Taxation Institute, Direct Tax Acts 12 th Edition, edited by Tom<br />
Maguire. Published by Irish Taxation Institute, Ireland<br />
1642
Moving Fast Forward to National Data Standardization<br />
Asanee Kawtrakul 1 , Intiraporn Mulasastra 1 , Tawa Khampachua 2 and Somchoke<br />
Ruengittinun 1<br />
1 Kasetsart University, Bangkok, Thailand<br />
2 King Mongkut’s University of Technology North Bangkok, Bangkok, Thailand<br />
asanee_naist@yahoo.com<br />
int@ku.ac.th<br />
khampachua.tawa@gmail.com<br />
somchoke.r@gmail.com<br />
Abstract: Since 2007, the Ministry of Information and Communication Technology has been developing the Thailand<br />
eGovernment Interoperability Framework (TH e-GIF) as guidelines for transformation to a connected government.<br />
However, the transformation has been slow for four main reasons: lack of national data standards, lack of best<br />
practices to follow, no clear guidelines for how to start the project, and absence of a proactive mindset. This work<br />
focuses on building national data standards to support government data interchange and data integration. We begin<br />
to establish the footprint for data standardization by producing a manual containing implementation guidelines and<br />
developing the roadmap for national data standard initiatives. These initiatives, we hope, will be implemented over a<br />
five year period, from 2011 to 2015. By conducting an eSurvey of government information systems, the data<br />
landscapes and information logistics were developed. Then, information exchange domains were outlined based on<br />
task-oriented and organizational ontology. In addition, several workshops and seminars were conducted for both<br />
executive and operational officials from several public agencies. As a result, fifteen information exchange models<br />
were constructed; three of them were selected for study in detail to help create data standardization guidelines. The<br />
survey, workshops, and seminars, along with a study of national strategic plans, enabled us to come up with the data<br />
standardization roadmap that consists of three main activities: national data standard building, research and<br />
development to support standardization mechanisms, and government personnel preparation. Based on this<br />
roadmap, the creation of national data standards can be pursued in a strategic manner, strengthening the<br />
government transformation to be completely eGovernment as well as to become connected government.<br />
Keywords:, data standardization, eGovernment, data landscape, information logistic, ontology based information<br />
exchange, domain classification<br />
1. Introduction<br />
The performance of government leaders is increasingly being measured by the benefits they can create<br />
for their citizens, communities, and the private sector. These clients of government demand greater<br />
efficiency, proper accountability and public trust, and a renewed focus on delivering better services and<br />
results. Examples of service improvements needed are how to speed up payment of promised<br />
compensation to flood-effected households, how to reduce waiting time and cost in referring patients from<br />
one hospital to another, or how to provide a one-stop service to enable searching and viewing all data<br />
pertinent to an individual citizen, such as records of birth, study, employment, sickness, and death.<br />
In Thailand, almost all government agencies are actively grooming their organization to incorporate<br />
eGovernment to provide better services. However, the processes have been individually designed and<br />
developed by data owners or by software developers, which has resulted in a wide variety of nonstandard<br />
data formats and data collection procedures. Starting in 2007, the Ministry of Information and<br />
Communication Technology has developed the Thailand eGovernment Interoperability Framework (TH e-<br />
GIF) as guidelines for transformation to connected government. Two main phases of TH e-GIF, TH e-GIF<br />
1.1 and TH e-GIF 2.0 are put forth as recommendations and guidelines for eGovernment interoperability<br />
implementation. The recommendations are related to data harmonization, data interoperability standards,<br />
technical interoperability standards, eGovernment project development, etc. Some pilot projects have<br />
been implemented. However, the transformation has been slow for four main reasons: lack of national<br />
data standards, no best practices to follow, lack of clear guidelines for how to start the project, and<br />
absence of a proactive mindset.<br />
In order to reduce the gaps between TH e-GIF and the eGovernment project implementation, some key<br />
challenges should be addressed (Dada,2006):<br />
The ability of government organizations to interchange and integrate information using common data<br />
standards,<br />
Creating success cases for sharing and reusing best practices,<br />
643
Asanee Kawtrakul et al.<br />
Strategies and policies to support transformation to a connected government.<br />
This work, then, focuses on building the national data standards to support government data sharing. We<br />
start to establish the footprint for data standardization by constructing a manual containing<br />
implementation guidelines and developing a roadmap for national data standard initiatives. By conducting<br />
an eSurvey of government information systems, the data landscapes and information logistics were<br />
defined. Then, information exchange domains are outlined based on a task-oriented and organizational<br />
ontology. In addition, several workshops and seminars were conducted for both executives and<br />
operational officials from several public agencies. Fifteen information exchange models were created<br />
during the workshops for initiating and prioritizing success cases; three of them were selected to study in<br />
detail to help create data standardization guidelines with concrete examples.<br />
The survey, workshops, and seminars, along with a study of the national strategic plan, enabled us to<br />
come up with a data standardization roadmap that consists of three main activities for supporting<br />
connected government activities: national data standard building with a universal core set, research and<br />
development to support standardization mechanisms, and government personnel preparation. In the<br />
future, based on the roadmap, the creation of national data standards will be promoted in a strategic<br />
manner, strengthening government transformation to be completely eGovernment as well as to become a<br />
connected government.<br />
In section 2, the backgroud of TH e-GIF development is given, the problems of transformation and<br />
implementation of the eGovernment pilot projects are described in section three. A holistic view of<br />
ongoing efforts to develop national standards and roadmap is described in sections 4 and 5. The final<br />
section presents observations and recommendations for future work.<br />
2. Background and related work<br />
In order to achieve the targets of a one-stop service: providing seamless data integration, and quality and<br />
cost effective service delivery, the Thailand eGovernment Interoperability Framework (TH e-GIF) was<br />
developed under the auspices of the Ministry of Information and Communication Technology. TH e-GIF<br />
1.1 and TH e-GIF 2.0 are put forth as recommendations and guidelines for eGovernment interoperability<br />
implementation.<br />
TH e-GIF version 1.1 (Ministry of Information and Communication Technology, 2009) provides six<br />
recommended guidelines for eGovernment interoperability implementation, as follows:<br />
Policies and guidelines for government data integration<br />
eGovernment interoperability benchmarking<br />
Business process modeling<br />
Business information modeling with XML Naming and Design Rules<br />
Interoperabilty technical standards that allow data, IT systems, business processes, and delivery<br />
channels to interoperate such that services can be properly integrated<br />
TH e-GIF change management and compliance.<br />
Many public agencies have been implementing e-Document for back office functions and some<br />
integrated service applications, such as e-Tax and e-Procurement, under TH e-GIF 1.1 guidelines.<br />
TH e-GIF 2.0 provides more details for how to develop interoperability projects with one pilot project, and<br />
indicates success criteria with evaluation methods. A one-stop driver licensing service has been<br />
implemented as a proof of concept pilot project.<br />
However, in practice, public-agencies need a footprint to start up information exchange projects,<br />
especially the process of data standardization with the seed of existing national data standards. National<br />
data standards can provide not only common syntactic but also semantic understanding of data among<br />
government agencies. Without national data standards, government agencies are unable to share<br />
information in a timely and effectively manner; data conversion or data mapping tools are needed to<br />
facilitate information exchange.<br />
644
Asanee Kawtrakul et al.<br />
According to NIEM (2007), data standards are classified into three categories: universal core data,<br />
common core data, domain specific core data (see Figure 1).<br />
Universal data standard is defined for data that is commonly shared and understood among all<br />
domains, e.g., person, address.<br />
Domain-specific data standards are defined for each specific domain.<br />
Common core data standard is defined for use in two or more domains.<br />
Universal<br />
Core<br />
Domain B<br />
Domain C<br />
Domain<br />
Specific<br />
Common<br />
Core<br />
Domain A<br />
Figure 1: Domain data core concept (NIEM,2007)<br />
There are three main types of data that should be standardized for information sharing: data component,<br />
code list, and electronic document.<br />
A data component describes a concept by giving its name and details (attribute names). For<br />
example, a person is a data component describing an individual person by attributes such as the<br />
person’s name, date of birth, sex, race, and ethnicity.<br />
A code list is a list of codes and descriptions representing objects in the same set such as currency<br />
codes (ISO-4217) and country codes (ISO-3166-1) defined by ISO (in Charalabidis et al. 2008:42).<br />
An electronic document for interchange among government agencies compose of data extracted<br />
from their internal databases. It is essential that the data contained in each document conform to<br />
existing data standards. A commonly used document can be registered as a standardized document<br />
for reuse or restructuring to create new related documents.<br />
The universal data standards can be applied directly or can be reused and extended to create domain<br />
specific or common core data standards as shown by example in Figure 2. This reuse makes common<br />
data in many domains effectively interoperable since data have the same core attributes.<br />
FirstName<br />
U: Person<br />
LastName<br />
Gender<br />
BirthDate<br />
U: Person<br />
Figure 2: Example of universal core data reuse (NIEM, 2007)<br />
645<br />
Edu: Student<br />
EntryYear<br />
EducationField
Asanee Kawtrakul et al.<br />
To become a universal data standard, consensus by all domains is needed on the semantics and<br />
structure of the data (NIEM, 2007). An example of a universal address component defined by UK e-GIF<br />
(2010) is shown in Table 1.<br />
Table 1: UK e-GIF universal address (UK-eGIF, 2010)<br />
BS7666 Address Component Cardinality<br />
Basic land and Property Unit 0-1<br />
Primary Addressable Object Name 1<br />
Secondary Addressable Object Name 0-1<br />
Unique Property Reference Number 0-1<br />
Street Descriptive Identifier Structure 0-1<br />
Unique Street Reference Number 0-1<br />
Postcode 0-1<br />
Note: details of each component are given on the UK e-GIF website (UK-eGIF, 2010)<br />
Figure 3 illustrates the relationships between each type of data standard where the innermost, universal<br />
core set, is necessarily defined first as core data standard for reuse in defining domain specific or<br />
common core sets. For example, a person data component could be reused to create new kinds of<br />
people components such as student, farmer, and patient. Compliance with the universal data standard<br />
enables people data in all domains effectively interoperable. Based on the data standards, electronic<br />
documents can be designed for exchange among government agencies.<br />
Birth Birth Certificate Certificate<br />
XML XML Schemas Schemas for for Documents<br />
Documents<br />
Student,<br />
Student,<br />
Soldier<br />
Soldier<br />
Farmer<br />
Farmer<br />
Tax Tax Payer<br />
Payer<br />
ID ID Card<br />
Card<br />
Domain Domain specific specific Core Core Set, Set, Common Common Core Core Set<br />
Set<br />
Citizen Citizen<br />
Farmer Farmer Address<br />
Address<br />
VISA VISA Document Document<br />
Farmer Farmer Record<br />
Record<br />
Tax Tax Clearance Clearance Criminal Criminal Record<br />
Record<br />
Universal Universal Core Core Set<br />
Set<br />
Person Person Address<br />
Address<br />
Document Document Organization<br />
Organization<br />
Period Period Payment<br />
Payment<br />
Patient Patient Transferred Transferred Record<br />
Record<br />
Code Code List: List: country code list, province code list, unit code list, currency Code,…<br />
Figure 3: Basic data modeling concepts and their relations (modified from Charalabidis et al, 2008)<br />
TH e-GIF 2.0 recommends using the Core Component Technical Specification developed by<br />
UN/CEFACT (United Nations Centre for Trade Facilitation and Electronic Business) for electronic<br />
document data modeling, XML Naming and Design Rules (UN/CEFACT), and existing international data<br />
standards. However, there are many different international data standards which make it difficult for<br />
public organizations to follow this guideline. Moreover, the international standards may not be applicable<br />
in every case, for example, the address component of each country has both schematic and semantic<br />
differences. In Thailand, there exist data standards, most are code list types, used in some government<br />
agencies but they have not been declared as national data standards yet. In addition, there is some<br />
redundancy in data standards by different government agencies.<br />
3. A holistic framework for eGovernment interoperability implementation<br />
As mentioned in section 2, the universal data core set is crucial for data integration and service<br />
interoperability. In order to achieve the goal of both vertical integration (between tiers of public<br />
administration either for a single function or for a number of functions) and horizontal integration (across<br />
boundaries of functions, organizations, or nations) (United Nations, 2008), every domain should create its<br />
domain specific core set; related domains need to collaborate to define common core data sets. Every<br />
public organization should be motivated and educated to realize the necessity of data standardization so<br />
646
Asanee Kawtrakul et al.<br />
as to collaborate on data standard development. To accomplish those goals, skills, culture, politics, and<br />
mindsets of public officials with a holistic framework should be considered (Archmann and Kudlacek,<br />
2008; Gottschalk and Solli-Saether, 2009).<br />
To facilitate the national standardization, including building the universal data core set, common core<br />
sets, and domain specific core sets, we conducted an eSurvey, several workshops, and seminars for<br />
government agencies. As a result, a Strength-Weakness-Opportunity-Threat analysis of Thailand<br />
eGovernment Interoperability Implementation was developed as summarized in Table 2.<br />
Table 2: SWOT analysis of Thai eGovernment<br />
STRENGTH<br />
Drivers from top-down: trust, political and legal<br />
pressures as lubricants facilitating eGovernment<br />
projects.<br />
Active government agencies on transformation to<br />
eGovernment<br />
Government budget for enhancing network infrastructure<br />
OPPORTUNITY<br />
Increase of service innovation delivery<br />
Improvement of Thailand's competitiveness<br />
Equity and accessibility of rural public services<br />
Greater efficiency, transparency, and cost reduction in<br />
delivering services.<br />
WEAKNESS<br />
Lack of national data standards and standard<br />
governance body<br />
Lack of awareness about the necessity for data<br />
integration.<br />
Lack of clear understanding about common processes<br />
across all involved stakeholders.<br />
Lack of best practices and knowledge sharing in<br />
implementation<br />
Lack of data quality and data collection resources<br />
Lack of laws and regulations in data sharing<br />
Insufficient IT personnel in government sector<br />
THREAT<br />
Frequent change of political agenda<br />
Data ownership mindset problems<br />
No clear rules about financial support and hosting for<br />
cross-ministry projects.<br />
Effects of frequent political change on sustainable and<br />
continuous project implementation<br />
No clear direction and support to motivate government<br />
agencies to participate in information exchange projects<br />
(across organizations)<br />
Using SWOT analysis, this work focuses on building the national data standards in support of<br />
government data interchange and data integration. We begin to establish a footprint for data<br />
standardization by producing a manual containing implementation guidelines and developing the<br />
roadmap for national data standard initiatives partly based on the results of the SWOT analysis.<br />
4. A practice in data standardization footprint establishment<br />
To establish national data standardization, it is important to consider the re-engineering of processes,<br />
tools and technologies, skills, and the mindsets of public officials within a holistic framework. In order to<br />
accelerate connected government transformation, the footprint for data standardization has been<br />
recommended.<br />
4.1 Processes<br />
Figure 4 describes the process to establish the footprint for data standardization resulting in a manual of<br />
implementation guidelines and a roadmap for national data standard initiatives. Based on the eSurvey of<br />
government information systems, data landscapes and information logistics were defined. Then,<br />
information exchange domains are outlined based on a task-oriented and organizational ontology. In<br />
addition, several workshops and seminars were conducted for both the executive and operational officials<br />
from government agencies. As a result, fifteen information exchange models were created during the<br />
workshops; three of them were selected for study in detail to help create data standardization guidelines.<br />
The survey, workshops, and seminars, along with a study of the Eleventh National Development Plan<br />
2012-2016 and ICT Master Plan 2020, provide the basis for the data standardization roadmap.<br />
647
1 eSurvey<br />
3-4 Conduct<br />
seminars and<br />
workshops<br />
Data Landscape<br />
Information Logistic<br />
Information<br />
Exchange<br />
Domains<br />
Asanee Kawtrakul et al.<br />
5 Create Manual<br />
for Data<br />
Standardization<br />
6<br />
Roadmap<br />
Development<br />
2<br />
Study national<br />
policy & plan<br />
Figure 4: The process of data standardization guideline and roadmap establishment<br />
4.2 Analysis of government information exchange model<br />
Manual for Data<br />
Standardization<br />
Data Standardization<br />
Roadmap<br />
• short term (1 year)<br />
• medium term (3 years)<br />
• long term (5 years)<br />
Information exchange domains are an important key to initiate national data standardization. Each<br />
domain indicates which service should be integrated, what data is needed for interchange, and who are<br />
the stakeholders. Figure 5 shows the process of generating the information exchange domains.<br />
Data Landscape<br />
• What (data)<br />
• Where<br />
(government agencies<br />
producing data)<br />
Information Logistics<br />
• data flow among<br />
government agencies<br />
Process<br />
Ontology Specified<br />
Information Exchange Domain<br />
Figure 5: Ontogy based information exchange domain identification<br />
Using the eSurvey results, the data landscapes (Chisholm, 2008) and Information logistics are analyzed.<br />
The data landscapes illustrate data stored and information produced by government agencies.<br />
Information logistics are data flows among government agencies. Table 3 shows the data landscape of<br />
crops and farmers. Data landscapes of all ministries can be integrated and extended to define<br />
government information logistics.<br />
An information logistic is defined as a directed graph where each node represents an organization and<br />
each directed path represents the flow of data from one organization to another. Each directed path in the<br />
graph is labeled with a name of a data element disseminated from one node to the other. An organization<br />
that produces data for internal use has a path directed to itself. Also, each path can be categorized by<br />
data dissemination methods: paper based, electronic, or online exchange.<br />
Figure 6 a) illustrates flows of data among government agencies. When using graphical tools to depict a<br />
logistic, the density of traffic can be easily detected and the status of data exchange method can be<br />
explored. Figure 6b) shows that the information logistic can be reduced to a specific information logistic<br />
by using the domain specific ontology: both the organizational and task-orient ontology.<br />
648
Asanee Kawtrakul et al.<br />
Table 3: A part of the data landscape of the Ministry of Agriculture and Cooperatives<br />
Department Name<br />
Data<br />
Crops crop production area * * * *<br />
crop production amount * * *<br />
crop seed *<br />
rice seed *<br />
rice production cost *<br />
Farmers farmer groups *<br />
farmer registry *<br />
economic crop farmer registry *<br />
farmer crop production *<br />
farmer career groups *<br />
Cooperative Promotion<br />
Note: * indicates that the department stores the data in a database<br />
crop seed<br />
soil<br />
rice seed<br />
forest<br />
weather<br />
crop<br />
production<br />
amount<br />
specify concept<br />
‘crop’<br />
Agricultural Extension<br />
Fisheries<br />
Land Development<br />
crop seed<br />
ice seed<br />
Agricultural Economics<br />
rop<br />
production<br />
amount<br />
6 a) Before Reduction 6 b) After Reduction<br />
Note: crop is a main concept; rice is a lower level concept of crop<br />
Figure 6: 6a) Information logistic generated from eSurvey, 6b) ontology based domain analysis<br />
Based on the information logistic, we can use the reduction process to form a collaborative group of<br />
agencies who use or produce related information. This group should be involved in national data<br />
standardization in defining domain specific or common core data sets. For example, when we want to<br />
develop a data standard in the justice domain, the reduction of government information logistic will result<br />
in an information exchange domain: the groups of organizations that use, produce or disseminate data<br />
involving the court of justice are shown in Figure 7.<br />
In summary, we used eSurvey as a tool for Plan-Do-Check-Act the information exchange domains of<br />
eGovernment services. The flow of data, the collaborative group of public agencies, and the integrated<br />
services then, could be formalized to initiate data standardization.<br />
649<br />
Rice<br />
Agriculture
Prisoner Data<br />
Ministry of<br />
Finance<br />
Ministry of<br />
Justice<br />
Prime<br />
Ministry<br />
Office<br />
Ministry of<br />
Education<br />
Lawsuit data<br />
Tax<br />
Consumer data<br />
Ministry of<br />
Interior<br />
Asanee Kawtrakul et al.<br />
Education data<br />
Bankrupt<br />
Personal ID<br />
Patient data<br />
Ministry of<br />
Commerc<br />
Patents<br />
Justice<br />
Domain<br />
Ministry of<br />
Health<br />
Absolver data<br />
Politician data<br />
Office of<br />
Election<br />
Commission<br />
Lawyer<br />
data<br />
Foreigner data<br />
His Majesty's<br />
Principal Privat<br />
e Secretary<br />
Labor data<br />
Ministry of<br />
Foreign<br />
Affair<br />
Lawyer<br />
Office<br />
Ministry of<br />
Labor<br />
Warrant of arrest<br />
Warrant of arrest<br />
Insurance<br />
Office<br />
Police<br />
Office<br />
Figure 7: Organizations and information involved in the Justice domain.<br />
Participants in the eSurvey process include 30% of government agencies comprised of seven main<br />
domains being outlined: health, education, agriculture, transportation, security, enviroment, and<br />
economy.<br />
4.3 Top-down and bottom-up based implementation guidelines establishment<br />
From analysis of government agency requirements gathered during workshops, fifteen information<br />
exchange models were created (see Table 4). Three of them were selected based on prioritization factors<br />
for study in detail to help create data standardization guidelines. Those are data integration for tracking<br />
educational records, data interchange for patient referral, and data integration for traceability of<br />
agricultural products.<br />
Table 4: Information exchange models derived from workshops<br />
Information Exchange Model Domain Integration Type<br />
Data integration for tracking educational records Education Horizontal<br />
Research data integration Education Horizontal<br />
Data exchange for checking vaccine receipt records of students Health Vertical<br />
Data interchange for patient referral Health Vertical<br />
Data integration for traceability of agricultural products Agriculture Horizontal<br />
Data integration for predicting the spread of brown plant hoppers (rice<br />
insect pests)<br />
Agriculture Horizontal<br />
Individual and juristic person data exchange for ship registration Agriculture Horizontal<br />
Data exchange for natural disaster assistance for farmers Agriculture Horizontal<br />
Data exchange for rubber exporter subsidiary Agriculture Horizontal<br />
Data exchange for criminal background checks Security Horizontal<br />
Data integration for elderly monthly payment service Security Horizontal<br />
Data integration for job finding assistance for disabled people Security Horizontal<br />
Data integration for pollution control Environment Horizontal<br />
Data integration for checking juristic tax fraud from water usage amount Justice Horizontal<br />
Data exchange for facilitating application for factory building in<br />
settlement industrial zones<br />
650<br />
Economic Horizontal
Asanee Kawtrakul et al.<br />
The projects were prioritized using six criteria: the readiness of technology infrastructure, data quality,<br />
budget for implementation (compared to its cost), personnel readiness for project participation, impact on<br />
the nation, and collaboration among related organizations. However, prioritizing projects based on their<br />
impact is difficult, since the impact is not always quantifiable and comparable. Accordingly, prioritization<br />
can be done by brainstorming ideas from people who are affected by each project (McGilvray,2008).<br />
The implementation guideline (see Figure 8) starts with data standard concepts followed by data<br />
standardization processes with the three selected cases as examples. Finally, cost-benefit analysis of<br />
data exchange projects is presented along with project prioritization methods.<br />
Introduction<br />
and<br />
Teamwork<br />
Preparation<br />
4. Validation<br />
and Publish<br />
1. Business<br />
Scenario<br />
Creation<br />
3. Data<br />
Standardization<br />
2.<br />
Information Exchange<br />
Requirement Analysis<br />
Figure 8: The data standardization guideline (modified from NIEM, 2007)<br />
5. Roadmap<br />
Cost-<br />
Benefit<br />
Analysis<br />
Two executive seminars were conducted in 2010, with 109 executives invited from various government<br />
agencies. The seminar participants brainstormed for ideas on the success factors of information<br />
exchange among government agencies, resulting in identification of four success factors: human<br />
resources, budget, policy, and incentives, for which the details are presented in Table 5.<br />
Table 5: Success factors in eGovernment implementation<br />
Success Factors Details<br />
Human Resources Continuous training and education for both operational and management personnel<br />
Forming data standardization groups (cross functional) in every public organization<br />
Including data standardization topic in ICT curriculum<br />
Budget Sufficient budget for ICT activities, e.g., data standardization, information exchange<br />
projects, data quality improvement programs<br />
Policy National policy for public information sharing with clear guidelines for each organization<br />
to follow<br />
Raising management awareness on ICT as strategic driving<br />
Incentives Rewards for successful projects<br />
Best practices for adopters<br />
The roadmap highlights three categories of tasks: national data standard building, research and<br />
development for supporting standardization mechanism and government personnel preparation in order<br />
to tackle data standardization challenges as early as possible. The mindset for this strategy is that the<br />
earlier a data standardization project can be established, the greater the likelihood that a connected<br />
government can be successfully achieved. Figure 9 shows the 5-year roadmap (2011-2015).<br />
651
Data Standard<br />
R&D<br />
People<br />
Asanee Kawtrakul et al.<br />
Short Term<br />
National Data Standard Committee<br />
Appointment<br />
Medium-Term Long Term<br />
Universal Data Core Set Development Revision and Usage<br />
Promotion<br />
Establishment of Communities of<br />
Interest for Strategic Domains<br />
Extension<br />
Development of Domain Specific<br />
and Common Core sets<br />
Extension<br />
National Data Standard Registry<br />
Development<br />
Maintenance<br />
Research Innovation for<br />
eGovernment Services<br />
Continuing<br />
Data Standard Benchmark and<br />
Evaluation System<br />
Monitoring and Auditing<br />
Information Regulation Study Propose for creating<br />
Government Data Quality<br />
Improvement Program<br />
Raising Awareness and Building<br />
Capacity<br />
Establishing Benchmark<br />
and Evaluation System<br />
Knowledge Management<br />
and Sharing<br />
Strategic Planning Implementation Continuous<br />
Improvement<br />
Figure 9: The 5-year data standardization roadmap (2011-2015)<br />
6. Conclusion and next steps<br />
This work provides the necessary tools, data standardization manual, and roadmap, to complete an<br />
eGovernment interoperability framework for government agencies at all levels in Thailand. A platform for<br />
establishing the universal core set, domain specific core set, common core sets, and code lists are<br />
established in the standardization manual. The data standardization roadmap, which consists of three<br />
main activities: national data standard building, research and development for supporting standardization<br />
mechanisms, and government personnel preparation, is also provided for faster and more effective<br />
implementation.<br />
Ontology development for eGovernment services is a current project led by the Uknow Center, Kasetsart<br />
University. It will be constructed to function as a key word index to support online searching, and as a<br />
“category list” to support navigational browsing. This ontology could support automated semantic<br />
matching. For example, when users want to find data about farmers, by using the ontology, the search<br />
system could find data elements in data landscapes that semantically relate to the word “farmer” such as<br />
“rice grower” and “grains grower”.<br />
In order that mindsets and work systems reflect best practices, the following issues should be<br />
considered:<br />
Initiate and promote events for sharing best practices in the public sector, such as an eGovernment<br />
day for sharing service innovation, service innovation exhibition, etc.<br />
Capture, share and reuse knowledge and best practices in data standardization<br />
Develop and design innovative mechanism for driving the data standardization implementation<br />
Market the benefits of data standardization<br />
Establish a standardization evaluation system with<br />
Attractive key performance indices which are academic based, outcome-oriented, and mission-based<br />
Non-financial incentives for motivating proactive participation in data standardization,<br />
Rewards for success cases in developing connected goverment applications<br />
652<br />
Connected Government for Integrated Services
Acknowledgements<br />
Asanee Kawtrakul et al.<br />
This paper is the result of our work on the TH e-GIF project (phase 4) hosted by the Ministry of<br />
Information and Communication Technology of Thailand. We would like to thank all representatives from<br />
both public and private sectors who participated in TH e-GIF project activities and provided us the<br />
comments and suggestions. Special thank goes to Dr. James Edward Brucker for English proofreading.<br />
References<br />
Archmann, S., Kudlacek, I. (2008) ‘Interoperability and the exchange of good practice cases’, <strong>European</strong> Journal of<br />
ePractice, Vol. 2, No. 1, pp 3-12.<br />
Charalabidis, Y., Lampathaki, F. and Askounis, D. (2008) ‘Unified Data Modeling and Document Standardization<br />
Using Core Components Technical Specification for Electronic Government Applications’, Journal of Theoretical<br />
and Applied Electronic Commerce Research, Vol. 3, No. 3, pp. 38-51.<br />
Chisholm, M. (2008) Mapping the Data Landscape, [Online], Available: http://www.b-eye-network.com/view/6674, [10<br />
January 2010].<br />
Dada, D. (2006) ‘The Failure of eGovernment in Developing Countries: A Literature Review’, The Electronic Journal<br />
on Information Systems in Developing Countries (EJISDC), Vol. 26, No.7, pp. 1-10.<br />
Gottschalk, P., Solli-Saether, H. (2009) EGovernment Interoperability and Information Resource Integration:<br />
Frameworks for Aligned Development, Information Science Publishing.<br />
Janssen, M., Wagennar, R. (2002) ‘Towards a flexible ICT-Architecture for Multi-Channel eGovernment Service<br />
Provisioning’, Proceedings of the 3<strong>6th</strong> Hawaii International <strong>Conference</strong> on System Sciences (HICSS'03), IEEE<br />
Computer Society, pp.148-158.<br />
McGilvray, D. (2008) Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information, Morgan<br />
Kaufmann, MA.<br />
Ministry of Information and Communication Technology (2009) Thailand Electronic Government Interoperability<br />
Framework version 1.1.<br />
Ministry of Information and Communication Technology (2010) Thailand Electronic Government Interoperability<br />
Framework version 2.0 (in Thai).<br />
NIEM (2007). Introduction to the National Information Exchange Model, [Online], Available:<br />
http://www.niem.gov/topicIndex.php?topic=file-introduction, [25 Febuary 2010].<br />
UK e-GIF (2010) Data Standard Cataloque, [Online], Available:<br />
http://interim.cabinetoffice.gov.uk/govtalk/schemasstandards/e-gif/datastandards.aspx, [20 March 2010]<br />
United Nations (2008) United Nations eGovernment Survey 2008: From eGovernment to Connected Governance,<br />
[Online], Available: http://unpan1.un.org/intradoc/groups/public/.../un/unpan028607.pdf, [10 January 2010]<br />
653
654
Work<br />
in<br />
Progress<br />
Papers<br />
655
656
Bridging the IT/Process Divide in Public Administrations by<br />
Simple Semantic Interoperability Artefacts<br />
Robert Orlowski and Veit Jahns<br />
University of Duisburg-Essen, Germany<br />
robert.orlowski@stud.uni-due.de<br />
veit.jahns@icb.uni-due.de<br />
Abstract: Semantic interoperability is an objective that has been addressed in many research projects and<br />
publications in the past by the development or presentation of new artefacts (approaches, ontologies, tools, etc.).<br />
Mostly, different aspects of semantic interoperability have been addressed, which distinguished these artefacts from<br />
each other. But on the other hand, all these artefacts have one characteristic in common: they are big, complex,<br />
complicated, not easy to understand for people who are not familiar with the concepts and technology of the<br />
Semantic Web, and (sometimes) not easy to integrate into legacy systems. But this is crucial in the context of public<br />
administration, because there are small- and medium-sized public authorities, e.g., municipalities with limited<br />
resources, as well as big and advanced public authorities with a sufficient amount of resources, but existing<br />
information systems that cannot be replaced easily, e.g., because they are customized to local needs. In this work in<br />
progress paper the question is posed, how the technology regarding the facilitation of semantic interoperability can<br />
be simplified, so that these concepts and technology are first of all more understandable to employees and second<br />
easier to implement in small- and medium-sized public authorities like municipalities. A deliberation on this question<br />
promises the possibility, that the barriers for using these concepts and technology in municipality can be reduced<br />
and, that the municipalities can take advantage of these concepts and technology. Some ideas how this question can<br />
be approached are outlined in this poster paper.<br />
Keywords: eGovernment, public service, interoperability, semantic web<br />
1. Introduction<br />
In their vision for a semantic business process management Hepp et al. (2005) propose to use Semantic<br />
Web technology to bridge the IT/process divide, i.e., that manual labour is needed to transfer the<br />
artefacts from the sphere of business process analysis into the sphere of IT implementation and vice<br />
versa (Hepp et al. 2005: 536). This issue has been addressed also in eGovernment. Many projects<br />
dealing in one way or the other with issues of semantic interoperability were conducted in the past or are<br />
still in progress. Examples for such projects are the Governance Enterprise Architecture (e.g., Peristeras<br />
and Tarabanis 2004), Access eGov (e.g., Skokan et al. 2008), TERREGOV (Bettahar et al. 2009), or<br />
Amt@Direkt (e.g., Jahns et al. 2009). On the one hand, these projects differ in the considered aspects of<br />
semantic interoperability or the chosen approach to it, but on the other hand they share a common<br />
characteristic: many complex and sometimes complicated artefacts are developed.<br />
The reason for this complexity lies in the concept of public administration itself. In a simplified manner,<br />
public administration can be defined as an organization providing services, which are assigned to it due<br />
to a decision made by a sovereign, e.g., a parliament or a king (Lynn 2006: 24). But such a decision is<br />
always based on epistemological and ideological assumptions. And as there are many different<br />
epistemological and ideological assumptions, there are many different ideas about what a public<br />
administration shall be and which services it shall provide.<br />
Furthermore, the manifestation of public administration in practice covers a wide spectrum depending on<br />
different degrees of autonomy, of resource availability, etc. With respect to the usage of information<br />
systems to support the provision of services by the public administration and based on a similar analysis<br />
by Jahns et al. (2009: 306) two types of organizations in the public administration can be identified:<br />
Public authorities of small and medium size, e.g., municipalities or public authorities, which are<br />
independent and not embedded in some kind of network providing the needed IT resources. In<br />
general, those authorities possess simple structured information systems and amount of personnel. If<br />
they want to use such technologies, they want to use them with minimal efforts and costs.<br />
Public authorities of big size in general possess highly advanced information systems and business<br />
processes, as well as the required resources in terms of budget, staff, and knowledge needed to<br />
realize information systems by using highly advanced Semantic Web technologies. But on the other<br />
hand those kinds of authorities already invested many efforts in their existing information systems,<br />
which they want to protect.<br />
657