27.06.2013 Views

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

6th European Conference - Academic Conferences

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

The Proceedings<br />

of the<br />

11th <strong>European</strong><br />

<strong>Conference</strong> on<br />

eGovernment<br />

Faculty of Administration,<br />

University of Ljubljana, Ljubljana,<br />

Slovenia<br />

16-17 June 2011<br />

Edited by<br />

Maja Klun, Mitja Decman and Tina Jukić<br />

University of Ljubljana


Copyright The Authors, 2011. All Rights Reserved.<br />

No reproduction, copy or transmission may be made without written permission from the individual authors.<br />

Papers have been doubleblind peer reviewed before final submission to the conference. Initially, paper<br />

abstracts were read and selected by the conference panel for submission as possible papers for the<br />

conference.<br />

Many thanks to the reviewers who helped ensure the quality of the full papers.<br />

These <strong>Conference</strong> Proceedings have been submitted to the Thomson ISI for indexing.<br />

Further copies of this book can be purchased from http://academic-conferences.org/2-proceedings.htm<br />

ISBN:978-1-908272-01-0 CD<br />

Published by <strong>Academic</strong> Publishing Limited<br />

Reading<br />

UK<br />

44-118-972-4148<br />

www.academic-publishing.org


Contents<br />

Paper Title Author(s) Page<br />

No.<br />

Preface vi<br />

Biographies of <strong>Conference</strong> Chairs, Programme Chair,<br />

Keynote Speaker and Mini-track Chairs<br />

Biographies of contributing authors ix<br />

Evaluation of eGovernment Implementation at Federal,<br />

State and Local government Levels in Malaysia<br />

ICT Education and Access as Strategies to Generate<br />

and Distribute eGovernment Content<br />

The Role of National Culture on Citizen Adoption of<br />

eGovernment websites<br />

i<br />

Ahmad Bakeri Abu Bakar 1<br />

Fatemeh Ahmadi Zeleti and Erja<br />

Mustonen-Ollila<br />

Omar Al-Hujran and Mahmoud Aldalahmeh<br />

A Framework for Transitioning to Mobile Government Shadi Al-khamayseh and Elaine<br />

Lawrence<br />

The Stages of eGovernment: Correlation Between<br />

Characteristics That Affect eGovernment Systems<br />

Social Media in <strong>European</strong> Governmental<br />

Communication<br />

Technology Adoption and Innovation in Public Services:<br />

The Case of eGovernment in Italy<br />

Pan-<strong>European</strong> eGovernment and eHealth Services in<br />

Slovenia<br />

Enhancement of Public Service Effectiveness by<br />

Partially Automating Service Request Paper Forms<br />

Using Citizen ID Smartcard<br />

Development of User Authentication for web<br />

Application Sign-on Mechanism Using Oasis SAML<br />

Standard With Thai Citizen ID Card<br />

A Pilot Development of PKI Digital Signatures on<br />

Electronic Correspondence Using Citizen ID<br />

Smartcards<br />

Development of an Electronic Correspondence Time-<br />

Stamping Service Using Oasis Digital Signature<br />

Services<br />

Framework Guidelines to Measure the Impact of<br />

Business Intelligence and Decision Support<br />

Methodologies in the Public Sector<br />

vii<br />

10<br />

17<br />

27<br />

Madi Al-Sebie 36<br />

Isabel Anger and Christian Kittl 43<br />

Davide Arduini, Mario Denni and<br />

Gerolamo Giungat and Antonello<br />

Zanfei<br />

Jaro Berce, Vasja Vehovar, Ana<br />

Slavec and Mirko Vintar<br />

Choompol Boonmee, Rattapol<br />

Chatchumsai, Tawa Khampachoa<br />

and Chakri Chuenurah<br />

Choompol Boonmee, Peera<br />

Tharaphant and Pipop Damtongsuk<br />

Choompol Boonmee, Peera<br />

Tharaphant and Pipop Damtongsuk<br />

Choompol Boonmee, Rattapol<br />

Chatchumsai and Sunet Boonmee<br />

Roberto Boselli, Mirko Cesarini and<br />

Mario Mezzanzanica<br />

Avoiding Disasters – Ensuring PKI-Service Availability Harald Bratko, Peter Lipp and<br />

Christof Rath<br />

Achieving Optimum Balance in the Simplification of tax<br />

Compliance Obligations for Business Customers and<br />

Management of Compliance and Collection Risks by<br />

Revenue<br />

53<br />

65<br />

74<br />

80<br />

87<br />

97<br />

107<br />

116<br />

Leonard Burke and Kieran Gallery 124


Paper Title Author(s) Page<br />

No.<br />

Risk Management in a Cooperation Context Walter Castelnovo 132<br />

The Effect of User's Satisfaction of web Security on<br />

Trust in eGovernment<br />

A Common Process Model to Improve eService<br />

Solutions - the Municipality Case<br />

Measuring Performance of eGovernment to the<br />

Disabled: Theory and Practice in Taiwan<br />

Predictive Analytics in the Public Sector: Using Data<br />

Mining to Assist Better Target Selection for Audit<br />

Citizen Participation in Urban Planning: Looking for the<br />

“E” Dimension in the EU National Systems and Policies<br />

Social Media and Local Government in England: Who<br />

is Doing What?<br />

Electronic Health Records Management and<br />

Preservation: The Case of Slovenia<br />

Sustaining Electronic Governance Programs in<br />

Developing Countries<br />

Adapting Family Card System by Means of Smart<br />

Cards<br />

Collaborative Network Analysis of two eGovernment<br />

<strong>Conference</strong>s: Are we Building a Community?<br />

E-Identity, E-Activities and E-Political Participation:<br />

How are College Students Embracing the Promise of<br />

the Internet?"<br />

Semantic-Driven eGovernment: Correlating<br />

Development Phases with Semantic eGovernment<br />

Specific Ontology Models<br />

Towards a Unified Semantic-Driven Methodology<br />

Framework for eGovernment Systems Development<br />

An Information System to Collect and Analyze Data<br />

From Educational Units During Epidemy Spread<br />

Periods<br />

Interoperability in the Justice Field: Variables That<br />

Affect Implementation<br />

eGovernment and Service Delivery at the Local Level:<br />

A Comparative Analysis of Three Canadian<br />

Municipalities<br />

ii<br />

Lichun Chiang, Ching-Yuan Huang<br />

and Wu-Chuan Yang<br />

140<br />

Marie-Therese Christiansson 149<br />

Pin-yu Chu, Tong-yi Huang and<br />

Ning-wan Huang<br />

158<br />

Duncan Cleary 168<br />

Grazia Concilio and Francesco<br />

Molinari<br />

177<br />

Martin De Saulles 187<br />

Mitja Decman 193<br />

Zamira Dzhusupova, Tomasz<br />

Janowski, Adegboyega Ojo and Elsa<br />

Estevez<br />

Magdy Elhennawy, Tarek Saad,<br />

Ashraf abdel Wahab and Sameh<br />

Bedair<br />

203<br />

213<br />

Nuša Erman and Ljupčo Todorovski 225<br />

Marcoux Faiia 234<br />

Jean Vincent Fonou Dombeu and<br />

Magda Huisman<br />

Jean Vincent Fonou Dombeu and<br />

Magda Huisman<br />

John Garofalakis, Andreas Koskeris,<br />

Evangelia Boufardea, Theofanis<br />

Michail and Flora Oikonomou<br />

245<br />

254<br />

263<br />

Mila Gascó and Carlos E Jiménez 272<br />

John Grant, Frank Ohemeng and<br />

Roberto Leone<br />

280


Paper Title Author(s) Page<br />

No.<br />

Crowd-sourcing Techniques: Participation,<br />

Transparency and the Factors Determining the Co-<br />

Production of Policy<br />

Implementation of a Contact Centre in a Swedish<br />

Municipality<br />

An Outline of the Technical Requirements on<br />

Governmental Electronic Record Systems Derived from<br />

the <strong>European</strong> Legal Environment<br />

Examining Influences on eGovernment Growth in the<br />

Transition Economies of Central and Eastern Europe:<br />

Evidence from Panel Data<br />

Management of Latvian Government Communications<br />

During an Economic Crisis: The Role of Information<br />

Strategies in the Public Sector<br />

Business/IT Alignment as Enabler for eGovernment in<br />

Syria<br />

iii<br />

Mary Griffiths 288<br />

Kerstin Grundén 296<br />

Bernhard Horn, Gerald Fischer,<br />

Roman Trabitsch and Thomas<br />

Grechenig<br />

303<br />

Princely Ifinedo 310<br />

Aleksis Jarockis 320<br />

Raed Kanaan, Kamal Atieh and<br />

Omar Subhi Aldabbas<br />

Does eTaxation Reduce Taxation Compliance Costs Maja Klun 335<br />

International Assistance Relationship to eGovernment<br />

Development and Benchmarking<br />

Challenges to the Design and use of Stages-of-Growth<br />

Models in eGovernment<br />

Developing Measures for Benchmarking the<br />

Interoperability of Public Organizations<br />

Barriers to Developing eGovernment Projects in<br />

Developing Countries<br />

328<br />

Endrit Kromidha 339<br />

Devender Maheshwari, Anne Fleur<br />

van Veenstra and Marijn Janssen<br />

Devender Maheshwari, Anne Fleur<br />

van Veenstra and Marijn Janssen<br />

347<br />

354<br />

Zaigham Mahmood 363<br />

Digital Inclusion: a target not always desirable Fausto Marcantoni and Alberto<br />

Polzonetti<br />

Multi-Level Interoperability for ICT-Enabled<br />

Governance: A Framework for Assessing Value Drivers<br />

and Implications for <strong>European</strong> Policies<br />

Strategies for eGovernment Implementation in<br />

Developing Countries: A Case Study of The Botswana<br />

Government<br />

The use of ICT by Government Departments and<br />

Parastatals in South Africa<br />

The Workload for the Structural Implementation of<br />

eDemocracy: Local Government Policy Issues<br />

Combined With the Policy Cycle and Styles of<br />

Citizenship.<br />

Gianluca Misuraca, Giuseppe Alfano<br />

and Gianluigi Viscusi<br />

Racious Moilamashi Moatshe and<br />

Zaigham Mahmood<br />

369<br />

377<br />

386<br />

Matsobane Frans Mosetja 394<br />

Bert Mulder and Martijn Hartog 399<br />

Channel Shift - a UK Customer Response Darren Mundy, Qasim Umer, and<br />

Alastair Foster<br />

406


Paper Title Author(s) Page<br />

No.<br />

eGovernment in Social and Economic Development:<br />

The Asymmetric Roles of Information,<br />

Institutionalization and Diffusion<br />

iv<br />

Bongani Ngwenya 413<br />

National Electronic Government Strategies in Austria Birgit Oberer and Alptekin Erkollar 422<br />

Smoke and Mirrors: Can a Useful Approximation of the<br />

Cigarette tax gap be Determined?<br />

Adopting Web 2.0 in Building Participatory<br />

eGovernment: A Perception Contour From Inside the<br />

Government<br />

Combating Identity Fraud in the Public Domain:<br />

Information Strategies for Healthcare and Criminal<br />

Justice<br />

Approaching eGovernment as a Strategic Driver for<br />

Improving the Ethical Model: An Empirical Analysis<br />

From Business Economics<br />

Public Procurement and Internet-purchasing: the<br />

Defence Sector Evidence<br />

Evaluating the Development of eGovernment Systems:<br />

The Case of Polish Local Government Websites<br />

Comparative Analysis of Information Security<br />

Governance Frameworks: A Public Sector Approach<br />

Clare Omelia 432<br />

Ching-Heng Pan and Lichun Chian 443<br />

Marijn Plomp and Jan Grijpink 451<br />

Massimo Pollifroni 459<br />

Nataša Pomazalová and Zbyšek<br />

Korecki<br />

469<br />

Leszek Porębski 475<br />

Oscar Rebollo, Daniel Mellado , Luis<br />

Enrique Sánchez and Eduardo<br />

Fernández-Medina<br />

Web 2.0 on the Mexican State Sites: An Overview Rodrigo Sandoval Almazán, Gabriela<br />

Díaz Murillo , Ramón Gil-Garcia, Luis<br />

Luna-Reyes and Dolores Luna-<br />

Reyes<br />

eGovernment in Serbia: Prospects and Challenges Laslo Šereš and Ivana Horvat 502<br />

An Organizational Framework for Managing<br />

eGovernment Systems in Developing Countries: The<br />

Case of Kurdistan Region of Iraq<br />

Outsourcing of IT Projects in the Public Sector –<br />

Sustainable Solution or Erosion of the Public Sector?<br />

Closing the Digital Divide gap in <strong>European</strong> Union: A<br />

Unique Solution for Different Tiers?<br />

Towards Estimating Users’ Strength of Opinion in<br />

Forum Texts about Governmental Decisions<br />

An Efficient, Effective eGovernment Enterprise<br />

Resource Planning Model<br />

Citizen-Government Interaction in Russia:<br />

eGovernment as Tradition Bearer<br />

Shareef Shareef, Elias Pimenidis,<br />

Hamid Jahankhani and J. Arreymbi<br />

482<br />

491<br />

513<br />

Dalibor Stanimirovic and Mirko Vintar 522<br />

Virgil Stoica and Andrei Ilas 531<br />

George Stylios, Christos<br />

KatsisVasiliki Simaki, Sofia Stamou<br />

and Dimitris Christodoulakis<br />

547<br />

John Douglas Thomson 553<br />

Anna Trakhtenberg 564<br />

eGovernment Openness Index Nataša Veljković, Sanja Bogdanović-<br />

Dinić and Leonid Stoimenov<br />

571


Paper Title Author(s) Page<br />

No.<br />

Exploring Facilitators and Challenges Facing ICT4D in<br />

Tanzania<br />

v<br />

Jim Yonazi 578<br />

PHD 589<br />

Maturity Models Transition from eGovernment<br />

Interoperability to T-Government: Restyling Dynamic<br />

Public Services Through Integrated Transformation of<br />

Service Delivery<br />

Quality of Services and Citizen Profiling in<br />

eGovernment<br />

A Quest for an Applicable Model of Growth for<br />

Directgov<br />

Mohamed Mohyi Eddine El Aichi and<br />

Mohamed Dafir Ech-Cherif El Kettani<br />

Guillaume Gronier, Sandrine Reiter<br />

and Mélanie Becker<br />

591<br />

603<br />

Panos Hahamis 612<br />

Non <strong>Academic</strong>s Papers 621<br />

Providing Public Services Through Digital Postal<br />

Networks: A Position Paper<br />

An Evaluation of Expression of Doubt in the context of<br />

Self-Assessment: Section 955(4) Taxes Consolidation<br />

Act 1997<br />

Liam Church and Maria Moloney 623<br />

Anne Corbett and Francis Rossney 630<br />

Moving Fast Forward to National Data Standardization Asanee Kawtrakul, Intiraporn<br />

Mulasastra, Tawa Khampachua and<br />

Somchoke Ruengittinun<br />

Work in Progress 655<br />

Bridging the IT/Process Divide in Public Administrations<br />

by Simple Semantic Interoperability Artefacts<br />

643<br />

Robert Orlowski and Veit Jahns 657


Preface<br />

These proceedings represent the work of presenters at the 11th <strong>European</strong> <strong>Conference</strong> on e-Government<br />

(ECEG 2011).<br />

The <strong>Conference</strong> this year is being hosted by the Faculty of Administration, University of Ljubljana, Ljubljana,<br />

Slovenia. The <strong>Conference</strong> Chair is Professor Maja Klun and the Programme Co-Chairs are Mitja Decman<br />

and Tina Jukić, all from the University of Ljubljana.<br />

The opening keynote address is given by Dr. Aleš Dobnikar, E-Government and Administrative Processes<br />

Directorate, Ministry of Public Administration, Slovenia.<br />

This <strong>Conference</strong> brings together practitioners and researchers in the area of e-Government from some 40<br />

different countries. Participants will be able to share their research findings and explore the latest<br />

developments and trends in the field which can then be disseminated in the wider community.<br />

With an initial submission of 192 abstracts, after the double blind, peer review process there are 74 papers<br />

published in these <strong>Conference</strong> Proceedings. These papers represent research from countries including<br />

Australia, Austria, Belgium, Brazil, Canada, Czech Republic, Eygpt, Estonia, Finland, France, Germany,<br />

Greece, India, Ireland, Italy, Jordan, Latvia, Luxembourg, Macao, Malaysia, Mexico, Norway, Poland,<br />

Romania, Russia, Saudi Arabia, Serbia, Slovenia, South Africa, Spain, Sweden, Taiwan, Tanzania, Thailand,<br />

The Netherlands, Turkey, UK, USA and Zimbabwe. This will ensure a very interesting two days.<br />

I hope that you have an stimulating conference, and enjoy your time in Ljubljana.<br />

Maja Klun, Mitja Decman and Tina Jukić<br />

Co-Programme Chairs<br />

University of Ljubljana<br />

June 2011<br />

vi


Biographies of <strong>Conference</strong> Chairs, Programme Chairs<br />

and Keynote Speakers<br />

<strong>Conference</strong> Chair<br />

Maja Klun is a vice-dean for Scientific and Research Activities at the Faculty of<br />

Administration, University of Ljubljana. Holding her first, master and Ph. D. degrees in<br />

economy from The Faculty of Economics, the Ljubljana University, her main theoretical<br />

and professional experience is in the field of Public sector Economics and Taxation<br />

System. She is an Assistant Professor at the Faculty of Administration, teaching at both<br />

the undergraduate and postgraduate levels in Economics, Public Finance, and Public<br />

Sector Economics. Her research interests focus mainly on Public sector Economics,<br />

Administrative Burden Reduction, Performance Budgeting, and Performance Measuring in Public Sector.<br />

Programme Chairs<br />

Mitja Decman is a Senior Lecturer in Informatics and Information Systems in<br />

Public Administration at Faculty of Administration, teaching at undergraduate level.<br />

He holds a first and master degree in Computer and Information Science, from the<br />

Faculty of Computer and Information Science, and a Ph. D. in Administration<br />

Science from the Faculty of Administration. His project and research work<br />

includes: development of information systems, benchmarking systems, digital<br />

preservation, information security, e-government, e-governance, web 2.0 and<br />

others.<br />

Keynote Speakers<br />

Tina Jukić is a researcher and PhD student at Faculty of Administration, University of<br />

Ljubljana, Slovenia, where she also completed her master’s degree. Her research is<br />

currently focused on ex-ante and ex-post evaluation of e-government projects, but she<br />

has been and still is active in other fields of e-government research as well (e.g.<br />

measuring e-government user satisfaction, e-democracy, evaluation of e-government<br />

development etc.). She is collaborating on several national and international egovernment-related<br />

projects, and same holds for her publications.<br />

Dr. Aleš Dobnikar is Director-General of the e-Government and Administrative<br />

Processes Directorate at the Ministry of Public Administration of the Republic of<br />

Slovenia. He is also a senior assistant in the Department of Intelligent Systems at the<br />

Jožef Stefan Institute, the biggest technological institute in Slovenia and an assistant<br />

professor of strategic management, development of modern systems and the field of<br />

information-communication technologies at the University of Primorska. He is a<br />

member of several national, <strong>European</strong> and international bodies and associations and<br />

a leader or member of many international teams, including the Centre for<br />

eGovernance Development in South East Europe (CeGD) Supervisory Board. He is<br />

the author of numerous expert and scientific articles and books. He earned his doctorate degree in 1997<br />

from the Faculty of Electrical Engineering, University of Ljubljana.<br />

Mini track chairs<br />

Christian Breitenstom works as software architect with focus on privacy enhancing<br />

technologies and enterprise applications. Among his projects were the central news<br />

system for the German government (BPAVIS) and the distributed information system of<br />

the German police (INPOL). With Fraunhofer FOKUS he developed the Electronic Safe<br />

for Data and Documents as trustworthy e-Government infrastructure. As OMG certified<br />

professional Christian trained software engineering teams in modelling and JEE<br />

technologies.<br />

vii


Tom Collins lectures in International Tax and Advanced Tax in the B.A. (Hons.) in<br />

Applied Taxation and in Wealth Management for the MSc (Computational Finance) at<br />

the National Centre for Taxation Studies, University of Limerick. Tom has over 25 years<br />

experience with Big-4 tax practices in Ireland and New Zealand. Prior to joining the<br />

University of Limerick, Tom was a Tax Director with Deloitte specialising in international<br />

tax, real estate and wealth management. Tom is NCTS director since September 2009.<br />

Mila Gascó holds a Ph. D. in public policy evaluation and a Master in Business<br />

Administration. She is a researcher at the Institute of Governance and Public<br />

Management of ESADE as well as an associate professor at both the Open University<br />

of Catalonia and the Pompeu Fabra University. She also has a lot of consulting<br />

experience on the information and knowledge society. Her main interests are related to<br />

public policies that allow the transition of a society to the so-called knowledge era (in<br />

particular, e-government and e-governance), to the use of ICTs for human development<br />

and to public policy evaluation.<br />

Carlos Jiménez is a Computer Engineer and holds a diploma on Information Systems<br />

Management. He is finishing his MSc. on the Information Society. He is in charge of the<br />

change management of the e-Justice project sponsored by the Information Systems<br />

Service of the Justice Department of the Autonomous Government of Catalonia. His<br />

main interests include information systems, e-governance, and interoperability. In these<br />

areas he has and carried out international training and consulting work for important<br />

organizations worldwide such as CLAD, the Government of Brazil, the Externado<br />

University of Colombia or the Pompeu Fabra University in Spain.<br />

government.<br />

Zaigham Mahmood is a Principal Researcher and Reader in Applied Computing in<br />

the School of Computing and Mathematics, University of Derby, UK. He has an MSc in<br />

Mathematics, an MSc in Computer Science and a PhD in Modeling of Phase<br />

Equilibria. He is also a Chartered Engineer and a Chartered Information Technology<br />

Professional. Zaigham has in excess of 50 publications in proceedings of international<br />

conferences and journals as well as chapters in books. He is also Editor-in-Chief of<br />

Journal of E-Government Studies and Best Practices. His research interests are in the<br />

areas of software engineering, project management, enterprise computing and e-<br />

Pat Molan is a Principal Officer with the Irish Revenue Commissioners and Limerick<br />

District Manager. Pat has worked with Revenue for almost thirty years having worked in<br />

a number of government departments previously. Pat has been centrally involved in the<br />

delivery of new and innovative IT solutions that have helped transform the Irish Revenue<br />

Commissioners into an organisation that is internationally regarded as the flagship for e-<br />

Government in the Irish Public Service.<br />

Biographies of contributing authors (in alphabetical<br />

order)<br />

Ahamed Bakeri Abu Bakar is Currently a professor at the Department of Library and Information Science,<br />

International Islamic University Malaysia, Kuala Lumpur, Malaysia. Has published a good number of articles<br />

in refereed journals and has presented numerous papers at international conferences worldwide covering<br />

areas such as digital libraries, e-governments, and information access.<br />

Fatemeh Ahmadi Zeleti is a Master of Science in Software Engineering. She has investigated the progress<br />

and obstacles of implementing and improving e-government in Iran. Prior to this, she completed her Bachelor<br />

of Science in Information Technology. Fatemeh's research interests include ICTs, e-government and its<br />

security issues, e-services, trust management, and technology and knowledge management.<br />

Shadi Al-khamayseh is a lecturer at Dubai Women's College, Higher College of Technology, Dubai City,<br />

UAE. He completed his PhD on Mobile Government at the University of Technology Sydney, Australia where<br />

viii


he lectured and tutored in a number of Information Technology subjects. He has published widely on<br />

electronic and mobile government.<br />

Madi Al-Sebie is an assistant professor in IT at Taibah University, Saudi Arabia. He received his PhD from<br />

School of Information Systems and Computing, Brunel University (UK). He received his M.Sc. in Computer<br />

Studies (Department of Computer Science) from the University of Essex.<br />

Isabel Anger studied journalism and organizational communication at FH JOANNEUM, University of Applied<br />

Sciences. After finishing her studies in 2010, she has been working as junior researcher at evolaris next level<br />

GmbH in Graz, Austria. Her research focus lies on Social Media and mobile web.<br />

Davide Arduini is Lecturer of International Industrial Economics at University of Urbino. He holds a PhD in<br />

Economics from Polytechnic University of Marche. He has collaborated with the National Centre for<br />

Information technology in the Public Administration. He works on Economics of technical change and<br />

technology policy, diffusion of ICT and e-Government.<br />

Jaro Berce, PhD, an assistant professor. Research interests: Information Society technologies (IST) and<br />

socio-economics implications; Knowledge management, Learning organization and Governance<br />

models.Lecturing: Project management, Secondary data and information resources, Information systems<br />

and eGovernance, Analyse of Information Society. Publishing topics: eGovernance, IST, Knowledge<br />

management and Learning organisation culture at conferences, journals and books.<br />

Choompol Boonmee is a lecturer at faculty of engineering Thammasat university. He also works as an ICT<br />

consultant of Thai government. He led many e-government projects. He is also the president of the electronic<br />

data interchange promotion association (EDIPA). His interests include e-government interoperability, ICT<br />

benefit management, national ID smartcard, software engineering, service oriented architecture and scientific<br />

computation.<br />

Roberto Boselli is professor assistant in Computer Science at the Department of Statistics, University of<br />

Milan Bicocca. His research activities focus on Information Systems, Semantic Web, Web 2.0 and egovernment<br />

services. He published many scientific papers in books, international journals, proceedings of<br />

national and international conferences.<br />

Leonard Burke is a Principal Officer with the Irish Revenue Commissioners in the Collector General’s<br />

Division. Leonard has worked with Revenue since 2006 having previously worked in the Department of<br />

Social Protection for 28 years. He is centrally involved in identifying and delivering new and innovative IT<br />

solutions in an organisation that is internationally regarded as the flagship for e-Government in the Irish<br />

Public Service.<br />

Walter Castelnovo is assistant professor of Information Systems and Organization at the University of<br />

Insubria (Italy). His research interests concern technological and organizational innovation in Public<br />

Administration and Interorganizational Information Systems. He is a member of the Department of<br />

Institutional Reforms, E-Government, Cooperation and Communitarian Policies of the Association of<br />

Municipalities of Lombardia (italy).<br />

Lichun Chiang is an associate professor at the Department of Political Science at the National Chung Kung<br />

University in Tainan, Taiwan. She earned her Ph.D. in Political Science, and obtained her Master in Public<br />

Administration from the University of Southern California, USA. Her recent research interests are mainly in<br />

e-governance, information technology and public organizations.<br />

Marie-Therese Christiansson, PhD, is an Assistant Professor in Information Systems at Karlstad University<br />

in Sweden. Her research interest covers process oriented driven business- and system development. Focus<br />

in her research is a co-production in an established network for practitioners, in private as well as public<br />

organisations, with interest in knowledge development and lightweight process methodologies.<br />

Pin-Yu Chu serves as Distinguished Professor of National Chengchi University, Taiwan. Her research<br />

interests include technology development and management and digital governance. Her publications can be<br />

found in Government Information Quarterly, Omega: The International Journal of Management Science,<br />

Journal of Management & Organization, Public Performance and Management Review, International Journal<br />

of Technology Management, etc.<br />

Liam Church is president and CEO of Escher Group Ltd. During his 22 year career in the postal system, he<br />

has been responsible for numerous, large-scale business and IT projects. He has considerable expertise in<br />

ix


the use of technology to manage change, to drive business growth and to help accelerate profitability in<br />

postal organizations.<br />

Duncan Cleary Senior Statistician in Revenue, Ireland, based in the Research and Analytics Branch;<br />

specialising in the application of Knowledge Discovery/ Data Mining methodologies and their application in<br />

the Irish Tax & Customs Authority, using predictive analytics, customer segmentation, real time risk<br />

analyses, large scale surveys, social network analysis, spatial analyses, time series and evidence based<br />

experiements.<br />

Grazia Concilio- Degree in Engineering, PhD in Evaluation Methods for the Integrated Conservation of<br />

Architectural, Urban and Environmental Heritage, assistant professor in Urban Planning at the Polytechnic of<br />

Milan and author of several articles. Research work mainly developed around the implementation of<br />

methodologies and techniques of knowledge representation and management for decision-making in spatial<br />

planning.<br />

Anne Corbett has worked for the Irish Revenue Commissioners for over 25 years and has extensive<br />

experience in a wide range of areas and roles. Currently she is involved in comprehensive audit (Corporation<br />

Tax, PAYE, VAT, CGT) with responsibility for the audit of high worth individuals, professionals and large<br />

companies. She also has a particular focus on anti-avoidance issues and her job entails sourcing and<br />

investigating such issues, schemes, and risks. She has recently completed an Honours Degree course in<br />

Applied Taxation with the University of Limerick.<br />

Martin De Saulles is a Principal Lecturer at the University of Brighton in the UK where he teaches and<br />

carries out research on knowledge management, social media management and innovation in the<br />

information sector. Prior to joining the University of Brighton in 2003, Martin worked in the advertising and<br />

management consulting sectors.<br />

Mitja Dečman is a Senior Lecturer in Informatics and Information Systems in Public Administration at<br />

Faculty of Administration, teaching at undergraduate level. He holds a Ph. D. in Administration Science from<br />

the Faculty of Administration. His project and research work includes: development of information systems,<br />

benchmarking systems, digital preservation, information security, e-government, web 2.0 and others.<br />

Amanda Derrick (MA Cantab) is Programme Director for Connect Digitally a multiple award-winning<br />

programme. The programme is leading central and local government in transforming key services for<br />

citizens across England by streamlining delivery and innovative use of digital technology. Amanda has a<br />

strong leadership and delivery record in government.<br />

Mohamed Mohyi Eddine El AichiI a Software Development manager, is currently preparing his PhD at<br />

ENSIAS. The aim of his thesis is to model transformational government process. His experience in<br />

implementing e-government solutions in Morocco and his interest in best practices for managing information<br />

systems, enable him to understand the weakness of implementation of a t-government solution.<br />

Magdy El-Hennawy is the project manager for the Family Card System in MSAD. Meanwhile, working as<br />

a lecturer in the Higher Institute of Computer Science & Information Technology, El-Shorouk Academy.<br />

Before, since 1978, working as chief of the System Engineering team, deputy manager then manager of<br />

software development center specialized in mission critical software systems.<br />

Nuša Erman graduated from the University of Ljubljana's Faculty of Social Sciences (social informatics) in<br />

2007. Most of her research is focused on social network, citation, and scientific network analysis (mostly in egovernment<br />

domain). She collaborates with Faculty of administration as a young researcher and an assistant<br />

in the field of Informatics.<br />

Marcoux Faiia is a Professor of Sociology at Rivier College in Nashua, N.H., U.S.A.. Dr. Marcoux Faiia has<br />

a Masters of Social Work from Boston College and a Ph.D. in Sociology/Anthropology from Northeastern<br />

University. Dr. Marcoux Faiia's research interests are in deviant behavior, popular culture and youth and<br />

women's Issues.<br />

Jean Vincent Fonou Dombeu is a PhD candidate at the School of Computer, Statistical and Mathematical<br />

Sciences at the North-West University and a lecturer in the Department of Software Studies at the Vaal<br />

University of Technology. His research interests include: Biometric for Personal Identification, Ontology,<br />

Agent Modelling, and Semantic Knowledge representation in egovernment<br />

x


John Garofalakis is Professor at the Department of Computer Engineering and Informatics, Patra’s<br />

University, Greece, and Director of Research <strong>Academic</strong> Computer Technology Institute’s Sector for Regional<br />

Development. His experience includes R&D work (and relevant publications) in the fields of: Web and Mobile<br />

Technologies, Performance Analysis of Computer Systems, Computer Networks and Telematics, Distributed<br />

Computer Systems, Queuing Theory.<br />

Mila Gascó holds a MBA and a Ph. D. in public policy evaluation. She is a researcher at the Institute of<br />

Governance and Public Management of ESADE as well as an associate professor at both the Open<br />

University of Catalonia and the Pompeu Fabra University, all of them in Spain.<br />

John Grant holds a Ph. D in Political Science from McMaster University. His fields of expertise include<br />

policy research, public administration, performance management, statistical analysis and data collection. He<br />

is a senior policy analyst for a consulting company and maintains a current appointment as an external<br />

researcher for the York Centre for International and Security Studies.<br />

Mary Griffiths teaches in communications and media and is Head of Media at the University of Adelaide.<br />

Current research includes Creative Tactics; and Digital Citizenship and Youth Participation, a comparative<br />

study (with Youn-Min Park). She is guest editor of ‘Trading with China’ (2012), a special issue of<br />

Communications, Politics and Culture.<br />

Guillaume Gronier has realised a PhD in ergonomic psychology on computer supported cooperative work.<br />

Currently Research and Development Engineer at the Public Research Centre Henri Tudor in Luxembourg,<br />

he works on issues related to ergonomics, collective and organizational performance, digital trust and user<br />

profiling for online government services.<br />

Kerstin Grundén is senior lecturer in informatics at the West University of Sweden. She has also a<br />

background as a sociologist. She is participating in an on-going interdisciplinary research project Innoveta<br />

funded by Vinnova for the study of customer centres implementation and e-services within municipalities in<br />

Sweden.<br />

Panos Hahamis is a Senior Lecturer in Business Information Management and Operations at the<br />

Westminster Business School and a Henley DBA Research Associate. He holds a BA (Hons) in Politics, an<br />

MSc in Advanced Information Technology, a PGCHE and a Post-Graduate Advanced Diploma in<br />

Management Consultancy-ADipC. A former diplomatic agent and military officer, in recent years his research<br />

interests have focused on e-Government.<br />

Martijn Hartog is a project leader and researcher at the eSociety Institute. He functioned as advisor within<br />

several Dutch governmental agencies, such as the Ministry of General Affairs / Ministry of Transport, Public<br />

Works and Water Management / Dutch Public Broadcast Agency and Municipality of Rotterdam. His current<br />

field of research concerns applied e-democracy.<br />

Bernhard Horn is a research assistant in the research group for Industrial Software at Vienna University of<br />

Technology and his research and science focus is in the field of e-government, IT law and medical<br />

informatics. He holds master diplomas in Business Informatics and Law from the University of Vienna.<br />

Currently he works on his PhD thesis about the Austrian legal regulations for the electronic delivery of<br />

governmental documents.<br />

Ivana Horvat is a student of PhD studies, module Business informatics at University of Novi Sad, Faculty of<br />

Economics. Most of the research period she was interested in business informatics and, therefore, she<br />

defined research areas that comprise of XML databases, services that use XML to exchange documents,<br />

with special concern on e-government processes.<br />

Princely Ifinedo is an Associate Professor at Cape Breton University, Canada. He holds a doctoral degree<br />

in Information Systems Science from the University of Jyväskylä and masters degrees from the University of<br />

London and Tallinn University. He has presented research at various international IS conferences.<br />

Aleksis Jarockis is a PhD candidate of the University of Latvia, Department of Communications Studies. In<br />

2009 acquired Latvian University Social Sciences master's degree in Communicational Sciences with<br />

honors. Research interests: public administration communication, crisis communication in the public sector,<br />

organization communication, media and public in public current issues research and interpretation.<br />

Raed Kanaan is an assistant Professor in Management Information System at the Arab Academy for<br />

Banking and Financial Sciences. He received his PhD in Information systems from the De Montfort<br />

xi


University, and MSc in management information systems form the Arab Academy for Banking and Financial<br />

Sciences. His research interests include e-government in developing countries, e-commerce, impact of<br />

culture on IT adoption and implementations in the Middle East, and Intellectual capital in the Arab<br />

universities.<br />

Maja Klun oriented her research in public finance, and economics of public sector. The government<br />

appointed her as a member of government group for development of performance-oriented budgeting for the<br />

period 2005-2007. She cooperates with the government in the field of better regulation, and in the board for<br />

public sector.<br />

Endrit Kromidha (MSc) is a researcher and lecturer in Royal Holloway, University of London and other UK<br />

higher institutions in management, information systems, e-business and information society. Having a<br />

background in international economics and work experience in business, non-profit sector and academia, his<br />

current interest is on e-government, international assistance, sustainability, information systems, and<br />

institutionalisation.<br />

Peter Lipp is Assistant Professor at IAIK, Graz University of Technology, and is heading the Java Crypto<br />

development team at IAIK and Stiftung Secure Information and Communication SIC, where he also is one of<br />

the CEOs. He has been involved in PKI-projects and standardisation for about 20 years.<br />

Devender Maheshwari is a PhD researcher at Information and Communication Technologies (ICT)<br />

Department, Delft University of Technology, The Netherlands He holds a master degree in<br />

Telecommunication from Delft University. His research is focused on E-government growth and readiness,<br />

interoperability, e-governance, measuring and benchmarking, and enterprise architectures of public<br />

organizations.<br />

Zaigham Mahmood is a Reader in Applied Computing at the University of Derby UK. He is a Chartered<br />

Engineer and has in excess of 60 articles published in conference proceedings, journals and books. His<br />

research is in the areas of software engineering, project management, enterprise computing and egovernment.<br />

Gianluca Misuraca is a Scientific Officer at the Information Society Unit of the Institute for Prospective<br />

Technological Studies of the <strong>European</strong> Commission's Joint Research Centre (JRC-IPTS). Also a Research<br />

Associate at the Ecole Polytechnique Fédérale de Lausanne (EPFL) where previously he was the Managing<br />

Director of the Global Executive Master in e-Governance.<br />

Racious Moatshe is a PhD student at the University of Derby, UK. He is pursuing a research project on<br />

Barriers to successful implementation of e-government in developing countries, taking the case of Botswana<br />

government. Racious has experience and knowledge in business finance, banking, and business needs<br />

analysis, portfolio management, and people and business management.<br />

Maria Moloney is an IT consultant with Escher Group Ltd and a lecturer at Trinity College Dublin. After<br />

earning a BSc degree and an MSc degree in Information Systems, she is currently reading towards a PhD at<br />

Trinity College Dublin. Her research interests include informational privacy, e-government and information<br />

systems design theory.<br />

Frans Mosetja is a junior lecturer in the department of Information Systems at the Faculty of Commerce,<br />

North West University-Mafikeng campus, South Africa, teaching the undergraduate courses. He is currently<br />

busy with his Masters degree in Information Systems. His research is focused on the use of Information<br />

Technology by government departments in South Africa.<br />

Bert Mulder is an associate professor of Information, Technology and Society at The Hague University of<br />

Applied Sciences and founder of the eSociety Institute. His main objective concerns strategy development<br />

for a broad and innovative appliance of ICT within the society. Prior to this he worked as an information<br />

advisor at the Dutch parliament.<br />

Darren Mundy holds a PhD in the field of Healthcare Informatics (2004) and a first class honours degree in<br />

Computer Science (2000) both of which were obtained from the University of Salford. Darren is the Director<br />

of Undergraduate Studies in the School of Arts and New Media at the University of Hull. His research<br />

interests range from Computer Security through web personalisation systems to innovative educational<br />

technologies.<br />

Gianluca Misuraca Scientific Officer at the Information Society Unit of the Institute for Prospective<br />

Technological Studies of the <strong>European</strong> Commission's Joint Research Centre (JRC-IPTS). Also a Research<br />

xii


Associate at the Ecole Polytechnique Fédérale de Lausanne (EPFL) where previously he was the Managing<br />

Director of the Global Executive Master in e-Governance.Gianluca held several positions as policy advisor<br />

for various International Organisations, bilateral cooperation agencies and consulting companies.<br />

Francesco Molinari -MSc & MA in Local Public Management (Siena University, 2007 & 2005) and BSc in<br />

Social and Economic Disciplines (Milan “L. Bocconi” University, 1990). Currently an independent research<br />

and project manager for several public and private organizations in Europe. His background includes a 5years<br />

service as strategic advisor of a middle-sized Italian City Mayor.<br />

Bongani Ngwenya is the Dean, Faculty of Business, MBA Thesis Defense Panel Chair, Lecturer and<br />

Master’s thesis supervisor at Solusi University, in Zimbabwe.Currently studying PhD in Business<br />

Management & Administration, with specialization in Strategic Management with North West University,<br />

Mafeking Campus in South Africa. Research interests are mainly in the areas of Organisational Decision-<br />

Making Research & Business in general.<br />

Birgit Oberer is amember of the Faculty of Arts and Science at Kadir Has University. Currently, her<br />

academic interests are public management, process management and information technology. She actively<br />

takes part in a number of international networks and task forces on Management and IT and member of<br />

editorial reviewer boards for international journals<br />

Clare Omelia is an Assistant Principal Officer with the Irish Revenue Commissioners and is Dublin<br />

Enforcement District Manager, based at Dublin Port. With Revenue since 2004, Clare has previously worked<br />

in other Government Departments, and in the private sector.<br />

Robert Orlowski (B.Sc.) is a student of Information Systems at the University of Duisburg-Essen. His<br />

academic areas of interest include ontological engineering and semantic interoperability of information<br />

systems.<br />

Ching-Heng Pan is an assistant professor at the National Chung Hsing University in Taiwan. He earned his<br />

Ph.D. in Public Administration from University of Southern California, and obtained his Master in Public<br />

Administration from Columbia University. His recent research interests are mainly in e-governance,<br />

innovation diffusion, and public organizations.<br />

Marijn Plomp has an MSc in Information Science from Utrecht University and currently works there as a<br />

PhD Researcher at the Department of Information and Computing Sciences. His research focuses on the<br />

adoption of chain information systems. He also has a position as researcher/consultant at Dialogic innovation<br />

& interaction in Utrecht, The Netherlands.<br />

Massimo Pollifroni (2001) L’economia dell’azienda universitaria, Giappichelli, Turin.(2003) Processi e<br />

modelli di e-government ed e-governance applicati all’azienda pubblica, Giuffrè, Milan.(2007) Public Sector<br />

Social Responsibility. Strumenti di rendicontazione etico-sociale per l’azienda pubblica, Giuffrè, Milan.(2009)<br />

Green Public Accounting. Profili di rendicontazione ambientale per un’azienda pubblica responsabile e<br />

sostenibile, Giappichelli, Turin.<br />

Nataša Pomazalová, Ph.D.Nataša is lecturer at University of Defence in Brno (CZ). Her research interests<br />

include managerial education, outsourcing use in the public sector and e-government. Her research is<br />

focusing on public procurement and knowledge management.<br />

Leszek Porębski is a professor of political science, employed in the Department of Political Science and<br />

Contemporary History, at the Faculty of Humanities, AGH University of Science and Technology, Kraków,<br />

Poland. Major fields of interest: e-democracy, e-government, societal consequences of the ICT use as well<br />

as the political theory of Harold D. Lasswell.<br />

Oscar Rebollo is MSc in Computer Science and Networks from the University of Alcalá de Henares (Spain).<br />

He is currently a PhD student and a member of the GSYA research group at the School of Computer<br />

Science at the University of Castilla-La Mancha. His research activity is in the field of security in Information<br />

Systems.<br />

Laslo Šereš is an assistant professor at University of Novi Sad, Department of Business Informatics. He’s<br />

interest and active involvement with databases is already 20 years long. Nowadays his primary research<br />

interest is in XML database constraints and usage of XML databases in different areas, including e-Business<br />

processes. His other interests are database design, query optimization issues, and Data Warehousing.<br />

xiii


Shareef Shareef BSc in Physics from Mousel University in 1990 in Iraq. Received an MSc in Digital<br />

Communications Networks in 2005 from London Metropolitan University with distinction. worked as an expert<br />

in ICT Centre at the Ministry of Higher Education & Scientific Research in Kurdistan Region of Iraq (KRI) in<br />

2007Currently at the University of East London as a PhD student.<br />

Dalibor Stanimirovic finished his master's studies at the University of Ljubljana’s Faculty of Administration.<br />

He is an assistant in the field of Informatics in public administration and an active member of Institute for<br />

Informatization of Administration. He is involved in various IT projects and his research interests include egovernment,<br />

e-democracy and social dimensions of ICT.<br />

Virgil Stoica, Ph.D.Head of Political Science Department – Alexandru Ioan Cuza University of Iasi, Faculty<br />

of Philosophy, Social and Political Sciences; Courses taught: Public Policy, Public Administration, and<br />

Political Science Research Methods; Scientific research fields: e-government, public policies, local<br />

government, and political elites.<br />

John Douglas Thomson, PhD: Research interests include corporate governance policy and ethics, ebusiness<br />

and government/industry policies, infrastructure development and high tech project delivery,<br />

business systems and marketing. He has published four books, five book chapters, and 32 refereed<br />

conference/journal publications/papers.<br />

Natasa Veljkovic received the BSc and MSc degrees in Computer Science at the Faculty of Electronic<br />

Engineering, University of Nis, Serbia. She is currently working as a Teaching Assistant at Faculty of<br />

Electronic Engineering with the Department of Computer Science. Her PhD research is concerned with<br />

Sensor Web systems, E-systems, GIS and e-Government solutions and implementation.<br />

Jim Yonazi is a Lecture and a researcher from the Institute of Finance Management (IFM) in Dar es Salaam<br />

Tanzania. His research interest is on the areas of e-Government, ICT4D, and ICT innovations. Jim has a<br />

PhD in e-Government from the University of Groningen (Netherlands) and MSc Information Technology and<br />

Management from Keele University (UK).<br />

xiv


Evaluation of eGovernment Implementation at Federal, State<br />

and Local government Levels in Malaysia<br />

Ahmad Bakeri Abu Bakar<br />

International Islamic University Malaysia, Kuala Lumpur, Malaysia<br />

bakeri@iiu.edu.my<br />

Abstract: The Malaysian Government has been implementing eGovernment initiatives since 1997. One way that the<br />

government can demonstrate physically to meet public demands for greater transparency and accountability is to<br />

offer online services and products through the eGovernment websites or portals. The eGovernment websites at<br />

Federal government, State government and Local government levels vary from one another considerably in terms of<br />

their technological design as well as their contents. For the purpose of measuring the generic aptitude of the State,<br />

Federal and Local government authorities to employ eGovernment, the Web Presence Measurement Model<br />

employed by the United Nations for the Global eGovernment Survey 2003, was used to evaluate the websites.<br />

Evaluation of MyGovernment, the Malaysia’s Government official portal,13 State government websites as well as<br />

State agencies websites and 145 local government authorities websites was conducted. The study was able to<br />

identify the current state of maturity of eGovernment websites and the stage of fitness of those websites in the cyber<br />

space. It was found that the portal, MyGovernment was far ahead in term of sophistication, followed closely by the<br />

websites of the Ministry of Agriculture and Agro-Based Industry and the Ministry of Tourism. The websites of all the<br />

State Governments in Malaysia are fairly good but the State Agencies websites have several deficiencies especially<br />

in incorporating the eGovernment applications such as E-procurement in their websites. At the Local government<br />

Authorities level the implementation of eGovernment is fairly good for those in rich States such as Selangor while<br />

those in poor States such as Sabah they are deficient in several aspects such as the absence of online payment, e-<br />

Procurement and online application in their websites. This sort of indicate that local government authorities with<br />

money to spend can develop their websites/portals to a sophisticated level of maturity while other less fortunate<br />

States could only provide the barest minimum for their websites/portals as in the case of Sabah.<br />

Keywords: eGovernment, Malaysia, state government, local government, website evaluation<br />

1. Introduction<br />

The Malaysian Government has been implementing eGovernment initiatives since 1997. This initiative by<br />

the government is in reality a product of the efforts under the Multimedia Super Corridor (MSC). It was<br />

designed to improve information flow and processes within the government, improve the speed and<br />

quality of policy development, and improve coordination and enforcement. This would enable the<br />

government to be more responsive to the needs of its citizens. The MSC is a project created by the<br />

government to hasten the process of the nation to become first world status by the year 2020. For this<br />

purpose the government has embarked in various initiatives and investments related to information and<br />

communication technology (ICT). The MSC now known as MSC Malaysia was responsible for<br />

establishing the eGovernment flagship under its flagship applications programme. Under the<br />

eGovernment flagship, seven main projects were identified to be the core of the eGovernment<br />

applications. The eGovernment projects are Project Monitoring System (PMS), Electronic Procurement<br />

(eP), Generic Office Environment (GOE), E-Syariah, Human Resource Management Information System<br />

(HRMIS Electronic Services Delivery (eServices)), and Electronic Labour Exchange (ELX).<br />

As citizens are responsible for electing the government at the Federal, State and Local government levels<br />

in Malaysia they expect the government to adopt strategies that improve citizen access to government<br />

information and expertise to ensure citizen participation in and satisfaction with the government process.<br />

This situation arises from the Malaysian government structure of having a three-tiered government<br />

administrative systems namely Federal, State government and Local authorities. One way that the<br />

government can accede to this inquisition is to offer online services and products through the<br />

eGovernment websites or portals. The eGovernment applications would not have succeeded had it not<br />

been for the might and evolution of information and communication technology (ICT) sectors. The<br />

commitment of the government towards investments in the ICT sector has been enhanced recently.<br />

During the tabling of the 10th Malaysia Plan (10MP) 2011-2015 in parliament in June 2010, the Prime<br />

Minister outlined several investments in ICT sectors. At the same time several States announced ICT<br />

plans to complement the development of the MSC. For example, Selangor state government including<br />

the local governments at state level has set up the Selangor Networking and the Web homepage for its<br />

various agencies which would link the state administration and all government departments and agencies<br />

with every business organisation, office, factory, school and home in the state. Johor state government<br />

announced the establishment of Johor Information Infrastructure (JII) costing RM30 million, the first state<br />

1


Ahmad Bakeri Abu Bakar<br />

to set up such a system in order to provide the public with a more efficient information service (Erlane<br />

and Jamaliah, 2010).<br />

Governments of both developed and developing countries have embraced ICT to improve the quality of<br />

public service, increase public access to information and to energise more participation in civic affairs<br />

(Moon, 2000; Schedler, 2003). The citizens also are accustomed to the developments of ICT through the<br />

escalating rate of utilization of Internet. In the case of Malaysia Internet usage has increased at a<br />

remarkable rate. This can be visualized from the figures provided by the Malaysian Communications and<br />

Multimedia Commission (MCMC). In 2000 the number of subscribers was only about 2 million ( Abd<br />

Rozan,2008). Currently it is estimated that the number of Internet subscribers have reached close to 12<br />

million (11.76 million at the end of 2007) (MCMC, 2008). The current Internet penetration rate is at 16.9<br />

million (ITU, 2010). The Internet is an important element in eGovernment as the term itself is defined as”<br />

exclusively an Internet-driven activity that improves citizen access to government information ,services<br />

and expertise to ensure citizen participation in, and satisfaction with the government process”<br />

(UNDPEPA, 2002).<br />

The presence of eGovernment websites, however, might not change the status quo as they could just be<br />

displaying information in an attractive manner and nothing more to the public. Benjamin and Whitley<br />

(2004) opined that “ No longer can a website justify itself merely by being a website – the bottom line is<br />

apparently clear : web pages must reach concrete goals and prove their investment”. In order to<br />

understand whether the creation of the eGovernment websites has benefited the public or not then the<br />

question of how usable these websites are to the public has to be evaluated. The evaluation of<br />

eGovernment websites and portals can be done at several levels of the government machinery. Some<br />

scholars have accessed for features such as information availability, service delivery, and public access<br />

at global level ( West, 2007), at national level (Benjamin and Whitley,2004) and at municipality level (<br />

Kunsteij and Decman,2005).<br />

Malaysia, a federal constitutional elective monarchy, is nominally headed by the Paramount Ruler or<br />

Yang di-Pertuan Agong , commonly referred to as the King of Malaysia. The state governments are led<br />

by chief ministers , nominated by the state assemblies and advising their respective sultans or governors.<br />

There are 13 states and three federal territories which are Kuala Lumpur, Labuan Island and the<br />

Putrajaya federal administrative territory. The local authorities are under the jurisdiction of the state<br />

governments. Three types of administrative councils are in existence. These are the City, Municipal, and<br />

District councils. A city council refers to a local authority in which the population of the jurisdiction area<br />

exceeds 500,000 people and the collection of the annual revenue is more than RM100 million. City<br />

councils are led by mayors. A local authority is known as the municipal council if the population of the<br />

jurisdiction area is not less than 150,000 and the annual revenue collection is more than RM20m. A<br />

municipal council is led by a president. On the other hand, a local authority is known as a district council if<br />

the population of the jurisdiction area is less than 150,000 and the collection of annual revenue is less<br />

than RM20m (Hazman, 2006). In Malaysia the eGovernment projects are monitored closely by the<br />

Director-General of the Malaysian Administrative Modernisation and Management Planning Unit (<br />

MAMPU) of the Prime Minister’s Department. The national committee responsible for overseeing the<br />

development of public sector websites or portals is the Public Sector Portal/Website Steering Committee<br />

headed by the Director General of MAMPU. Amongst the tasks given to this Committee are to: coordinate<br />

and monitor implementation of public sector websites/portals, monitor effectiveness of public sector<br />

websites/portals and identify improvement efforts and solve problems and issues. It does not come as a<br />

surprise to record some accolade attributed to the Malaysian public sector eGovernment websites or<br />

portals given the fact that the quality of these websites or portals are always never compromised by<br />

MAMPU. Consequently, at the World Congress on Information Technology 2008 (WCIT2008) held in May<br />

2008 Malaysia’s MyGovernment portal (http://www.gov.my) beat about 70 others around the world to take<br />

the top prize in its category in the 2008 Global ICT Awards (Star,2008). MyGovernment was initiated by<br />

MAMPU in 2003 and according to MAMPU the portal had 6.5 million visitors as at May 2008. This portal<br />

acts as the main gateway to access government information and online services ( 900 websites across<br />

Federal, State and Local authorities (MAMPU,2008). The global eGovernment ranking for Malaysia has<br />

also improved significantly. For example in the Brown University’s Global EGovernment survey,<br />

Malaysia’s ranking was 157 out of 199 countries in 2005 and it moved to 36 in 2006. In the latest 2007<br />

survey its position has improved further to 25 (West,2007). With such an improvement in the global<br />

ranking it is expected that the scenario is not just an outcome of the display of reengineering done only at<br />

Federal Government level but also at State Government and Local authorities level.<br />

2


2. Purpose of study<br />

Ahmad Bakeri Abu Bakar<br />

The aim of the study is to determine the maturity level of implementation of eGovernment applications at<br />

the Federal, State and Local Government levels based on the evaluation of the eGovernment websites or<br />

portals at Federal ,State and Local Authorities level in order to understand more clearly the actual<br />

situation on the ground.<br />

3. Methodology<br />

A Model called Web Presence Measurement Model WPMM) was employed to evaluate the current status<br />

of those websites or portals in Malaysia selected for the study. The Web Presence Measurement Model<br />

(WPMM) was introduced in the UN eGovernment Survey 2003 as an assessment towards United Nations<br />

member countries specifically for their capability providing services electronically via the Internet. The<br />

WPMM shows 5 progressively ascending stages of presence that consists of Emerging Presence,<br />

Enhanced Presence, Interactive Presence, Transactional Presence and Networked Presence. WPMM<br />

quantification considers the development of maturity of EGovernment presence on-line.<br />

Indicators are used to measure the presence or absence of specific electronic facilities or services<br />

available in the government agency websites or portals. The WPMM model is shown in Table 1 and<br />

some refinements or adjustments have been made to some indicators to ease the evaluation process.<br />

Table 1: Web presence measurement model indicators<br />

Stage 1 Emerging Presence<br />

Existence of an Official Website or National portal<br />

Archived information<br />

Message from Head of organization<br />

Link to Ministries or other organizations<br />

Stage II: Enhanced Presence<br />

Provide current and archived information<br />

Policies, budgets, regulations and downloadable databases<br />

Search enabled<br />

Site map<br />

Menu provided<br />

Help features such as FAQ provided<br />

Product, service details and downloadable brochures<br />

Stage III: Interactive Presence<br />

Downloadable forms for printing and to be mailed back<br />

Audio and video capability<br />

E-mail, fax, telephone and physical address provided for ease of participation from public<br />

Updated regularly<br />

Stage IV : Transactional Presence<br />

Instruction to support any transaction<br />

Online application of identity cards, birth certificate and license renewal<br />

3


Ahmad Bakeri Abu Bakar<br />

Able to make online payments via credit, bank or debit cards<br />

E-procurement facilities provided<br />

Online bidding via secure links for public contracts<br />

Stage V: Networked Presence<br />

Use of Web Comment forms<br />

Other innovative dialog mechanism such as chat or forum facilities<br />

Web rating<br />

Extracted from the UN Global EGovernment Survey 2003.<br />

(http://unpan1.un.org/intradoc/groups/public/documents/un/unpan016066)<br />

A weight scoring method to gauge the presence of the relevant indicators is adopted in analyzing the<br />

maturity of the respective websites or portals. The weightage is computed on the basis of 1 unit score is<br />

given to the presence of a particular indicator. Based on this procedure the scoring weight for the five<br />

stages of presence is shown in Table 2.<br />

Table 2: Scoring weightage<br />

Stages Weightage<br />

Stage 1 Emerging Presence 4<br />

Stage II: Enhanced Presence 7<br />

Stage III: Interactive Presence 4<br />

Stage IV: Transactional Presence 5<br />

Stage V: Networked Presence 3<br />

The data for this study were obtained from an assessment of the Federal government authorities,<br />

MyGovernment portal from MAMPU, two Federal Ministry websites, namely from the Ministry of<br />

Agriculture and Agro-Based Industry (MOA) and Ministry of Tourism (MOTOU) and the Malaysian local<br />

authorities websites. The assessment for the local authorities was based on the official local government<br />

websites or portals covering all the 14 states in Malaysia while for the State government authorities, the<br />

assessment will be based on the official state government websites covering all the 14 states in Malaysia<br />

and in addition the state agency websites that deal with the subject of tourism and agriculture. The<br />

scoring process will be based on whether the indicators as stipulated in the WPMM are present or<br />

absent. In the case where indicators are present they will be provided with an appropriate weightage as<br />

stipulated above. Table 3: Shows the scores obtained from the portal of the Federal Government,<br />

MyGovernment from MAMPU<br />

Table 3: Scoring weightage for MyGovernment portal<br />

Stages Weightage<br />

Stage 1 Emerging Presence 3<br />

Stage II: Enhanced Presence 7<br />

Stage III: Interactive Presence 4<br />

Stage IV: Transactional Presence 5<br />

Stage V: Networked Presence 2<br />

4


Ahmad Bakeri Abu Bakar<br />

As expected the MyGovernment portal shows the existence of the indicators in all the five stages.<br />

However, contrary to expectation is the absence of the indicator for message from head of organization.<br />

Usually government agencies receive a high score for this indicator as they are supposed to convey their<br />

mission, vision and aspirations to the public for awareness purposes. One of the plausible explanations<br />

could be due to the fact that this portal is not representing any particular government agency but the<br />

Federal government as a whole.<br />

Table 4 shows the scores obtained from the two Federal ministries websites, i.e. Ministry of Agriculture<br />

and Agro-Based Industry ( MOA) and the Ministry of Tourism (MOTOU).<br />

Table 4: Scoring weightage for (MOA) and (MOTOU) websites<br />

Stages Weightage for MOA Weightage for MOTOU<br />

Stage 1: Emerging Presence 4 4<br />

Stage II: Enhanced Presence 7 6<br />

Stage III: Interactive Presence 4 4<br />

Stage IV: Transactional Presence 3 2<br />

Stage V: Networked Presence 1 1<br />

Table 4 shows the existence of the indicators in all the five stages for both MOA and MOTOU websites.<br />

All the indicators in stage II are present for MOA including the display of products and services offered by<br />

MOA while in the case of MOTOU there is no site map available which could affect the accessibility of the<br />

website. There are no indicators for online payment and online bidding for public contracts for both<br />

websites. Feedback from the public related to the online rating of the websites is also absent. Overall,<br />

MOA website is found to be more mature and sophisticated as compared to MOTOU website.<br />

Table 5 shows the scoring pattern of the State Government websites. Assessment of State Government<br />

websites involved only the official website or portal of the 13 State Government websites.<br />

Table 5: Scoring weightage for State Governments websites<br />

Stages Sg Kdah Ktan Tnu Prlis Sbah Swak Jhr Mka Phg Png Ns Pk<br />

Stage 1 4 4 4 4 4 3 4 4 4 4 4 4 4<br />

Stage II 6 5 5 5 3 5 6 6 6 6 6 5 5<br />

Stage III 4 3 2 2 2 2 3 3 3 3 3 3 2<br />

Stage IV 3 1 1 1 1 3 4 2 2 1 4 2 3<br />

Stage V 1 1 1 1 0 1 1 1 2 1 2 1 2<br />

It is evident from Table 5 that the differences between weightage of the Federal Government Ministry<br />

websites and the State Government websites are just marginal for the first 3 stages. However, in the<br />

case of stage 5 there is one state , Perlis that carries no weightage. This might be due to the fact that<br />

MAMPU has kept a close watch on the implementation of EGovernment applications in the public sector.<br />

The other point is that as the party involved are the 13 State Governments they have to lead by example,<br />

and therefore they have to comply as closely as possible with the instruction coming from Federal<br />

Government related to the development of websites. Should they not comply with the request of the<br />

Federal Government then it is highly likely that those Agencies under the State Government will also act<br />

5


Ahmad Bakeri Abu Bakar<br />

otherwise. As such there is a need to discover whether the State Agencies have complied with what the<br />

Federal and State Government wish them to practice. An assessment of the State Agencies websites<br />

could help us in the discovery.<br />

Table 6 and Table 7 shows the scoring for the State Agencies related to tourism and agriculture. These<br />

two fields are selected because of the importance of these sectors for the Malaysian economy. For<br />

example tourism sectors brought in US$15 billions, the Malaysian tourism income<br />

for 2007, the second national income after the industry sector (US$60 billions in 2007)<br />

(Tradersdailynews,2008).<br />

Table 6: Scoring weightage for State Agency in tourism websites<br />

Stages Sg Kdah Ktan Tnu Prlis Sbah Swak Jhr Mka Phg Png Ns Pk<br />

Stage 1 3 2 2 3 3 4 3 3 3 2 2 3 3<br />

Stage II 4 3 3 3 3 4 3 4 5 4 3 3 5<br />

Stage III 1 1 1 2 0 2 2 2 2 2 2 0 1<br />

Stage IV 0 0 0 0 0 1 1 1 0 1 0 0 0<br />

Stage V 0 0 0 1 0 1 1 1 2 1 2 1 2<br />

Table 6 shows clearly that State Agency websites have not developed to a state of maturity or<br />

sophistication expected of them. Most of the State Agency websites as shown in Table 6 manage to get a<br />

weightage of 1 or 0 for stage 4 and 5. This result demonstrates clearly that although MAMPU has<br />

implemented the E-Procurement applications, this initiative has not trickled down to those Agencies<br />

under the State Government.<br />

Table 7 shows a replication of the results as demonstrated in Table 6. As in Table 6 stage 4 and 5 have<br />

mostly a weightage of 1 or 0. This happens despite the fact that they belong to a separate Ministry with<br />

different leadership and work culture.<br />

Table 7: Scoring weightage for State Agency in agriculture websites<br />

Stages Sg Kdah Ktan Tnu Prlis Sbah Swak Jhr Mka Phg Png Ns Pk<br />

Stage 1 2 3 3 3 3 4 3 2 3 3 2 3 4<br />

Stage II 2 3 3 4 3 5 4 3 3 3 3 4 4<br />

Stage III 0 1 1 2 1 1 1 1 2 1 1 2 3<br />

Stage IV 0 0 1 0 1 1 1 0 1 0 0 0 2<br />

Stage V 0 0 0 0 0 0 1 0 1 0 0 0 2<br />

Based on this finding we can infer that the success story is up to the level of State Government websites.<br />

When comes to the websites of Agencies at State Government level another story unfolds.<br />

6


Ahmad Bakeri Abu Bakar<br />

Table 8 shows the scores obtained from an assessment of the City councils websites/portals in Malaysia.<br />

As shown in Table 8 not all states in Malaysia have their own City councils. Only 9 states are represented<br />

with City councils. In cases where the City council operates it can be seen that all have passed Stage I :<br />

Emerging Presence, while in Stage II : Enhanced Presence two City councils operating in the states of<br />

Sabah and Sarawak have 71% achievement which means that there are certain indicators in the Stage II<br />

that are absent. All the City councils have passed Stage III: Interactive Presence while in Stage IV :<br />

Transactional Presence the City council of Federal Territory (Kuala Lumpur City council) has the highest<br />

achievement of 80%. As expected the Stage V: Networked Presence is found to be difficult for the City<br />

councils to achieve a high score. Their best current achievement score for most of them is only at 67%.<br />

Table 8: Scoring weightage for City council websites/portals<br />

Stages Fed Slg Kda Ktan Tg<br />

Ter<br />

h<br />

g<br />

Stage 100 100 100 Nil 100<br />

1 % % %<br />

%<br />

Stage 100 100 100 Nil 100<br />

II % % %<br />

%<br />

Stage 100 !00% 100 Nil 100<br />

III %<br />

%<br />

%<br />

Stage 80% 60% 40% Nil 40<br />

IV<br />

%<br />

Stage 67% 67% 67% Nil 67<br />

V<br />

%<br />

Plis Sba<br />

h<br />

Swak Jhr Mka Phg Png Ns Pk<br />

Nil 100 100% 100 100 Nil Nil Nil 100<br />

%<br />

% %<br />

%<br />

Nil 71% 71% 100 100 Nil Nil Nil 100<br />

% %<br />

%<br />

Nil 100 100% 100 100 Nil Nil Nil 100<br />

%<br />

% %<br />

%<br />

Nil 0 40% 40% 60% Nil Nil Nil 40%<br />

Nil 0 33% 67% 67% Nil Nil Nil 33%<br />

Table 9 shows the scores obtained from an assessment of the Municipal councils websites/portals in<br />

Malaysia. As shown in Table 9 all states in Malaysia except for the Federal Territory have their own<br />

Municipal councils. These Municipal councils usually operate in the main towns of the States. As<br />

expected their scope of operations are much smaller than the City councils and as such their<br />

achievements would be likely less than that of the City councils . As shown in Table 9 there are several<br />

Municipal councils websites/portals that have not passed Stage II especially in the States of Sabah and<br />

Sarawak where they manage to achieve 43% and 57% respectively. This is in stark contrast with the<br />

achievements obtained by the City councils websites/portals in which only the two States of Sabah and<br />

Sarawak that managed to obtain 71% achievement while the rest obtained 100% achievement.<br />

Table 9: Scoring weightage for Municipal council websites/portals<br />

Sta<br />

ges<br />

Sta<br />

ge 1<br />

Sta<br />

ge II<br />

Sta<br />

ge<br />

III<br />

Sta<br />

ge<br />

IV<br />

Sta<br />

ge<br />

V<br />

Fed<br />

Ter<br />

Not<br />

avai<br />

l<br />

Not<br />

avai<br />

l<br />

Not<br />

avai<br />

l<br />

Not<br />

avai<br />

l<br />

Not<br />

avai<br />

l<br />

Slg Kda<br />

h<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

Ktan Tgg Plis Sba<br />

h<br />

100<br />

%<br />

90% 100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

Swa<br />

k<br />

100<br />

%<br />

Jhr Mka Phg Png Ns Pk<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

43% 57% 95% 76% 100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

96% 92% 100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

86% 100<br />

%<br />

86% 100<br />

%<br />

43% 27% 0 40% 40% 40% 20% 13% 13% 40% 20% 40% 40<br />

%<br />

67% 33% 33% 33% 33% 0 0 67% 44% 78% 0 78% 33<br />

%<br />

In the case of Stage IV, Table 9 shows that all the Municipal councils websites/portals obtained<br />

achievements below 50% which means that there are three indicators that are absent from their<br />

websites. For Stage V, the Municipal councils websites/portals achievement s are almost similar to that of<br />

the City councils.<br />

Table 10 shows that even at Stage I the District councils websites/portals have not obtained 100 %<br />

achievement. The States of Sabah and Perak have obtained an achievement of 94% and 98%<br />

respectively while all the Malaysian states that have City councils and Municipal councils have an<br />

achievement of 100 % which means that all the indicators in Stage I are present in their websites.<br />

7<br />

10<br />

0<br />

%<br />

93<br />

%<br />

94<br />

%


Ahmad Bakeri Abu Bakar<br />

Table 10: Scoring weightage for District council websites/portals<br />

Stage<br />

s<br />

Stage<br />

1<br />

Stage<br />

II<br />

Stage<br />

III<br />

Stage<br />

IV<br />

Stage<br />

V<br />

Fed<br />

Ter<br />

Not<br />

avai<br />

l<br />

Not<br />

avai<br />

l<br />

Not<br />

avai<br />

l<br />

Not<br />

avai<br />

l<br />

Not<br />

avai<br />

l<br />

Slg Kdah Ktan Tgg Plis Sbah Swa<br />

k<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

Not<br />

Avai<br />

l<br />

76% 82% 93% Not<br />

Avai<br />

l<br />

89% 91% 50% Not<br />

Avai<br />

l<br />

50% 29% 33% 40% Not<br />

Avai<br />

l<br />

75% 33% 33% 33% Not<br />

Avai<br />

l<br />

100<br />

%<br />

94% 100<br />

%<br />

29% 37% 100<br />

%<br />

75% 71% 100<br />

%<br />

Jhr Mka Phg Png Ns P<br />

k<br />

100<br />

%<br />

100<br />

%<br />

76% 100<br />

%<br />

100<br />

%<br />

100<br />

%<br />

86% 100<br />

%<br />

92% 86% 86% 100<br />

%<br />

9<br />

8<br />

%<br />

9<br />

7<br />

%<br />

13% 20% 15% 13% 20% 20% 8% 2<br />

0<br />

%<br />

0 0 67% 44% 71% 0 67% 3<br />

3<br />

%<br />

Table 10 also shows for Stage II the District councils websites/portals of the State of Sabah obtained the<br />

lowest achievement of 29% followed by the State of Sarawak at 37%. In the case of Stage IV the<br />

achievement of the District councils websites/portals are relatively lower than the City councils and<br />

Municipal councils websites/portals and in the case of the District council of Negeri Sembilan websites<br />

they obtained merely 8% achievement which means four out of the five indicators are absent from the<br />

websites. In respect of Stage V the number of indicators present in the District council werbsites/portals<br />

are almost similar to those exhibited by the City councils and Municipal councils websites/portals.<br />

4. Conclusion<br />

Based on the findings we can infer that the success story in the case of Malaysia’s e- government<br />

implementation is up to the level of the Federal government and its Agencies. At the State government<br />

level the implementation of eGovernment is fairly good but deteriorates rapidly at the level of State<br />

government Agencies where there are several deficiencies especially in incorporating the eGovernment<br />

applications of e-Procurement in their websites. At the Local government Authorities level the<br />

implementation of eGovernment is fairly good for those in rich States such as Selangor while those in<br />

poor States such as Sabah they are deficient in several aspects such as the absence of online payment,<br />

e-Procurement and online application in their websites. This sort of indicate that local government<br />

authorities with money to spend can develop their websites/portals to a sophisticated level of maturity<br />

while other less fortunate States could only provide the barest minimum for their websites/portals as in<br />

the case of Sabah. Having identified the shortcomings the relevant authorities especially MAMPU should<br />

take steps to improve the situation of the public sector websites especially those related to local<br />

government authorities operating at State level as they are found to be deficient in several areas.<br />

References<br />

Benjamin, M and Whitley, E. (2004). “ Assessing UK EGovernment Websites : Classification and Benchmarking<br />

Proceedings of the 12th <strong>European</strong> <strong>Conference</strong> on Information Systems, Turku, Finland,<br />

Ghani, E and Said, J. (2010) “Digital Reporting Practices among Malaysian Local Authorities” Electronic Journal of<br />

eGovernment Volume 8, 1, 2010, pp33 – 44.<br />

Hazman, S.A (2006), “From customer satisfaction to citizen satisfaction: Rethinking local government service<br />

delivery”, Paper presented at the Service delivery by local authorities: Issues and Challenges conference,<br />

Malaysia<br />

ITU (2010) “Malaysia: Internet Usage Stats and Marketing Report” http://www.internetworldstats.com/asia/my.htm<br />

Kunstelj, M. and Decman, M (2005). “ Current State of eGovernment in Slovenian Municipalities” The Electronic<br />

Journal of eGovernment, 3(3), pp117-128.<br />

“ Malaysian tourism to invest in the Arab World”. Retrieved on 12 June 2008 from<br />

http://www.traveldailynews.com/pages/show_page/25774.<br />

8<br />

1<br />

0<br />

0<br />

%


Ahmad Bakeri Abu Bakar<br />

MAMPU (2007) “MyGovernment Portal”.<br />

http://www.mampu.gov.my/pdf/semict07/Portal%20Presentation%Bluewave%20K3.pdf.<br />

MCMC. (2008). “Facts and figures: A report” http://www.skmm.gov.my/facts_figures/stats/index.asp.<br />

Moon, S. Y. (2000).” The utilization of the Internet technology in the Public Services of Korea”.<br />

Proceedings of the EROPA Hong Kong <strong>Conference</strong>.<br />

MSC Malaysia.( 2008). “ Flagship applications progress status (as of 28th November 2007)” Retrieved on 12 June<br />

2008 from http://www.mscmalaysia.my/topic/Governments.<br />

Rozan, M. Z.A. and Mikami, Y. ( 2005) “ An exploratory analysis of 200 Malaysian Enterprise websites based on Web<br />

Presence Measurement Model (WPMM)”. Proceedings of the International <strong>Conference</strong> on E-commerce,<br />

Subang, Malaysia .<br />

Schedler, K. and Summermatter, L (2003). “EGovernment: What Countries Do and Why: A <strong>European</strong> Perspective”,<br />

Journal of Political Marketing, 2 (3/4), pp255-277.<br />

Shafie, Shaidin. (2007). “ eGovernment Initiatives in Malaysia and the role of the National Archives of Malaysia in<br />

Digital Records Management. Retrieved on 12 June 2008 from<br />

http://www.archives.go.jp/news/pdf/MrShaidin2/pdf.<br />

STAR (2008) “ My Government portal wins Global ICT awards”<br />

UNDPEPA. (2002). “ Benchmarking EGovernment: A global perspective“<br />

http://www.unpan.org/egovernment2.asp<br />

West, D. M. (2003). “ Global EGovernment ” , http://www.insidepolitics.org/egovt03int.html.<br />

Yttersad, P. and Watson, R. (1996). “ Teledemocracy : Using information technology to enhance political work”, MIS<br />

Quarterly, 20(3). 15<br />

9


ICT Education and Access: As Strategies to Generate and<br />

Distribute eGovernment Content<br />

Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />

Lappeenranta University of technology, Lappeenranta, Finland<br />

Sanaz.Ahmadi@lut.fi<br />

Erja.Mustonen-Ollila@lut.fi<br />

Abstract Low-level citizens’ education and adoption of Information and Communication Technology (ICT) is a<br />

common problem in both the developed and developing countries. EGovernment, which is defined as the application<br />

of ICTs to improve the activities of government, is widely seen as a means to promote efficiency of the government<br />

activities and services. In eGovernment context, the citizens play a vital role in the success of eGovernment services,<br />

initiatives, plans, strategies, and overall activities. This can be achieved if citizens are well educated in ICT and have<br />

wider access to ICTs. Furthermore, ICT, as a new and supporting tool to improve eGovernment, should be<br />

accessible in social places aside from home and work. The goal is to increase and widen citizens’ access to ICTs<br />

regardless of age, gender, profession, income, education, ethnicity, and religion. On the other hand, proper and<br />

adequate ICT education in schools, universities, and public and private organizations should be offered to citizens<br />

and encourage them to utilize and take advantage of ICTs in their everyday life. The purpose of this paper is to study<br />

the following two factors and their impact on eGovernment: Citizens’ wider access to ICTs, and citizens’ ICT<br />

education. We will attempt to find out if these factors have an impact on generating and distributing eGovernment<br />

content. In this study we have investigated the various ways of ICT education and how to widen citizens’ access to<br />

ICT. We will evaluate if these two factors can work and contribute to greater success in regard to generating and<br />

distributing eGovernment content. Through a comprehensive review of the relevant literature, and using both the<br />

qualitative and quantitative research approaches, the main result of the study showed that citizens’ ICT education<br />

and the expansion of citizens’ access to ICT both have an essential impact on generating and distributing<br />

eGovernment content.<br />

Keywords: ICT, ICT education, citizen government, eGovernment<br />

1. Introduction<br />

In recent years, ICT has played a pivotal role in the development of digital economy. This technology<br />

facilitates the rapid accumulation and dissemination of information, group interaction, communication,<br />

and collaboration (Shirazi et al., 2010). Currently, ICT has become one of the core elements of<br />

managerial reform around the world (Zimmermann and Finger, 2005). Government authorities around the<br />

world are fully cognizant of the potential and importance of ICT to improve the delivery of government<br />

information and services to citizens, businesses, and organizations, and thereby employ ICT to support<br />

all the government activities (Wangpipatwong et al., 2008; Abanumy et al., 2005). Therefore, many<br />

governments use ICT and eGovernment, which offer services that are cheaper, more convenient, and<br />

easy to provide (Alsaghier et al., 2009). Some governments have launched their eGovernment initiatives<br />

globally to provide and offer citizens, businesses, and organisations with more convenient ways to<br />

access government information and services (Turban et al., 2002). The Internet and World Wide Web<br />

has embraced the concept of delivering information and services to citizens (Abanumy et al., 2005).<br />

Consequently, the Internet has changed the way people communicate and work, and therefore it requires<br />

innovative designs and features to make it accessible to every citizen, including people with disabilities.<br />

The internet is indeed one of the most powerful means for making this communication and eGovernment<br />

service delivery possible. Educating constituents about ICT is important because it will help facilitate and<br />

engage citizens’ interaction with eGovernment and will help increase efficiency when government<br />

information and services are utilized via government websites and other channels of communication. It<br />

will also contribute to broader access to citizens. Hence, the government is responsible for providing<br />

access to ICTs in social places aside from home and work. In addition to this, citizens’ education should<br />

be adequately fulfilled by universities, schools, institutions, public and private organizations, and other<br />

training centres. It is also important that these participants adapt to an evolving global economy and<br />

base their efforts and expectations on concepts such as transparency, flexibility, and competitiveness.<br />

In this paper, citizens’ wider access to ICTs, and citizens’ ICT education will be identified and studied.<br />

The study aims to evaluate if the ICT education and widening citizens’ access to ICTs can have an<br />

impact on generating and distributing eGovernment content. The rest of the article is organised as<br />

follows: In section two, the main terms, EGovernment and ICT, are presented. In section three, citizens’<br />

wider access to ICTs is outlined. In section four, we present citizens’ ICT education and the strategies for<br />

ICT and eGovernment promotion. Finally, in section five, we present the conclusions and discussion.<br />

10


2. eGovernment and ICT<br />

Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />

Through a comprehensive review of the relevant literature, we found various definitions to eGovernment.<br />

Most of them, however, revolve around the concepts of government’s employment of ICTs, in particular<br />

web-based application to improve the access and delivery of the government services to the citizens,<br />

businesses, and government organizations. Many governments globally are moving towards<br />

eGovernment. Nevertheless, the introduction and implementation of eGovernment has encountered<br />

many problems, both in the developed and in the developing countries (Abanumy et al., 2005).<br />

In this study, eGovernment is defined as the application of ICT by government organizations. Therefore,<br />

the main purpose of using the ICT for eGovernment is to enhance the effectiveness and efficiency of<br />

government and government organizations’ processes (Abanumy et al., 2005). Hence, it is permitting the<br />

government to transform the ICT to be more citizen-oriented. EGovernment also calls for a change and<br />

new forms of management. It calls for the transformation of public and private business to make its<br />

impact effective, and it requires changing processes, which means changing policy and organizational<br />

culture. Changing policy results in changing the way people do things, which in turn changes the culture.<br />

Given its surrounding impact, it is expected that eGovernment will affect economic, legal, and democratic<br />

values in for public administratiors (Snijkers 2005). The greatest challenge in eGovernment is how to<br />

manage the changes systematically and effectively in a specific organizational context (Mirandilla 2008).<br />

Development of ICTs such as the telegraph, telephones, personal computers, satellites, fiber-optic cable,<br />

and the early version of the World Wide Web, are a few examples of dynamic forces behind the<br />

phenomenon of global integration (Mirandilla 2008). Innovation in ICTs has stimulated many current<br />

transformations that the world is undergoing. ICT, then, has reduced the cost of communications,<br />

logistics, and information processing, which, in turn has transform the way the people communicate, live,<br />

and do businesses. These technological changes have various impacts on government performance.<br />

In our study, we base the ICT definition to Shirazi et al. (2009), who claims that ICT will contribute to<br />

improvement of basic social services, help economic development, improve the efficiency of the<br />

government services and activities, and also help to enhance the provision of education and health.<br />

Shirazi et al. (2009) pointed that firms using ICT in developing countries are 5.1% more profitable, own<br />

1.2% more employment growth, reinvest 6% more that other countries, and produce $3400 more valueadded<br />

per worker than enterprises that do not use ICT or have limited access to ICT. We claim that ICT<br />

helps businesses with technological and advanced tools and enables them to enter the global market and<br />

increases their productivity and competitiveness. Furthermore, ICT promotes a more effective, efficient,<br />

accountable, and democratic government which can provide employment opportunities for those who are<br />

skilled and appropriately trained.<br />

This paper is based on a literature review on past studies based on a large-scale of surveys. Surveys<br />

were collected from selected groups, such as citizens who had ICT education and knowledge, and<br />

citizens who were still unfamiliar with this phrase and its advantages. We will outline some past studies in<br />

the next sections and try to give answers to the two aforementioned factors and their impact to<br />

eGovernment.<br />

3. Citizens’ wider access to ICTs<br />

Citizens in all nations are expecting the creation and delivery of high quality services from their<br />

governments. This expectation is creating a pressure on governments to perform the Government to<br />

Citizen (G2C) eGovernment. Therefore, the G2C is designed to facilitate the interaction between the<br />

government and citizens by the use of the government web portals as an electronic medium for G2C'<br />

interactions and is perceived to be the main goal of the eGovernment (Seifert 2008). G2C is thus, an<br />

online non-commercial interaction between the local and central government and the private individuals<br />

(Sarpoulaki et al., 2008). However, this is not entirely true, since not all government services and<br />

information can be posted online as the users may face different obstacles in making full use of all these<br />

government resources online. The obstacles can be the inadequate infrastructure, low speed internet and<br />

network connections, low PC penetration, or also varying degrees of literacy levels and physical<br />

constraints of some groups of the society (e.g. elderly, children, and people with disabilities) (Yong 2004).<br />

In order to reach the citizens as quickly as possible, government should design the G2C initiatives based<br />

on the multi channel access method. Figure 1 depicts the G2C multi channel access methods in citizens’<br />

wider access to the ICTs.<br />

11


Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />

Telephone<br />

Postal mail PC/Internet<br />

G2C<br />

Face to face Information Kiosk<br />

Services<br />

Mobile Phones Call Center<br />

PDA<br />

Figure 1: G2C multi channel access method in citizens’ wider access to the ICTs (Yong 2004)<br />

While the internet and information kiosks are the primary means to provide the government services and<br />

information, the other channels, such as telephones, emails, postal mail, and face to face contact, remain<br />

as critical in G2C interaction (Yong 2004). However, in developing countries, information kiosks are<br />

particularly very useful in the rural areas since accessing online channels may not be easily done.<br />

However, in more modern societies with wider mobile usage, services and information are provided<br />

through mobile phones.<br />

Usage of online centres and public access points is high, even for those who have home access to the<br />

internet. This may be because citizens want to reduce the access costs, or that citizens are offered lowlevel<br />

internet access, especially at work. Therefore, when planning eGovernment initiatives, authorities<br />

should bear in mind the importance of encouraging citizens and employees to broaden the access to the<br />

internet and ICT in the working place (Foley 2004).<br />

Moreover, the level of citizens’ knowledge on the analysis and assessment of information and using the<br />

library to access information will increase if the wider access and usage of ICT increases among the<br />

users (Usluel 2007). More local online centres should assist citizens to get online. Centres with a few<br />

resources can then develop their activities and reach a sufficient level that users require. However, these<br />

centres should also expand their ICT training and access to staff and employees of the government<br />

organizations (Foley 2004).<br />

Foley (2004) has suggested the organization of a regional conference in order to encourage citizens to<br />

increase internet and ICTs usage. This is because there is a need to share the results of the different<br />

studies, which can be the first step towards identifying what these centres are.<br />

According to Selwyn (2002), the results of the survey of 1001 respondents over 21 years of age reporting<br />

where they have access to public ICT are as follows: 28 per cent of the respondents cited the libraries, 14<br />

per cent of the commercial pay-per-use sites, and 10 per cent of the local educational institutions are<br />

offering potential access to the ICTs. However, only 5 per cent of the respondents cited having access to<br />

ICTs in community centre sites. While public access sites were substantially less likely to be cited, only a<br />

third of the respondents cited the workplace as providing access to the ICTs.<br />

While developing the eGovernment programmes has been a challenge for the many public<br />

administrations, encouraging the citizens to use the available services can often be equally daunting. To<br />

increase the take-up rate of the eGovernment content and offerings to citizens, Yong (2004), has outlined<br />

the following six strategies that the governments have to implement to encourage citizens to adapt to<br />

ICTs and eGovernment.<br />

Providing the infrastructure: Providing the ICT infrastructure serves as an essential backbone for the<br />

agenda of the eGovernment. The absence of the sufficient high bandwidth network can seriously<br />

hinder the delivery of the ICT access and services and also the eGovernment information and<br />

services. Therefore, ICT infrastructure is the key success for the overall measure of the ICT maturity<br />

in a society. Some maturity metrics such as the fixed and mobile phone penetration, networks,<br />

microwaves, satellite, and internet are the critical factors to increase the ICT maturity in a society.<br />

12


Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />

Raising the IT and internet awareness: To benefit and make the greater usage of the ICTs and<br />

eGovernment services and information, effort must be made to raise the IT and internet familiarities<br />

for both the public who are the users of the services and also to the civil servants who should be<br />

implementing and maintaining the services. In these circumstances, educating and training the<br />

citizens are very critical to achieve the goals. The public and media communications are also very<br />

important to allow any public concerns regarding privacy and security issues.<br />

Facilitating affordable access: The authorities should be able to facilitate the citizens with an<br />

affordable access to the computers, and internet connection. The low-cost computer built with the<br />

low-cost hardware and software and also the cheaper internet connection charges can be offered to<br />

the citizens. Though, to keep the software costs affordable, some governments have adopted the<br />

open source software as an alternative to proprietary software products.<br />

Making the online services more appealing than offline: To be able to convince and encourage the<br />

citizens to use more ICTs and government services online, the government authorities need to make<br />

ICTs and government services delivery more online than the conservative way like visiting the<br />

government agency physically. At its fundamental level, the ICTs and eGovernment services should<br />

be available any time and anywhere. Another level may be the reengineering of the existing<br />

government processes and services to be able to make the online process more convincing to the<br />

citizens. Moreover, another level would be to apply the tool of the Customer Relationship<br />

Management (CRM) in the eGovernment initiatives to build up better knowledge of the citizens.<br />

Offering incentives: In order to encourage the citizens to go under ICT training and education and to<br />

regularly exercise and use the ICT and eGovernment services in their everyday life, the authorities<br />

should introduce various incentives. More incentives can be allocated for the citizens who use the<br />

ICT and eGovernment services frequently. These incentives can be in different forms, such as the<br />

financial incentives like cash rebates, lucky draw, and fast-food coupons, and the non-financial<br />

incentives like priority and personalized services.<br />

Promoting local language content: If there is a little online content in the local language, the citizens<br />

are not encouraged to make use of the ICTs and eGovernment services and information. Therefore,<br />

it is very essential that the authorities provide the ICTs and eGovernment services and information in<br />

the local language. In this way the authorities encourage the citizens to enter the Internet.<br />

Foley (2004) claimd that there is a considerable lack of interest in using the internet among the nonusers.<br />

It was mentioned that nearly all the socially excluded citizens have high level of curiosity for the<br />

use of the internet. Hence, policymakers should put more efforts to promote curiosity of the citizens for<br />

using ICTs and internet. Foley (2004) has proposed the following two stages.<br />

First, the decision to use the internet in the public access points, such as in the community groups,<br />

malls, streets, and other locations. This is considered to be a ‘trial’ period for the citizens or the noninternet<br />

users, and it usually lasts several months. Foley (2004) has shown that only 26 per cent of<br />

the public internet users, using the internet for less than a period of twelve months have access from<br />

their homes. This stage should be taken into account by the authorities since, accessing to internet<br />

can increase the ICT knowledge and awareness.<br />

Second, purchasing personal computers for the home access, instead of the public access. This will<br />

usually be taken by the socially excluded groups several months after they have first tried the ‘trial’<br />

period of the access to the public access points. At this stage, curiosity on using the internet will be<br />

substituted by the better understanding of the benefits and advantages of using internet and going<br />

online to increase the ICT and internet knowledge and awareness.<br />

In both stages, Foley (2004) claimed that the policymakers, and internet service providers are playing an<br />

important role in clarifying the real cost of the computing equipments and the internet access to the<br />

citizens.<br />

4. Citizens’ ICT education: Strategies for ICT and eGovernment promotion<br />

Usluel (2007) argues that the lowest self-efficacy is in making use of the ICT to access information.<br />

While, using information technologies is a determining factor in the establishment of information literacy<br />

skills (Usluel 2007), in the computer, internet, and ICT world, many participants are still requesting for<br />

“helping hands” to assist them when they deal with internet and ICTs (Foley 2007). By definition, many<br />

old people do not have a wide range of access to their friends who can assist them. Therefore, the focus<br />

of the many governments is to provide and offer training centres to give a general internet and ICT help<br />

13


Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />

and to support to the citizens regardless of their age, gender, income level, occupation, ethnic minorities,<br />

and religion.<br />

Furthermore, the kindergarten is the starting point for the education. When improving kindergarten<br />

practices, Mooij (2005) pointed that improving the development and learning progress starts when<br />

improving a child’s entry characteristics. The researchers and kindergarten teachers searched for a tool<br />

to estimate the entry characteristics of a child, and finally a psychometrically controlled screening<br />

procedures instrument was selected. This instrument contains forms of questionnaires including the<br />

seven category rating. The parents and the teachers must take this in use after the first month a child has<br />

been in the kindergarten. The seven categories are as follows.<br />

Social interaction/communication,<br />

General cognition,<br />

Language proficiency,<br />

Pre-arithmetic,<br />

Emotional-expressive,<br />

Sensory-motor, and<br />

Expected educational behaviour.<br />

In practical experiences the possible difficulties of the children were seen in playing, developing, and<br />

learning especially when it came to the computer, internet, and ICT education (Mooij 2005).<br />

Furthermore, Ahmadi Zeleti (2010) mentioned that for a better technology society and environment, the<br />

ICT education and training should be offered in kindergarten as playing tools for early age children to get<br />

familiar with the technology and its devices. The intermediary courses could be offered in the elementary<br />

schools through the wide range of internet and ICT. The extension to the professional ICT education and<br />

training, however, should be offered in the high schools and universities as well (Ahmadi Zeleti 2010).<br />

Hsu (2010) has shown that about 95 per cent of the teachers used the word processor for making the<br />

handouts and tests, and 91 per cent used the internet to search for the information and material. Only 1<br />

per cent of the teachers reported never using the word processor during the previous semester. Using<br />

the presentation software applications was less frequent, as compared to the use of the word processors<br />

and the internet. About 10 per cent of the teachers reported that they had never used presentation<br />

software once during the last semester. Building or managing the websites for instruction, presentation,<br />

or sharing material, however, was even less frequent than the use of presentation software. About 20 per<br />

cent of the teachers never built or managed the websites once during the last semester, and only 53 per<br />

cent reported doing so often or very frequent. Finally, using the computers to record or edit sound or<br />

music is the least practised ICT activity, with only 9.3 per cent reporting the frequent use. In other words,<br />

the teachers frequently used the word processing software and searched the internet, sometimes used<br />

the presentation software or built or managed the websites, and seldom used the software for recording<br />

or editing sounds. With this encouragement, the teachers can devote greater attention to those students<br />

who need more guidance and support. It is usually the teachers who must specify how the learning<br />

activities should proceed when a student encounters problems. Therefore, the teachers should also be<br />

well trained in both the social, technology and ICT affairs (Mooij 2005).<br />

Furthermore, the education environment should be designed so that the students can collaborate with<br />

each other in the problem solving issues, which means that they need not suffer from the less teacher<br />

attention (Mooij 2005). Additionally, with the use of the integrated systems, it is possible to monitor and<br />

measure the progress of students. By this system, the teachers can involve other students, teachers, and<br />

parents from outside the school to interact with the learning process (Mooij 2005). This will increase the<br />

students’ and teachers’ motivation in the use of the ICT in the learning process. According to Sang et al.<br />

(2010), strong relationship of the computer-related attitude among the students and all the citizens should<br />

be emphasized and taken into the consideration. Positive attitude towards the computers, internet, and<br />

ICT influences teachers’ acceptance of the usefulness of the technology in the learning process.<br />

Ahmadi Zeleti (2010) drowned the projection line to the ICT education, training, and skills of the<br />

government authorities and employees, and businesses. The intensive courses should be obligatory to<br />

these groups who are running the country. However, the government authorities should also establish<br />

more IT and ICT education centres free of charge for those citizens who cannot afford it (Ahmadi 2010).<br />

14


Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />

Ahmadi Zeleti (2010) mentioned that ICT and its applications like an email can be used through personal<br />

computers, mobile phones, and smart devices such as mp4s. People around the world are willing to<br />

communicate with each other with a lower cost. The internet and ICT are the effective tools to be used for<br />

this purpose and can substitute the use of the telephone lines which is expensive.<br />

5. Conclusions and discussion<br />

In this study we have highlighted the two factors and their impact to the eGovernment. The factors are<br />

the citizens’ wider access to the ICTs, and the citizens’ ICT education.<br />

First, the citizens’ wider access to the ICTs and its impact to the eGovernment. This study shows that it is<br />

important to provide citizens with cheap internet access and computer equipments to their home and<br />

office use. Moreover, the local libraries should offer the ICT technologies and applications. However, to<br />

encourage the citizens, it is crucial to provide them more ICT infrastructure, government online services<br />

in local language, and incentives. Hence, the internet, and ICT awareness through the commercial sites,<br />

media, local educational institutions, schools and universities, regional conferences, and etc. is strongly<br />

considered as the precondition factor to citizens awareness and the ICT use.<br />

Second, the citizens’ ICT education shows that the ICT must be used in the education and learning<br />

process. The classrooms can be utilized with the computers, and the learning process and progress can<br />

be then more efficient and faster, and students will be more competitive and technology oriented<br />

(Sa´nchez et al., 2011). However, to make an effective use of ICT in learning process, the teachers<br />

should be well ICT trained, and have a positive attitude toward using the computers, internet, and other<br />

ICT technologies in their teaching processes. They should also be capable of establishing a strong<br />

relationship of computer-related tasks and attitude in their respective students. The integrated systems as<br />

a tool can be used in schools to motivate teachers and students in using ICTs. Moreover, building the<br />

websites for sharing materials, instructions, and presentations can be the other striking technique.<br />

Therefore, training centres can be established to offer the internet and ICT help and support to the<br />

teachers and parents. Education of ICT and its applications through the training centres can also be<br />

offered to the governments, parliament and justice, public and private sector organizations, businesses,<br />

policy makers, politicians, citizens, health centres, and the public administrations in order to get<br />

advantage from the ICTs and to strength their daily activities (Ahmadi Zeleti 2010; Zimmermann 2005).<br />

Yong’s (2004) six strategies and Foley’s (2004) instructions should be taken very carefully into account<br />

when encouraging the citizens’ to utilize ICT.<br />

Furthermore, some authors highlighted that when some certain conditions are achieved, the use of the<br />

ICT can have a positive effect on education and learning. These conditions are sufficient access to<br />

technology, adequate training for teachers, an effective curriculum, relevant and pertinent evaluations, a<br />

stimulating educational system, and a motivating family and community (Norris et al., 2002; Roschelle et<br />

al., 2000).<br />

The research investigating on the impact of citizens' ICT education and access to generate and distribute<br />

eGovernment content is complex. Different strategies, regulations, and approaches are being defined<br />

every day by different governments. However, in every study on the ICTs, the role of the internet is<br />

considered primary. Hence, in this study, when talking about the ICTs, it is assumed that an accepted<br />

internet connection and speed is fully achieved.<br />

To sum up, the level of contribution on using the online information and services is increasing by the<br />

citizens especially in the education systems. Citizens can feel the advantage, easiness, and usefulness<br />

of accessing online information and services through the government sites. More citizens are now eager<br />

to connect to internet and access to wide range of information. The governments on the other hand are<br />

trying to increase the ICT awareness, access, education, and use in order to react more effectively and<br />

efficiently to the citizens needs by offering them online information and services. The governments then<br />

can take this advantage of the citizens’ willingness to participate in making a technology-based<br />

environment to generate and distribute eGovernment contents.<br />

References<br />

Abanumy, A., Al-Badi, A. and Mayhew, P. (2005) EGovernment Website Accessibility: In-Depth Evaluation of Saudi<br />

Arabia and Oman, The Electronic Journal of eGovernment, Vol 3, No. 3, pp 99-106.<br />

Ahmadi Zeleti, F. (2010) The progress and Obstacles of Implementing and Improving eGovernment in Islamic<br />

Republic of IRAN. Master of Science Thesis, Lappeenranta University of Technology, Lappeenranta, Finland.<br />

15


Fatemeh Ahmadi Zeleti and Erja Mustonen-Ollila<br />

Alsaghier, H., Ford, M., Nguyen, A. and Hexel, R. Conceptualising Citizen’s Trust in eGovernment: Application of Q<br />

Methodology Electronic Journal of eGovernment, Vol 7, No. 4, pp 295- 310.<br />

Foley, P. (2004) Does the Internet help to overcome social exclusion? Electronic Journal of eGovernment, Vol 2, No.<br />

2, pp 139-146.<br />

Hsu, S. (2010) Who assigns the most ICT activities? Examining the relationship between teacher and student usage,<br />

Computers & Education.<br />

Loveless, A., Burton, J. and Turvey, V. (2006) Developing conceptual frameworks for creativity, ICT and teacher<br />

education, Electronic Journal of Thinking Skills and Creativity, Vol 1, No. 1, pp 3-13.<br />

Mirandilla, M (2008) Promoting eGovernment in the Context of New Public Management: The Case of the Local<br />

Government of Cebu, Philippines 3rd Communication Policy Research: South <strong>Conference</strong>, Beijing, China.<br />

Mooij, T. (2007) Design of educational and ICT conditions to integrate differences in learning: Contextual learning<br />

theory and a first transformation step in early education, Electronic Journal of Computers in Human Behavior,<br />

Vol 23, No. 3, pp 1499-1530.<br />

Norris, C., Soloway, E. and Sullivan, T. (2002) Examining 25 years of technology in US education, Communications<br />

of the ACM, Vol 45, No. 8, pp 15–18.<br />

Roschelle, J., Pea, R., Hoadley, C., Gordin, D. and Means, B. (2000) Changing how and what children learn in<br />

school with computer-based technologies, The Future of Children, Vol 10, No.2, 76–101.<br />

Sa´nchez, J., Salinas, A. and Harris, J. (2010) Education with ICT in South Korea and Chile International Journal of<br />

Educational Development, Vol 31, No. 2, pp 126-148.<br />

Sang, G., Valcke, M., Braak, J. and Tondeur, J. (2010) Student teachers’ thinking processes and ICT integration:<br />

Predictors of prospective teaching behaviors with educational technology, Electronic Journal of Computers and<br />

Education, Vol 54, No. 2, pp 103-112.<br />

Sarpoulaki, M., Eslami Rad, A. and Saleknia A (2008) EGovernment concept and spatial information: A case study in<br />

Islamic republic of Iran, The International Archives of the Photogrammetry, Remote Sensing and Spatial<br />

Information Sciences, [e- journal] XXXVIIB4, pp 19- 23.<br />

Seifert, J. W. (2008) A Primer on EGovernment: Sectors, Stages, Opportunities, and Challenges of Online<br />

Governance. In R. B. Ventura (Ed.), EGovernment in High Gear. New York: Nova Science Publishers.<br />

Selwyn, N. (2002) Widening access to ICT via public sites – a research report, Cardiff University School of Social<br />

Sciences.<br />

Shirazi, F., Ngwenyama, O. and Morawczynski, O. (2010) ICT expansion and the digital divide in democratic<br />

freedoms: An analysis of the impact of ICT expansion, education and ICT filtering on democracy, Electronic<br />

Journal of Telematics and Informatics, Vol 27, No. 1, pp 21-31.<br />

Shirazi, F., Gholami, R. and Higo´n, D. (2009) The impact of information and communication technology (ICT),<br />

education and regulation on economic freedom in Islamic Middle Eastern countries, Electronic Journal of<br />

Electronic and Management, Vol 46, No. 8, pp 426-433.<br />

Snijkers, K. (2005) EGovernment: ICT from a Public Management Perspective. Paper presented at the 13th Annual<br />

NISPAcee <strong>Conference</strong>, Moscow Russia, May 19-21.<br />

Turban, E., King, D., Lee, J., Warkentin, M. and Chung, H. M. (2002). Electronic Commerce : A Managerial<br />

Perspective (2nd ed.). Upper Saddle, New Jersey: Prentice Hall.<br />

Usluel, Y. (2007) Can ICT usage make a difference on student teachers' information literacy self-efficacy, Library &<br />

Information Science Research, Vol 29, No. 1, pp 92-102.<br />

Wangpipatwong, S., Chutimaskul, W. and Papasratorn, B (2008) Understanding Citizen’s Continuance Intention to<br />

Use eGovernment Website: a Composite View of Technology Acceptance Model and Computer Self-Efficacy,<br />

The Electronic Journal of eGovernment, Vol 6, No. 1, pp 55 – 64.<br />

Yong, J. (2004). Promoting Citizen-Centred Approaches to eGovernment Programmes - Strategies & Perspectives<br />

from Asian Economies, Second APEC High-Level Symposium on eGovernment. Acapulco, Mexico. October 6-<br />

8.<br />

Zimmermann, P. and Finger, M. (2005) Information- and Communication Technology (ICT) and Local Power<br />

16


The Role of National Culture on Citizen Adoption of<br />

eGovernment web sites<br />

Omar Al-Hujran 1 and Mahmoud Al-dalahmeh 2<br />

1<br />

Princess Sumaya University for Technology, Amman, Jordan<br />

2<br />

University of Jordan, Amman, Jordan<br />

o.hujran@psut.edu.jo<br />

dalahmeh2@yahoo.com<br />

Abstract: Increasingly governments around the world have realized the imperative of providing the public with not<br />

only improved government information and services but also improved public governance, transparency and<br />

accountability through eGovernment services. However, many governments still face the problem of low level<br />

adoption of eGovernment websites. It is because the issue of eGovernment adoption is complex and multidimensional<br />

in nature. In consequence, it must be carefully addressed not only from technological perspectives but<br />

also from social, cultural, and organizational perspectives. The business case for developing sustainable successful<br />

eGovernment initiatives critically depends on our knowledge and understanding of how to increase citizen adoption<br />

of eGovernment websites. A review of the literature, however, shows that much of extant eGovernment research has<br />

focused on eGovernment adoption in developed countries. In consequence, little is known about national cultural<br />

factors that may influence eGovernment adoption in developing countries. This knowledge gap is particularly<br />

apparent in Jordan. Therefore, the objective of this paper is to examine national cultural factors that may influence<br />

citizen adoption of eGovernment websites in this culturally different part of the world. We developed an integrated<br />

model by extending the technology acceptance model (TAM) with Hofstede’s national culture dimensions, which is<br />

used to evaluate the impact of national culture on eGovernment adoption in this paper. Based on survey data<br />

collected from a total of 197 Jordanian citizens, evidence shows that while two cultural dimensions: power distance<br />

and uncertainty avoidance had significant impacts on citizens' intention to adopt eGovernment, the other three<br />

cultural dimensions: individualism, masculinity, and long-term orientation had no discernible impacts. The results also<br />

indicate that perceived usefulness, perceived ease of use, attitude are significant indicators of citizens’ intention to<br />

use state government services online.<br />

Keywords: eGovernment adoption, technology acceptance model, culture, Jordan<br />

1. Introduction<br />

Information and communication technology (ICT) and resulting online capabilities such as the Internet<br />

provide the foundation for the transformation of the traditional government service. Over the past decade<br />

governments all over the world have realized the importance of providing government services and<br />

information via the Internet and world-wide-web to improve the efficiency, cost and quality of the<br />

government information and services provided to the public. However, although the adoption of<br />

eGovernment has the potential to provide better services to citizens at lower costs, it has acceptance<br />

problems. In fact, understanding why people accept or reject new information technology (IT) has proven<br />

to be one of the most challenging issues in IT/IS research (Al-Adawi et al., 2005). The acceptance and<br />

success of eGovernment is dependent upon citizen willingness to adopt this innovation (Carter and<br />

Bélanger, 2005). Yet, many governments worldwide still face the problem of low-level of citizen adoption<br />

of eGovernment websites (Belanger and Carter, 2008; Choudrie and Dwivedi, 2005; Gupta et al., 2008;<br />

Kumar et al., 2007; Fu et al., 2006; Wang, 2003). EGovernment adoption occurs in a turbulent socialpolitical<br />

environment. In consequence, it must be carefully addressed not only from technological<br />

perspectives, but also from social, political, and cultural perspectives. Without understanding what<br />

motivates the public to use eGovernment services, governments will not be able to take strategic actions<br />

to increase the eGovernment up-take (Gilbert et al., 2004). Hence, more empirical studies are required in<br />

the area of eGovernment adoption to help governments to improve their understanding of the issues that<br />

affect citizen adoption of eGovernment services.<br />

In addition, while the academic literature on eGovernment adoption has focused upon the adoption of<br />

eGovernment websites in developed countries, relatively little attention has been given to the citizen<br />

adoption of eGovernment websites in developing countries (Alhujran and Chatfield, 2008). The study,<br />

therefore, aims to fill this gap in the literature by conducting empirical field research on eGovernment<br />

adoption in the Arab world, specifically Jordan. Grounded in the Technology Acceptance Model (TAM)<br />

(Davis et al., 1989), this study develops a conceptual model by integrating the TAM with two of<br />

Hofstede’s national culture dimensions - power distance, uncertainty avoidance. The extended TAM<br />

model is to examine the impacts of these cultural dimensions upon citizen adoption of eGovernment<br />

websites in developing countries with different national cultures and values.<br />

17


Omar Al-Hujran and Mahmoud Al-dalahmeh<br />

Moreover, although culture is being considered as a contributing factor in the IT/IS adoption, very limited<br />

research attempted to explore the impact of the culture on IT/IS adoption in the Arab region. Most of the<br />

previous research has focused on economical, political, and technological factors that impact technology<br />

transfer to the Arab world (e.g. Al-Gahtani, 2004; Straub et al., 2001). Furthermore, to date, no prior<br />

research has considered the influence of national culture on eGovernment adoption in the Arab world in<br />

general and Jordan in particular.<br />

In terms of achievements, Jordan's efforts to provide eGovernment services to the public have been<br />

recognized. Recently, the ministry of Information and Communication Technologies (MoICT) has<br />

introduced more than three main eGovernment services to the public. Examples of these services are:<br />

police clearance, higher education admissions, and public jobs applications and tracking. However,<br />

despite some success, the eGovernment services and websites in Jordan are facing the challenge of<br />

increasing the usage level of these services and websites (Al-Hujran and Shahateet, 2010). Therefore, a<br />

better understanding of the factors that influence citizen adoption of eGovernment is a critically important<br />

policy issue in this country. This study provides the eGovernment officials with a useful guideline for<br />

achieving better eGovernment websites and increasing the citizen's adoption of these websites.<br />

The remainder of this paper is organized as follows. Section 2 presents the theoretical background and<br />

research model. Section 3 describes the research methodology. Section 4 presents the analysis and<br />

results. Finally, we present our discussions and conclusion.<br />

2. Theoretical background and research model<br />

The research model used to guide the study is shown in Figure 1. In the following sections, the meaning<br />

and the theories supporting the relationship are presented.<br />

Figure 1: Research model of citizen’s intention to use eGovernment websites<br />

2.1 Technology Acceptance Model (TAM)<br />

The technology acceptance model (TAM) (Davis, 1989; Davis et al., 1989), is one of the various models<br />

that IT/IS researchers have used to predict and explain the underlying factors that motivate users to<br />

accept and adopt new information technology systems. This model (Figure 2) is derived from the theory<br />

of reasoned action (TRA) (Fishbein and Ajzen, 1975; Ajzen and Fishbein, 1980).<br />

According to TRA, the individual attitudes and subjective norms influence the user’s behavioural<br />

intention, which, in turn, influences his/her actual behaviour. Building upon this, TAM was proposed to<br />

explain and predict users’ acceptance of IT and IS systems by assuming that the constructs - perceived<br />

ease of use (PEOU) and perceived usefulness (PU) - are the key determinants of IT and IS acceptance<br />

behaviour. Davis (1989, p.320) defined perceived usefulness as “the degree to which a person believes<br />

that using a particular system would enhance his or her job performance”, and defined perceived ease of<br />

use as “the degree to which a person believes that using a particular system would be free of effort”.<br />

Fishbein and Ajzen (1975, p.216) defined behavioural intention as “the strength of one’s intention to<br />

perform a specified behaviour”.<br />

18


Omar Al-Hujran and Mahmoud Al-dalahmeh<br />

In TAM, the perceived usefulness of the system is predicted to be positively influenced by its perceived<br />

ease of use. TAM also theorises that all other external variables are fully mediated by PU and PEOU<br />

(Heijden, 2003). Figure 2 illustrates TAM constructs and their relations. According to TAM, greater PU<br />

and PEOU of an IT/IS system will positively influence an attitude toward this system. The attitude, in turn,<br />

leads to a greater intention to use the system, which positively affects one’s actual use of the system<br />

(Davis, 1989).<br />

Several meta-analysis studies have provided sufficient data about TAM to be highly credible (King and<br />

He, 2006; Shumaila et al., 2007), and routinely explain up to 40 per cent of the behavioural intentions to<br />

use (Venkatesh and Davis, 2000). It also received substantial empirical support by means of validations<br />

and replications from numerous researchers (Adams et al., 1992; Davis, 1993; Venkatesh and Davis,<br />

2000). In addition, several studies have applied TAM to evaluate users’ adoption in different settings such<br />

as e-mail, voice-mail, graphics, spreadsheet, and word processing, electronic commerce electronic<br />

learning, internet banking, and eGovernment. Furthermore, TAM has reliable instruments, and is<br />

empirically sound (Pavlou, 2003). Although TAM is criticised for ignoring the social influence on<br />

technology adoption (Mathieson, 1991), social and human factors could be integrated with TAM to<br />

improve its predictive power (Venkatesh and Davis, 2000).<br />

However, most of prior TAM research relatively focused on IT/IS adoption by employees in organizations<br />

context (Phang et al. 2005), where the use in most cases is mandatory. Nevertheless, researchers need<br />

to be cautious when applying the results of these studies to a different context such as the eGovernment,<br />

where the use of technology is voluntary. Therefore, it is essential to study the adoption of new IT/IS with<br />

different population such as citizens.<br />

Figure 2: TAM source: Davis (1989)<br />

Based on the above-mentioned assumptions of the original TAM, the following hypotheses are proposed<br />

in this study:<br />

H1: There is a direct and positive relationship between perceived usefulness and attitude toward using<br />

eGovernment websites.<br />

H2: There is a direct and positive relationship between perceived ease of use and attitude toward using<br />

eGovernment websites.<br />

H3: There is a direct and positive relationship between attitude and behavioural intentions to use<br />

eGovernment websites.<br />

H4: There is a direct and positive relationship between perceived ease of use and the perceived<br />

usefulness of eGovernment websites.<br />

H5: There is a direct and positive relationship between perceived usefulness and the behavioural<br />

intentions to use eGovernment websites.<br />

2.2 eGovernment adoption and TAM<br />

Although TAM has been applied to a wide range of IT/IS settings, only a few empirical and conceptual<br />

studies have explored citizen adoption of eGovernment using TAM as a theoretical framework. Table 1<br />

summarizes the findings of these studies using TAM. Conceptual but not empirical studies are shown by<br />

single astrict (*). However, due to the words limit, only the findings concerning our model variables are<br />

reported in this table.<br />

19


2.3 National culture<br />

Omar Al-Hujran and Mahmoud Al-dalahmeh<br />

The culture is not an easy concept to define (Davison and Martinsons, 2003). In addition, there is no<br />

generally accepted definition for national culture. Hofstede (1997 p.21) defines national culture as “the<br />

collective programming of the mind which distinguishes the members in one human group from another”.<br />

Although Hofstede’s national culture framework has been criticized due to some methodological<br />

weaknesses (Baskerville, 2003), Leidner and Kayworth, (2006) found, after an extensive literature review<br />

of national culture studies, that over 60 percent used one or more of Hofstede’s cultural dimensions.<br />

Hofstede (1997) identified five dimensions of cultural variation. These dimensions have been<br />

conceptually defined (Hofstede, 1997) as follows:<br />

Power Distance (PD): the extent to which the less powerful members of group or society accept and<br />

expect that power is unequally distributed;<br />

Uncertainty Avoidance (UA): the extent to which the members of group or society feel threatened by<br />

unknown situations;<br />

Individualism vs. Collectivism (IDV): the extent to which individuals are integrated into groups;<br />

Masculinity vs. Femininity (MAS): the extent to which gender roles are assigned in a culture;<br />

Long-Term vs. Short-Term Orientation (LTO): a society’s preference to be more forward looking or<br />

future oriented.<br />

Table 1: eGovernment adoption studies using TAM<br />

TAM core variables Authors Findings<br />

Perceived usefulness(PU) Carter and Belanger 2004; Fu et al. 2006;<br />

Kumar et al. 2007*; Phang et al. 2005;<br />

Perceived ease of use(PEOU)<br />

Warkentin et al. 2002*; Wang 2003<br />

Citizens’ PU is a significant<br />

predictor of their intention to<br />

use eGovernment.<br />

Carter and Belanger 2004 PEOU did not have a direct<br />

effect on citizens’ BI to<br />

Carter and Belanger 2005; Fu et al. 2006;<br />

Kumar et al. 2007*; Phang et al. 2005;<br />

Warkentin et al. 2002*; Wang 2003<br />

Fu et al. 2006; Phang et al. 2005; Wang<br />

2002<br />

adopt eGovernment.<br />

Citizens’ PEOU is a<br />

significant predictor of their<br />

intention to use<br />

eGovernment.<br />

PEOU was a significant<br />

determinant of PU.<br />

Culture Warkentin et al. 2002* They hypothesized that the<br />

cultural dimensions (power<br />

distance and uncertainty<br />

avoidance) were most likely<br />

associated with<br />

eGovernment adoption.<br />

The importance of both national and organizational culture to the success of IT/IS adoption has been<br />

widely recognized (e.g. Bagchi et al., 2003; Straub, 1994; Twati, 2006). Researchers also explored the<br />

impact of the national culture on TAM variables (e.g. Twati, 2006; Veiga et al., 2001). They concluded<br />

that the cultural dimensions influence the model variables. However, In their study, Warkentin et al.<br />

(2002) proposed that of the five cultural dimensions, power distance and uncertainty avoidance are the<br />

most likely to differentiate eGovernment adoption and use. Therefore, the following hypotheses are<br />

proposed:<br />

H6a: There is a direct and positive relationship between uncertainty avoidance and the perceived<br />

usefulness of eGovernment websites.<br />

H6b: There is a direct and positive relationship between power distance and the perceived usefulness of<br />

eGovernment websites.<br />

H7a: There is a direct and positive relationship between uncertainty avoidance and the perceived ease of<br />

use of eGovernment websites.<br />

20


Omar Al-Hujran and Mahmoud Al-dalahmeh<br />

H7b: There is a direct and positive relationship between power distance and the perceived ease of use of<br />

eGovernment websites.<br />

3. Methodology<br />

3.1 Instrument development<br />

The survey items were adopted from prior research. The TAM scales of PU and PEOU were measured<br />

using items adopted from Davis (1989) and Davis et al. (1989). TAM scales of ATU were adopted from<br />

Taylor and Todd (1995). BI items were adopted from Malhotra & Galletta (1999) and Pavlou (2003).<br />

Culture items were adopted from Al-Sukkar (2005). All items were measured using a five-point Likert-type<br />

scale, ranging from "strongly agree" to "strongly disagree".<br />

Sekaran (2003) stresses the importance of choosing the questionnaire language that approximates the<br />

level of understanding of the respondents. Given that the majority of the Jordanians are communicating in<br />

Arabic language, questionnaire items of this study have been translated into Arabic language. The<br />

English version of the questionnaire has been translated into Arabic language by two independent<br />

translators. The Arabic version which has been translated by the first translator has been translated back<br />

to English by the second translator. The same was repeated to the second translator's version. The two<br />

versions in both languages have been compared to resolve any differences. The final version has been<br />

used in the study.<br />

3.2 Evaluating the validity and the reliability of the instrument<br />

Content validity is concerned with the degree to which the scale items represent the domain of the<br />

concept under study. According to Sekaran (2003), face validity is a basic index of content validity.<br />

Experts in the field can be solicited to advice on whether scale items have face validity (Straub et al.,<br />

2005). Therefore, instrument was pre-tested with three academics and one student in the field of IS. An<br />

academically excellent student has been asked to fill the survey. When he finished it, he was questioned<br />

to find out if there are any problems to understand the survey questions. Based on this feedback, the<br />

wording of some questions was modified to improve clarity. After this step, three academics were asked<br />

to answer the survey questions and to provide their feedback on whether the questions would accurately<br />

measure each construct, whether the questions were vague, ambiguous, and difficult to understand, or<br />

contained contradictions. The instrument was then modified to reflect feedback received from the experts.<br />

Final survey items are in Appendix 1.<br />

To insure that the instrument items are measuring the same construct, Cronbach’s alpha used to<br />

evaluate the reliability of the instrument items (Cronbach, 1970). Although researchers suggest 0.7 as the<br />

accepted reliability cut-off, a value more than 0.6 is regarded as a satisfactory level (Hair et al., 2006).<br />

The reliability function in the SPSS 17 was used to test the internal consistency for the items of each<br />

scale. The results are presented in Table 2. The outcomes of the statistical analysis demonstrate<br />

satisfactory reliabilities, ranging from 0.745 to 0.896 all of scales.<br />

Table 2: Reliability statistics<br />

Scale No. of Items Mean Cronbach Alpha (α)<br />

Perceived Usefulness (PU) 5 3.995 .798<br />

Perceived ease of use (PEOU) 5 3.698 .831<br />

Attitude Toward Using (ATU) 3 4.198 .745<br />

Behavioral Intention to Use (BI) 2 4.028 .756<br />

Culture: Uncertainty Avoidance<br />

4 4.199 .781<br />

Power Distance 5 2.459 .867<br />

Total 24<br />

3.3 Data collection and participants<br />

Prior research showed that the educated Jordanian citizens are the early adopters of the Internet (Al-<br />

Jaghoub and Westrup, 2003) and are likely users of eGovernment websites in Jordan. For this study,<br />

therefore, we identify the university students and internet cafes users who are Jordanian citizens as our<br />

population. A face-to-face personally administered survey was the research method adopted in this<br />

study. The final survey (see Appendix 1) was distributed to a sample of 265 students drawn from the<br />

different Universities and internet cafes in Jordan. A total of 208 surveys were returned, achieving a<br />

21


Omar Al-Hujran and Mahmoud Al-dalahmeh<br />

78.4% survey response rate. Eleven incomplete surveys were exempted from the analysis. Thus, 197 of<br />

the returned surveys were usable responses.<br />

Table 3: Demographic characteristics of participants<br />

Characteristics<br />

Frequency Percent<br />

Gender Male 128 65.0<br />

Female 69 35.0<br />

Age Less than 20 29 14.7<br />

20-30 132 67.0<br />

31-40 25 12.7<br />

41-50 10 5.1<br />

More than 50 1 .5<br />

Education High school 9 4.6<br />

Community College 11 5.6<br />

Bachelor 156 79.2<br />

Postgraduate 21 10.7<br />

Income Less than 200 99 50.3<br />

201-500 65 33.0<br />

501-800 14 7.1<br />

More than 800 19 9.6<br />

Occupation Private sector employee 23 11.7<br />

Public sector employee 43 21.8<br />

Student 131 66.5<br />

Computer experience Less than 3 years 36 18.3<br />

3-5 47 23.9<br />

More than 5 years 114 57.9<br />

Internet usage frequencies Once a month 39 19.8<br />

Several times monthly 42 21.3<br />

Several times weekly 55 27.9<br />

Once a day 20 10.2<br />

Several times daily 41 20.8<br />

Demographic characteristics of the overall participants are presented in Table 3. Of the surveys analyzed,<br />

69 respondents (52.3%) were female and 128 (65.0%) were male. Most of them are between 20−30<br />

years of age (67.0%), have a bachelor’s degree (79.8%). In addition, most of the respondents have<br />

considerable experience in using a computer. 81.8% of the respondents had more than 3 years of<br />

computer use. Moreover, around 60% of them are using the Internet in daily or weekly bases. These<br />

results indicated that university students in Jordan have considerable experience in using computers and<br />

the Internet. Demographic characteristics of the overall participants are presented in Table 3.<br />

3.4 Data analyses<br />

A set of multiple linear regressions and analyses of variance (ANOVA) were used to analyze the sample<br />

data, and to test the hypothesis associated with the research model. Multiple regression analysis is a<br />

statistical technique used to explore the relationship between a single dependent variable and several<br />

predictors (independent variables) (Hair et al, 2006). There were no associated with violation of the<br />

regression assumptions.<br />

4. Analysis and results<br />

Table 3 shows the results of regression analysis based on the relationships proposed in the research<br />

model and Figure 3 is a graphical representation of the analysis results (only significant relations appear<br />

in this Figure). To investigate the research hypotheses, several multiple regression analyses were<br />

performed by using SPSS 17.0 package for Windows. For example, to investigate hypothesis H6a and<br />

H6b, UA and PD were simultaneously regressed on simultaneously regressed on perceived usefulness.<br />

A summary of the research hypotheses and test results are provided in Table 3 and Figure 3. The nine<br />

research hypotheses (H1, H2, H3, H4, H5, H6a, H6b, H7a, H7b) have been supported from the empirical<br />

22


Omar Al-Hujran and Mahmoud Al-dalahmeh<br />

test. In addition, the results indicated that the research model explained around 43% of the variance in<br />

citizens’ intention to adopt and use eGovernment websites (R 2 = 0.433).<br />

Table 3: Path coefficients and hypothesis testing<br />

Analyses<br />

Type<br />

Multiple<br />

Linear<br />

Regression<br />

Statistical Significance<br />

Hypothesis Independent Variable Dependent<br />

Variable<br />

Cultural dimensions PU<br />

Beta Supported<br />

H6a UA 0.137* Yes<br />

H6b PD 0.187* Yes<br />

Cultural dimensions PEOU<br />

H7a UA 0.223** Yes<br />

H7b PD 0.202** Yes<br />

H1 - PU Attitude 0.236** Yes<br />

H2 - PEOU Attitude 0.182** Yes<br />

H4 - PEOU PU 0.505*** Yes<br />

H5 - PU BI 0.236** Yes<br />

H3 - Attitude BI 0.534*** Yes<br />

*** Correlation is Significant at


Omar Al-Hujran and Mahmoud Al-dalahmeh<br />

example, they could achieve this by increasing the citizen's awareness about the usefulness of using<br />

eGovernment; providing eGovernment and ICT training workshops; and refining IT/IS systems selections<br />

to meet different citizens’ needs. However, Perceived usefulness was the strongest predictor of citizens’<br />

attitude toward using eGovernment websites. This finding is in accordance with earlier TAM research that<br />

consistently finds that perceived usefulness is a more powerful predictor than perceived ease of use (e.g.<br />

Davis, 1989; Fu et al., 2006). This outcome yields the implication that usefulness is more interesting to<br />

some citizens than others. In addition, perceived ease of use of eGovernment websites indirectly<br />

enhanced a citizen’s attitude toward using eGovernment websites through perceived usefulness. The<br />

influence of perceived ease of use on perceived usefulness was strong. This supports TAM which asserts<br />

the easier a system is to use, the more useful it can be. Hence, developing eGovernment websites that<br />

are easy to use will enhance the usefulness of the websites and indirectly increase citizen’s attitude<br />

toward using eGovernment websites. This study also hypothesised that there would be a positive<br />

relationship between two of the national culture dimensions and TAM core constructs (perceived<br />

usefulness and perceived ease of use). Findings showed that the two cultural dimensions: power<br />

distance and uncertainty avoidance had a significant positive impact on perceived ease of use and<br />

perceived usefulness. These findings are consistent with previous research (Warkentin et al., 2002). In<br />

their study, Warkentin et al. (2002) proposed that of the five cultural dimensions, power distance and<br />

uncertainty avoidance are the most likely to differentiate eGovernment adoption and use.<br />

6. Conclusion<br />

This study integrates the technology acceptance model (TAM) and Hofstede’s national culture<br />

dimensions to evaluate citizen adoption of eGovernment. The results of a multiple regression analysis<br />

indicate that perceived usefulness, perceived ease of use, attitude are significant indicators of citizens’<br />

intention to use state government services online. In addition, the results show that the two cultural<br />

dimensions: power distance and uncertainty avoidance had significant impacts on citizens' intention to<br />

adopt eGovernment. As government agencies continue to invest in eGovernment services, it is very<br />

important for agencies to enhance their understanding of the factors that influence citizen adoption of<br />

eGovernment websites and services.<br />

7. Appendix 1: Survey items<br />

Behavioral Intention to Use (BI)<br />

BI1<br />

BI2<br />

Attitude toward Using (ATU)<br />

ATU1<br />

ATU2<br />

ATU3<br />

Perceived Usefulness (PU)<br />

PU1<br />

PU2<br />

PU3<br />

PU4<br />

PU5<br />

I intend to use the eGovernment portal and/or Ministry's website(s) to access government<br />

services frequently.<br />

I predict that I should use the eGovernment portal and/or Ministry's website(s) to access<br />

government services in the future.<br />

Using the eGovernment portal and/or Ministry's website(s) to access government services is a<br />

good idea.<br />

I like the use of eGovernment portal and/or Ministry's website(s) to access government<br />

services.<br />

Using the eGovernment portal and/or Ministry's website(s) to access government services<br />

would be pleasant.<br />

Using eGovernment portal and/or Ministry's website(s) enable me to access government<br />

services (e.g. getting national exam result online, getting national number) more quickly.<br />

Using eGovernment portal and/or Ministry's website(s) enhances my effectiveness in<br />

accessing government services (e.g. find the most relevant information about a service).<br />

Using eGovernment portal and/or Ministry's website(s) allows me to access more government<br />

services than would otherwise possible.<br />

Using eGovernment portal and/or Ministry's website(s) to access government services<br />

increases my productivity (e.g. find information about services within shortest time frame).<br />

Overall, I find eGovernment portal and/or Ministry's website(s) useful for me to access<br />

government services.<br />

24


Perceived Ease of Use (PEOU)<br />

PEOU1<br />

PEOU2<br />

Omar Al-Hujran and Mahmoud Al-dalahmeh<br />

Learning how to use eGovernment portal and/or Ministry's website(s) to access government<br />

services is easy for me.<br />

I find it easy to use eGovernment portal and/or Ministry's website(s) to find what I want.<br />

PEOU3<br />

My interaction with eGovernment portal and/or Ministry's website(s) to access government<br />

services is clear and understandable.<br />

PEOU4 EGovernment portal and/or Ministry's website(s) is flexible to interact with.<br />

PEOU5<br />

Overall, I find using eGovernment portal and/or Ministry's website(s) to access government<br />

services easy to use.<br />

Uncertainty Avoidance (UA)<br />

UA1<br />

It is important to have job requirements and instructions spelled out in detail so that people<br />

always know what they are expected to do<br />

UA2<br />

Rules and regulation are important because they inform workers what the organization expects<br />

of them<br />

UA3 Order and structure are very important in a work environment<br />

UA4<br />

Working in a structured environment is better than working (rules and regulations) in an<br />

unstructured work environment<br />

Power Distance (PD)<br />

PD1 Managers should be careful not to ask the opinions of subordinates too frequently, otherwise<br />

the manager might appear to be weak and incompetent<br />

PD2 Manager should make most decisions without consulting subordinates<br />

PD3 Employees should not question their manager’s decisions<br />

PD4 Manager should not ask subordinates for advice, because they might appear less powerful<br />

PD5 Decision making power should stay with top management in the organization and not be<br />

delegated to lower level employees<br />

References<br />

Abu-Samaha, A. & Abdel Samad, Y. (2007) "Challenges to the Jordanian Electronic Government Initiative", Journal<br />

of Business Systems, Governance and Ethics, Vol 2, No. 3, pp 101-109.<br />

Ajzen, I. & Fishbein, M. (1980) Understanding Attitudes and Predicting Social Behaviour, Prentice-Hall, Englewood<br />

Cliffs, NJ.<br />

Al-Adawi, Z, Yousafza, S & Pallister, J (2005) "Conceptual Model of Citizen Adoption of EGovernment", in<br />

Proceedings of the Second International <strong>Conference</strong> on Innovations in Information Technology (IIT’05), Dubai,<br />

United Arab, 26-28 September 2005, p 1-10.<br />

Al-Gahtani, S. (2004) "Computer Technology Acceptance Success Factors In Saudi Arabia: An Exploratory Study",<br />

Journal of Global Information Technology Management, Vol 7, pp 5-29.<br />

Alhujran, O. & Chatfield, A. (2008) "Toward a Model for EGovernment Services Adoption: The Case of Jordan", in<br />

Proceedings of the 8th <strong>European</strong> <strong>Conference</strong> on eGovernment, Ecole Polytechnique, Lausanne, Switzerland,<br />

10-11 July 2008, pp 13-22.<br />

Alhujran, O & Shahateet, M (2010) "Citizen adoption of eGovernment initiatives in developing countries: A case study<br />

of Jordan", in Proceedings of the 10th <strong>European</strong> <strong>Conference</strong> on EGovernment, Limerick, Ireland.<br />

Al-Jaghoub, S. & Westrup, C. (2003) "Jordan and ICT-led development: towards a competition state?”, Information<br />

Technology & People, Vol 16, pp 93-110.<br />

Al-Sukkar, A. (2005) "The application of Information Systems in the Jordanian Banking Sector: A study of the<br />

Acceptance of the Internet", PhD thesis, University of Wollongong, Australia.<br />

Bagchi, K, Cerveny, R, Hart, P & Peterson, M (2003) "The Influence of National Culture in Information Technology<br />

Product Adoption", in Proceedings of the Ninth Americas <strong>Conference</strong> on Information Systems, Tampa, Florida,<br />

USA, 4-6 August 2003, pp 957-965.<br />

Baskerville, R (2003) "Hofstede Never Studied Culture", Accounting, Organizations and Society, vol. 28, no. 1, pp 1-<br />

14.<br />

Carter, L. & Belanger, F. (2004) "Citizen Adoption of Electronic Government Initiatives", in the 37th Hawaii<br />

International <strong>Conference</strong> on System Sciences, Hawaii, USA.<br />

Carter, L. & Bélanger, F. (2005) "The utilization of eGovernment services: citizen trust, innovation and acceptance<br />

factors", Information Systems Journal, Vol 15, No. 1, pp 5-25.<br />

Chatfield, A. & Alhujran, O. (2009) "A Cross-Country Comparative Analysis of EGovernment Service Delivery among<br />

Arab Countries", Information Technology for Development, Vol 15, No. 3, pp 151-170.<br />

Choudrie, J. & Dwivedi, Y. (2005) "A Survey of Citizens’ Awareness and Adoption of EGovernment Initiatives, The<br />

‘Government Gateway’: A United Kingdom Perspective", in eGovernment Workshop ’05 (eGOV05), Brunel<br />

University, London, UK.<br />

25


Omar Al-Hujran and Mahmoud Al-dalahmeh<br />

Cronbach, L. (1970) Essentials of Psychology Testing, Harper & Row, New York.<br />

Davis, F. (1989) "Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology",<br />

MIS Quarterly, Vol 13, No. 3, pp 319-340.<br />

Davis, F, Bagozzi, R & Warshaw, P (1989) "User Acceptance of Computer Technology: A Comparison of Two<br />

Theoretical Models", Management Science, vol. 35, no. 8, pp 982-1005.<br />

Davison, R & Martinsons, M (2003) "Guest Editorial; Cultural Issues and IT Management: Past and Present", IEEE<br />

Transactions on Engineering Management, vol. 50, no. 1, pp 3-7.<br />

Fishbein, M. & Ajzen, I. (1975) Belief, Attitude, Intentions and Behavior: An Introduction to Theory and Research,<br />

Addison-Wesley, Boston.<br />

Fu, J.-R., Farn, C.-K. & Chao, W.-P. (2006) "Acceptance of Electronic Tax Filing: A study of taxpayer intentions ",<br />

Information & Management, Vol 43, No. 1, pp 109-126.<br />

Gefen, D., Pavlou, P., Warkentin, M. & Gregory, M. (2002) "EGovernment Adoption", in Proceedings of the AIS 2002<br />

Americas <strong>Conference</strong> on Information Systems, Dallas, Texas, USA, 9-11 August 2002, pp 569-576.<br />

Gilbert, D., Balestrini, P. & Littleboy, D. (2004) "Barriers and Benefits in the Adoption of E- government", International<br />

Journal of Public Sector Management, Vol 17, No. 4, pp 286-301.<br />

Gupta, B., Dasgupta, S. & Gupta, A. (2008) "Adoption of ICT in a Government Organization in a Developing Country:<br />

An Empirical Study", Journal of Strategic Information Systems, Vol 17, No. 2, pp 140-154.<br />

Heijden, H. (2003) "Factors influencing the usage of websites: the case of a generic portal in the Netherlands",<br />

Information & Management, Vol 40, No. 6, pp 541-549.<br />

Hofstede, G. (1997) Cultures and Organizations: Software of the Mind, McGraw-Hill, New York.<br />

King, W & He, J (2006) "A Meta-Analysis of the Technology Acceptance Model", Information & Management, vol. 43,<br />

no. 6, pp 740-755.<br />

Kumar, V., Mukerji, B., Butt, I. & Persaud, A. (2007) "Factors for Successful eGovernment Adoption: a Conceptual<br />

Framework", Electronic Journal of eGovernment, Vol 5, No. 1, pp 63-76.<br />

Leidner, D. & Kayworth, T. (2006) "A Review of Culture in Information Systems Research: Toward A Theory of<br />

Information Technology Culture Conflict", MIS Quarterly, Vol 30, No. 2, pp 357-399.<br />

Malhotra, Y. & Galletta, D. (1999) "Extending the technology acceptance model to account for social influence:<br />

Theoretical bases and empirical validation", in Thirty-Second Annual Hawaii International <strong>Conference</strong> on<br />

System Sciences-Volume 1, Hawaii, USA.<br />

Mathieson, K (1991) "Predicting User Intentions: Comparing the Technology Acceptance Model with the Theory of<br />

Planned Behavior", Information Systems Research, vol. 2, no. 3, pp 173-191.<br />

Pavlou, P. (2003) "Consumer acceptance of electronic commerce: integrating trust and risk with the technology<br />

acceptance model", International Journal of Electronic Commerce, Vol 7, No. 3, pp 69-103.<br />

Phang, C., Sutanto, J., Li, Y. & Kankanhalli, A. (2005) "Senior Citizens' Adoption of EGovernment: In Quest of the<br />

Antecedents of Perceived Usefulness", in the 38th Hawaii International <strong>Conference</strong> on System Sciences,<br />

Hawaii, USA.<br />

Sekaran, U. (2003) Research Method for Business: A Skill Building Approach, John Wiely and Sons, New York.<br />

Shumaila, Y, Gordon, R & John, G (2007) "Technology Acceptance: A Meta-Analysis of the TAM: Part 2", Journal of<br />

Modelling in Management, vol. 2, no. 3, pp 251-280.<br />

Straub, D (1994) "The Effect of Culture on IT Diffusion: Email and Fax in Japan and the US", Information Systems<br />

Research, vol. 5, no. 1, pp 23-47.<br />

Straub, D. W. (1989) "Validating Instruments in MIS Research", MIS Quarterly, Vol 13, No. 2, pp 146-169.<br />

Straub, D., Loch, K. & Hill, C. (2001) "Transfer of information technology to the Arab world: a test of cultural influence<br />

modeling", Journal of Global Information Management, Vol 9, No 4, pp.141-172.<br />

Straub, D. W., Gefen, D. & Boudreau, M. C. (2005) Quantitative Research ,In Research in Information Systems: A<br />

Handbook for Research Supervisors and Their Students, D. Avison and J. Pries-Heje, Amsterdam.<br />

Taylor, S. & Todd, P. (1995) "Understanding Information Technology Usage: A Test of Competing Models",<br />

Information Systems Research, Vol 6, No. 2, pp 144-176.<br />

Twati, J. (2006) "Societal and Organisational Culture and the Adoption of Management Information Systems in Arab<br />

Countries", PhD thesis, Griffith University, Brisbane, Australia.<br />

Veiga, J, Floyd, S & Dechant, K (2001) "Toward Modeling the Effects of National Culture on IT Implementation and<br />

Acceptance", Journal of Information Technology, vol. 16, no. 3, pp 145-158.<br />

Venkatesh, V. & Davis, F. (2000) "A theoretical extension of the technology adoption model: Four longitudinal field<br />

studies", Management Science, Vol 46, pp 186-204.<br />

Wang, Y. (2003) "The Adoption of Electronic Tax Filing Systems: An Empirical Study", Government Information<br />

Quarterly, Vol 20, No. 4, pp 333–352.<br />

Warkentin, M., Gefen, D., Pavlou, P. & Rose, G. (2002) "Encouraging Citizen Adoption of eGovernment by Building<br />

Trust", Electronic Markets, Vol 12, pp 157-162.<br />

26


A Framework for Transitioning to Mobile Government<br />

Shadi Al-khamayseh 1 and Elaine Lawrence 2<br />

1 Dubai Women's College, Higher College of Technology, Dubai City, UAE<br />

2 University of Technology Sydney, Australia<br />

shadi.alkhamayseh@gmail.com<br />

Elaine.Lawrence@uts.edu.au<br />

Abstract: Over the past decade, many Governments have moved towards providing services to their citizens via the<br />

web, with varying degrees of success. This paper reports on research concerning the transition from eGovernment to<br />

mobile government (m-Government). This research contributes to the field by developing a successful m-<br />

Government framework as a basis for a transition methodology, either from eGovernment to m-Government or<br />

directly to m-Government. Transitioning from eGovernment to m-Government requires an investigation of the<br />

integration process between eGovernment and m-Government. We need to examine all the pressures and obstacles<br />

that hinder the transition process, as well as those that determine m-Government success factors. Such obstacles<br />

and success factors differ between nations, such as a nation’s technological and information infrastructure, mobile<br />

device penetration and acceptance, public and social pressures, and security. Finally an m-Government initiative is<br />

required. Yet mobile government, despite its potential, has not reached anticipated adoption levels. The main aim of<br />

this study is to discover what is needed to improve the adoption and implementation of mobile government systems.<br />

Specific objectives proposed to achieve this aim include: a) identifying all the factors that may influence the adoption<br />

and implementation of mobile services, b) integrating such factors and relations between them in a framework, and c)<br />

providing specific recommendations and guidelines in all the various perspectives. Case Studies was the<br />

methodology employed to fulfil these objectives. A qualitative approach was found to be most suitable to this study,<br />

and open ended Web survey questions, as well as various kinds of interviews, including email, face-to- face, and<br />

phone, were used to obtain detailed, in-depth information from industry and user participants. A total of nine such<br />

studies were carried out in Australia, the United Arab Emirates and Jordan. Interviews were recorded and<br />

transcribed, and all the material was analysed using nVivo, a qualitative data analysis (QDA) computer software<br />

package. The final contribution of this study is an adaptive theoretical framework that explains the specific factors<br />

that influence the adoption, diffusion and implementation of mobile government systems.<br />

Keywords: mobile, electronic, government, success factors, framework<br />

1. Introduction<br />

eGovernment is defined as the transformation of government work through the use of wired Information<br />

Communication Technologies (ICTs), such as the wired Internet, for faster delivery of governmental<br />

services to constituents (Australian Government Information Management Office (AGIMO) 2007) and to<br />

improve government efficiency, effectiveness, transparency and accountability (The World Bank Group<br />

2005). m-Government is a subset of eGovernment that complements it by delivering services through<br />

wireless channels (Kuscu, Kushchu & Yu 2007b; Lallana 2004). Both electronic and mobile governments<br />

share the same objectives of improving government efficiency, effectiveness, transparency and<br />

accountability, and facilitating constituents’ access to government information and services. Although the<br />

Internet is expanding rapidly, the number of users is still fewer than envisaged by many observers of the<br />

Internet’s development. To achieve eGovernment goals, different communication channels need to be<br />

considered. eGovernment needs to become mobile, offering the ability to engage with government<br />

services “anytime, anywhere” (Heeks & Lallana 2008). “After eGovernment comes mobile government<br />

(M-Government); the idea of permanently streaming data to and from a user’s mobile phone may be<br />

some people’s nightmare. In Sweden, it is already reality” (Cross 2004). Although there is a lower-thanexpected<br />

uptake of m-Government in many countries and cities, some have been advancing, such as<br />

Sacramento which received an award for Mobile Government Leadership in 2007 (Government<br />

Technology Magazine 2009).<br />

Section 2 provides the background to the paper, while in Section 3 we outline the results of our online<br />

survey of experts in the field. In Section 4, we describe the next phase of the investigation, namely the<br />

case studies undertaken to a) identify all the factors that may influence the adoption and implementation<br />

of mobile services, b) integrate such factors and relations between them into a framework, and c) provide<br />

specific recommendations and guidelines in all the various perspectives. Finally, we present the finished<br />

Framework and our recommendations.<br />

2. Background<br />

An m-Government definition that emerged from the analysis of expert surveys and interviews along with<br />

the literature review is presented below:<br />

27


Shadi Al-khamayseh and Elaine Lawrence<br />

“m-Government is a strategic system that extends stationary eGovernment systems to<br />

enable interoperability with heterogeneous wireless and mobile technologies through<br />

applications for constituents (Governments, Employees, Businesses, and Citizens). This<br />

allows them to interact within/with their government(s) or any government regardless of time<br />

and location, and to enhance the delivery of service in order to support government’s<br />

operations and decision making, and to support constituents’ business with the government.”<br />

In order to highlight the similarities and differences, we compare and contrast the features of electronic<br />

and mobile government in Table 1.<br />

Table 1: Features of electronic and mobile government: eGovernment and m-Government<br />

Criteria eGovernment m-Government<br />

Mobile devices: mobile phones, PDAs,<br />

Access devices PCs, Laptops, telephones<br />

Laptops and pocket PCs (Lallana 2004),<br />

iPads, Tablets.<br />

Personalization<br />

Always on<br />

Mobility<br />

eGovernment access devices can be<br />

used by many users, and are not<br />

personalised in a way that allows sending<br />

personal information to the constituent’s<br />

device (Yu & Kushchu 2004).<br />

eGovernment access devices are often<br />

switched off when they are not in use.<br />

When the devi♣ce is switched off it can<br />

neither receive any information nor switch<br />

itself on to do so.<br />

eGovernment access devices such as<br />

PCs are location fixed, so the citizen has<br />

to find the access device and an Internet<br />

connection to access services.<br />

Accessibility 24x7 fixed location access (Carroll 2005).<br />

Limitations<br />

Service coverage<br />

3. Findings of online survey<br />

The ICTs related to eGovernment, such<br />

as computers, have minor limitations.<br />

Many rural areas cannot access<br />

eGovernment services because of lack of<br />

land-lines (Hossan, Chowdhury &<br />

Kushchu 2005).<br />

Mobile devices are usually used by a single<br />

user (but not necessarily in underdeveloped<br />

countries). This facilitates sending<br />

personalised information to a specific<br />

constituent at any time through his/her<br />

mobile device (Yu & Kushchu 2004).<br />

m-Government devices, especially mobile<br />

phones and PDAs, are always switched on.<br />

These devices shift to an inactive mode<br />

when not in use, but are immediately<br />

activated by applications or information sent<br />

to the device (Yu & Kushchu 2004).<br />

m-Government access devices are mobile<br />

and designed to provide instant access to<br />

users by delivering, for example, warning<br />

SMS.<br />

24x7 with the advantage of access<br />

anywhere due to the mobility of the<br />

accessing devices (Carroll 2005).<br />

Small screen size limits the volume and type<br />

of information accessed (Carroll 2005).<br />

Nearly 100% country coverage in many<br />

countries (Kushchu & Kuscu 2003).<br />

The first stage of our study was an extensive literature review, the second involved the identification of<br />

eGovernment and m-Government experts for surveying, and the third involved a series of nine case<br />

study interviews with twelve officials from government departments and local councils in Australia and the<br />

Middle East. In this section, the data or empirical materials (Myers 1997) were collected through an openended<br />

online survey. The online survey included general open-ended questions of an exploratory nature,<br />

to prevent any influence on the experts’ point of view. The research question analysed here was:<br />

“Do you think that eGovernment is a necessary prerequisite to m-Government? Why/Why<br />

not?”<br />

This general open-ended question elicited rich data. According to Strauss and Corbin (1990) it is up to<br />

the researcher to determine when a sufficient number of surveys have been collected for analysis. Thus,<br />

a response of forty-three (43) participants was the saturation point used to develop a preliminary<br />

consensus of opinions as, at this stage, the results were becoming repetitious and no new information<br />

was being added. The participants targeted were mainly <strong>Academic</strong>s (i.e. Professors, Assistant<br />

Professors) researchers (i.e. a Research Director) and industry experts (i.e. an eGovernment<br />

Programmes Manager, a service design consultant, Business Development Manager, Mobile Portal<br />

Project Manager, eGovernment consultant, eService Provisioning Officer). The participants had authored<br />

28


Shadi Al-khamayseh and Elaine Lawrence<br />

or co-authored at least one published paper on m-Government. Figure 1 shows the location of the 43<br />

respondents and it is noted that the largest sample came from Europe which reflects the bulk of cutting<br />

edge research and implementation of mobile government.<br />

Figure 1: Location and number of respondents<br />

The respondents’ opinions were divided about this issue, with the majority agreeing with the question.<br />

Some answered confidently in the negative: “No[,] eGovernment is not a necessary prerequisite to m-<br />

Government”. Many others agreed, but added that “m-Government is an alternative or further<br />

development of eGovernment”, which means m-Government complements eGovernment “They are<br />

complementary”. According to one respondent, “ eGovernment is about building Internet-based<br />

solutions…” and m-Government “is the same, but using wireless as well as fixed networking<br />

technologies”, so “m-Government is a complimentary channel” and thus, an “m-Government solution is<br />

therefore an eGovernment solution”. Another respondent shared the same opinion but stated that the<br />

previous existence of eGovernment also contributes to awareness: “you need the people's awareness of<br />

"eGovernment in order to be familiar with the m-Government”. “Once people use and trust eGovernment<br />

services they will shift towards m-Government.” Thus, “ eGovernment plays an important role as a driving<br />

force”.<br />

Another respondent sums up that, “m-Government is a kind of eGovernment service [where] users can<br />

use mobile (wireless) devices as an interaction device”. Additionally, eGovernment programs contribute<br />

to devising successful m-Government programs and applications: “the eGovernment management [team]<br />

will have a good idea of what services to provide through the mobile”. According to these comments,<br />

eGovernment seems to be a core factor for m-Government. “ eGovernment is fundament [fundamental]<br />

for m-Government” and, “Surely eGovernment is a key enabler for m-Government” and therefore, “There<br />

should be first the backbone of eGovernment” as “ eGovernment services are the back-end Information<br />

Technology systems of the governmental agencies”. These systems support m-Government as “m-<br />

Government will often work alongside eGovernment, e.g. people using the Internet to register for an m-<br />

Government service”.<br />

These respondents see m-Government as a subset of existing eGovernment infrastructure which it<br />

complements by adding the wireless channel. eGovernment services contribute to awareness and trust<br />

which motivate people to use m-Government applications devised by the eGovernment management.<br />

Thus, eGovernment is a driver and a core enabler of mobile government. While most respondents<br />

recommended having an eGovernment infrastructure, some did disagree with the idea of requiring<br />

eGovernment as a pre-requisite of m-Government: “No[,] eGovernment is not a necessary prerequisite of<br />

m-Government”, as a global government industry manager said, adding that “Initially, the two initiatives<br />

did not require one as a prerequisite to the other”. m-Government applications that do not rely on<br />

eGovernment infrastructure have their own benefits too: “There is no reason however why m-<br />

Government applications on their own cannot increase efficiency and quality of service.” This means that<br />

“There are practical advantages to be gained from standalone m-Government applications as an initial or<br />

pilot stage in development, particularly as they may be quicker to develop and introduce”. It is also<br />

29


Shadi Al-khamayseh and Elaine Lawrence<br />

important to understand that although a standalone m-Government application is possible, “not all<br />

government services can be rendered using m-Government technologies”. Thus, some respondents did<br />

not provide a clear cut answer, but agreed with both views: “yes and no”. As explained by the<br />

eGovernment Corporate Programmes Manager, “m-Government can be achieved without eGovernment,<br />

but is somehow limited”. A researcher respondent added that “some innovative services can be<br />

accomplished without eGovernment” as it depends on the functionality level of the service/application: “It<br />

depends on what kind of m-Government you are considering. For example, ‘Light’ mobile applications<br />

might be implemented without a comprehensive eGovernment framework”. Figure 2 shows views on m-<br />

Government and its dependence or otherwise on eGovernment.<br />

Figure 2: Percentages of participants’ answer to: Do you think that eGovernment is a necessary<br />

prerequisite of m-Government?<br />

4. Case study interviews<br />

For the next stage of our investigation, we chose Case Studies methodology as, according to Tellis<br />

(1997): “Case study can be seen to satisfy the three tenets of the qualitative method: describing,<br />

understanding, and explaining”. The goals of this study included an exploration of the (a) success factors<br />

and (b) economic aspects of the acquisition of wireless and mobile technologies in the public sector. The<br />

objectives deriving from those goals are set out in Table 2.<br />

Table 2: Objectives and questions<br />

Objectives Questions<br />

An assessment of the categories of mobile and wireless<br />

technologies use in the public sector.<br />

The establishment of a basis for understanding the<br />

current and future success aspects of mobile government.<br />

An evaluation of the mobile government adoption issues,<br />

including managerial issues and the centralization and/or<br />

decentralization of decision making.<br />

The establishment of a basis for understanding the<br />

current and future economic aspects of mobile<br />

government.<br />

What patterns of acquisition emerge from the current<br />

wireless and mobile technologies and the perceived<br />

needs for mobile government?<br />

What characteristics of the categories of mobile<br />

government services contribute to the patterns of<br />

acquisition?<br />

What issues arise from the rapid acquisition of<br />

mobile and wireless technologies and how important<br />

have those technologies become to the<br />

organization?<br />

How will the organization balance the need for<br />

technological changes with the need to continue the<br />

accomplishment of routine tasks?<br />

These questions were used for all the case studies from Australia, Jordan and the United Arab Emirates<br />

and the answers were recorded, transcribed and later analyzed using nVivo, a qualitative data analysis<br />

software package. The above questions along with the main research question: “What are the factors that<br />

contribute to successful mobile government? How? Why?” reinforce the exploratory nature of this<br />

research. As can be seen from Table 3, twelve persons were interviewed for the case studies.<br />

30


Shadi Al-khamayseh and Elaine Lawrence<br />

Table 3: Interviewees, location, government type and positions<br />

Pseudonym Government Type No Positions<br />

QLDCC1 (AUST) Local City Council 2 IT manager and project manager<br />

QLDCC2(AUST) Local Regional Council 1 Team Leader of Technical Service<br />

NSWCC1(AUST) Local City Council 1 IT Manager<br />

NSWCC2(AUST) Local City Council 1 IT manager<br />

NSWCC3(AUST) Local City Council 1 IT Manager<br />

JorFed (JORDAN) Federal Government Department 1 IT Manager<br />

JorState (JORDAN) State Government Department 3 Customer Service Manager; IT Director;<br />

Head of Customer Information System<br />

(CIS) and Quality Unit.<br />

UAEstate01 (UAE) State Government Department 1 The Director General of eGov<br />

UAEstate02 (UAE) State Government Department 1 IT Manager<br />

Our study, by using a variety of methodologies – extensive literature review, online surveys and<br />

interviews with local, state and federal government personnel in Australia, Jordan and the United Arab<br />

Emirates - enabled us to identify many more success factors than we orginally found in the literature<br />

review, as depicted in Table 4.<br />

Table 4: Success factors identified by literature review<br />

Acceptance<br />

Access<br />

Coherent M-Gov framework<br />

Cost<br />

eGovernment<br />

High mobile penetration<br />

Infrastructure<br />

Infrastructure management<br />

IT literacy<br />

Legal issues deregulation of telecommunication sector<br />

M-Gov awareness<br />

M-Government Portal and exclusive Gateway GW<br />

Partnership with private sector<br />

Privacy and security<br />

Quality and user friendly applications<br />

Standards and data exchange protocols<br />

Strategy<br />

User needs and preferences applications<br />

As a result of the high number of success factors identified from our surveys and interviews, we<br />

organized the success factors in the framework around ten perspectives. The ten groups – Drivers,<br />

Solutions, Constituents (Citizens), Constituents (Employees), Providers, Business Case, Security,<br />

Government Role, and Benefits are the ones that have been proven in the collected data. Figure 3 below<br />

depicts the theoretical framework of m-Government as it emerged from the data analysis in the form of a<br />

visual model. The framework is adaptive as its components are rich and detailed, and they are not<br />

specific to one country, technology, organisational factor, economic factor, or social and human factor.<br />

The richness and level of detail provides any government with the capacity to adapt. The framework<br />

brings the issues facing the implementation of m-Government into sharp relief. We discuss each of the<br />

perspectives below.<br />

4.1 Drivers perspective<br />

Although different government departments have quite different responsibilities, tasks, structures, and<br />

customers, they share very similar drivers for the development and adoption of m-Government. The<br />

investigation conducted in this research shows that many of these drivers were and remain the same.<br />

31


Shadi Al-khamayseh and Elaine Lawrence<br />

Mallett, Millar and Beane (2006) acknowledge the flexibility driver, and theorize that work is no longer a<br />

place to go to but an activity to be undertaken. Thus, employees demand work flexibility in order to<br />

undertake their work whenever and wherever it is convenient for them. These drivers essentially oblige<br />

government departments to request the use of mobile and wireless technologies by proposing a business<br />

case.<br />

Figure 3: The adaptive m-Government framework<br />

4.2 Business case perspective<br />

The business case, according to the case studies findings, must be developed with mutual efforts from<br />

both the department or business group and the IT group. The business case needs to justify an m-<br />

Government project based on a cost/benefit analysis. Benefit/cost justification would typically answer the<br />

following question: How will the system improve the organisation? Potential benefits of implementing m-<br />

Government systems are discussed in Section 4.10.<br />

4.3 Solutions perspective<br />

The category included twenty-four success factors, some of which overlapped with other Perspectives<br />

such as the Providers and Business Case. The in-depth knowledge gained from the analysis of the case<br />

studies shows that mobile government solutions can change business processes within government<br />

departments. It also suggests that the mobile government platform is the most important factor in<br />

achieving functional and quality mobile government solutions (Olmstead et al. 2007). The Jordanian case<br />

study is therefore a good example to follow, as the Ministry of Information and Communication<br />

Technology (MOICT) has developed a central platform that hosts all services from all participating<br />

departments. Olmstead et al. (2007) confirmed this method and, as a result, started the USE-ME.GOV<br />

project to make available an open and interoperable platform for sharing across different local authorities<br />

and diverse organisational units. Such a platform reduces the cost of providing services and should<br />

address openness, interoperability, usability, and security (Decker & Bulander 2009; Olmstead et al.<br />

2007; Tadwalkar, Xiaoli & Lim 2007).<br />

32


4.4 Security perspective<br />

Shadi Al-khamayseh and Elaine Lawrence<br />

Literature has acknowledged that m-Government involves hidden risks due to the insecurity of the air<br />

medium and the vulnerabilities of wireless systems, and security has therefore been highlighted as a<br />

major success perspective (Carroll 2005; Kumar, Hanumanthappa & Reddy 2008; Mallett, Millar & Beane<br />

2006; Tadwalkar, Xiaoli & Lim 2007). The case studies shows the use of networks such as GSM, 3G, and<br />

NextG, with the majority of the cases using the 3G networks. Kumar, Hanumanthappa and Reddy (2008)<br />

stated that, in the past, wireless protocols had several security vulnerabilities, however, newer protocols<br />

such as 3G and WiMAX had the necessary requisites for secure deployment and utilisation. The case<br />

studies also recommend utilising the Virtual Private Networks (VPNs), and Kumar, Hanumanthappa and<br />

Reddy (2008) conclude that a preferable solution in the case of m-Government lies in session layer<br />

security. Finally, the case studies and literature suggest that to secure m-Government systems, an<br />

understanding of all possible threats to any part of the system is required in order to source suitable<br />

defence measures (i.e. algorithms, mechanisms and policies).<br />

4.5 Devices perspective<br />

The analysis of the mobile government services implemented in the different case studies highlighted<br />

Devices as an important mobile government perspective. Choosing input/output modalities for a mobile<br />

government solution should be based primarily on service characteristics, then on user-preferred<br />

modalities. Olmstead et al. (2007) recommend utilising multimodal User interfaces (UI), so that users can<br />

switch between input modalities if a situation requires it. Due to the special characteristics of mobile<br />

devices, such as size and battery life, Olmstead et al. (2007) and Decker and Bulander (2009)<br />

recommend considering context-awareness mechanisms. Geihs et al. (2006) highlight that the<br />

performance and quality of mobile applications crucially depend on the dynamically changing properties<br />

of the execution context, such as changing bandwidth and noisy environments which affect the sound<br />

output. To provide the best possible service to the user, they recommend developing self-adapting<br />

applications that automatically adapt to context changes and/or user preferences. Self-adapting<br />

applications is added to the solution’s success factors. Responsiveness is a measure of the quality of any<br />

m-Government service when selecting the access devices to be used.<br />

4.6 Providers perspective<br />

The analysis of the case studies has revealed the importance of Providers, as providers already<br />

partnering with other departments have more experience than those who have not taken that step. It can<br />

be seen that partnering with experienced providers has advantages such as lower cost and faster<br />

provisioning of services, due to established infrastructure. Although pricing is a reflection of user value<br />

(Kar 2008), Mallat (2007) identified premium pricing as one of the major barriers to mobile services<br />

adoption. The Ministry of Information and Communication Technology (MOICT) in Jordan has recognised<br />

this adoption barrier and therefore reduced the cost of the m-Government pull services [mobile<br />

services/information requested by citizens through SMS] twice in less than a year. The Jordanian MOICT<br />

also bears the cost of the Push SMSs [SMS sent by public organisations users] (Jordan eGovernment<br />

2009a). Consequently, the SMS Gateway is the most popular E-Service used by Jordanians (Jordan<br />

eGovernment 2009b). A Gartner report reported that mobile messaging services were worth $68.1 billion<br />

in regional revenues during 2007 while text message volumes were forecast to reach 5.6 trillion in 2012<br />

(Ingelbrecht et al. 2008). This demonstrates in favour of using SMS due to its lower pricing. Kar (2008, p.<br />

49) concludes that the ‘pricing model [structure] should be part of the design process’.<br />

4.7 Government role perspective<br />

The analysis of the case studies indicates that high level government should play a positive role in<br />

encouraging organisational willingness to adopt mobile government systems by devising a mobile<br />

government policy which incorporates a strategy for all concerned parties to follow. JorFed discussed the<br />

importance of having an m-Government strategy, either within the eGovernment strategy or separate<br />

from it. He highlighted the importance of having an m-Government vision set by the central government<br />

to guide and drive all agencies’ efforts towards the successful implementation of m-Government. This<br />

practice can be found in Sweden, where central government envisages facilitating and stimulating<br />

development among the agencies. (Capra, Francalanci & Marinoni 2007).<br />

33


Shadi Al-khamayseh and Elaine Lawrence<br />

4.8 The constituents’ (employees’) perspective<br />

m-Government has a major impact on employees and thus adaption may take longer than anticipated,<br />

hindering the success of the project or causing delays in outcomes. Kar (2008) affirms that mobile<br />

workforce solutions represent a crucial domain for developing mobile services, and explains that mobile<br />

workers are “considered to be people whose professional tasks can only be completed in a ‘mobile<br />

environment’, which refers to the user’s mobility and the need for technology that supports this mobility”<br />

(Kar 2008, p. 8). The case studies revealed consideration of different user sectors (e.g. age groups) as a<br />

success factor. The interviewees did mention privacy concerns occasionally. Straub and Heinemann<br />

(2004) acknowledge these concerns and highlight the importance of ensuring users’ privacy to increase<br />

acceptance of the system. The second stage in the process of assuring privacy is “that there have to<br />

exist means that enable them [users] to protect and control data about themselves” (Trček 2006). For<br />

example, a location-based or location-aware G2E solution could track or monitor workers for efficiency<br />

purposes, but this may have legal repercussions (Kushchu, Arat & Borucki 2007). All parties involved in<br />

any mobile government transaction need to make a reasonable effort to demonstrate that the user’s<br />

information is private, and this must be governed through legislation (Trček 2006). According to Kar<br />

(2008), privacy and security can be considered as opposite values; thus, to ensure privacy, security is<br />

required as a key condition (Macumber & Cheung 2007; Trček 2006).<br />

4.9 The constituents’ (citizens’) perspective<br />

Adopting and diffusing m-Government systems in the public sector and their use by employees impacts<br />

on citizens. Governments have to be able to introduce new public services and processes that are<br />

available to their citizens as well as public sector employees. Also, although a government department<br />

can impose the use of m-Government applications on its employees, it is not possible to make the same<br />

imposition on citizens. Thus, it is important to attain representative figures of mobile usage to predict<br />

citizens’ acceptance and accessibility. According to the interviewee NSWCC3, the implementation of<br />

G2C m-Government applications is poor due to “no demand from customers”.<br />

4.10 The benefits perspective<br />

The adoption of mobile technologies by the public sector not only benefits parties who use these<br />

services, but also has a positive impact on the internal workings of the public sector (Kushchu, Arat &<br />

Borucki 2007). No doubt the major benefit of m-Government is obtaining services anywhere, anytime<br />

(ubiquity), but the analysis of the nine case studies has identified twenty five more benefits that need to<br />

be understood by government to encourage the adoption and diffusion of m-Government.<br />

5. Conclusion<br />

This study aims to qualitatively identify successful aspects of m-Government and the relevant factors<br />

required for successful adoption and diffusion of m-Government systems. The basic assumption is that<br />

m-Government is still in its infancy, and there is not yet full awareness of the adoption and diffusion<br />

factors that contribute to its success, which therefore became the focus of this research. Research of any<br />

kind into m-Government research is quite a recent development, and there is a significant lack of<br />

literature. For this reason, the search for data by desk analysis, as well as by online surveys, and in-field<br />

interviews, is very challenging. The results achieved are presented in the m-Government framework<br />

model, developing a successful m-Government framework as a basis for a transition methodology, either<br />

from eGovernment to m-Government or directly to m-Government.<br />

References<br />

Australian Government Information Management Office (AGIMO) (2007) “Australians’ use of and satisfaction with<br />

eGovernment services – 2007”, [online] <br />

Capra, E. Francalanci, C. and Marinoni, C. (2007) “Soft Success Factors for M-Government”, in I. Kushchu (ed.),<br />

Mobile Government: An Emerging Direction in eGovernment, IGI Publishing, Hershey, PA, pp. 106-133.<br />

Carroll, J. (2005) “Risky Business: Will Citizens Accept m-Government in the Long Term?” URO mGOV 2005,<br />

Brighton, UK, pp. 77-87.<br />

Cross, M. (2004) “Channel for Change”, The Guardian, [online]<br />

.<br />

Decker, M. and Bulander, R. (2009) “A Platform for Mobile Service Provisioning Based on SOA-Integration”, ebusiness<br />

and Telecommunications, vol. 23, pp. 72-84.<br />

34


Shadi Al-khamayseh and Elaine Lawrence<br />

Geihs, K., Khan, M.U., Reichle, R., Solberg, A. and Hallsteinsen, S. (2006) “Modeling of Component-Based Self-<br />

Adapting Context-Aware Applications for Mobile Devices”, IFIP International Federation for Information<br />

Processing, vol. 227, pp. 85-96.<br />

Government Technology Magazine (2009) “City of Sacramento Awarded for Mobile Government Leadership”,<br />

[Online] <br />

Heeks, R. and Lallana, E.C. (2008) “mGovernment Benefits and Challenges, eGovernment for Development”,<br />

[online] .<br />

Hossan, G.C., Chowdhury, M. and Kushchu, I. (2005) “Prospects of Using m-Technologies for Disaster Information<br />

Management in Bangladesh and other LDCs”, EURO mGOV 2005, Brighton, UK, pp. 243-253.<br />

Ingelbrecht, N., Baghdassarian, S., Gupta, M., Hart, T.J., Shen, S. and Tazaki, K. (2008) “Forecast: Mobile<br />

Messaging, Worldwide, 2007-2012”, Gartner Research.[online] http://www.gartner.com/technology/home.jsp<br />

Jordan eGovernment (2009a) “ eGovernment Program Reduces Cost of SMS’s”, [online]<br />

.<br />

Jordan eGovernment (2009b) SMS Gateway is the Number One E-Service Used Amongst the Jordanian Society<br />

[online].<br />

Kar, E.v.d. (2008) Designing Mobile Service Systems, 2nd edn, IOS Press, Amsterdam<br />

Kumar, M., Hanumanthappa, M. and Reddy, B.L. (2008) “Security Issues in m-Government”, International Journal of<br />

Electronic Security and Digital Forensics, vol. 1, no. 4, pp. 401-412.<br />

Kuscu, M.H., Kushchu, I. and Yu, B.( 2007a), “Introducing Mobile Government”, I. Kushchu (ed.), Mobile<br />

Government: An Emerging Direction in eGovernment, IGI Publishing, Hershey, PA.<br />

Kuscu, M.H., Kushchu, I. and Yu, B. (2007b) “Introducing Mobile Government”, in I. Kushchu (ed.), Mobile<br />

Government: An Emerging Direction in eGovernment, 1st edn, IGI Pub, Hershey, PA, pp. 1-11.<br />

Kushchu, I. (ed.) (2007), Mobile Government: An Emerging Direction in eGovernment, IGI Publishing, Hershey, PA.<br />

Kushchu, I., Arat, S. and Borucki, C.( 2007) “The Impact of M-Government on Organisations: A Mobility Response<br />

Model”, in I. Kushchu (ed.), Mobile Government: An Emerging Direction in eGovernment, IGI Publishing,<br />

Hershey, PA, pp. 134-153.<br />

Kushchu, I. and Borucki, C. 2004 “A Mobility Response Model for Government”, [online]<br />

.<br />

Kushchu, I. and Kuscu, M.H. (2003) “From eGovernment to m-Government: Facing the Inevitable”, 3rd <strong>European</strong><br />

<strong>Conference</strong> on eGovernment, Dublin, Ireland, [online]<br />

.<br />

Lallana, E.C. (2004) “mGovernment Definitions and Models, eGovernment for Development”, [online]<br />

.<br />

Lallana, E. (2008a), “mGovernment: Mobile/Wireless Applications in Government”, [online]<br />

.<br />

Lallana, E.C. (2008b,) “mGovernment Definitions and Models, eGovernment for Development”, [online]<br />

<br />

Macumber, H. and Cheung, B. (2007) “A Secure Wireless Data Access Service for the Government of Canada”, in I.<br />

Kushchu (ed.), Mobile Government: An Emerging Direction in eGovernment, IGI Publishing, Hershey, PA, pp.<br />

318-338<br />

Mallat, N.( 2007) “Exploring Consumer Adoption of Mobile Payments: A Qualitative Study”, The Journal of Strategic<br />

Information Systems, vol. 16, no. 4, pp. 413-432.<br />

Mallett, C.T., Millar, W. and Beane, H. (2006) “Perspectives on Next Generation Mobile”, BT Technology Journal, vol.<br />

24, no. 4, pp. 151 - 160.<br />

Myers, M. D. (1997) "Qualitative Research in Information Systems", MISQ Discovery, vol.21, pp. 241-242, 1997<br />

Olmstead, P.M., Abramowicz, W., Bassara, A., Filipowska, A., Wisniewski, M. and Zebrowski, P. (2007) “Usability<br />

Driven Open Platform for Mobile Government (USE-ME.GOV)”, in I. Kushchu (ed.), Mobile Government: An<br />

Emerging Direction in eGovernment, IGI Publishing, Hershey, PA, pp. 30-59.<br />

Straub, T. and Heinemann, A. (2004) “An Anonymous Bonus Point System for Mobile Commerce Based on Word-of-<br />

Mouth Recommendation”, Symposium on Applied Computing, Nicosia, Cyprus, pp. 766 - 773<br />

Strauss, A. and Corbin, J. (1990) Basics of Qualitative Research Grounded Theory Procedures and Techniques,<br />

Sage, London.<br />

Tadwalkar, Y., Xiaoli, Y. and Lim, R. (2007) “Usability Evaluation of a Mobile Government Service: mPAL-my cpf”,<br />

4th International <strong>Conference</strong> on Mobile Technology, Applications, and Systems and the 1st International<br />

Symposium on Computer Human Interaction in Mobile Technology ACM, Singapore, pp. 547-551.<br />

Tellis, W. (1997) “Introduction to Case Study”, The Qualitative Report, vol. 3, no. 2. [online]<br />

http://www.nova.edu/ssss/QR/QR3-3/tellis2.html<br />

Trček, D. (2006) Managing Information Systems Security and Privacy, Springer-Verlag, Berlin Heidelberg.<br />

World Bank 2008, “m-Government” [online],<br />

<br />

Yu, B. and Kushchu, I. (2004) “Evaluating Mobility for Citizens”, mGovLab.<br />

35


The Stages of eGovernment: Correlation Between<br />

Characteristics That Affect eGovernment System<br />

Madi Al-Sebie<br />

Taibah University, Al-Madinah Al-Munawarah, Saudi Arabia<br />

mrmah1997@yahoo.com<br />

Abstract: It is clear that the stages of eGovernment are the central point and significant issue of eGovernment<br />

system. The stages of eGovernment can be represented in different ways. Through a review of the normative<br />

literature in the field of e- government, it appears that there is a lack of studies that discuss the use of the stages of<br />

eGovernment as criteria to make correlation between different characteristics that affect the eGovernment system.<br />

This paper, therefore, focuses mainly on discussion of correlation between different characteristics that affect<br />

eGovernment in light of stages of the eGovernment system. Furthermore, this paper discusses the comparison<br />

between traditional and electronic government services, and the tool of delivering eGovernment services.<br />

Keywords: stages of eGovernment; criteria; characteristics.<br />

1. Introduction<br />

In the last decade, eGovernment has made rapid progress (Datar et al (2010)). E- Government has<br />

become the next wave of technology application in the public sector, now that e-commerce, in the private<br />

sector is maturing (Eyob 2004). Abie, et. al, (2004) claim that eGovernment could be considered a<br />

powerful tool that can effectively manage and integrate the huge amount of existing information, as well<br />

as seamlessly integrate citizen interaction with its services.<br />

EGovernment is the use of Information and Communication Technology (ICT) to promote more efficient<br />

and cost effective government, facilitate more convenient government services, allow greater public<br />

access to information, and make government more accountable to citizens (Monga 2008). The process of<br />

the government delivering information and services to customers (citizens, businesses and public<br />

administrations) electronically can play a significant role, not only in improving customer services,<br />

developing businesses, the economy, and society but also in renewing the role of government itself.<br />

However, the stages of eGovernment are essential to the eGovernment system, because eGovernment<br />

systems pass through a number of stages, until they reach the highest potential of providing customers<br />

with full online interaction with their governments, thus enabling them to get government information and<br />

services from a single point of access (Al-Sebie and Irani 2005).<br />

Comprehensive review of the relevant literature shows there is a lack of studies that focus on the use of<br />

eGovernment stages as criteria to make correlation between different characteristics that affect the<br />

eGovernment system. This paper, therefore, will try to fill in that gap.<br />

This paper will start with a comparison of government services: traditional and electronic ways. This will<br />

be followed by discussing the tool of delivering eGovernment services. Finally, correlation between<br />

characteristics that affect the eGovernment system in the light of its stages will be discussed.<br />

2. Government services; traditional and electronic<br />

The eGovernment system can play a significant role in providing government services to customers<br />

efficiently. Yu and Janssen (2010) claim that the major goal for launching eGovernment is creating value<br />

for citizens, businesses and government agencies through public service delivery. Metaxiotis and Psarras<br />

(2004) argue that the traditional model of government is no longer functional. Furthermore, Chandler and<br />

Emanuels (2002) point out that the traditional form of government is failing, because their hierarchical<br />

structure is based on central systems that have been unable to reflect the needs and beliefs of its<br />

citizens. So, this deficit in the traditional model of government may be a significant motivation for<br />

governments to adopt eGovernment. The essential motivating point behind initiating eGovernment is the<br />

need for more efficiency in public sectors (Affisco and Soliman, 2006). However, as argued by Larson<br />

(2001), eGovernment has an opportunity to improve the delivery of government services and create<br />

significant cost-savings; this can lead to governments becoming more efficient and more effective.<br />

Furthermore, Al-kaabi and Hattab (2009) claim that eGovernment is a way for governments to use the<br />

most innovative information and communication technology to provide customers with efficient access to<br />

government information and services.<br />

36


Madi Al-Sebie<br />

On the other hand, Atallab (2001) claims that eGovernment cannot be considered as a solution for failed<br />

development and routine systems. However, it can be said that eGovernment, if it is implemented<br />

successfully, can be considered a significant tool that can help to overcome the shortcomings of<br />

traditional systems, and increase the efficiency and effectiveness of government. The key to a successful<br />

eGovernment is, to have the ability to provide a citizen-centric view of government model (Sanati and Lu<br />

2010).<br />

There are several characteristics that differentiate between delivering government services electronically<br />

and the traditional methods (Warkentin et al 2002). These characteristics include wide use of<br />

communication technology, smooth collection and processing of information, the development of<br />

communication mediums, the impersonal feature of the online environment, and the full benefit of using<br />

high standards of technological infrastructure for transactions.<br />

Morris (2002) compared government services of the traditional and electronic paths, as shown in figures<br />

1 and 2 below. Traditionally, public services can be delivered by direct interaction between a citizen or<br />

business and representatives or agents of government, who are considered transaction processors or<br />

gatekeepers to the desired transactions or information.<br />

Figure 1: Traditional path to government service (source: (Morris, 2002))<br />

On the other hand, delivering of public services electronically, leads to a change in the role of<br />

government representatives, from gatekeeper to problem solver or service provider. Furthermore,<br />

electronic public service delivery, enables citizens and businesses to serve themselves.<br />

Figure 2: E-Path to government services (source (Morris, 2002))<br />

Howard (2001) argues that eGovernment services at all levels will increasingly be delivered through<br />

electronic methods, but this will not replace the traditional ways of delivering government services.<br />

Instead, electronic channels will be additional paths of delivery for eGovernment services.<br />

However, governments still need to provide citizens and businesses with public services through<br />

traditional channels, because not all services are suited for electronic delivery, additionally, not all citizens<br />

and businesses have the desire or ability to access public services via electronic channels (Morris 2002).<br />

3. The tool of delivering eGovernment services<br />

eGovernment uses information technology (IT) to provide unlimited access to a wide range of public<br />

services (Sagheb, 2010). Aggarwal (2009) claims that advances in information and communication<br />

technologies (ICT) provide opportunities for governments to offer e-services on the web. Governments<br />

37


Madi Al-Sebie<br />

deliver their services more, through different service delivery channels such as phone, web and physical<br />

offices (Bajnath et al 2010). Internet is one of the most significant tools for delivering government services<br />

electronically. Abdel-Fattah and Galal-Edeen (2008) claim, that delivering services through electronic<br />

means -such as the Internet- forms an important component of most eGovernment strategies.<br />

One-stop public services and single window systems are primary goals for many eGovernment projects<br />

(Lee et al 2009). The most important trend in eGovernment is the increasing concentration on the web<br />

portal. According to Teicher et al (2002, P.389) “A portal is a point of entry which enables citizens to have<br />

access to a full range of services without any consciousness of movement between Internet sites and<br />

where those services may be tailored to user’s profile”. As shown in table 1 below, portals provide<br />

citizens with easy and single access to government services without the need to know which agency is<br />

responsible for them. An eGovernment portal is based on the concept of “intentions-based design” so the<br />

site is organized to meet the citizens needs rather than the structure of government. So, a true<br />

eGovernment portal is much better than a website (Howard 2001). Morris (2002) argues that portals lead<br />

to saving time spent by citizens, businesses and employees, on access and searching for information<br />

and services.<br />

A portal requires comprehensive technology, project management skills and systems integration, as well<br />

as graphics design, interactive media and user interface construction abilities (Sharma and Gupta, 2002).<br />

However, it can be said that eGovernment is not about creating a web site nor new technology; it is about<br />

transforming the delivery of government services via the use of technology.<br />

Table 1: Differences between portals and websites (source: Howard, (2001))<br />

Web Site Enterprise Portal<br />

Basic home page Organized by customer groups or Internet<br />

List of agencies List key services<br />

Mainly static information Information and interactions<br />

Some transactions Transactions rich<br />

Organized by agency Organized for user needs<br />

Separate from IT Fully integrated to IT systems<br />

Weak customer support Full customer support<br />

4. The correlation between characteristics that affect the eGovernment system in<br />

light of its stages<br />

As mentioned previously, the process of implementing an eGovernment system passes through different<br />

stages, until it reaches its highest potential, whereas government information and services integrate in<br />

different departments, for different functions and at different levels of the government system, enabling<br />

customers to obtain government services and information online from a single point of access.<br />

When issues related to the stages of eGovernment systems are discussed, some points should be taken<br />

into account (Al-Sebie et al 2005):<br />

A specific approach to the stages of eGovernment systems has not been agreed on between the<br />

researchers, nor has there been an agreement on the number of stages required for an eGovernment<br />

system; the stages required for an eGovernment system have been classified into either three, four,<br />

five or six stages.<br />

Most studies have classified eGovernment into four stages, although, some studies have classified<br />

eGovernment into three, five and six stages.<br />

Different models of the eGovernment stages show that there is almost a consensus that the first<br />

stage of an eGovernment system aims to create a static website that contains information and<br />

services of eGovernment without interaction. However, this first stage has been given different<br />

names such as ‘information’, ‘presence’ and ‘emerging’.<br />

There is a significant total agreement that the main purpose of the final stage is, to integrate<br />

government information and services in different departments, functions and levels of the government<br />

system, to enable citizens to obtain government services and information online, from a single point<br />

of access.<br />

38


Madi Al-Sebie<br />

The final stage of eGovernment is also given different names; such as ‘transformation’ and<br />

‘integration’. Finally, the different models of the stages of eGovernment show that there remains an<br />

argument between the researchers of eGovernment systems on the perception, and number of<br />

stages which arise between the first and final stages.<br />

As shown in table 2 below, some scholars use the stages of eGovernment as criteria to make correlation<br />

between different characteristics that affect eGovernment.<br />

Table 2: Correlation between different characteristics of eGovernment in the light of the stages of<br />

eGovernment<br />

Correlation between different characteristics of eGovernment Reference<br />

Positive correlation between value of eGovernment to citizen / business and complexity. (See Backus (2001)<br />

figure: 3)<br />

Positive correlation between sophistication of eGovernment and benefits. (See figure: 4) Howard (2001)<br />

Positive correlation between technology and organizational complexity and integration. (See<br />

figure: 5)<br />

Positive correlation between web based application functionality and enterprise integration.<br />

(See figure: 6)<br />

Layne and Lee<br />

(2001)<br />

Eyob (2004)<br />

In light of the above table, Backus (2001) claims that eGovernment can be categorized into four stages:<br />

information, interaction, transaction and transformation. These stages can be represented by correlation<br />

between the value to citizens/businesses and complexity, as shown in figure 3 below:<br />

Figure 3: Relationship between value to Citizens/Businesses and Increasing Complexity source (Backus,<br />

2001)<br />

Howard (2001) notes that there are at least three stages of eGovernment - publishing, interaction and the<br />

transaction stage. These stages can be represented by the correlation between eGovernment<br />

sophistication and benefits, as shown in figure 4:<br />

Layne and Lee (2001) - as shown in figure 5 below – divided the eGovernment system into four stages,<br />

namely: cataloguing, transaction, and vertical and horizontal integration. They note that there is<br />

correlation between technology and organisational complexity of the stages and various levels of<br />

integration.<br />

Additionally, Eyob (2004) notes that there are at least four stages of eGovernment, namely: websites for<br />

information dissemination, web based two-way transactions, portals for government services, and<br />

39


Madi Al-Sebie<br />

enterprise wide integration of government services. He claims that these stages can be represented by<br />

correlation between web based application functionality and enterprise integration, as shown in figure 6<br />

Figure 4: The relationship between eGovernment sophistication and benefits source (Howard, 2001)<br />

Figure 5: The relationship between technology and the organizational complexity of the stages of<br />

eGovernment and various levels of integration. source (Layne and Lee, 2001)<br />

As a result of the above discussion, and in light of the stages of the eGovernment system, it can be noted<br />

that, the closer the stages of eGovernment system get to its highest potential:<br />

The more the value to citizen/ business and complexity of eGovernment increase.<br />

The more eGovernment sophistication and benefits for customers increase.<br />

The more technology and organisational complexity of the stages and various levels of integration<br />

increase.<br />

40


Madi Al-Sebie<br />

Figure 6: Correlation between web based application functionality and enterprise integration Source<br />

(Eyob, 2004)<br />

The more web based application functionality and enterprise integration increase.<br />

However, governments seeking to reach the highest level of delivering services to customers, should<br />

take into account that the closer the stages of eGovernment system get to its highest potential, the more<br />

the value, sophisticated, benefits, complexity of technology, web based application functionality and<br />

enterprise integration increase, as shown in figure (7) below:<br />

Figure 7: The stages of eGovernment as criteria to make correlation between different characteristics<br />

that affect eGovernment<br />

5. Conclusion<br />

It has been shown in this paper that although the benefits of providing government services to customers<br />

electronically are essential, governments still need to provide citizens and businesses with public<br />

services through traditional channels. There are several reasons for that, such as, not all services are<br />

suited for electronic delivery, furthermore, not all customers have the desire or the ability to access public<br />

services via electronic channels. According to the discussion of the tool of delivering eGovernment<br />

services, it has been concluded that the eGovernment is not about creating a web site nor new<br />

technology; it is about transforming the delivery of government services via the use of technology. The<br />

stages of eGovernment can be considered as a central point and significant issue of the eGovernment<br />

system. Due to the lack of studies that focus on the use of the stages of eGovernment as criteria to make<br />

41


Madi Al-Sebie<br />

correlation between different characteristics that affect eGovernment, this paper has focused on filling in<br />

this information gap. Consequently, the closer the stages of eGovernment system get to its highest<br />

potential enabling customers to obtain government services and information online from a single point of<br />

access, the more the value, sophistication, benefits, complexity of technology, web based application<br />

functionality and enterprise integration increase. However, comprehensive literature review shows that<br />

correlation between different characteristics that affect eGovernment in light of stages of the<br />

eGovernment system has been discussed from theoretical perspective. Empirical studies should be taken<br />

into account in this area.<br />

References<br />

Abdel-Fattah, M., and Galal-Edeen, G. (2008). ‘Towards Flexible Evaluation for eGovernment Websites Quality:, A<br />

Multi-Perspective Evaluation Framework, Proceedings of 8th <strong>European</strong> <strong>Conference</strong> on EGovernment, Ecole<br />

Polytechnique, Lausanne,, Switzerland, 2008, pp.1-12.<br />

Abie, H., Foyn, B., Bing, J., Blobel, B., Pharow, P., Delgado, J., Krnouskos, S., Pitkanen, O. and Tzovaras, D. (2004)<br />

‘The need for a digital rights management framework for the next generation of eGovernment services’,<br />

Electronic Government, Vol. 1, No. 1, pp.8– 28.<br />

Affisco, F., and Soliman, K. (2006). ‘EGovernment: a strategic operations management framework for service<br />

delivery’ ,Business Process Management Journal, Vol. 12, No. 1.<br />

Aggarwal, A.K (2009). 'A training model for e-readiness in e-governance' Electronic Government, an International<br />

Journal 2009 - Vol. 6, No.2 pp. 111 - 128.<br />

Al-kaabi, R., and Hattab, E. (2009). ‘eGovernment Success Factors: A Survey, Proceedings of 9th <strong>European</strong><br />

<strong>Conference</strong> on EGovernment, University of Westminster, London, 2009, pp.39-44.<br />

Al-sebie,M., and Irani, Z. ‘Technical and organisational challenges facing transactional eGovernment systems: an<br />

empirical Study‘ Electronic Government, an International Journal 2005 - Vol. 2, No.3 pp. 247 - 276<br />

Al-sebie,M., Irani, Z., and Eldabi,T. ‘Issues relating to the transaction stage of the eGovernment system‘ Electronic<br />

Government, an International Journal 2005 - Vol. 2, No.4 pp. 446 - 459<br />

Atallab ,S. (2001). ‘EGovernment , Considerations For Arab States’, online, http://www.surf-as.org/Papers/e-govenglish.PDF.<br />

Backus, M. (2001). ‘E-governance in Developing Countries’, online,<br />

http://www.ftpiicd.org/files/research/briefs/brief1.pdf<br />

Bajnath, S., Janssen, M., Bharosa, N., Both, C., Klievink, B., Overbeek, S., and Veenstra, A. (2010). ‘Driving Service<br />

Delivery Principles Using a Role Playing Game’, Proceedings of 10th <strong>European</strong> <strong>Conference</strong> on EGovernment,<br />

University of Limerick, Ireland, 2003, pp.36-43.<br />

Chandler,S and Emanuels, S. 2002. ‘Transformation Not Automation’, Proceedings of 2 nd <strong>European</strong> <strong>Conference</strong> on<br />

EGovernment, St Catherine’s College Oxford 2002, United Kingdom, pp.91-102.<br />

Datar, M., Kothari, D., and Kumta, G. (2010). ‘Cloud Computing and its Impact on eGovernance Architecture,<br />

Proceedings of 10th <strong>European</strong> <strong>Conference</strong> on EGovernment, University of Limerick, Ireland, 2010, pp.114-121.<br />

Eyob, E. (2004) ‘EGovernment: breaking the frontiers of inefficiencies in the public sector’, Electronic Government,<br />

Vol. 1, No. 1, pp.107 – 114.<br />

Howard, M. (2001). ‘eGovernment Across the Globe: How Will “e” Change Government’, Government Finance<br />

Review, 17(Part 4): 6-9.<br />

Larson ,A. (2001). ‘EGovernment: Promoting Efficiency and Openness’, online,<br />

http://www.state.gov/e/rls/rm/2001/4531.htm.<br />

Layne, K and Lee, J. (2001). ‘Developing fully functional EGovernment: A four-stage model’, Government Information<br />

Quarterly 18, pp.122 - 136.<br />

Lee, T., Hon, C., and Cheung, D. (2009). ‘XML Schema Design and Management for eGovernment Data<br />

Interoperability, Proceedings of 9th <strong>European</strong> <strong>Conference</strong> on EGovernment, University of Westminster, London,<br />

2009, pp.436-444.<br />

Mextaxiotis, K. and Parras, J. (2004) ‘EGovernment: new concept, big challenge, success stories’, Electronic<br />

Government, Vol. 1, No. 2, pp.141 – 151.<br />

Monga, A. (2008). EGovernment in India: Opportunities and challenges, JOAAG, Vol. 3. No. 2<br />

Morris (2002). ‘Electronic Service Delivery – More Than Just Technology’, Proceedings of 2 nd <strong>European</strong> <strong>Conference</strong><br />

on EGovernment, St Catherine’s College Oxford 2002, United Kingdom, pp. 299-311.<br />

Sagheb, M (2010). 'A model of successful factors towards eGovernment implementation' Electronic Government, an<br />

International Journal 2010 - Vol. 7, No.1 pp. 60 - 74.<br />

Sharma, S.K and Gupta, J.N.D. (2002). ‘Transforming To EGovernment: A Framework’, Proceedings of 2 nd <strong>European</strong><br />

<strong>Conference</strong> on EGovernment, St Catherine’s College Oxford 2002, United Kingdom, pp. 383-390.<br />

Sanati, F and Lu, J (2010). 'Life-event modelling framework for eGovernment integration' Electronic Government, an<br />

International Journal 2010 - Vol. 7, No.2 pp. 183 - 202.<br />

Teicher, J. Hughes, O. and Dow, N. (2002). ‘EGovernment: a new route to public sector quality’, Managing Service<br />

Quality, Vol. 12, No. 6, pp. 384 -393.<br />

Warkentin, M; David, G; Pavlou, P A and Rose, G M. (2002) ‘encouraging Citizen Adoption eGovernment by Building<br />

Trust’, Electronic Markets, Vol. 12, No 3, pp. 157-162.<br />

Yu, C and Janssen, M (2010). ' The need for strategic management and business model design in government and<br />

public administration' Electronic Government, an International Journal 2010 - Vol. 7, No.4 pp. 299 - 315.<br />

42


Social Media in <strong>European</strong> Governmental Communication<br />

Isabel Anger and Christian Kittl<br />

evolaris next level GmbH, Graz, Austria<br />

isabel.anger@evolaris.net<br />

christian.kittl@evolaris.net<br />

Abstract: Since 2005 the phenomenon called “Web 2.0” or “Social Media” has been growing rapidly, with services<br />

gaining more and more users every month. Social Media platforms provide room for users to express and present<br />

themselves, create and share content and communicate with each other. As using Social Media has become an<br />

everyday task for a part of the world’s population, organizations both commercial and non-profit are beginning to take<br />

part in the online discussions. They leverage Social Media to reach their stakeholders directly. Many are very<br />

successful at that, learning from their stakeholders, building trust and securing their market position. While the<br />

success of economic organizations in Social Media communication increases, most <strong>European</strong> governments seem to<br />

ignore this new form of communication. Politicians campaigning for elections try to leverage the possibilities of Social<br />

Media which include word-of-mouth marketing, bi-directional communication, a higher level of trust among users,<br />

cost-efficient use of various platforms, and viral distribution of content. After the elections, however, many politicians’<br />

Social Media accounts stay silent. On the other hand, political protests and initiatives are commenced and spread<br />

very successfully with the help of Social Media tools. They form a strong counterpart to governmental content on<br />

Social Media. In order to aid governments in using Social Media as a new communication channel, this paper<br />

provides a conceptual process model for a communication strategy. The objectives of this strategy are building trust,<br />

encouraging dialogue, reaching the online-savvy segment of citizens, and encouraging citizen participation. After a<br />

basic definition of Social Media, the use of Social Media platforms and the implementation of Social Media<br />

functionalities by <strong>European</strong> governments will be analysed to give an overview on the current political Social Media<br />

communication state of the art in Europe. The analysis is based on a conceptional process model which will also be<br />

the basis for recommendations for the optimization of Social Media communication on a governmental level provided<br />

in the final section of this paper.<br />

Keywords: social media, governmental communication, Europe, youth, citizen participation<br />

1. Introduction<br />

Currently, about 500 million people use Facebook. This amounts to 25 % of the total number of people<br />

using the internet. Facebook as the largest and most popular Social Media platform is the best example<br />

for the success of Social Media. Many institutions use Social Media to reach and communicate their<br />

target groups on a more personal level than classic mass media such as television or newspapers ever<br />

could. In the political environment, however, those using Social Media seem to be rather individual<br />

politicians than government institutions, especially in times of elections and in political competition. This<br />

observation made in the authors’ home country led to the question whether other <strong>European</strong> governments<br />

perform better and use Social Media more consequently and, if so, what content they communicate,<br />

which channels they use and how these Social Media profiles are promoted.<br />

1.1 Definitions<br />

The term Social Media is used synonymously to the term Web 2.0. It can be visualized as “a set of<br />

principles and practices that tie together a veritable solar system of sites that demonstrate some or all of<br />

those principles“ (O'Reilly 2005). The main principles are the new view of the web as a platform where<br />

the user controls his or her own data. Further core factors of Web 2.0 or Social Media include<br />

architecture of participation, remixable data sources and data transformations, and harnessing collective<br />

intelligence.<br />

Another more recent definition focuses on the community aspect of Social Media: The web can be seen<br />

as a “city above the city” with Social Media as locations where persons meet to interact socially on public<br />

or semi-public profiles (Boyd and Ellison 2007), metaphorically described as bars, restaurants or parties<br />

where people talk, share multi-media content or get acquainted with other people (Scott 2010).<br />

Behavioural norms known from face-to-face social interaction are transferred to the Social Web which<br />

builds on the basic instincts of human beings to communicate with other humans and to receive a<br />

favourable social status (Thiedeke 2004).<br />

1.2 Methodology<br />

As Social Media is a rather new field in the scientific landscape, most insights today have been gained<br />

from the analysis of case studies. American authors such as Brian Solis, Deirdre Breakenridge and David<br />

43


Isabel Anger and Christian Kittl<br />

Meerman Scott, who are very active citizens of the Social Media environment themselves, have acquired<br />

knowledge from practical both best-case and worst-case examples. The conceptional process model<br />

presented in this paper is based on the analysis of their findings in the context of recent sociological and<br />

technological developments of Social Media. The model contains all steps and factors that need to be<br />

considered when planning to set up a communication strategy for Social Media.<br />

It is also the basis for the analysis of the EU governments’ Social Media communication. The analysis<br />

covered official ministries, departments, agencies, cabinets, offices, and public service platforms. Social<br />

Media profiles of individual politicians or parties who follow personal interests with their Social Media<br />

communication were not included in this evaluation. The analysis was carried out in November 2010; the<br />

data in section 2 reflects the status of November 23 rd , 2010.<br />

The first step in the evaluation was to check websites of governmental institutions for references to Social<br />

Media profiles. The Social Media platforms chosen for a closer investigation are the social network<br />

Facebook, the micro-blogging service Twitter and the video platform YouTube as they are the most<br />

widely used Social Media services. These platforms were also scanned for profiles of governmental<br />

institutions by using each platform’s search field and researching a country’s name in English as well as<br />

in the respective national language.<br />

The second step was to investigate the use of Facebook, Twitter and YouTube, determining target group,<br />

content and performance of the identified governmental Social Media profiles. On Facebook, the<br />

description of the fan page, the number of people who like the page and the content of the Facebook wall<br />

were analysed; on Twitter, the number of followers who subscribe to the status updates and the content<br />

of the latter were investigated; and on YouTube, the number of subscribers and uploaded videos as well<br />

as the video contents were examined.<br />

2. Analysis of Social Media in <strong>European</strong> Government communication<br />

The following countries’ government institutions did not have any Social Media profiles linked on their<br />

website and could not be found on the analysed platforms in the time span considered: Belgium,<br />

Bulgaria, Cyprus, Denmark, Estonia, Finland, Germany, Greece, Hungary, Ireland, Italy, Luxembourg,<br />

Malta, Romania, Slovakia, Slovenia, Spain, and Sweden. They are therefore not included in the detailed<br />

analysis.<br />

2.1 Austria<br />

Two of Austria's federal institutions are present on Social Media:<br />

The Austrian Federal Criminal Agency has a Facebook page (http://www.facebook.com/Bundeskriminalamt)<br />

that provides information on current topics concerning safety and targets all Austrian citizens. 18,756<br />

people like this page and each Facebook update is commented and discussed lively. The Facebook page<br />

links to the Agency's website, a link to the Facebook profile is prominently placed on the Agency's front<br />

page.<br />

The Federal Ministry for Education, Art and Culture is also present on Facebook<br />

(http://www.facebook.com/pages/Bundesministerium-fur-Unterricht-Kunst-und-Kultur-bmukk/144730522227336)<br />

where it posts mainly news topics but also statements from the minister. The site is targeted at Austrian<br />

citizens interested in education, art and culture. 367 people like this page. The individual Facebook<br />

updates are almost never commented by the page's fans. The Facebook page provides a link to the<br />

Ministry's website, but there is no link from the Ministry's website to Facebook.<br />

2.2 Czech Republic<br />

The Czech government presents itself on Facebook and Twitter.<br />

The Facebook page (http://www.facebook.com/uradvlady) of the Office of the Government of the Czech<br />

Republic provides links to news articles as well as pictures with insights on the government's everyday<br />

work. The site targets all Czech citizens and is liked by 2,008 people. Almost every status update is<br />

commented and discussed. The Facebook page provides links to the government's website and to its<br />

Twitter profile. On the Czech government's website, a link to the government's Facebook page is also<br />

provided.<br />

44


Isabel Anger and Christian Kittl<br />

The Czech government's Twitter profile (http://twitter.com/#!/strakovka) provides information on current<br />

activities and news from the government. The profile is followed by 1,852 other Twitter users. The Twitter<br />

profile links to the government's website and a link from the website to the Twitter profile is also provided.<br />

2.3 France<br />

The French government provides Facebook pages as well as several Twitter accounts to inform and<br />

communicate with the French citizens.<br />

The Presidency of the French Republic uses Facebook and Twitter to communicate with French citizens.<br />

The Facebook page (http://www.facebook.com/elysee.fr) provides news and multimedia and is liked by<br />

7,234 people. All status updates are moderately commented and discussed by fans of the page. A link to<br />

the Presidency website is provided, a link from the website to the Facebook page is also available. On<br />

Twitter (http://twitter.com/#!/Elysee), the same information as on the Facebook page can be found. The<br />

Twitter account is followed by 9,007 other Twitter users and provides a link to the website. A link from the<br />

Presidency website to the Twitter profile is also provided.<br />

The French Ministry of Foreign Affairs presents itself on a Facebook page, a YouTube account and a<br />

Twitter account where news and information on the activities of the Ministry are published. The<br />

information is targeted mainly at French citizens. The Facebook page<br />

(http://www.facebook.com/france.diplomatie) is liked by 4,071 people who comment and discuss the<br />

posted status updates. The Twitter account (http://twitter.com/#!/francediplo) is followed by 55,152 other<br />

Twitter users. The YouTube account (http://www.youtube.com/francediplotv) is subscribed by 193 people<br />

and provides 177 videos with interviews and coverage of current foreign affairs. All Social Media profiles<br />

link to the website of the Ministry and the website provides links to all profiles as well.<br />

The official Facebook page (http://www.facebook.com/France) of France.fr, a service platform for visitors<br />

and residents of France, has only been updated once. Nonetheless, 22,988 people like the page and the<br />

only status update is commented by many fans. A link to the France.fr website is provided; France.fr also<br />

links to its Facebook profile.<br />

Service-Public.fr is the official website of the French Administration and provides a Twitter profile<br />

(http://twitter.com/#!/servicepublicfr) where news and helpful information for French citizens are posted.<br />

382 other Twitter users follow Service-public.fr. A link from Twitter to the website is provided, but there is<br />

no link from the website to the Twitter profile.<br />

2.4 Latvia<br />

The Latvian government and ministries provide several Twitter and YouTube accounts. The information<br />

on all Social Media profiles is targeted at all Latvian citizens.<br />

The Latvian Presidency communicates via Twitter and YouTube. The Twitter account<br />

(http://twitter.com/#!/Rigas_pils) is followed by 4,173 people and provides news from the Presidency. The<br />

YouTube account (http://www.youtube.com/user/presidentlv) is subscribed by 160 people and provides<br />

243 videos, mostly interviews with and statements from the Latvian president. Both accounts link to the<br />

Presidency's website and are also linked on the website.<br />

The Latvian Parliament also uses Twitter for communication with the Latvian citizens. The Twitter<br />

account (http://twitter.com/#!/Jekaba11) is followed by 1,970 people and publishes news from the<br />

Parliament. A link from the Twitter profile to the website is provided, as well as a link from the website to<br />

the Twitter account.<br />

The Latvian Cabinet of Ministers provides a Twitter and YouTube account with news and statements from<br />

the Prime Minister. The Twitter account (http://twitter.com/#!/Brivibas36) is followed by 1,693 people. The<br />

YouTube account (http://www.youtube.com/user/valstskanceleja) provides 13 videos and is subscribed<br />

by 38 people. Both accounts are linked on the Cabinet’s website, the Twitter account links back to the<br />

website. The videos published on the YouTube account also contain links to the website.<br />

The Latvian Ministry of Defence uses Twitter for communication. The Twitter account<br />

(http://twitter.com/#!/aizsardzibasmin) provides news from the Ministry and often references the Twitter<br />

45


Isabel Anger and Christian Kittl<br />

updates of the Latvian military Twitter account. The account is followed by 164 other Twitter users. It links<br />

to the Ministry’s website; a link from the website to the Twitter account is also provided.<br />

The Latvian Ministry of Finance also uses Twitter. The Twitter account (http://twitter.com/#!/finmin) is<br />

followed by 806 people. It provides financial news and links to the Ministry's website, where a link to the<br />

Twitter profile is also prominently placed on the front page.<br />

The Latvian Ministry of Foreign Affairs communicates via Twitter and YouTube and provides information<br />

on news concerning foreign affairs as well as statements from the Ministry. The Twitter account<br />

(http://twitter.com/#!/Arlietas) is followed by 287 people. The YouTube account<br />

(http://www.youtube.com/user/LatvianMFA) is subscribed by 9 people and provides 13 videos. Both<br />

accounts are linked on the Ministry's website but only the Twitter account links back to the website.<br />

The Ministry of Health provides a Twitter account. This account (http://twitter.com/#!/veselibasmin) is<br />

followed by 46 people and provides information on events and news about health issues in Latvia. The<br />

account links to the Ministry's website; a link from the website to the Twitter profile is also provided.<br />

The Latvian Ministry of Regional Development and Local Government also communicates via Twitter.<br />

The Twitter account (http://twitter.com/#!/raplms) provides mainly news and is followed by 461 people. It<br />

links to the Ministry's website; a link from the Website to the Twitter profile is also provided.<br />

The Latvian Ministry of Welfare communicates via Twitter and YouTube, providing information on welfare<br />

topics and news from the Ministry. The Twitter account (http://twitter.com/#!/Lab_min) is followed by 219<br />

people. The YouTube account (http://www.youtube.com/user/LabklajibasMinistrij) is subscribed by 3<br />

people and provides 26 videos with footage from public discussions and coverage of welfare issues. Both<br />

accounts are linked on the Ministry's website but only the Twitter account links back to the website.<br />

2.5 Lithuania<br />

The Lithuanian government itself provides a Facebook page, a Twitter account and a YouTube account<br />

which are all targeted at the Lithuanian people.<br />

The Facebook page (http://www.facebook.com/pages/Vyriausybe/96251623407) is liked by 2,235 people<br />

and provides information, news and media. Most status updates are commented by the fans of the page.<br />

The Twitter profile (http://twitter.com/#!/vyriausybe) is followed by 511 people and provides mostly links to<br />

news on the government's website. The YouTube account (http://www.youtube.com/LRvyriausybe) gives<br />

insights on government work and statements of politicians in 49 videos. All Social Media accounts are<br />

linked on the government's website and also link back to the website.<br />

Three other Lithuanian ministries are present on Social Media platforms: The Ministry of Transport and<br />

Communication provides a Facebook page and a YouTube account. The Facebook page<br />

(http://www.facebook.com/susisiekimo.ministerija) is liked by 1,579 people, the status updates are<br />

commented regularly. The YouTube account (http://www.youtube.com/user/LRsusisiekimas) is<br />

subscribed by 16 people and provides 68 videos with short documentaries and TV advertisements. Both<br />

accounts are linked on the Ministry's website and also link back.<br />

The Ministry of Culture communicates via Facebook. On its Facebook page which is liked by 1,235<br />

people (http://www.facebook.com/pages/Lietuvos-Respublikos-Kulturos-Ministerija/200936741930), the<br />

Ministry publishes information, news and media. The status updates are commented rarely. A link to the<br />

Ministry’s website is available, a link from the website to the Facebook page is also provided.<br />

The Ministry of Social Security and Labour is also present on Facebook. The Facebook page<br />

(http://www.facebook.com/socmin) provides mainly news and is liked by 985 people. The status updates<br />

are almost never commented. The Facebook page links to the Ministry's website; a link from the website<br />

to the Facebook page is also provided.<br />

2.6 Netherlands<br />

The Netherlands' government is communicating via Twitter and YouTube with its citizens. The Twitter<br />

account (http://twitter.com/#!/Rijksoverheid) provides information and news and is followed by 1,375<br />

people. The YouTube account (http://www.youtube.com/rijksoverheid) is subscribed by 335 people and<br />

46


Isabel Anger and Christian Kittl<br />

provides 388 videos, mainly news coverage, interviews and statements from Dutch politicians, especially<br />

from the Prime Minister. Both accounts are linked on the government's website. The Twitter and YouTube<br />

account both link to the government's website, but only the YouTube account is linked on the website.<br />

Additionally, the Ministry of Economic Affairs, Agriculture and Innovation is present on Facebook. The<br />

Facebook page (http://www.facebook.com/MinELenI) is liked by 161 people and provides news and<br />

media. There are only a few comments on published status updates. The Facebook page linked from the<br />

Ministry's section on the government’s website and also links back to the website.<br />

2.7 Poland<br />

The Polish government provides a promotional portal which also includes a Facebook page. Apart from<br />

that, the Polish Ministry for Foreign Affairs is present on Twitter and YouTube. The Twitter account<br />

(http://twitter.com/#!/PolandMFA) is followed by 640 people and targets not only Polish citizens but also<br />

foreigners as some updates are in English. The YouTube account<br />

(http://www.youtube.com/user/PolandMFA) is subscribed by 95 people and provides 62 videos with<br />

politicians' statements, short documentaries and news. Both Social Media accounts are linked on the<br />

ministry's website and also link back to the website.<br />

2.8 Portugal<br />

The government of Portugal communicates via Twitter with its citizens. The Twitter account<br />

(http://twitter.com/#!/govpt) is followed by 6,856 people. It provides mainly information about upcoming<br />

events and news. A link to the government's website is provided; the Twitter account is also linked on the<br />

website.<br />

2.9 United Kingdom<br />

The government of the United Kingdom provides a public service platform called Directgov that also uses<br />

a Facebook page, a Twitter account and a YouTube account to communicate with the people in England<br />

and Wales. The Directgov Facebook page (http://www.facebook.com/Directgov) is liked by 692 people<br />

and delivers information and tips for everyday life. It also encourages users to participate. The fans of the<br />

page comment Directgov's status updates regularly. The Twitter account (http://twitter.com/#!/directgov)<br />

is followed by 10,628 people and provides similar information as the Facebook account. The YouTube<br />

account (http://www.youtube.com/directgovuk) has 496 subscribers and provides 96 videos with various<br />

service topics. All three Social Media profiles are linked on the Directgov website; a link from each<br />

account to the website is also provided.<br />

Apart from the public service platform, several British ministries use Social Media accounts for<br />

communication.<br />

The Prime Minister's Office is present on Facebook, Twitter and YouTube where it provides general<br />

information and news about the activities of the government and statements from the Prime Minister. On<br />

Facebook, an application (http://apps.facebook.com/numberten/) is provided. This application is currently<br />

used by 509 people. As the application did not work at the time of the analysis, it could not be tested by<br />

the author. The Twitter account (http://twitter.com/#!/Number10gov) is followed by 1,763,228 people. The<br />

YouTube account (http://www.youtube.com/user/number10gov) is subscribed by 1,021 people and<br />

provides 19 videos containing statements from the Prime Minister and footage from press conferences.<br />

All Social Media platforms are linked from the website; links from the profiles to the website are also<br />

provided.<br />

The United Kingdom's Economics and Finance Ministry (Her Majesty's Treasury) presents itself on<br />

Twitter and YouTube. The Twitter account (http://twitter.com/#!/hmtreasury) is followed by 16,904 people<br />

and publishes mainly links to press notices as well as news about financial issues. The YouTube account<br />

(http://www.youtube.com/hmtreasuryuk) is subscribed by 366 people and provides 4 videos with<br />

statements from politicians and ministers. Both Social Media accounts link to the Ministry's website; the<br />

Ministry's website, however, links only to the Twitter account.<br />

The Department of Energy and Climate Change communicates British environment issues, news and<br />

statements via Twitter and YouTube. The Twitter account (http://twitter.com/#!/deccgovuk) is followed by<br />

7,522 people. The YouTube channel (http://www.youtube.com/deccgovuk) is subscribed by 121 other<br />

47


Isabel Anger and Christian Kittl<br />

YouTube users and provides 22 videos with statements from politicians and short documentaries focused<br />

on environment issues. Both account are linked on the Department's website and also link back to the<br />

website.<br />

The Department for Environment, Food and Rural Affairs is present on Twitter and YouTube. The<br />

communicated topics include environment news, wildlife, food, farming and pets. The Twitter account<br />

(http://twitter.com/#!/defragovuk) is followed by 4,580 people. The YouTube account<br />

(http://www.youtube.com/user/defrauk) is subscribed by 235 people and provides 69 videos with<br />

politicians' statements and short documentaries of relevant events. Both accounts are linked on the<br />

Department's website and also link back to the website.<br />

The Ministry of Justice is present on Twitter and YouTube where it communicates information and service<br />

tips for different justice issues. The Twitter account (http://twitter.com/#!/MoJGovUK) is followed by 5,039<br />

people, the YouTube account (http://www.youtube.com/user/MinistryofJusticeUK) is subscribed by 150<br />

people. On YouTube, the Ministry provides 91 videos in 11 playlists that offer advice in legal issues<br />

related topics as well as statement from politicians and justice. Both accounts are linked on the Ministry's<br />

website and also link back to the website.<br />

The UK Parliament uses Facebook, Twitter and YouTube for communicating government issues. The<br />

Facebook page (http://www.facebook.com/pages/UK-Parliament/16553417732) is liked by 5,618 people<br />

and provides mainly videos and photographs of events. The contents on the Facebook page are often<br />

commented and lively discussed. The Twitter account (http://twitter.com/#!/UKParliament) is followed by<br />

30,217 people. The YouTube account (http://www.youtube.com/UKParliament) is subscribed by 1,677<br />

people and provides 97 videos. All accounts are linked on the Parliament's website and also link back to<br />

the website.<br />

The Home Office is the government department for immigration and passports, drugs policy, crime,<br />

counter-terrorism and police. It is present on Twitter (http://twitter.com/#!/ukhomeoffice) where it is<br />

followed by 6,064 people and provides news and information about immigration and policing. The<br />

account is linked on the Office's website and also links back to the website.<br />

The British Foreign and Commonwealth Office uses Facebook, Twitter and YouTube for communication.<br />

The Facebook account is available in three different languages (English, Arabic and Urdu) and provides<br />

travel advices (English page: http://www.facebook.com/fcotraveladvice). 5,131 people like the English<br />

page, but there are only few comments. The Office offers a wide range of Twitter accounts; the main<br />

account (http://twitter.com/#!/foreignoffice) is followed by 24,265 people and provides information and<br />

news from the Office. The YouTube account (http://www.youtube.com/ukforeignoffice) is subscribed by<br />

1,445 people and provides 545 videos with interviews and short documentaries of foreign issues in<br />

various languages. All accounts are linked on the Office’s website and also link back to the website.<br />

The Cabinet Office is present on Twitter. The Twitter account (http://twitter.com/#!/cabinetofficeuk) is<br />

followed by 5,788 people and aggregates information from the governing offices and departments. The<br />

account is linked on the Cabinet Office's website and also links back.<br />

2.10 Results<br />

The analysis showed that 9 of the 27 EU member states use some form of Social Media for<br />

communicating with their citizens. 6 countries use Facebook, 8 countries use Twitter and 6 countries use<br />

YouTube. As shown in Table 1, 15 Facebook profiles, 27 Twitter accounts and 16 YouTube channels are<br />

used, making Twitter the most popular of all Social Media platforms.<br />

Almost every Social Media account is prominently linked on the front page of the government, a ministry<br />

or department in order to guide visitors to these conversational platforms. The accounts that are not<br />

referenced on a website tend to be less successful as they are not easily found by citizens surfing the<br />

website. Social Media not only facilitates communication from government to citizen but also from citizen<br />

to citizen as Facebook profiles show. Facebook is also used for publishing multimedia content such as<br />

photos or videos. Twitter is used mostly as a dynamic and fast news stream and is not only addressed to<br />

citizens but also to journalists who seek first-hand information. YouTube is used mainly for publishing<br />

statements from leading politicians but also serves as a platform for service and information videos.<br />

48


Isabel Anger and Christian Kittl<br />

Table 1: Number and types of Social Media accounts in EU governments<br />

Facebook Twitter YouTube Sum<br />

Austria 2 - - 2<br />

Czech Republic 1 1 - 2<br />

France 3 3 1 7<br />

Latvia - 9 4 13<br />

Lithuania 4 1 1 6<br />

Netherlands 1 1 1 3<br />

Poland - 1 1 2<br />

Portugal - 1 - 1<br />

United Kingdom 4 10 8 22<br />

Sum 15 27 16 58<br />

The most successful countries on Social Media are the United Kingdom, Latvia and France: They have<br />

the most fans, followers and subscribers, they communicate continuously and in form of dialogues and<br />

post the most content.<br />

3. Recommendations and conceptional process model<br />

The recommendations are aggregated in the conceptional process model that is explained in the<br />

following subsections. This model is made up of six steps which structure communication preparation and<br />

implementation in Social Media. Figure 1 shows a schematic visualisation of the conceptional process<br />

model.<br />

Figure 1: Schematic visualisation of the conceptional process model<br />

3.1 Analysis<br />

The first step to Social Media communication is a thorough analysis of the internal and external<br />

communicative starting point. Two analysing models are recommended:<br />

1. Conversations in Social Media according to the Lasswell model (Lasswell 1948) to evaluate platforms,<br />

topics, sentiment, participants and relevant influencers. The Lasswell model describes the key elements<br />

49


Isabel Anger and Christian Kittl<br />

of communication: Who says what to whom in what channel to what effect. This is a linear approach to<br />

communication, channelling information and thus bringing it from the sender to the recipient. In order to fit<br />

the netted structure of the web, (Solis and Breakenridge 2009) enhanced the original Lasswell model:<br />

Who says what to whom in what channel to what effect then who hears what, who shares what with what<br />

intent to what effect.<br />

2. ACCESS Model<br />

Audience: evaluation of key target groups or segments that are to be reach via Social Media.<br />

Concept: basic ideas on means of communication with the target groups including messages and<br />

channels.<br />

Competition: overview of similar use cases, such as governments already communicating via Social<br />

Media<br />

Execution: overview of all issues around the campaign such as legal concerns, resources available<br />

for the campaign etc.<br />

Social Media: selection of platforms suited for the desired campaign<br />

Sales Viability: business model<br />

3.2 Objectives<br />

The objective must not be to gain a certain amount of followers or fans on Social Media platforms –<br />

although these figures are suitable for controlling the success of Social Media activities – but rather be to<br />

inform citizens, build trust and encourage participation.<br />

3.3 Activities, time, budget<br />

These three elements are strongly interconnected and must therefore be viewed as one step in the<br />

concept. The element “Activities” comprises the selection of Social Media platforms and associated tasks<br />

as well as setting up a plan of topics and a crisis communication plan. The element “Time” refers to a<br />

time plan in which activity, objective and charge is listed according to the respective time of<br />

implementation and duration. A 12-month plan is suggested for the initial implementation of Social Media<br />

communication (Brake and Safko 2009). The element “Budget” encompasses all costs for the<br />

communication strategy, the greatest part of which are generally made up of personnel expenses.<br />

3.4 Implementation<br />

The implementation process is executed according to the concept devised in the previous steps. It is<br />

suggested that one coordinator for all Social Media measures is appointed to oversee the implementation<br />

and constant communication processes. Throughout the implementation, changes in platform<br />

functionality as well as the evolution of novel platforms or services must be supervised in order to<br />

determine whether new services would fit the communication needs of the government and if their use<br />

would be of value to the target groups.<br />

3.5 Performance measurement<br />

At the end of the communications campaign or at milestones of the communication process a set of<br />

operating figures helps to determine the performance of the strategy:<br />

Raw author contribution<br />

Followers, readers, fans, memberships on different Social Media platforms<br />

Interaction frequency<br />

Mentions, links, recommendations from other users<br />

Participation and user-generated content<br />

Sentiment (positive, negative or neutral) of comments<br />

The term raw author contribution refers to the amount of content created by the communicating party<br />

itself. The content is the substance needed to trigger discussion and encourage dialogue. The publication<br />

of a large amount of quality multi-media content demonstrates the government’s will to communicate<br />

transparently and authentically.<br />

50


3.6 Accompanying process: Monitoring<br />

Isabel Anger and Christian Kittl<br />

Monitoring is the process of observes the Social Media landscape throughout the entire campaign. Both<br />

topics and performance can be monitored. Identifying relevant conversations and trending topics enables<br />

the government to interact at the right places and at the right time. This can be done by subscribing to email<br />

alert services but also by manual search. By monitoring performance figures, the effects of<br />

communication measures can be analysed. Reactions to released information, calls to action or<br />

discussions can be used as the decision basis for upcoming communication measures.<br />

Tools for monitoring are available in many forms and styles online. Some of the most popular free<br />

monitoring tools include Google Alerts (http://www.google.com/alerts), Socialmention<br />

(http://socialmention.com/) and newsfeed aggregators such as netvibes (http://www.netvibes.com/).<br />

Facebook and YouTube offer their own free tools called Facebook Insights and YouTube Insight for<br />

monitoring the performance of pages, status updates and videos. Comprehensive multi-platform tools<br />

include Radian6 (http://www.radian6.com/) and TwentyFeet (https://www.twentyfeet.com/): they track the<br />

performance of numerous Social Media services including Facebook, Twitter and YouTube but charge a<br />

monthly fee.<br />

4. Conclusion and discussion<br />

The analysis showed that most governments of EU member states refrain from using Social Media. Only<br />

9 of 27 governments communicate with their people via Facebook, Twitter or YouTube. Those who<br />

consequently communicate with dedication on these novel platforms – best-practice examples are the<br />

government agencies in the United Kingdom and in Latvia – can reach thousands of people, especially<br />

the online-savvy target group and younger citizens and thus transport an image of transparency and<br />

trust. The new communication channel Social Media supports governments in quickly informing, linking to<br />

important news and encouraging participation.<br />

The conceptional process model presented in the final section of this paper serves as a six-step guideline<br />

for setting up a strategy for leveraging Social Media in governmental communication. However, it remains<br />

a concept up to now since it has not yet been validated in a practical test; there are no empirical values<br />

that allow an evaluation of the model.<br />

The model is designed for entities that are not yet deeply engaged with strategic communication<br />

approaches. For governments that already have a comprehensive communication strategy, some steps<br />

in the model, such as the analysis, may be shortened (e.g. in terms of target group analysis or resources)<br />

or might perhaps be redundant. When incorporating Social Media into an existing communication plan, it<br />

is essential to adapt the overall communication goals and not isolating the communication in social<br />

networks.<br />

An explanation of or guide to the use of individual platforms is deliberately omitted in the section<br />

“Activities” of the proposed model as preferred platforms and services change quicker than the basic<br />

features and principles the phenomenon called Social Media. Also, any person seeking to use Social<br />

Media platforms for professional communication must explore functionalities of the respective platforms<br />

on his or her own, as the scientific work can only analyse and describe the structures and functionalities.<br />

Choosing to take up communication in Social Media entails several implications that need to be<br />

observed. Firstly, Social Media as conversational media demand commitment and time from professional<br />

communicators. Additionally, government representatives communicating in Social Media must act and<br />

react quickly to upcoming topics or users’ questions. It is essential to avoid delays in communication<br />

caused by long procedures of releasing content for communication, if possible. To facilitate this, topics<br />

and user inquiries must be structured by different authorisation levels. A further implication is the set-up<br />

of a crisis communication plan. As Social Media enables every user to easily publish information or<br />

comment on existing information, it is possible that users publish unfavourable postings in connection<br />

with the government. Leveraging social Media also means carefully dealing with such negative usergenerated<br />

content instead of ignoring or deleting it.<br />

By using Social Media, governments can display openness and the will to communicate directly with the<br />

people in an environment where there is much to gain at a minimal risk.<br />

51


References<br />

Isabel Anger and Christian Kittl<br />

Boyd, D. and Ellison, N. (2007) “Social Network Sites: Definition, History, and Scholarship”, [online], Journal of<br />

Computer-Mediated Communication, http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html.<br />

Brake, D. and Safko, L. (2009) The Social Media Bible: Tactics, tools & strategies for business success, John Wiley<br />

& Sons, Hoboken.<br />

Lasswell, H. (1948). “The structure and function of communication in society”, in Bryson, L. (ed.) The Communication<br />

of Ideas, Institute for Religious and Social Studies, New York.<br />

Meerman Scott, D. (2010) The New Rules of Marketing and PR, John Wiley & Sons, Hoboken.<br />

O'Reilly, T. (2005) “What is Web 2.0”, [online], O'Reilly Media, http://oreilly.com/web2/archive/what-is-web-20.html.<br />

Solis, B. and Breakenridge, D. (2009) Putting the Public back in Public Relations, FT Press, Upper Saddle River.<br />

Thiedeke, U. (2004) Soziologie des Cyberspace, VS Verlag, Wiesbaden.<br />

52


The Provision of eGovernment Services: The Case of Italy<br />

Davide Arduini 1 , Antonello Zanfei 1 , Mario Denni 2 and Gerolamo Giungato 3<br />

1 University of Urbino Carlo Bo, Urbino, Italy<br />

2 Italian Competition Authority (Agcm), Rome, Italy<br />

3 Italian National Institute of Statistics (Istat), Rome,l Italy<br />

davide.arduini@uniurb.it<br />

antonello.zanfei@uniurb.it<br />

Mario.Denni@agcm.it<br />

giungato@istat.it<br />

Abstract: Using data from 1,176 Italian municipalities in 2005, we identify factors associated with the development of<br />

eGovernment services supplied by local public administrations (PAs). We show that the combination of internal<br />

competencies and context-specific factors is different when explaining decisions to start eGovernment activities vs.<br />

the intensity of such activities. Municipalities involved in eGovernment are larger, carry out more in-house ICT<br />

activities and are more likely to have intra-net infrastructures than PAs that do not offer front office digitized services.<br />

They are also generally located in regions having relatively large shares of firms using or producing ICTs, where<br />

many other municipalities offer digitized services, and where population density is relatively low. The range and<br />

quality of eGovernment services supplied by local PAs tend to increase with their stock of ICT competencies, their<br />

efforts to train workers, and with their ability to organise efficient interfaces with end-users. Moreover, there is a<br />

correlation between the range and quality of eGovernment services offered and the broadband infrastructure<br />

development in the area where local PAs are located.<br />

Keywords: innovation system, dynamic capabilities, technology adoption, electronic government, innovation in<br />

services, two-part model<br />

1. Introduction<br />

In advanced economies the public sector has been under pressure to increase transparency in<br />

administrative procedures and decision making processes as well as increase the efficiency of its<br />

services to citizens and business enterprises. These pressures are the result of a combination of factors,<br />

including increasing competition in political arenas, institutional changes and technical progress. The use<br />

of digital technologies at all levels of Public Administrations (PAs) and the development of “eGovernment”<br />

services are a key aspect of this transformation (Tung, Rieck 2005). Studies on digital technology<br />

adoption and on ICT based services supplied by public organisations, however, reveal the existence of a<br />

considerable heterogeneity across EU countries and regions (Caldas et al. 2005; Torres et al. 2005). In<br />

other words, not all PAs are equally prone to involvement in eGovernment nor are they equally active in<br />

this field. Using data on 1,176 Italian municipalities in year 2005, this paper contributes to our<br />

understanding of this diversity. More precisely we analyse the factors that are associated with PA<br />

decisions on whether and how to become involved in eGovernment activities.<br />

The analysis carried out in this paper can be cast in a general framework that explains innovation as the<br />

result of a process wherein the competencies of innovating entities co-evolve with the technological,<br />

institutional and economic environment in which they are active (Nelson 1995). In this case, we shall<br />

focus on a specific category of innovators, namely local-level public administrative bodies, which we shall<br />

call “municipalities” from now on. We shall use the provision of digitalised front office services to the<br />

citizens, firms and other institutions (eGovernment) as a measure, though partial, of municipality<br />

innovation. Furthermore, we consider the relevant technological, institutional and economic context for<br />

innovation to be largely represented by the “regions” in which municipalities are located. While the choice<br />

of territorial aggregation is always arbitrary, we thought it sensible and feasible in terms of data<br />

availability to utilise the Eurostat NUTS2 level of analysis for Italy, which corresponds to the 21 subnational<br />

regions that were institutionalised in 1970 following a constitutional provision of 1948. In this<br />

general framework, we shall show that different competencies and contextual factors matter when<br />

considering innovation rate between or within municipalities.<br />

The rest of this paper is organised as follows. Section 2 draws together different streams of literature to<br />

single out the key factors that can help explain innovation in public services in general and eGovernment<br />

in particular. Section 3 illustrates our datasets and discusses the empirical strategy we follow. Section 4<br />

examines the results of the econometric exercise carried out on innovative activities of Italian<br />

municipalities. Section 5 concludes.<br />

53


Davide Arduini et al.<br />

2. Background literature on innovation and implications for public services<br />

Innovation in services has attracted increasing, albeit still limited, attention in economic literature (Barras<br />

1986, 1990; Miles 1993; Andersen et al. 2000; Metcalfe, Miles 2000; Tether 2005; Cainelli et al. 2006;<br />

Consoli 2007; Clark et al. 2008). As particularly stressed by the evolutionary approach, our understanding<br />

of innovation can greatly benefit from the analysis of competencies of firms and institutions. This stream<br />

of literature views innovators as depositories of largely tacit knowledge incorporated in such firm-specific<br />

assets as routines, skills, technical and organisational capabilities (Nelson, Winter 1982; Cohen et al.<br />

1996; Dosi, Malerba 1996; Antonelli 2006). Such assets, normally identified with the comprehensive term<br />

“competencies”, are the result of conscious efforts to invest in training of human capital and in<br />

institutionalised R&D. Moreover, competencies originate from learning processes associated with<br />

production, the use of technology and the interaction with external parties (other producers, users, and<br />

institutions) which are themselves depositories of knowledge assets. To explain better the introduction of<br />

innovation in general, and of eGovernment services as a special case of innovation in services, one also<br />

needs to acknowledge the importance of context specific factors. There is a general consensus on the<br />

role played by demand conditions as fundamental drivers for innovation. The hypothesis that extensive<br />

and growing demand stimulates innovation was originally proposed by Schmookler (1962, 1966) and<br />

tested at different levels of analysis with a focus on the manufacturing industry (Scherer 1982; Mowery,<br />

Rosenberg 1979; Brouwer, Kleinknecht 1999). Most contributions on innovation in services emphasise<br />

the importance of demand determinants of innovative activities (Gallouj, Weinstein 1997; Miles 2005)<br />

although there are few empirical studies concerning this issue (Cainelli et al. 2006). In the public sector<br />

case, attention has been given to the role of governmental bodies in public procurement of advanced<br />

technology, hence as actors on the demand side affecting innovation carried out by supplier sectors<br />

(Zanfei 1998; Edquist et al. 2000). Apart from the characteristics of demand, innovation is affected by a<br />

number of other context specific factors and by the complex networks of relationships among the different<br />

actors involved in innovative activities (Lundvall 1992; Nelson 1993; Edquist 1997, 2005; Malerba 2005).<br />

Important interdependencies can be observed between all components in innovation systems, whether<br />

the systems are defined at the national, regional or sectoral level. The interactive and systemic nature of<br />

innovation is mediated by spatial factors, such as geographic proximity and localised knowledge<br />

accumulation. Emulation processes across innovators, user-producer interactions, knowledge exchanges<br />

and involuntary information leakages are favoured by close interaction and day-to-day contact between<br />

actors involved. There is significant evidence of inter-regional variations in the generation and adoption of<br />

new technology, revealing that innovation tends to be geographically bounded (Antonelli 1990, 2000;<br />

Saxenian 1994; Baptista 2000, 2001; Asheim, Gertler 2005).<br />

3. Data sources and empirical strategy<br />

In this section we illustrate the data and methods we utilize to examine the factors affecting the innovative<br />

activities of Italian PAs. As stated in the introduction, our unit of analysis is based on local PAs<br />

(municipalities), and we use their involvement in the provision of digitalized front office services<br />

(eGovernment) as the dependent variable in our econometric exercise. We expect different factors at the<br />

municipality and contextual levels to be associated with the introduction of eGovernment services. These<br />

factors were selected from the existing literature on innovation processes, as in Section 2. Let us first<br />

illustrate our data sources and then discuss how these are utilized for analytical purposes.<br />

3.1 Data<br />

Our empirical tests are based on data at both municipality and contextual (mainly regional) levels. For<br />

one variable only data is collected at the level of the Italian provinces. For municipality level variables,<br />

data are obtained by merging two different surveys. One is the survey conducted by Italy’s National<br />

Bureau of Statistics (Istat) in 2006 on the usage of ICT in 3,323 Italian local public administrations. It<br />

collects information on the diffusion and use of ICT in the local public administrations. The other is the<br />

survey carried out in 2006 by the National Centre for the Information Technology in the Public<br />

Administration (Cnipa) on the official websites of 1,825 Italian municipalities. It includes information on<br />

some 266 on-line services provided by the municipalities. The intersection of the two datasets yields<br />

cross-sectional information referring to 1,176 municipalities in 2005, providing the final sample size used<br />

in the econometric exercise. Data on several regional level variables have then been drawn from different<br />

surveys. One is the 2005 survey on the usage of ICT in Italian firms with 10 employees or more. Data on<br />

employees in ICT sectors come from the 8 th General Industry and Services Census carried out in 2001.<br />

Data on inhabitants at the municipality level are taken from the Istat project “Demography in Figures”.<br />

The MIUR (Italian Ministry of University and Research) survey on the tertiary education provides data on<br />

the number of graduates in ICT disciplines as a measure of human capital endowments in fields relating<br />

54


Davide Arduini et al.<br />

to eGovernment. For all the variables where information is available at regional level, the same value is<br />

assigned to every municipality belonging to the same region. As a result, we have no intra-regional<br />

variance and only in inter-regional variation at this level of analysis. Finally, information on the diffusion of<br />

broadband infrastructure and services are taken from the Broadband Observatory. These are the only<br />

data to which we have access available at the provincial level. Table 1 provides a brief description of all<br />

the explanatory variables considered in the empirical application and their source. In Table 2 summary<br />

statistics are provided.<br />

Table 1: Variables description<br />

Variable Description Year Source of data<br />

Dependent variable<br />

Front-Office Index Municipality's E-gov level composite indicator 2005 EGOV (Cnipa )<br />

2004 ICT-PA (Istat )<br />

Municipality characteristics<br />

Municipality ICT Empl Number of municipality’s employees who have the ability to develop, operate and maintain ICT systems; core<br />

activities of their job are related with ICT<br />

2005 ICT-PA (Istat )<br />

Municipality ICT Training Binary variable taking on the value 1 if municipality has sponsored at least one of the following training<br />

programs: office automation, operation systems, web, data management, and <strong>European</strong> Computer Driving<br />

License<br />

2005 ICT-PA (Istat )<br />

Municipality InHouse ICT Share of ICT-related activities operated with internal staff. ICT-related activities taken into account are: project<br />

management, software development, hardware management, software management, systems management,<br />

network management, database management, ICT-related security, web/internet technologies development and<br />

management, web content management, data entry, PC users assistance, ICT training, and e-commerce systems<br />

55<br />

2005 ICT-PA (Istat )<br />

Municipality BroadBand Binary variable taking on the value 1 if municipality has broadband access to the Internet. We consider<br />

broadband as a transmission capacity that is faster than primary rate ISDN, at 2 Mb/s<br />

Municipality EDP-based Activities Share of internal activities operated through EDP-based systems 2005 ICT-PA (Istat )<br />

Municipality Interface Binary variable taking on the value 1 if municipality has single EDP-based interface to the user (identified in 2005 ICT-PA (Istat )<br />

Italy with the terminology "Sportello Unico delle Attività Produttive", SUAP)<br />

2005 ICT-PA (Istat )<br />

Municipality OpenSource Share of open-source system software used. Software considered is: operative system software for server and<br />

that for PC desktop, office automation, web server, e-mail client, Data Base Management System, and security<br />

software<br />

Municipality Intranet Share of laptop and desktop PC logged in Intranet out of the total number of laptop and desktop PC 2005 ICT-PA (Istat )<br />

Municipality Multichannel Binary variable taking on the value 1 if municipality uses at least a web-alternative channel to provide its 2005 ICT-PA (Istat )<br />

services. Web-alternative channels are: call center, mobile technology such as SMS and WAP/GPRS/UMTS,<br />

and digital television<br />

Municipality Size Municipality’s inhabitants 2004 RESIDENT POPULATION<br />

( Istat<br />

)


Table 1: Variables description (cont’d)<br />

Variable Description Year Source of data<br />

Regional and contextual characteristics<br />

RESIDENT POPULATION<br />

(Istat )<br />

Capital Share Reg Share of inhabitants living in the regional capital city out of the total regional population 2006<br />

Municipal E-gov Suppliers Reg Share of munucipality providing at least an E-gov service out of the total number of municipalities in the region 2005 ICT-FIRMS<br />

(Istat )<br />

2005 ICT-FIRMS<br />

(Istat )<br />

ICT User Share Reg Simple mean of shares of ICT user firms out of the total number of firms in the region. ICT is: using extranet,<br />

internal automated systems for purchases, internal automated systems for payments; using Internet for banking<br />

and financial services, staff training, and acquiring digital information and services; providing products<br />

catalogue on web site; purchasing products/services via Internet<br />

Davide Arduini et al.<br />

2005 ICT-FIRMS<br />

(Istat )<br />

E-gov User Share Reg Simple mean of shares of e-Gov user firms out of the total number of firms in the region. E-gov is using<br />

municipality web site to: obtain information; download formats; submit formats and complete the service<br />

process<br />

2001 CENSUS-FIRMS<br />

(Istat )<br />

ICT Producer Ntnl Share Reg Ratio of the number of employees in ICT sectors in that region to the national mean. To define the ICT sectors<br />

we follow the OECD classification. As for manufacturing, ICT sectors include: manufacture of office,<br />

accounting and computing machinery (sector 3000 based on ISIC Rev. 3.1), manufacture of insulated wire and<br />

cable (sector 3130), manufacture of electronic valves and tubes and other electronic components (sector 3210),<br />

manufacture of television and radio transmitters and apparatus for line telephony and line telegraphy (sector<br />

3220), manufacture of television and radio receivers, sound or video recording or reproducing apparatus, and<br />

associated goods (sector 3230), manufacture of instruments and appliances for measuring, checking, testing,<br />

navigating and other purposes, except industrial process control equipment (sector 3312), and manufacture of<br />

industrial process control equipment (sector 3313). As for services, ICT sectors are wholesale of computers,<br />

computer peripheral equipment and software (sector 5151), wholesale of electronic and telecommunications<br />

parts and equipment (sector 5152), telecommunications (sector 6420), renting of office machinery and<br />

equipment, including computers (sector 7123), and computer and related activities (sector 72)<br />

56<br />

2005 MIUR<br />

ICT Degrees Ntnl Share Reg Ratio of the number of graduates in ICT faculties in that region to the national mean. According to the OECD<br />

definition, ICT faculties include: engineering and engineering trades, manufacturing and processing,<br />

architecture and building, life sciences, physical sciences, mathematics and statistics, and computing<br />

BroadBand Share Share of population out of the total provincial population reached by at least a broadband access provider 2004 BROADBAND<br />

OBSERVATORY (Between )


Table 2: Descriptive statistics<br />

Variable<br />

Davide Arduini et al.<br />

Number of<br />

observations<br />

Mean<br />

Standard<br />

deviation<br />

Min Max<br />

Dependent variable<br />

Front-Office Index 1176 0,087 0,168 0 2,02<br />

Municipality characteristics<br />

Municipality ICT Empl 1176 2,79 11,13 0 208<br />

Municipality ICT Training 1176 0,23 0,42 0 1<br />

Municipality InHouse ICT 1176 0,46 0,35 0 1<br />

Municipality BroadBand 1176 0,36 0,48 0 1<br />

Municipality EDP-based Activities 1176 0,38 0,13 0,02 1<br />

Municipality Interface 1176 0,23 0,42 0 1<br />

Municipality OpenSource 1176 0,19 0,27 0 1<br />

Municipality Intranet 1176 0,44 0,46 0 1<br />

Municipality Multichannel 1176 0,13 0,33 0 1<br />

Municipality Size 1176 24,63 101,30 0,08 2.553,9<br />

Regional and contextual characteristics<br />

Capital Share Reg 21 16,00 11,12 4,73 48,46<br />

Municipal E-gov Suppliers Reg 21 0,12 0,08 0,02 0,35<br />

ICT User Share Reg 21 0,25 0,04 0,20 0,31<br />

E-gov User Share Reg 21 0,92 1,29 0,31 6,12<br />

ICT Producer Ntnl Share Reg 21 0,82 0,31 0,44 1,76<br />

ICT Degrees Ntnl Share Reg 21 0,97 0,32 0,18 1,80<br />

BroadBand Share 103 0,79 0,13 0,41 0,99<br />

3.2 The dependent variable: The Front Office Index (FOI)<br />

The dependent variable in our econometric exercise is a composite indicator measuring the availability<br />

and the level of interactiveness of on-line services for each administration. Information on these two<br />

dimensions come from the Cnipa dataset. Examining the official websites of 1825 municipalities, Cnipa<br />

singles out 266 different on-line services. The same service can be recorded for more than one<br />

municipality. This results in an initial dataset of 21,337 observations. For each of them, using a taxonomy<br />

introduced by Capgemini (2006), by means of four dichotomic variables Di, the dataset indicates whether<br />

or not there are specific characteristics (see footnote 8) that each reflect a different degree of<br />

interactiveness in on-line services:<br />

The possibility of downloading administrative forms necessary to receive the service (indicated as<br />

D1);<br />

The possibility of exchanging interactive information about the service, such as asking specific<br />

questions and obtaining answers (D2);<br />

The presence of an authentication procedure through which the user can be identified and given a<br />

personal account as a means to enhance security (D3);<br />

Finally, the possibility of carrying out the whole transaction process on-line (D4). This represents the<br />

most comprehensive level that can be provided for an on-line service.<br />

Note that each service may show none, some, or all of these features.<br />

For analytical purposes, we followed a two-step procedure. First, we employ Multiple Correspondence<br />

Analysis (MCA) to associate four binary variables to the 21,337 on-line services observed, so as to<br />

compute a weight for each of the four features. At the end of the first step, we have a score for each of<br />

the 21,337 entries in the dataset reflecting the “intensity” of the on-line service in terms of quantity (given<br />

by the 0/1 Di variables) and level (given by the weight associated to each Di variable) of actions it<br />

performs. For a given on-line service, the score is higher the higher the number of characteristics that<br />

service exhibits as well as the higher the degree of interactiveness of these characteristics. Second, we<br />

57


Davide Arduini et al.<br />

compute a final score for each municipality (the base unit of our analysis) by adding the scores received<br />

by all the services provided through its official website. This is our Front Office Index (FOI). It is a positive<br />

function of both the number of on-line services offered by the administration (the higher the number of online<br />

services supplied by the municipality, the greater the number of non-null scores computed and hence<br />

the higher the FOI associated to the same municipality) and of the “quality” of each of these services (the<br />

higher the score of each on-line service provided by the municipality, the higher its final FOI).<br />

3.3 Independent variables and controls<br />

In light of the selective review of the literature carried out in Section 2, we singled out a set of variables<br />

associated with the development of eGovernment services. These variables can be divided into two<br />

broad categories: characteristics of municipalities and contextual (mainly regional) features (see Table 2<br />

for details on variable specification and sources they are drawn from).<br />

Municipality level variables aim primarily at capturing a large variety of technical and organisational<br />

competencies of local administrative bodies. As discussed in sections 2 and 3, internal capabilities are<br />

considered key drivers of innovation - especially in the evolutionary and resource based views of the firm,<br />

which have also been looked at in studies on innovation in service sectors. We distinguish three different<br />

sets of internal competencies:<br />

Competencies embodied in personnel employed in the municipalities<br />

This is Municipality ICT Empl variable, expressed by the number of employees whose core activities are<br />

related to ICT, i.e. software design, computer based operations and maintenance. This variable reflects<br />

the actual stock of human capital qualified for the development and provision of digitalised services.<br />

Municipality ICT Training is a dummy to identify whether in 2005 municipality i has undertaken<br />

specialised training programs in any of 5 technical fields that are relevant for eGovernment activities.<br />

Through this indicator we mean to capture the conscious effort made by the institution to improve the<br />

quality of competencies in these areas. Municipality inHouse ICT is expressed as the percentage of ICT<br />

related activities carried out in the public organisation by means of internal staff. This variable indicates<br />

how capable the organisation is to take care of ICT activities with its own resources, without resorting to<br />

specialised external competencies.<br />

Competencies embodied in ICT based devices and instrumentation<br />

Indicators we used are: Municipality intranet, which measures the percentage of the computers<br />

connected to a Local Area Network (LAN); Municipality Broadband, a dummy variable identifying whether<br />

or not the municipality’s offices have broadband access to the internet; and Municipality OpenSource -<br />

that is, the share of open source systems out of the total number of software packages that are in use at<br />

the municipality’s offices. Since open source software is less established as a technical solution, and its<br />

development is by and large based on the interaction among communities of experienced users, we<br />

consider its rate of adoption as an indicator of both the innovativeness of systems in use and of the skills<br />

of technical personnel employed by the PA.<br />

Competencies embodied in the PAs’ organisation<br />

To capture this aspect of internal competencies we introduced several indicators of how pervasive ICT is<br />

in the overall organisational structure of the municipality. Measures of this type are: Municipality EDPbased<br />

activities, expressed as the share of total activities carried out at the municipality level operated<br />

using EDP-based systems; Municipality Interface, a dummy identifying whether or not the PA has set up<br />

an ICT based system that allows the user to deal with a single on-line administrative interface (the so<br />

called “Sportello Unico” in Italian technical jargon); and Municipality Multichannel, a dummy indicating<br />

whether or not the PA makes use of diversified channels to provide services, other than face-to-face<br />

contacts, that are not based on the web. These alternative channels include inter alia call centers, mobile<br />

messaging or interactive cable TV.<br />

As noted, there are important contextual factors which complement internal capabilities as key drivers for<br />

innovation in general and in public services in particular. Such “external factors” include:<br />

58


Demand size<br />

Davide Arduini et al.<br />

Factors at work on the demand side can be partly captured by our variable Municipality size, which is<br />

expressed in terms of the number of inhabitants resident in the territory of the local PA. While this<br />

indicator is defined at the municipality level, we suggest that it will help identify the extent of potential<br />

demand for eGovernment services. Consistently with the literature on demand-pull innovation, on<br />

demand externalities, and on user-producer interaction which we reviewed in Section 2, we assume<br />

Municipality size to be positively associated with eGovernment development.<br />

Demand quality<br />

To carry out a more detailed analysis of demand factors at a broader level (relative to the municipality<br />

level we have just considered), we first use variables that identify specific categories of users, such as<br />

ICT User Reg and E-gov User Reg. These are respectively expressed in terms of the percentage of total<br />

firms in the region that were reported in 2005 to have adopted ICT-based services in general or<br />

eGovernment services in particular. Unfortunately we do not have lagged data on use of digital services,<br />

which would enable us to test whether epidemic patterns of innovation diffusion, induced by previous<br />

adoption, can affect the development of eGovernment. Nevertheless, consistent with systemic<br />

approaches to innovation, we can expect that higher shares of companies that use digital services will be<br />

positively associated with more extensive and effective user-producer interaction, thus creating greater<br />

opportunities for PAs to offer new or improved ICT based services. As well, we attempt to capture how<br />

polarised demand is by identifying the percentage of inhabitants of the region that are concentrated in the<br />

capital city (Capital Share Reg). According to the literature on spatial diffusion of innovation, technology<br />

adoption tends to be more timely and intensive in locations where larger numbers of potential users are<br />

concentrated, especially in the initial stages of technical change (Glaeser 1999). As eGovernment is in its<br />

initial phase of diffusion, one might expect that the higher the share of population in capital cities and in<br />

metropolitan areas, the more these services will be concentrated there.<br />

Supply factors<br />

eGovernment activities of PAs are affected by the presence of other innovative actors in the same area.<br />

Among these actors are the other municipalities offering digitalised services. We capture this factor by<br />

means of our variable Municipal E-gov Suppliers Reg, expressed as the share of eGovernment service<br />

providers out of the total number of local administrative bodies in the Region. Consistently with systemic<br />

as well as spatial innovation approaches, we expect this variable to be positively related to the innovative<br />

activities of PAs. In fact, when a high number of innovators are located in a given area, knowledge<br />

spillovers will be facilitated and greater incentives are created that push less dynamic institutions to enter<br />

the innovation race.<br />

Interdependencies can also be observed between eGovernment service providers and local ICT<br />

producers. We proxy this factor with a separate variable we named ICT Producer Ntnl Share defined as<br />

the ratio between the percentage of employees in ICT manufacturing and service sectors out of the total<br />

number of employees in the Region, and the same percentage calculated at the national level. This factor<br />

is positively associated with the development of eGovernment services for two main reasons. First,<br />

municipalities located in regions with higher shares of ICT producers are in a better position to gain<br />

access to relevant technology, including both hardware and software. Second, where public and private<br />

markets overlap, as in the case of voice or image transmission over IP, a competitive presence of ICT<br />

service providers stimulates municipalities to expand the range of services offered through their city<br />

networks. Another supply-side, context specific factor we wish to account for is the state of<br />

communication infrastructure. For this purpose we introduce BroadBand Share, defined as the share of<br />

total population of the province in which a municipality is located reached by at least one broadband<br />

service provider. We consider wide availability of broadband connections an important condition for the<br />

provision of advanced eGovernment services because it demonstrates high quality infrastructure and<br />

might also reflect the existence of (actual and/or potential) competition in the provision of network<br />

solutions. Both the technological level and the degree of competition in the provision of network<br />

infrastructure are normally associated with higher rates of generation and diffusion of advanced<br />

communication services (Grubesic, Murray 2004). We further control for the availability of a pool of<br />

qualified human capital, a factor particularly emphasised in studies on the generation and diffusion of<br />

innovation in ICTs (Bresnahan et al. 2002). To capture the role of this factor, we calculate the ratio<br />

between the percentage of graduates in ICT disciplines out of total graduates in the Region and the same<br />

59


Davide Arduini et al.<br />

percentage at the national level (ICT Degrees Ntnl Share Reg). Indeed, this indicator will at the same<br />

time reflect the qualitative level of actual and potential workers in ICT manufacturing and service sectors<br />

and the competencies of potential users. In both cases the impact on eGovernment service provision<br />

should be positive. Finally, we also introduce controls for macro-regions (see Table 2 for aggregation<br />

criteria). This enables us to account for a number of other observable and unobservable sources of<br />

heterogeneity which might affect the provision of eGovernment services, including income levels,<br />

degrees of industrialisation, and sectoral composition of the areas where municipalities are located.<br />

3.4 The econometric model<br />

The choice of the econometric model strongly depends on the distribution of the dependent variable,<br />

namely the FOI index. Almost 30% of the observed municipalities do not provide on-line services, i.e. the<br />

composite indicator is nil for these units. Thus, our dependent variable is continuous over strictly positive<br />

values but takes value zero for a nontrivial fraction of the sample. Given the nature of our dependent<br />

variable we argue that a standard censored model would not be appropriate. In fact, municipalities can be<br />

thought of as solving an optimization problem, wherein the optimal choice might well be the corner<br />

solution, y=0. The case of limited dependent variables often arises in econometric analysis, especially<br />

when the behaviour of economic agents is being modelled. The traditional approach in dealing with such<br />

a problem is the Tobit model. However, this approach requires that the censoring mechanism derives<br />

from the same model that generates the outcome variable while in our case the censoring mechanism<br />

and outcomes may be more flexibly modelled using separate processes (Wooldridge, 2001). A two-part<br />

model allowing the zeros and non-zeros to be generated by different densities enables us to specify a<br />

model for the censoring mechanism and a model for the outcome, conditional on the dependent variable<br />

taking positive values. This allows the separation of the estimation of a standard Probit model (using all<br />

observations available) from that of an OLS model (using only observations with FOI > 0). We use a<br />

Probit in the first part of our model to analyze the municipality’s decision to offer on-line services via its<br />

official website. This allows us to explain innovation differences “between municipalities”, i.e. which PAs<br />

have a propensity to offer eGovernment services. The second part is a linear regression model to<br />

investigate the determinants of the intensity of eGovernment development in terms of both quality and<br />

quantity of on-line services. Using the terminology introduced earlier, this would allow us to explain<br />

innovation differences “within municipalities”.<br />

4. Results<br />

Table 3 illustrates the results of the econometric exercise we carried out using the data and<br />

methodologies discussed in Section 4. The whole set of independent variables illustrated in Section 4.3<br />

and listed in Table 2, was used in both stages of the two part model. The last two columns of Table 3<br />

report the results obtained from the final specification, following the entire selection procedure and<br />

controls for heteroskedasticity.<br />

Results from the final specification are by and large consistent with the view we have developed in this<br />

paper. As we suggested earlier drawing from different streams of literature, the specific kind of innovation<br />

analysed here - namely municipalities’ provision of digitalized services - is the result of a combination of<br />

internal competencies and of context specific factors. The econometric test suggests that different<br />

combinations of such variables are at stake when assessing PA decisions on whether or not to supply<br />

digitalized services and when considering the intensity of eGovernment activities (number and quality of<br />

services provided). In other words, factors associated with variations in innovative activities “between<br />

municipalities” are different from factors associated with differences in innovation “within municipalities”.<br />

Outcomes from the Probit specification in column 5 can be interpreted as “between effects”, while those<br />

obtained from the OLS part of the model and reported in column 6 illustrate “within effects”.<br />

More specifically, our econometric exercise yields the following sets of results.<br />

First, the environment in which municipalities are active, seems to influence the start up of digitalised<br />

services more than their intensity.<br />

Second, among the context specific factors we analysed, demand size and quality stimulate innovative<br />

entry into eGovernment service provision. Demand size at the local level is captured by the number<br />

inhabitants resident in the municipality area (Municipality Size). It has a positive and significant impact on<br />

differences in innovation between municipalities, reflecting demand pull considerations as well as other<br />

bandwagon effects induced by demand externalities and user-producer interactions.<br />

60


Table 3: Estimation results: Probit and OLS<br />

Variable<br />

Municipality characteristics<br />

Davide Arduini et al.<br />

Probit OLS Probit OLS Probit OLS<br />

1 2 3 4 5 6<br />

Municipality ICT Empl 0.062 0.010** 0.010** 0.011**<br />

0,062 0,004 0,004 0,005<br />

Municipality ICT Training -0,077 0.192** 0.196** 0.177**<br />

0,133 0,094 0,094 0,090<br />

Municipality InHouse ICT 0.381** 1.053*** 0.447** 1.058*** 0.560** 1.063***<br />

0,192 0,140 0,178 0,137 0,219 0,136<br />

Municipality BroadBand -0,047 0.255*** 0.220*** 0.251***<br />

0,109 0,084 0,082 0,330<br />

Mun. EDP-based Activities 1.232*** 0.710** 1.220*** 0.641** 1.292*** 0.720**<br />

0,419 0,333 0,413 0,331 0,456 0,331<br />

Municipality Interface 0,056 0.300*** 0.295*** 0.281***<br />

0,131 0,091 0,090 0,084<br />

Municipality OpenSource 0,034 0.303** 0.341** 0.265*<br />

0,239 0,151 0,149 0,152<br />

Municipality Intranet 0.276** 0.175* 0.261** 0.195** 0.556** 0,124<br />

0,123 0,095 0,119 0,092 0,220 0,094<br />

Municipality Multichannel 0,258 0.312*** 0.288** 0.288***<br />

0,200 0,112 0,111 0,106<br />

Municipality Size 0.065*** 0.001** 0.070*** 0.001** 0.094*** 0.001**<br />

0,009 0,000 0,008 0,000 0,015 0,000<br />

Regional and contextual characteristics<br />

Full Models Selected Models<br />

Capital Share Reg -0.019*** -0,001 -0.020*** -0.021***<br />

0,005 0,005 0,005 0,006<br />

Municipal E-gov Suppliers Reg 2.642*** 0,176 2.717*** 3.216***<br />

0,655 0,466 0,629 0,690<br />

ICT User Share Reg 1,696 1,729 2.590* 2.944*<br />

1,729 1,437 1,475 1,758<br />

E-gov User Share Reg 0,058 0,081 0.104** 0.124**<br />

0,077 0,072 0,051 0,052<br />

ICT Producer Ntnl Share Reg 0.392* -0,169 0.483** 0.484*<br />

0,23 0,197 0,210 0,251<br />

ICT Degrees Ntnl Share Reg 0,254 -0,234<br />

0,274 0,268<br />

BroadBand Share 0,163 1.021*** 0.772** 0.897**<br />

0,46 0,387 0,338 0,376<br />

Constant -2.037*** -5.219*** -1.987*** -4.872*** -2.293*** -5.094***<br />

0,480 0,446 0,412 0,303 0,486 0,334<br />

Macro-Regional Controls NO NO NO NO YES YES<br />

Num. Obs. 1176 815 1176 815 1176 815<br />

Pseudo R 2 / R 2 0,322 0,343 0,318 0,338 0,352<br />

LR-test (Wald) / F-test 466,29 24,44 461,62 37,24 (134.88) 33,99<br />

Standard errors in italics.<br />

* Significant at 10% level. ** Significant at 5% level. *** Significant at 1% level.<br />

Heteroskedastic<br />

Robust Estimates<br />

Demand conditions appear to play an even more important role at the regional level. Companies which<br />

have already adopted ICT services appear to have the highest impact on the decision of municipalities to<br />

get involved in eGovernment activities (see coefficient of ICT User Share Reg in column 5 of Table 3),<br />

suggesting that capable business users are of paramount importance for PAs. Even after controlling for<br />

ICT user firms, the impact of E-gov User Share Reg, i.e. the percentage of firms using eGovernment<br />

services, still remains positive and significant in our Probit regression. Although we do not have a data<br />

61


Davide Arduini et al.<br />

panel to evaluate how previous patterns of adoption affect diffusion, this result is largely consistent with<br />

the idea that innovation is favoured by pioneer users.<br />

Third, demand polarisation hampers innovation in public services. This is shown by the negative<br />

coefficient of Capital Share Reg in column 5 of Table 3, indicating that a high weight of the region’s<br />

capital will inhibit innovation elsewhere, especially in the early stages of development of new services.<br />

Fourth, emulation effects, knowledge exchanges, and competitive pressures can be observed on the<br />

supply side. The most important factor positively associated with the decision to supply digitalised<br />

services appears to be the number of eGovernment providers in the region (see coefficient of Municipal<br />

e-gov supplier Reg in column 5 of Table 3). Emulation factors matter here, especially in the presence of<br />

increasing competition in the political arena at the local level.<br />

Fifth, advanced communication infrastructures do not influence the start up of eGovernment but do affect<br />

eGovernment intensity. The only context specific factor that seems to impact significantly on innovation<br />

within, rather than on innovation between, municipalities is the diffusion of broadband in the area in which<br />

they are located (see coefficient of BroadBand Share in column 6 of Table 3). The presence of<br />

broadband infrastructures does not seem to affect significantly the decision to start up the digitalization of<br />

public services. At this stage the objective of municipalities is the presence on the web of relatively simple<br />

applications and services such as information services (e.g. basic tourist information and guidance to the<br />

citizen on administrative procedures) and communication services (e.g. self-managed webspaces to be<br />

used by associations and organizations, links to other public administration sites, discussion fora). On the<br />

other hand, broadband connections become essential when the eGovernment service supply is richer (in<br />

terms of the number of services provided) and more articulated (in terms of interactivity levels and<br />

technologically complex).<br />

Sixth, the decision to enter eGovernment activities is associated with a narrower range of generally less<br />

complex internal capabilities than those needed to increase the intensity of digitalised services.<br />

Differences in innovation between municipalities are not affected by the number of workers with<br />

experience in ICT nor by the efforts made to train existing workers. Increasing the range and quality of<br />

services is associated instead with a much wider set of more complex competencies (see OLS<br />

specification in the last column of Table 3).<br />

Finally, a few more words on the role played by location specific factors not captured by the variables we<br />

have introduced at the regional level. It is worth observing that the introduction of macro-regional<br />

dummies does determine non-trivial variations in the estimates of coefficients. This could per se be<br />

interpreted as a signal of the importance of regional factors which would deserve more careful<br />

observation and discussion. Estimations after macro-regional controls reveal even more striking<br />

differences when considering Municipality intranet - an important indicator of PAs’ internal competencies<br />

(whose coefficient more than doubles in size). This evidence is consistent with the broadly discussed<br />

Italian North-South divide, reflected inter alia in lower per capita income, less advanced industrial<br />

structure, and lower educational levels - i.e. unobserved factors which can be expected to translate into<br />

poorer local budgets devoted to ICT.<br />

5. Conclusions<br />

Using evidence on 1,176 municipalities in Italy, and combining several datasets on the characteristics of<br />

local PAs and of the territory in which they are located, we evaluate different factors associated with the<br />

development of eGovernment services.<br />

In more general terms, the combination of internal competencies and context specific factors is different<br />

when explaining the decision to start eGovernment activities vs. the intensity of such activities. Regional<br />

factors concerning both the demand and the supply of services appear to affect only the decision to enter<br />

eGovernment activities. Competencies needed to expand and improve the quality of services are much<br />

more numerous and complex than the ones associated with the mere decision to start eGovernment<br />

activities.<br />

The examined evidence is consistent with a view of eGovernment development as a process of gradual,<br />

step by step involvement, wherein municipalities initially engage in exploratory activities, favoured by an<br />

external context conducive to innovation and by very limited internal competencies. Once more efforts<br />

are made to expand and improve services supplied, more qualified competencies and more advanced<br />

62


Davide Arduini et al.<br />

environmental conditions need to be created. There is no guarantee that such circumstances occur, so<br />

that further development of currently embryonic eGovernment is at risk. This calls for increasing<br />

investments in training, human capital formation and in hardware and software devices at the individual<br />

municipality level. It also requires greater efforts to improve the technological environment in which PAs<br />

are active, including investments to improve the quality and accessibility of digital communications<br />

networks.<br />

References<br />

Andersen, B., Howells J., Hull R., Miles I., Roberts J.(eds), 2000. Knowledge and Innovation in the New Service<br />

Economy. Cheltenham, Edward Elgar.<br />

Antonelli, C., 1990. Induced adoption and externalities in the regional diffusion of information technology. Regional<br />

Studies 24, pp.31-40.<br />

Antonelli, C., 2000. Collective knowledge communication and innovation: the evidence of technological districts.<br />

Regional studies 34, pp. 535-547.<br />

Antonelli, C., 2006. Diffusion as a process of creative adoption. Journal of Technology Transfer 31, pp. 211-226.<br />

Asheim, B., Gertler M., 2005. The geography of innovation: regional innovation systems. In: Fagerberg J., Mowery<br />

D.C., Nelson R.R. (Eds.), The Oxford Handbook of Innovation. Oxford University Press, Oxford and New York.<br />

Baptista, R., 1999. The diffusion of process innovations: a selective review. International Journal of the Economics of<br />

Business, Taylor and Francis Journals 6(1), pp. 107-129, February.<br />

Baptista, R., 2000. Do innovations diffuse faster within geographical clusters?. International Journal of Industrial<br />

Organization 18, pp. 515-535.<br />

Baptista, R., 2001. Geographical clusters and innovation diffusion. Technological Forecasting and Social Change 66,<br />

pp. 31-46.<br />

Barras, R., 1986. Towards a theory of innovation in services. Research Policy 15, pp. 161-173.<br />

Bresnahan, T.F., Brynjolfsson E., Hitt L.M., 2002. Information technology, workplace organization, and the demand<br />

for skilled labour: firm-level evidence. Quarterly Journal of Economics 117, pp. 339-376.<br />

Brouwer, E., Kleinknecht, A., 1999. Innovative output, and a firm's propensity to patent.: An exploration of CIS micro<br />

data, Research Policy 28(6), pp. 615-624, August.<br />

Cainelli, G., Evangelista R., Savona M., 2006. Innovation and economic performance in services: a firm-level<br />

analysis. Cambridge Journal of Economics 30 (3), pp. 435-458.<br />

Caldas, A., David P., Ormanidhi O., 2005. Digital Information Network Technologies, Organisational Performance<br />

and Productivity. An Exploratory Study of the Public Sector in Europe. The Oxford Internet Institute, Oxford.<br />

Capgemini, 2006. On line Availability of Public Services: How Is Europe Progressing? Web based survey on<br />

electronic public services. Report of the <strong>6th</strong> measurement, Bruxelles.<br />

Capgemini, 2007. The User Challenge. Benchmarking The Supply Of Online Public Services. Report of the 7 th<br />

measurement, Bruxelles.<br />

CNIPA-CRC, 2006. Quarto Rapporto sull’Innovazione nelle regioni d’Italia. Collana Ricerche e Studi, Progetto CNIPA<br />

– CRC, Roma.<br />

Cohen, M., Burkhart R., Dosi G., Egidi M., Marengo L., Warglien M., Winter S., 1996. Routines and other recurring<br />

action patterns of organisations. Industrial and Corporate Change 5(3), pp.653-698.<br />

Comitato Interministeriale per la Banda Larga, 2007. Linee guida per i piani territoriali per la banda larga. Roma.<br />

Consoli, D., 2007. Services and systemic innovation: a cross-sectoral analysis. Journal of Institutional Economics 3,<br />

pp. 71-89.<br />

Danish Technological Institute and Institut für Informations management GmbH, 2004. Reorganisation of government<br />

back-offices for better electronic public services - <strong>European</strong> good practices. University of Bremen, Bremen.<br />

Davidson, R., MacKinnon J.G., 1984. Convenient specification tests for Logit and Probit models. Journal of<br />

Econometrics 25, pp. 241-262.<br />

Edquist, C., 2005. Systems of innovation. Perspectives and challenges: In: Fagerberg J., Mowery D.C., Nelson R.<br />

(Eds.), The Oxford Handbook of Innovation. Oxford University Press, Oxford and New York.<br />

Edquist, C., Hommen L., Tsipouri L., 2000. Public Technology Procurement and Innovation. Dordrecht, Kluwer<br />

<strong>Academic</strong> Publishers.<br />

<strong>European</strong> Commission, 2005. i2010 – A <strong>European</strong> Information Society for growth and employment. COM(2005)229,<br />

Bruxelles.<br />

Gallouj F., Weinstein O., 1997. Innovation in services. Research Policy 26, pp.537-556.<br />

Glaeser, E.L., 1999. Learning in cities. Journal of Urban Economics 46, pp. 254-277.<br />

Grubesic, T.H., Murray A.T., 2004. Waiting for broadband: local competition and the spatial distribution of advanced<br />

telecommunication services in the United States. A Journal of Urban and Regional Policy 35 (2), pp. 139-165.<br />

Lundvall, B.A., 1992. National Systems of Innovation: Towards a Theory of Innovation and Interactive Learning.<br />

Pinter Publishers, London.<br />

Metcalfe, S. and Miles I. (Eds.), 2000. Innovation System in the Service Economy. Measurement and Case Study<br />

Analysis. Boston, Kluwer.<br />

Miles, I., 1993. Services in the new industrial economy. Futures 25(6), pp. 653-672.<br />

Miles, I., 2005. Innovation in services. In: Fagerberg J., Mowery D.C., Nelson R. (Eds.), The Oxford Handbook of<br />

Innovation. Oxford University Press, Oxford and New York.<br />

Ministero per le Riforme e le Innovazioni nella Pubblica Amministrazione, 2007. Verso il Sistema nazionale di<br />

eGovernment – Linee strategiche. Roma.<br />

63


Davide Arduini et al.<br />

Ministero per lo Sviluppo Economico, 2007. Quadro Strategico Nazionale per la politica regionale di sviluppo 2007-<br />

2013. Roma.<br />

Mowery, D.C., Rosenberg N., 1979. The influence of market demand upon innovation: a critical review of some<br />

recent empirical studies. Research Policy 8, pp.102-153.<br />

Nardo, M., Saisana M., Saltelli A., Tarantola S., Hoffman A., Giovannini E., 2005. Handbook on Constructing<br />

Composite Indicators: Methodology and User Guide. OECD Statistics, Working Papers 3, Paris.<br />

Nelson, R.R., 1995. Recent evolutionary theorising about economic change. Journal of Economic Literature XXXIII,<br />

pp.48-90.<br />

OECD, 2003. The eGovernment imperative: main findings. OECD Press, Paris.<br />

Picci, L., 2006. The quantitative evaluation of the economic impact of eGovernment: a structural modelling approach.<br />

Information Economics and Policy 18, pp.107-123.<br />

Saxenian, A., 1994. Regional Advantage: Culture and Competition in Silicon Valley and Route 128. Harvard<br />

University Press, Cambridge, MA.<br />

Scherer, F.M., 1982. Demand-pull and technological innovation: Schmookler revisited. Journal of industrial<br />

economics 30, pp.225-237.<br />

Schmookler, J., 1962. Economic sources of inventive activity. Journal of Economic History, March, pp.1-20.<br />

Schmookler, J., 1966. Invention and Economic Growth. Harvard University Press, Cambridge, MA.<br />

Tether, B.S., 2005. Do services innovate (differently)?: Insights from the <strong>European</strong> innobarometer survey. Industry<br />

and Innovation 12(2), pp. 153-184.<br />

Torres, L., Pina V., Acerete B., 2005. EGovernment developments on delivering public services among EU cities.<br />

Government Information Quarterly 22, pp. 217–238.<br />

Tung, L.L., Rieck O., 2005. Adoption of electronic government services among business organizations in Singapore.<br />

Journal of Strategic Information Systems 14, pp. 417–440.<br />

United Nations/American Society for Public Administration (UN/ASPA), 2002. Benchmarking eGovernment: a global<br />

perspective. UN/ASPA, New York.<br />

Wooldridge, J.M., 2001. Econometric Analysis of Cross Section and Panel Data. The MIT Press, Cambridge,<br />

Massachusetts.<br />

Yatchew, A., Griliches Z., 1985. Specification error in Probit models. The Review of Economics and Statistics 67(1),<br />

pp. 134-139, February, MIT Press.<br />

Zanfei, A., 1998. Domanda pubblica e innovazione nelle telecomunicazioni in una fase di trasformazione tecnologica<br />

e istituzionale. Quaderni di ricerca IEFE-Università Bocconi, Milano.<br />

64


Pan-<strong>European</strong> eGovernment and eHealth Services in<br />

Slovenia<br />

Jaro Berce, Vasja Vehovar, Ana Slavec and Mirko Vintar<br />

University of Ljubljana, Slovenia<br />

Jaro.Berce@fdv.uni-lj.si<br />

Vasja.Vehovar@fdv.uni-lj.si<br />

Ana.Slavec@fdv.uni-lj.si<br />

Mirko.Vintar@fu.uni-lj.si<br />

Abstract: In 2009 we conducted a study on pan-<strong>European</strong> electronic government services that concentrated on<br />

eGovernment and eHealth. First, qualitative interviews were performed to determine key areas of priority and<br />

essential problems in this area; for a small country such as Slovenia, not all topics may be equally relevant. In<br />

addition, a telephone survey was conducted in individuals between the ages of 18 and 75 years. Not surprisingly, the<br />

respondents showed the most interest in pan-<strong>European</strong> eHealth services, remote access to health data, and in<br />

certification of education - the process of obtaining degrees (in that order). The least interest was shown in the<br />

establishment of online enterprises, and for the recognition of Slovenian public administration certificates in<br />

<strong>European</strong> Union member states (and vice versa). However, the interest for e-services in the realm of public<br />

administration is quite high. This interest in public administration services is connected to age (younger respondents<br />

show less interest) and employment status (students and the retired show less interest than do the employed and<br />

unemployed). The interest for public administration e-services is therefore linked to specific life situations.<br />

Accordingly, it is not surprising that interest is higher among those who most frequently travel to other EU countries.<br />

As for the use of public administration services in other EU countries, it is not very frequent – less than a tenth of<br />

respondents used it, more than half of them online. The countries where respondents most frequently use these<br />

services are Germany, Italy, and Austria. Considering the frequency of use, the order is reversed: Austria is in first<br />

place, then Italy and Germany, which shows that Austria has achieved the highest level of development of public<br />

administration e-services. In comparison to similar research undertaken by Capgemini worldwide, our survey showed<br />

a higher level of interest for electronic managing health insurance, recognition of education or other qualifications,<br />

and recognition of marriage and birth certificates. Among the respondents who lived abroad a month or longer, the<br />

interest for e-public administration domains in general is higher than for the respondents in the Capgemini survey. An<br />

exception is in the tax field, in which our respondents are less interested than the Capgemini respondents.<br />

Keywords: pan-<strong>European</strong> services, eGovernment, eHealth.<br />

1. Introduction<br />

With the increasing mobility of <strong>European</strong> citizens it is increasingly important that access to essential<br />

services does not depend on “local knowledge”. Presently, most eGovernment services are provided at<br />

the national or sub-national (regional or local) level. There are several ways to add a cross-border<br />

dimension; these ways range from the relatively simple (such as making a service available in another<br />

language than that of the <strong>European</strong> Union [EU] member state in which the service is being accessed), to<br />

more complex ways (such as information sharing between public administrations of different EU member<br />

states), or even through provision of a service at a “pan-<strong>European</strong>” level in which parts of the public<br />

administrations of all EU member states participate as a “back office” to this service. The term “pan-<br />

<strong>European</strong> eGovernment services” (PEGS) may seem to imply that only the latter example (service<br />

provision at the <strong>European</strong> level) would qualify for the name. However, it would be not useful to<br />

understand PEGS in such a limited way. PEGS are important because they add a <strong>European</strong> dimension to<br />

eGovernment services, and it is this <strong>European</strong> dimension and the progress towards it that matters. PEGS<br />

come in different forms, are developed by different actors, and in different areas, and have different<br />

development trajectories (Weehuizen and van Oranje, 2007).<br />

In the report Innovative and Adaptive PEGS for Citizens in 2010 and Beyond (Glott and Haaland, 2007),<br />

which was a part of the EUReGOV project of the same name that was prepared for the Directorate<br />

general - DG Information Society & Media of the <strong>European</strong> Commission, PEGS were defined as having<br />

the following characteristics:<br />

Pprovided by or on behalf of <strong>European</strong> public sector entities,<br />

At local, regional, national, or supra-national level,<br />

By means of interoperable trans-<strong>European</strong> telematic networks (e.g. the Internet),<br />

In order to perform public administration tasks, including provision and exchange of information and<br />

provision of participation opportunities for citizens,<br />

65


Jaro Berce et al.<br />

That meet a demand of other public entities and particularly demand of other citizens at any<br />

geographic level,<br />

For “material” services as well as for the generation of civic attitudes that address pan-<strong>European</strong><br />

tasks or improve citizens' identification with the EU,<br />

With the potential to be extended towards a majority of EU member states (instead of, for instance,<br />

only in countries with the same language, like UK and Ireland or Germany and Austria),<br />

By either being designed to expand or by containing elements (of, for instance, service integration,<br />

interoperability, or e-Inclusion) that could feed in the design of future eGovernment services on pan-<br />

<strong>European</strong> level.<br />

By IDABC (Interoperable Delivery of <strong>European</strong> eGovernment Services to public Administrations,<br />

Businesses and Citizens; http://ec.europa.eu/idabc/) definition, the horizontal pan-<strong>European</strong><br />

eGovernment services are “measures undertaken to initiate, enable and manage the provision of<br />

horizontal pan-<strong>European</strong> eGovernment services, including organizational and coordination aspects” (De<br />

Vriendt, 2005).<br />

In the study some relevant EU documents and studies were used to frame the research focus, such as:<br />

eGovernment for all (eGovernment Action plan 2011-2015) commits the EU member states to rely on<br />

information and communications technology (ICT) solutions to develop and promote improved ways<br />

for business and citizen participation in public policy consultations, debates, and policy-making<br />

processes. The Action Plan focusses on five main priorities. Foremost among these is the aim of<br />

making eGovernment inclusive, so that “no citizen is left behind”. The Action Plan aims to make highimpact<br />

services for citizens and businesses more widely available, including electronic procurement<br />

services for businesses, services for mobile citizens (including improved ability to search for jobs<br />

across the <strong>European</strong> Union), or social security services (for example, pension records and electronic<br />

benefit applications).<br />

A Digital Agenda for Europe (Digital Agenda for Europe 2010-2020) for maximising the social and<br />

economic potential of ICT, most notably the Internet, a vital medium of economic and societal activity:<br />

for doing business, working, playing, communicating, and expressing ourselves freely. <strong>European</strong><br />

governments are committed to making user-centric, personalised, multiplatform eGovernment<br />

services.<br />

The Vision Study (SMART 2006/0064) stimulated the debate on the key transformations and<br />

challenges ahead for the renewal of the <strong>European</strong> eGovernment agenda beyond 2010.<br />

The Guidelines on Sustainable Business Models for Inclusive Public Service Delivery (SMART<br />

2007/0052) study analyses the state of the art of the multichannel delivery of public services<br />

throughout Europe, and the progress made towards achieving the goal to ensure that “no citizen is<br />

left behind”. It provides useful recommendations and identifies further actions that will be needed<br />

over the next few years.<br />

The Progress Study (SMART 2008/0042) is a qualitative progress evaluation of the i2010<br />

eGovernment Action Plan, 2006-2010. The objectives of the study were to qualitatively analyse the<br />

progress towards achieving the goals of the Action Plan, and to evaluate its stimulus effect across the<br />

member states.<br />

Study on eGovernment scenarios for 2020 and the preparation of the 2015 Action Plan (SMART<br />

2009/0069) provided concrete input to the eGovernment 2015 Action Plan in terms of assessing<br />

objectives and validated priorities, delivering innovative ideas, and proposing a range of policy<br />

actions in support of these priorities.<br />

To better understand the PEGS in Slovenia, a small country where not all of the topics mentioned above<br />

may be equally relevant, two data gathering tools were used. First, qualitative interviews were performed<br />

to frame key priority areas and address essential problems. Second a telephone survey was conducted<br />

among active Internet users. Active Internet user was defined as “anyone who used the Internet in the<br />

last three months”.<br />

2. Analysis of expert interviews<br />

As detailed previously (Vintar et al, 2010), we performed a series of qualitative expert interviews with key<br />

local, regional, national, and <strong>European</strong> PEGS experts in order to effectively analyse the state of affairs,<br />

strategies, and priorities in the domain of PEGS, and to identify key services that should be implemented<br />

66


Jaro Berce et al.<br />

in future. In total, 14 interviews were performed: 10 with experts in e-administration, 3 in eHealth and 1 in<br />

the e-business domain. The main objective was to determine the key PEGS to be implemented in the<br />

future to ensure interoperability and mobility of Slovenia in the wider <strong>European</strong> market.<br />

Experts believe PEGS to be very important in general, but with regard to specific services their views<br />

differ, especially with respect to the order in which PEGS should be introduced. A quite wide range of<br />

domains was studied and examined with an eye toward what would be needed to enact workable pan-<br />

<strong>European</strong> PEGS: interviews/canvassings of companies employing foreign workers in Slovenia,<br />

population databases and their linkage, horizontal linkage, interoperability of services, and from the socalled<br />

“E-procurement” domain (public commissions, pan-<strong>European</strong> health cards, and so forth). The<br />

experts’ opinions focussed on the different elements that would be required to enact services in the pan-<br />

<strong>European</strong> space as well as on services themselves. To provide examples, administration of taxes<br />

demand an obligatory and unified pan-<strong>European</strong> taxation number; the linking of population registers<br />

would be needed for car registration abroad, and for extending the validity of drivers’ licences to include a<br />

greater number of member states. In the research process, some good practices from the EU were<br />

uncovered, for example Smart Cities (for connecting different <strong>European</strong> cities and enterprises within<br />

them). One expert pointed out that connecting on the mezzo level is a more reasonable start than aiming<br />

to connect whole countries. The enterprise viewpoint was exposed frequently, for example with the idea<br />

of pay circulation and the concept of SEPA (Single Euro Payment Area). However, connecting on the<br />

regional level is currently left to local initiatives.<br />

The key actors in the implementation of PEGS are the <strong>European</strong> Commission, in the role of connector,<br />

the Ministry of Public Administration, and the informatics professional in the role of the carrier of changes.<br />

Moreover, the <strong>European</strong> Commission thinks that politicians should be instructed on the importance of<br />

changes related to PEGS, but not until the different schools of thought in the field unify with respect to<br />

what initiatives should be undertaken. According to one of the interviewed experts, informatics could be<br />

withdrawn from the Ministry of Public Administration and made independent again (as it was before); this<br />

might allow for this department to be an independent actor that could step forth from the conflicting<br />

interests of others in the subfields that are collaborating to implement PEGS.<br />

An important pan-<strong>European</strong> service that still lives in practice is, according to one expert, the <strong>European</strong><br />

driving licence. Another expert exposed the historical background of differences in <strong>European</strong> population<br />

registers; specifically, member states in Eastern Europe (which once had different political systems) are<br />

more inclined toward centralisation of that sort of activity, and therefore have better-regulated civil<br />

population databases than do member states in Western Europe. The differences are based on different<br />

philosophies. In Slovenia, registers were introduced with the reforms of Habsburg Maria Theresa<br />

Walburga (1717 – 1780), while the collection of civilian data in Germany (due to the experience of the<br />

Second World War) is strictly unwanted and triggers social protests. Thus, cultural differences matter—in<br />

Slovenia we tend to control a priori, while in Britain control is only imposed when something goes wrong<br />

(to use an illustrative comparison).<br />

One of the experts interviewed noted that technical background is the least problematic aspect of such<br />

pan-<strong>European</strong> projects. Interestingly, experts are not uniform in their opinions concerning legal<br />

regulation. Some experts strongly value legal regulation, but one expert expressed the problematic<br />

nature of legal regulation when it comes to personal data security. In his opinion, despite the adjustment<br />

of legislation in various EU member countries to correspond with legislation for the overall <strong>European</strong><br />

Union, huge differences remain. For example, the RISER project (Registry Information Service on<br />

<strong>European</strong> Residents), in which also the Ministry for Public Administration is included and concerns<br />

searching for debtors abroad. The project is very successful in Germany, and eight countries participate<br />

in it. However, in Slovenia it is not feasible as our administration will not give data on debtors from<br />

Slovenia to foreign enterprises.<br />

One other expert also provided an interesting opinion—using an e-administration system, Slovenians can<br />

manage all procedures from abroad, but e-administration does not assure pan-<strong>European</strong> services. He<br />

defined pan-<strong>European</strong> services as those that enable you to manage things in a foreign country that has<br />

no data about you, but can retrieve it from a common register. In particular, another challenge with PEGS<br />

implementation in Slovenia is our legislation stating that all collected data must at the disposal of other<br />

public administration institutions. This is in tandem with the regulation that data already demanded by one<br />

institution cannot then be asked about a second time by another institution. In fact, according to another<br />

67


Jaro Berce et al.<br />

expert in terms of interoperability the most difficult aspects of PEGS are legislative, political, and<br />

organisational (that is, not related to ICT-related issues).<br />

2.1 eHealth domain<br />

The eHealth domain is less developed and accessible and has been exposed as the most problematic by<br />

several experts. Therefore it deserves more detailed examination.<br />

Slovenia has participated in the NETC@RDS project (http://netcards-project.com/web/frontpage) since<br />

2003. This project aims to introduce an electronic <strong>European</strong> health card that would hold health insurance<br />

data. Currently, the blue EU health card is in force. This health care card is not electronic but rather<br />

includes health insurance data that is physically written down; the card is only valid for one year. It is valid<br />

for urgent medical help abroad.<br />

The first phase of the NETC@RDS project was research; the second, pilot; and the last, at the end of<br />

2010, implementation. Interestingly, procedures have not changed after introduction of the electronic<br />

card; insurance companies continue to send invoices as usual. The pilot phase of the study is showing<br />

that Slovenians who work abroad and have two doctors (one abroad and one at home) are strongly<br />

inclined to use the card. The card has therefore found its widest adoption in border regions. There are 16<br />

countries participating in the NETC@RDS project (see http://netcards-project.com/web/partners). As an<br />

observer, Slovenia participates also in the Calliope project (http://www.calliope-network.eu/), which is a<br />

thematic network aimed at supporting, promoting, and disseminating products of a bigger project,<br />

<strong>European</strong> Patients Smart Open Services (epSOS) (http://www.epsos.eu/).<br />

According to experts, not long ago Slovenia was advanced in the eHealth domain; it now lags behind,<br />

except for one insurance company for obligatory health insurance. The health card substantially<br />

facilitates procedures, as there is no need to uniformly address first at the national level. Germany, for<br />

example, has been trying to introduce the health card for five years, but has been unable to do so<br />

successfully due to the many competing interests in the country’s economy (regarding the content of the<br />

card, the interests of insurance companies, producers, and so forth).<br />

To initiate a higher level of interoperability in the eHealth domain, it is pivotal to introduce the electronic<br />

health record (or a summary in electronic format), which is used in the Slovenian eHealth project. Our<br />

experts had the following to say about it:<br />

The eHealth project runs within the health ministry, therefore our experts could not speak to the<br />

details of it except for the action plan, which is partially funded by <strong>European</strong> funds.<br />

In 2010, the eHealth project set up a model of an electronic health record, an agreement for keeping<br />

data securely stored in an electronic format.<br />

Individual doctors and institutions at home and worldwide are already exchanging data in electronic<br />

format; however, for now everything is still only local. In Slovenia, some hospital and diagnostic<br />

centers are exchanging radiologic images; therefore, having on-duty radiologists is not necessary.<br />

Britain, for example, is sending their images to India, probably due to lower costs. Some doctors have<br />

their electronic health records, but they work only for themselves.<br />

3. eAdministration domain<br />

According to expert interviews there were some remarks about the FIO system (the phonetic index of<br />

persons, Schengen information system), in which foreign workers are authenticated, and it is determined<br />

whether they have any restrictions against being able to work and why, and about the new system (RISK)<br />

which is less clear and more difficult to use for data searches than its predecessor. It was often stated<br />

that Slovenia is well-developed in the eAdministration domain.<br />

On the other hand, it is not known how much these services are used among citizens. Experts stress that<br />

Slovenia collaborates in different pan-<strong>European</strong> projects, including STORK (Secure idenTity acrOss<br />

boRders linKed; designed for assuring general <strong>European</strong> identifications) and IMI (Internal Market<br />

Information System; which should enable verification of educational or other certificates, and could be<br />

useful also for other services), and PCI (Projects of Common Interests), which merges more sector<br />

projects, etc.<br />

68


3.1 eBusiness domain<br />

Jaro Berce et al.<br />

Experts provided some critical opinions on the e-VEM system (the Slovenia One Stop Shop project);<br />

these criticisms mainly centered on the idea that it is too open, and misuse is possible (for example,<br />

multiple enterprises registered at a single address). On the other hand, some experts considered e-VEM<br />

to be a world pearl, as Slovenia received the United Nations Public Service prize for it in 2009.<br />

Tax administration was exposed as especially problematic. Every foreigner in Slovenia for employment<br />

(except for students) has to obtain a tax number. To do this, he or she needs to enter an application in<br />

the register of those liable to taxation, a copy of a personal document, and registration of their certificate<br />

of temporary residence. This can also be done for family members supported by the employment, but is<br />

mandatory only in cases where these family members also live in Slovenia.<br />

Discrepancies between Slovenia and other countries appear also in income tax declarations, particularly<br />

in the ability to receive tax relief by claiming children as dependents. In Slovenia, children can qualify as<br />

dependents until their 18th birthdays; for most foreign countries, the age is 21 (reflecting college<br />

attendance). In Slovenian legislation concerning foreigners, family members are more broadly defined<br />

than they are in the definitions for tax administration.<br />

4. Analysis of households<br />

In December 2009, a telephone survey was conducted on a sample of about 600 persons aged from 18<br />

to 75 years (Vintar et al., 2010). This analysis focuses only on active Internet users in this group (that is,<br />

those who used the Internet in the last 3 months; n=365).<br />

Respondents show most interest in the eHealth domain, specifically in electronic management of health<br />

insurance, electronic linkage of Slovenian eHealth services with similar services in other EU countries (for<br />

example, allowing doctors in other countries to access personal health data, and Slovenian doctors to<br />

access data from healthcare provided abroad). The next most interesting domain is e-business:<br />

electronic management, recognition, editing of school or education, data exchange, and employment<br />

documentation.<br />

The least interest is shown in using PEGS for the establishment of on-line businesses and the recognition<br />

of Slovenian public administration certificates in EU countries, and vice versa. However, the interest for<br />

public administration e-services is quite high. It is connected with age (younger respondents show less<br />

interest) and with employment status (students and the retired show less interest than do the employed<br />

and unemployed). Thus, the interest in public administration e-services is linked to specific life situations,<br />

and not surprisingly is higher among those who frequently travel to other EU countries.<br />

The use of public administration services in other EU countries by Slovenians is not frequent - less than a<br />

tenth of respondents used them, more than half of them online. The countries where the respondents<br />

most often used these services are Germany, Italy, and Austria. Austria has developed the highest level<br />

of public administration e-services as reflected by frequency of use.<br />

In comparison to similar Capgemini worldwide Consulting research, our survey showed a higher level of<br />

interest for electronic editing of health insurance, recognition of education or other qualifications, and<br />

recognition of marriage and birth certificates. Among the respondents who lived abroad for a month or<br />

longer, the interest in e-public administration domains in general is higher than for the respondents in the<br />

Capgemini Consulting survey. An exception occurs in the tax field, where respondents from our<br />

interviews are less interested than the Capgemini Consulting respondents.<br />

Details regarding the specific elements of the survey are provided in the upcoming sections of the article.<br />

4.1 Interest in public administration eServices<br />

The highest interest (expressed on scale from 1 - not interested at all to 5 - very interested) in public<br />

administration e-services was shown for the electronic management of health insurance, as described<br />

previously (4,42), followed by electronic linkage of Slovenian eHealth services with similar services in<br />

other EU countries (4,19); electronic management, recognition, and alternation of school or education<br />

(4,1); data exchange and employment documentation (4,09); electronic management of pension<br />

insurance, official electronic data transfer (4,00); electronic management of change of residence (3,85);<br />

valid electronic transfer of receipts and extracts (3,78); taxation management documentation (3,71); intra-<br />

69


Jaro Berce et al.<br />

validity and recognition of electronic signatures (3,68); electronic editing of car registration and insurance<br />

(3,64); and the least for establishing businesses (3,59) and recognition of public administration<br />

certificates in other EU countries and vice versa (3,58). The breakdown of the participants in the survey<br />

according to each level of the 5-point Likert scale is shown in Table 1 below. (Vintar et al, 2010)<br />

Table 1: Interest in public administration eServices<br />

Valid electronic transfer of certificates and<br />

extracts (e.g. birth, marriage, residence) from<br />

Slovenian public administration to EU country<br />

public administration.<br />

Exchange of data and documentation for<br />

arranging employment.<br />

Electronic management of migrations (e.g.<br />

change of the permanent residence address)<br />

Electronic management, acknowledgement<br />

and change of school or education.<br />

Electronic linking of Slovenian eHealth<br />

services with similar services in other EU<br />

countries (e.g. access to my health data for<br />

doctor in other EU country and vice versa).<br />

Electronic management of health insurance.<br />

Electronic management of insurance for<br />

pension, official electronic data transfer.<br />

Acknowledgement of Slovenian public<br />

administration certificates in other EU<br />

countries and vice versa.<br />

Mutual validity and acknowledgement of<br />

digital signature.<br />

Electronic management of car registration<br />

and insurance.<br />

Establishing enterprises.<br />

Exchange of documentation for managing<br />

taxes.<br />

Source: Vintar et al. (2010).<br />

% (n)<br />

1 2 3 4 5<br />

Not<br />

interested at<br />

all<br />

7<br />

(27)<br />

8<br />

(28)<br />

9<br />

(34)<br />

8<br />

(27)<br />

6<br />

(22)<br />

5<br />

(17)<br />

7<br />

(24)<br />

13<br />

(45)<br />

13<br />

(46)<br />

10<br />

(36)<br />

12<br />

(43)<br />

11<br />

(40)<br />

8<br />

(30)<br />

2<br />

(9)<br />

6<br />

(21)<br />

4<br />

(14)<br />

3<br />

(10)<br />

1<br />

(5)<br />

5<br />

(17)<br />

7<br />

(26)<br />

9<br />

(31)<br />

10<br />

(35)<br />

9<br />

(32)<br />

6<br />

(22)<br />

24<br />

(88)<br />

13<br />

(48)<br />

20<br />

(72)<br />

12<br />

(42)<br />

14<br />

(49)<br />

8<br />

(29)<br />

20<br />

(72)<br />

24<br />

(86)<br />

19<br />

(68)<br />

22<br />

(81)<br />

21<br />

(76)<br />

21<br />

(75)<br />

20<br />

(72)<br />

26<br />

(96)<br />

22<br />

(80)<br />

26<br />

(94)<br />

22<br />

(79)<br />

1<br />

(68)<br />

20<br />

(73)<br />

22<br />

(77)<br />

18<br />

(66)<br />

23<br />

(83)<br />

23<br />

(84)<br />

26<br />

(93)<br />

4.2 Public administration services in EU member countries<br />

Very<br />

interested<br />

41<br />

(148)<br />

51<br />

(184)<br />

44<br />

(159)<br />

51<br />

(187)<br />

56<br />

(203)<br />

67<br />

(244)<br />

49<br />

(179)<br />

34<br />

(122)<br />

42<br />

(152)<br />

35<br />

(128)<br />

34<br />

(123)<br />

37<br />

(134)<br />

Total<br />

(n)<br />

Average<br />

σ ±<br />

Standard<br />

deviation<br />

Confidence<br />

interval<br />

365 3,78 1,03 0,11<br />

365 4,09 1,41 0,15<br />

365 3,85 1,21 0,13<br />

364 4,1 1,31 0,14<br />

363 4,19 1,35 0,14<br />

363 4,42 1,31 0,14<br />

365 4,00 1,36 0,14<br />

356 3,58 1,26 0,13<br />

363 3,68 1,20 0,13<br />

363 3,64 1,29 0,14<br />

358 3,59 1,19 0,13<br />

364 3,71 1,15 0,12<br />

Public administration services in other EU countries have been used by less than a tenth of respondents<br />

(8%). Those who already used them were asked if they did so online; more than half (56%) responded<br />

that they did use e-services in other countries. The share of respondents that also lived in another EU<br />

country is smaller (11%). Those who lived abroad were there usually less than a year; 29% lived there<br />

only one month, 27% more than six months, 14% more than six months but less than a year, and 14%<br />

more than one year.<br />

4.3 Slovenia in the Capgemini research<br />

In its 2009 study, Capgemini (Colclough and Tinholt, 2009) measured the “20 basic public services” since<br />

inception. Specifically, Capgemini assessed the availability of these services and the sophistication of<br />

them as offered through 14,000 public service provider websites across Europe. Europe shows continued<br />

70


Jaro Berce et al.<br />

steady progress in terms of full online availability. The overall EU27+ measure has risen to 71% in 2009<br />

from 59% in 2007. In terms of sophistication, Europe stands at 83%, compared with 76% in 2007.<br />

The report pointed to a coordinated approach of development of a pan-<strong>European</strong> eGovernment service<br />

design and delivery within projects in the areas of: e-Procurement, eHealth, and e-ID (collectively known<br />

as the Services Directive). These projects benefit from common building blocks for solutions, serviceoriented<br />

architectures, and inter-operability across EU.<br />

The Capgemini report demonstrates that the goal of improving eGovernment services extends beyond<br />

mere provision of services. There is no point in delivering eGovernment services if they are not used, or<br />

do not deliver the expected benefits to users. The end results must reflect the outcome they deliver for<br />

citizens, businesses, and government itself. The overall sophistication of service clusters with respect to<br />

features of eGovernment services is shown for the EU27+ in Figure 1. Slovenia is in the top five countries<br />

for which sophistication, availability, and the One Stop Shop approach is considered lagging behind when<br />

accessibility and user experiences and satisfaction are measured. The research report on the other hand<br />

praises Slovenia’s portal site http://e-uprava.gov.si/euprava/ as an all-in-one gateway both to the<br />

Slovenian government and EU initiatives; and Slovenia’s One Stop Shop for companies, e-VEM, which<br />

received the United Nations Public Service Award.<br />

Source: 8th Benchmark Measurement, Capgemini, November 2009.<br />

Figure 1: Sophistication of service clusters in the EU27+<br />

The Capgemini report states that “the Pan-EU eGovernment for most countries is a national affair. No<br />

countries have explicit targets for cross-border service development. Newer [EU member states] would<br />

appear to look more to <strong>European</strong> policy for guidance (i2010), potentially as in some of these countries the<br />

management of eGovernment and structural funds falls within the same organization. A growing and now<br />

considerable number of EU countries have elected however to participate in pan-<strong>European</strong> large scale<br />

pilots. The four major CIP ICT PSP (competitiveness and innovation program) pilots are actively<br />

supported, notably by several of the higher performing countries. Austria for example is active across all<br />

large-scale CIP pilots (pilot A). This affords the opportunity to observe, learn from, and potentially<br />

influence technology developments within Europe”.<br />

Figure 2 shows the e-Procurement process as it has developed in Slovenia. In the Capgemini report it is<br />

described as a country that has one of the best scores for the e-notification sub-phase, but its Pre-Award<br />

Process indicator is under the EU27+ average. Its e-award and e-submission scores are among the<br />

71


Jaro Berce et al.<br />

lowest in Europe; Slovenians and foreigners can access a mandatory national e-procurement platform<br />

free of charge and without prior registration.<br />

Source: 8th Benchmark Measurement, Capgemini, November 2009.<br />

Figure 2: eProcurement process development in Slovenia<br />

5. Conclusions<br />

The development of pan-<strong>European</strong> IT service companies will bring great benefits to EU citizens; it will<br />

facilitate the settlement of their affairs with the government, especially when their affairs occur outside<br />

their home countries. To achieve this goal, we need interoperability, which plays a crucial role in the<br />

development of more efficient, quality, and overall user-friendly services. Interoperability is also critical in<br />

establishing a single <strong>European</strong> market. It is therefore not surprising that at the <strong>European</strong> Ministerial<br />

<strong>Conference</strong> in Lisbon (2007) interoperability was at the top of the four strategic objectives of<br />

eGovernment. They also point out that the <strong>European</strong> Union through the ICT Policy Support Programme<br />

(PCP) project will specifically promote the development of e-procurement and the mutual recognition of<br />

electronic identification. In addition, the EU will promote the establishment of interoperability in<br />

conjunction with the requirements of the Services Directive. We expect that the Member States will set<br />

new priority areas of development of pan-<strong>European</strong> services. In line with this orientation, the cross-border<br />

interoperability as the key to the development of pan-<strong>European</strong> services was also one of the key strategic<br />

directives of the Slovenian EU Council Presidency in the first half of 2008.<br />

Interoperability of services and products in the field of ICT is one of the most important conditions for<br />

successful development of an information society. The ICT market is constantly evolving, spurred by a<br />

globalised approach, competition, liberalisation of telecommunications services, convergence of ICT, and<br />

increasingly also by media technologies and services. Therefore, we can summarise the results from the<br />

telephone survey in two ways:<br />

Interviewers opinion was that eGovernment services are very complex and use a lot of resources<br />

during their introduction but are still needed even in cases where they are not well accepted or used<br />

by users; and<br />

Users’ perspective should be more accurately used in designing and in prioritising which services to<br />

be introduced.<br />

References<br />

CIP_ICT_PSP (2009) ICT for sustainable and interoperable health services, October 2009, Available:<br />

http://ec.europa.eu/information_society/activities/health/cip_ict_psp/index_en.htm [24 Jan 2011].<br />

Colclough, G., and Tinholt, D. (2009) 8th Benchmark Measurement, Capgemini worldwide, Available:<br />

http://www.capgemini.com/insights-and-resources/by-publication/2009-eGovernment-benchmark/ [14 Mar<br />

2011].<br />

COM2004 (2009) eHealth - making healthcare better for <strong>European</strong> citizens: an action plan for a <strong>European</strong> eHealth<br />

area, October 2009, Available: http://eurex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:52004DC0356:EN:NOT<br />

[24 Jan 2011].<br />

COM(2006)45final (2009) Communication from the Commission to the Council and the <strong>European</strong> Parliament,<br />

Interoperability for Pan-<strong>European</strong> eGovernment Services, October 2009, Available:<br />

http://ec.europa.eu/idabc/servlets/Doc?id=24117 [24 Jan 2011].<br />

72


Jaro Berce et al.<br />

COM2008 (2008) A community framework on the application of patients' rights in cross-border healthcare, October<br />

2009, Available: http://ec.europa.eu/health-eu/doc/com2008415_en.pdf [24 Jan 2011].<br />

COM(2008)3282final (2008) Commission recommendation on cross-border<br />

interoperability of electronic health record<br />

systems, October 2008, Available:<br />

http://ec.europa.eu/information_society/newsroom/cf/document.cfm?action=display&doc _id=510 [24 Jan 2011].<br />

CPSC (2008) Connecting public communities, <strong>European</strong> review of political technologies, Volume 7, October 2008,<br />

Brussels: Politech Institute.<br />

De Vriendt,<br />

K. (2005) Pan-<strong>European</strong> eGovernment services (IDABC). Enterprise and Industry Directorate General,<br />

June 16, 2005, Available: http://www.is.lt/ida/files/2005_ivadas.pdf [24 Jan2011].<br />

Digital Agenda for Europe 2010-2010,<br />

http://ec.europa.eu/information_society/digital-agenda/index_en.htm [24 Jan<br />

2011].<br />

eEpoch2 (2003) e-ID and the information society in Europe, white paper, sept. 2003, Available:<br />

http://www.eepoch.net/documents/public/WhitePapers/eepoch_white_paper.pdf [24 Jan 2011].<br />

eGovernment Action plan 2011-2015: Harnessing ICT to promote smart, sustainable & innovative Government.<br />

http://ec.europa.eu/information_society/activities/eGovernment/action_plan_2011_2015/docs/action_plan_en_a<br />

ct_part1_v2.pdf [24 Dec 2010].<br />

eProcurement (2008) The eProcurement Map, A map of activities having an impact on the development of <strong>European</strong><br />

interoperable eProcurement solutions. <strong>European</strong> Commission, Directorate-General for Informatics. December<br />

2008, Available: http://ec.europa .eu/idabc/servlets/Doc?id=31968 [24 Jan 2011].<br />

<strong>European</strong> Commission (2008): <strong>European</strong> Interoperability Framework Version 2, EIF 2.0 – draft document. <strong>European</strong><br />

Commission, November 2008.<br />

Europe’s Information Society Thematic Portal, Pan-<strong>European</strong> members and services, Available:<br />

http://ec.europa.eu/information_society/policy/ecomm/current/pan_european/index_en.htm [24 Jan 2011].<br />

Glott, R., and Haaland, K. (2007) Innovative<br />

and adaptive pan-<strong>European</strong> services for citizens in 2010 and beyond—<br />

Pan-<strong>European</strong> eGovernment services: An assessment of their potential based on the GPF and<br />

IDABC good<br />

practice framework, Available: http://www.euregov.eu/deliverables/reports/WP2%20D1_final.pdf [24 Jan 2011].<br />

IDABC2004 (2004) <strong>European</strong> interoperability framework for pan-european eGovernment services, oktober 2009,<br />

Available: http://ec.europa.eu/idabc/servlets/Doc?id=19529 [24 Jan 2011].<br />

IDABCeID<br />

(2009) Preliminary study on mutual recognition of eSignatures for eGovernment applications, december<br />

2009, Available: http://ec.europa.eu/idabc/en/document/6485 [24 Jan 2011].<br />

Järv, M., Vali, I. (2009) Estonian company registration portal accepts digital, signatures<br />

given in other countries, RIK<br />

Center of Registers and Information Systems. CrossBorderDS, Available:<br />

http://www.epractice.eu/files/Company_registrationl_eng1.pdf [24 Jan 2011].<br />

PEPPOL-ISP(2009): Opening doors to cross-border business. Pan <strong>European</strong> public procurement Online, Available:<br />

http://ec.europa.eu/information_society/apps/projects/factsheet/index.cfm? project_ref=224974 [24 Jan 2011].<br />

RIS ( 2009) Alternativne plačilne metode pri e-nakupovanju, February 2009, Available:<br />

http://www.ris.org/2009/02/Novice/_Alternativne_placilne_metode_pri_enakupovanju/?&p2=285&p3=1354&p4=<br />

1356&id=1356 [24 Jan 2011].<br />

SMART 2006/0064. Impact of information society options on the development of pan-<strong>European</strong><br />

public e-services,<br />

Available: http://ec.europa.eu/information_society/activities/eGovernment/studies/docs/final_report_web.pdf [24<br />

Dec 2010].<br />

SMART 2007/0052. Guidelines on sustainable business models for inclusive public service delivery, Lot 1 and Lot 2,<br />

Available:<br />

http://ec.europa.eu/information_society/activities/eGovernment/policy/inclusion/docs/mc_egov_final_report.pdf<br />

[24 Dec 2010].<br />

SMART 2008/0042.<br />

i2010 eGovernment action plan progress study, Available:<br />

http://www.dti.dk/_root/media/37436_i2010%20eGovernment%20Action%20Plan%20-<br />

%20Progress%20Study.pdf<br />

[20 Dec 2010].<br />

SMART 2009/0069. Study on Multi-channel delivery strategies and sustainable business models for public services<br />

and addressing socially disadvantage groups, Available:<br />

http://ec.europa.eu/information_society/activities/eGovernment/policy/inclusion/docs/mc_egov_final_report.pdf<br />

[20 Dec 2010].<br />

STORK - PP (2008) Frank LEYMAN: STORK - Project Presentation.<br />

Available:<br />

http://www.riserid.eu/fileadmin/user_upload/Datei/konferenz/Session4_Leyman_RISER_4th_<strong>Conference</strong>_1010<br />

2008.pdf [24.1.2011].<br />

Strategija e-uprave RS za obdobje od leta 2006 do leta 2010 - SEP-2010, Available:<br />

http://e-uprava.gov.si/e-<br />

uprava/edemokracijaStran.euprava?pageid=516 [24.1.2011].<br />

Vintar, M., Kunstelj, M., Keržič, D. (2010): Razvoj pan-evropskih storitev informacijske družbe v Sloveniji, Available:<br />

http://www.ris.org/uploadi/editor/1290434751ZAKLJUCNO_POROCILO_FINAL.pdf [15 December 2010].<br />

Weehuizen, R., and van Oranje, C. (2007) Innovative and adaptive pan-<strong>European</strong> services for citizens in 2010 and<br />

beyond Pan-<strong>European</strong> eGovernment Services (PEGS) in perspective: function, forms, actors, areas, pathways<br />

and indicators. Deliverable WP3.D1; June 1, 2007, DRAFT version 0.8; Prepared for DG Information Society<br />

&<br />

Media of the <strong>European</strong> Commission, http://www.euregov.eu/deliverables/reports/WP3_Indicators.pdf<br />

[24.1.2011].<br />

73


Enhancement of Public Service Effectiveness by Partially<br />

Automating Service Request Paper Forms Using Citizen ID<br />

Smartcard<br />

Choompol Boonmee 1 , Rattapol Chatchumsai 1 , Tawa Khampachoa 2 and Chakri<br />

Chuenurah 3<br />

1<br />

Thammasat University Rangsit Campus, Pathumthani, Thailand<br />

2<br />

King Mongkut’s University of Technology North Bangkok, Bangkok, Thailand<br />

3<br />

Department of provincial administration, Bangkok, Thailand<br />

choompol@tu.ac.th<br />

rattapol@thaiidcard.net<br />

twk@kmutnb.ac.th<br />

chakri@dopa.go.th<br />

Abstract: Since the year 2004 Thai citizens older than 15 years old are required to have citizen identification card by<br />

law to certify his/her citizenship. Thai citizen ID card has a microchip as a secured personal information storage<br />

called smartcard. The information can be retrieved electronically by using standard ISO 7816 compliant smartcard<br />

reader. Traditionally in order to access public service, citizens need to fill out service request paper forms. The form<br />

details include personal information which is stored in the card. The idea is to enhance the effectiveness of existing<br />

public service without or with less change of practice by utilizing the information in the card. A number of local<br />

governments involved in the project to providing more effective service to their people. The results indicate that using<br />

citizen ID smartcard enhance public service efficiency in local government. It reduced time used in filling out service<br />

request form and reduced time consumed by service record.<br />

Keywords: smartcard, citizen ID card, eGovernment, public service effectiveness<br />

1. Introduction<br />

A number of countries are issuing electronic ID cards to their citizens (Robert 2002) (Georg 2009) (Pan<br />

2010). Using those cards public agencies can provide better services to their citizens easier. Most main<br />

objectives are to improve security in online services and unify authentication (Herbert 2002)<br />

(Ramaswamy 2008) (Chen 2010) (Yen-Cheng 2005). However not only for securely authentication<br />

mechanism that the smartcard can function it can also be used as small information storage.<br />

In Thailand since the year 2004 Thai citizens older than 15 years old are required to have citizen<br />

identification (ID) card by law to certify his/her citizenship.<br />

Figure 1 shows Thai citizen ID card. A set of citizen registration information is printed on the card surface.<br />

It includes the 13 digits of citizen identification (ID) number, the person name in Thai, the person name in<br />

English, the registered address in Thai, the card issued date, the expire date and the person photo<br />

image.<br />

Figure 1: Thai citizen ID card<br />

74


Choompol Boonmee et al.<br />

Thai citizen ID card is an electronic ID card which can also be used as secured personal information<br />

storage. The stored personal information can be retrieved electronically by using standard ISO 7816<br />

compliant smartcard reader. Basically the information which can be retrieved electronically is the set that<br />

is printed on the card surface.<br />

Since Thai citizen ID card is contact type smartcard, not contactless type, it is impossible to retrieve the<br />

information without inserting the card into the card reader. If the citizen does not want to provide their<br />

personal information in the card, he/she can keep their card information by not inserting it in the reader.<br />

The electronic citizen information in the ID card includes the same as printed on the card surface. It<br />

consumed less than a second to retrieve text data. It takes around 8 second to retrieve the person image.<br />

More than 30 million citizen ID cards have been issued to Thai citizens. Presently most of Thai people do<br />

have the smartcard as national ID card.<br />

There are a lot of public services provided by government agencies, for examples birth certificate service<br />

when a baby was born. In order to access such public services typically we need to fill out various kinds<br />

of request paper forms.<br />

Figure 2 shows a sample of public service request form. The citizen needs to find the request paper form<br />

which normally distributed for free at the government office. After fill out the form then the requester<br />

submits it to the officer in charge at the office. There are a lot of blanks in the form which need to be filled<br />

out, for examples, service requester name, address, age, request date and etc. After get the request form<br />

and filling it out, the requester needs to submit the completed form to the officer.<br />

Figure 2: The sample of public service request paper form used to access public service<br />

Figure 3 shows the typical process of public service access performed in Thai government agencies<br />

presently. Thai citizen who wants to access the public service have to get the request paper form, fill the<br />

form out and then submits the completed form to the officer at the government office. The officers then<br />

process the service which may be different from one to others. After finishing the process they may need<br />

to record the process in paper based style or may be in electronic based style or both. Most of public<br />

services are provided basically in paper based. Public services have been provided for a very long time.<br />

Various kinds of officers involved in the process. A large change to the process may introduce troubles<br />

and resistances.<br />

In Thailand there are many government agencies which provide public services to their citizens. They are<br />

ministerial departments, provinces, cities, municipalities, other local administration offices and so on.<br />

There are more than seven thousand offices of government agencies that provide such public services to<br />

their citizens. To reorganize the overall and details of the service process is very difficult and very timeconsuming.<br />

However it is required to take advantage of the information and communication technology<br />

(ICT) to improve public services. In this paper we focused on utilizing the already existing ICT<br />

75


Choompol Boonmee et al.<br />

infrastructure with less process change to maximize the effectiveness of public services and to minimize<br />

the time consumed.<br />

Figure 3: The typical process of public service access<br />

2. Form filling time consumed and the ID card<br />

In order to access the public service of the government agencies, citizens need to get the request paper<br />

form, to fill out the form, to submit the form, and to interact with the officers during the process until the<br />

service is finished. After finishing the service, the officers may need to record or conclude the service<br />

providing. We studied the time consumed by those processes.<br />

Figure 4 shows the result of studying the time consumed in some public service processes. It takes up to<br />

1 minute in ‘get the request form’ process. It takes 2 to 10 minutes in ‘fill out the form’ process which is<br />

hand-writing process. In this filling the form process, the information needed to be filled out includes<br />

various things. It includes the personal information of the requester which is the same set of the<br />

information that can be retrieved from the ID card. It takes 3 minutes as an average value to fill out this<br />

in-card information. It includes the identification number, title, given name, family name, address, street,<br />

city sub-division, city, country sub-division, birth date, card issue date and expire date. It also includes the<br />

information which can be computed automatically such as current age of the citizen, current date and so<br />

on. After finishing filling out the request form, the citizen can submit the form to the officer for the service<br />

requested. Then after the service process has done, the officer need to record or conclue the service<br />

provided which takes about 5 to 30 minutes.<br />

Figure 4: The study of time consumed in public service process<br />

We proposed the methodology to improve the public service process by using the national ID card to<br />

minimize the time consumed in some process especially hand-writing process and recording process. We<br />

focused on using the information which can be retrieved electronically automatically from the card with<br />

less change of the existing process. Figure 5 shows the processes that need to be added or modified;<br />

‘insert ID card’, ‘choose and print the form partially filled out’ and ‘record the service’ to get the advantage<br />

from using the ID card. Since the hand-writing process can be partially automated by retrieving the<br />

information from the ID card and the recording process can be automated electronically by the computer<br />

software, the significant improvement of service process time consumed and accuracy of service data<br />

can be expected.<br />

76


Choompol Boonmee et al.<br />

Figure 5: Study of public service process in which the ID card can be utilized to improve time consumed<br />

and effectiveness<br />

3. Service effectiveness enhancement<br />

We proposed to develop software that can perform the automation mentioned above. The software is<br />

supposed to retrieve personal information from the ID card, generate the public service request form and<br />

fill it out based on the card information and the extra input data from keyboard. The software should<br />

automatically produce the public service request form with partially filled. Therefore less blank space left<br />

on the printed form, less hand writing effort is required. This makes the time consumed in ‘get the form’<br />

and ‘filling the form’ process shorter. This also makes the information filled in the form more accurate.<br />

This makes the service recording process get done electronically without further work. The officers can<br />

use the electronically recorded information to make their reports.<br />

Figure 6 shows the concept of form generation software proposed in this paper. When citizens want to<br />

access the public service, instead of getting the blank form from the officer, they insert the ID card into<br />

the software, then they can choose the service request form from the templates. After printing the request<br />

form the citizen may need to write/sign some additional information to the form but much less than before<br />

using the software. This resulted less time consumed in ‘get the form’ and ‘filling the form’ process.<br />

Figure 6: This shows the form generation software which retrieves personal information from ID card to<br />

partially fill out and input extra information to the public service request form<br />

When choosing from the form templates and input additional information into the form, the software also<br />

records the transaction in the storage of the computer in the open standard format such as text, comma<br />

separated value (CSV) and XML. If the officers need to record the service providing at the end of the day,<br />

they can collect the records automatically stored by the software to edit or to reorganize the data as they<br />

want by using their familiar software without special skills.<br />

4. Software development<br />

We designed and developed computer software to automatically generate request form filled out with the<br />

information retrieved from the card and input from keyboard. The form generation software retrieves the<br />

from which the user chose from the templates, fill out the information from the ID card and keyboard<br />

input, then print out for the service requester. We prepared a hundred of forms widely used in Thai public<br />

services and store them in the form templates. This assisted the officers in government agencies that<br />

involved in our project to enhance the effectiveness of the public service process. It has been developed<br />

77


Choompol Boonmee et al.<br />

using java technology. It can be executed on various operating system widely used presently without any<br />

software modification. The existing computer, printer and operating system software can be used. All the<br />

users have to do is to get ISO-7816 compliant smartcard reader that works well with the existing<br />

computer which can be obtained easily and cheap.<br />

Figure 7 shows the main screen shot of the form generation software. It works with standard smart card<br />

reader. When we insert the Thai nation ID card into the reader, the information is retrieved automatically.<br />

The retrieved information is displayed on the software main screen as shown in the figure. It includes<br />

personal information, name, address, birth date, issue date, expire date and etc. After waiting for about 8<br />

seconds the person photo image is also displayed on the screen. Additionally the software also retrieves<br />

the current image from web camera attached to the computer and display on the screen. The user who<br />

may be the officer or the citizen himself may choose the public request form from the form templates<br />

prepared.<br />

Figure 7: This is the main screen shot of public service request form generation software<br />

Figure 8 shows the example of selected public service request form filled with requester information from<br />

the ID card with some extra input date. This example shows the personal photo image retrieved from the<br />

ID card printed on form.<br />

Figure 8: The selected public service request form filled with requester information from the ID card and<br />

some extra input data<br />

78


5. Experiments<br />

Choompol Boonmee et al.<br />

In Thailand there are many government agencies which provide public services to their citizens. They are<br />

ministerial departments, provinces, cities, municipalities, other local government administration offices<br />

and so on. Department of provincial administration started a pilot project to promote and to exercise the<br />

use of national ID card in public services. A number of local government administration offices involved in<br />

the pilot project. We have performed some experiments by adopting the form generation software<br />

developed in this research in some real public service process.<br />

Pibun Mangsahon is a municipality located in north east of Thailand. Its population is around 15 thousand<br />

people. The mayor agreed to involve in the pilot project by adopting the form generation software in some<br />

service process. One of the earlier adopted services is the request form to utilize the municipality facility.<br />

The request paper form includes one page request form and four pages contract forms. We measured<br />

the time consumed to filling out the form before and after using the software. Before using the software it<br />

consumed 9 minutes as average value to access the service. After using the software in service process<br />

it consumed only 3 minutes. The time consumed by the public access process decreased significantly.<br />

6. Conclusions<br />

Since the year 2004 Thai citizens older than 15 years old are required to have citizen identification card<br />

by law to certify his/her citizenship. Thai citizen ID card has a microchip as a secured personal<br />

information storage called smartcard. Traditionally in order to access public service, citizens need to fill<br />

out service request paper forms. The forms details include personal information which is stored in the<br />

card. The idea is to enhance the effectiveness of existing public service without or with less change of<br />

practice by utilizing the information in the card. A number of local governments involved in the project to<br />

providing more effective service to their people. The results indicate that using citizen ID smartcard<br />

enhance public service efficiency in local government. It reduced time used in filling out service request<br />

form and reduced time consumed by service record.<br />

Acknowledgements<br />

We thank to the department of provincial administration and electronic data interchange promotion<br />

association (http://www.edipa.org/) to provide support of the project. We also thank to all government<br />

agencies for the great contributions especially Phibun Mangsahan municipality.<br />

References<br />

Chen Yang, Zhengtao Jiang, Jianjun Yang, (2010) “Novel Access Control Scheme with User Authentication Using<br />

Smart Cards”, cso, vol.2, 2010 Third International Joint <strong>Conference</strong> on Computational Science and<br />

Optimization, pp.387-389.<br />

Georg Aichholzer , Stefan Strauss (2009) “The Citizen's Role in National Electronic Identity Management - A Casestudy<br />

on Austria”,<br />

2009 Second International <strong>Conference</strong> on Advances in Human-Oriented and Personalized Mechanisms,<br />

Technologies, and Services, pp. 45-50<br />

Herbert Leitold, Arno Hollosi, Reinhard Posch, (2002), “Security Architecture of the Austrian Citizen Card Concept”,<br />

acsac, 18 th Annual Computer Security Applications <strong>Conference</strong> (ACSCC ’02), pp 391<br />

Pan Tiejun, Xiong Chunlei, Zheng Leina, Han Yufeng, Bai Lingbin, (2010) “ONE-CARD System based on the second<br />

generation ID card in China”, ice, 2010 International <strong>Conference</strong> on E-Business and EGovernment, pp 108-111.<br />

Ramaswamy Chandramouli, (2008) “Policy Specification and Enforcement for Smart ID cards deployment”, 2008<br />

IEEE Workshop on Policies for Distributed System and Networks, pp 127-134.<br />

Robert Nitschke, (2002) "National ID card, electronic ID card becomes reality in Europe", [online] NOVOSEC<br />

Aktiengesellschaft,http://www.novosec.com/documents/eCommerce_ElectronicIDcard.pdf<br />

Yen-Cheng Chen, Lo-Yao Yeh (2005) “An Efficient Authentication and Access Control Scheme Using Smart Cards”,<br />

11 th International <strong>Conference</strong> on Parallel and Distributed Systems –Workshops (ICPADS’05), icpads, vol.2,<br />

pp.78-82.<br />

79


Development of User Authentication for web Application<br />

Sign-on Mechanism Using Oasis SAML Standard With Thai<br />

Citizen ID Card<br />

Choompol Boonmee 1 , Peera Tharaphant 1 and Pipop Damtongsuk 2<br />

1<br />

Thammasat University Rangsit Campus, Pathumthani, Thailand<br />

2<br />

Department of provincial administration, Bangkok, Thailand<br />

choompol@tu.ac.th<br />

peera@thaiidcard.net<br />

pipop@dopa.go.th<br />

Abstract: This paper presents a personal authentication sign-on mechanism using oasis SAML standard with citizen<br />

ID smart card. In Thailand a number of web application style online public service have been developed to serve a<br />

better service for citizens. The most frequently used user authentication mechanism is password. The users need to<br />

remember their unique password. And for security reason they may need to change their password periodically. If<br />

single sign-on solution is not deployed they may need to remember a number of different passwords for different<br />

system. It is not effective for the real situation user authentication methodology. However single sign-on solution<br />

need to be open-standard, product neutral and developer independent to allow widely deployment. The Organization<br />

for the Advancement of Structured Information Standards (OASIS) has developed SAML standard which can be<br />

used as an open-standard for sign on mechanism. In addition since the year 2004 Thai citizens older than 15 years<br />

old are required to have citizen ID card by law to certify his/her citizenship. Thai citizen ID card has a microchip as a<br />

secured personal information storage and personal authentication device called smartcard. In this paper we<br />

proposed the user authentication sign-on mechanism using oasis SAML standard with Thai citizen ID card. We<br />

developed software system based on this proposed mechanism. This prototype development software has been<br />

used in a number of government agencies in order to enhance the effectiveness of public service.<br />

Keywords: online service, single sign on, user authentication, citizen ID card<br />

1. Introduction<br />

Authentication is the process of identifying an individual who interacts with a computer system.<br />

Authentication ensures that the individual is who he or she claims to be. Generally there are three types<br />

of authentication mechanisms; by something you know (nobody else knows), by something you have<br />

(nobody else has) and by something identifies who you are (nobody else is you). In computer networks<br />

including the Internet, authentication is commonly done through the use of login passwords which is ‘by<br />

something you know’ mechanism. In Thailand a number of web application style online public service<br />

have been developed to serve a better service for citizens. Examples include social security service,<br />

business registration service, and etc. To enable a service to an individual citizen, authentication<br />

mechanism is required. Most of online service applications have their own account management and<br />

their own user authentication mechanism as shown in figure 1. Mostly used authentication mechanism is<br />

user name and password. Since there are many software systems provided, a citizen has to remember<br />

many combinations of user names and passwords. This is one of the hurdles that electronic public<br />

services have not been successful.<br />

Figure 1: Multiple service providers exist with their own account database management<br />

80


Choompol Boonmee et al.<br />

If a citizen wants to access several electronic services at the same time, he/she typically needs to browse<br />

multiple web page addresses or URLs and needs to sign on several times. This makes the services<br />

access not efficient and not effective. Moreover he/she needs to sign out from those services several<br />

times for security.<br />

For the first use, most of the systems let each citizen to register to make his/her account by input<br />

personal information through registration web site, citizen identification number (ID), name in Thai, name<br />

in English, registered address and so on, despite of those information have stored in citizen registration<br />

database. After registration the system may send the password through e-mail or SMS. This process<br />

typically takes time, depending on applications and conditions, typically about 5 to 10 minutes.<br />

Additionally since the personal information is input through keyboard, due to the low accuracy of<br />

information, for examples, wrong address, wrong spelling and etc. In the legal transaction this becomes<br />

even more important.<br />

A number of countries are issuing electronic ID cards to their citizens (Robert 2002) (Georg 2009) (Pan<br />

2010). Using those cards public agencies can provide better services to their citizens easier. Most main<br />

objectives are to improve security in online services and unify authentication (Herbert 2002)<br />

(Ramaswamy 2008) (Ramaswamy 2007) (Chen 2010) (Yen-Cheng 2005) (Bae-Ling 2009)<br />

(Abdulrahman 2009)(Minwei 2009)(Adam 2009)(Raja 2010)(Starr 2003)( Hamed 2003). However not<br />

only for securely authentication mechanism that the smartcard can function it can also be used as small<br />

information storage. In this paper we introduced the use.<br />

Since the year 2004 Thai citizens older than 15 years old are required to have citizen ID card by law to<br />

certify his/her citizenship. Thai citizen ID card has a microchip as a secured personal information storage<br />

and personal authentication device called smartcard.<br />

Figure 2 shows Thai citizen ID card. A set of citizen registration information is printed on the card surface.<br />

It includes the 13 digits of citizen identification (ID) number, the person name in Thai, the person name in<br />

English, the registered address in Thai, the card issued date, the expire date and the person photo<br />

image. More than 30 million citizen ID cards have been issued to Thai citizens by department of<br />

provincial administration (DOPA). Thai citizen information is stored in citizen database at DOPA.<br />

Presently most of Thai people do have the smartcard as national ID card.<br />

Figure 2: Thai citizen ID card, issuance process and citizen database<br />

Thai citizen ID card is an electronic ID card which can also be used as secured personal information<br />

storage. The stored personal information can be retrieved electronically by using standard ISO 7816<br />

compliant smartcard reader. Basically the information which can be retrieved electronically is the<br />

information set that is printed on the card surface.<br />

Figure 3 shows that personal information stored in the card can be retrieved into the computer via<br />

smartcard reader. Since Thai citizen ID card is contact type smartcard, not contactless type, it is<br />

impossible to retrieve the information without inserting the card into the card reader. If the citizen does<br />

not want to provide their personal information in the card, he/she can keep their card information by not<br />

inserting it in the reader. The electronic citizen information in the ID card includes the 13 digits of citizen<br />

81


Choompol Boonmee et al.<br />

identification number, the person name in Thai, the person name in English, the registered address in<br />

Thai, the card issued date, the card expire date and the person photo image, the same as printed on the<br />

card surface. It consumed less than one second to retrieve text data. It takes around 8 second to retrieve<br />

the person image.<br />

Figure 3: The citizen information stored in the ID card can be retrieved via smartcard reader<br />

If single sign-on solution is not deployed they may need to remember a number of different passwords for<br />

different system. It is not effective for the real situation user authentication methodology. However single<br />

sign-on solution need to be open-standard, product neutral and developer independent to allow widely<br />

deployment. This paper presents a personal authentication sign-on mechanism using oasis SAML<br />

standard with citizen ID smart card.<br />

2. Single sign-on using SAML and citizen ID card<br />

The Organization for the Advancement of Structured Information Standards (OASIS) has developed<br />

SAML standard which can be used as an open-standard for sign on mechanism. The main idea of this<br />

paper is to adapt the standard with the citizen ID card to improve the effectiveness. The targeted<br />

improvement includes<br />

Improve sign on method; easier with ID card<br />

Improve the security and reliability; with verifying the ID card and camera.<br />

Single sign on (SSO) for multiple applications<br />

Using open standard for interoperability<br />

Improve the access to the service applications easier and faster.<br />

Improve new account registration; faster and more accurate<br />

In order to make sign on process easier we introduced ‘insert card to log in’ style method. The user may<br />

not have to input URL to the Internet browser nor input the password. This makes sign on process much<br />

easier and faster. Since every Thai citizen has the citizen ID card by law, thus it can make sign-on more<br />

comfortable.<br />

In order to improve the security and reliability, the ID card will be verified with the card registration<br />

authority at online real-time. In addition, the user real time photo is recorded when signing on by using<br />

webcam. With the card verification the security and the reliability are improved. With the recorded camera<br />

image more visible evidences are provided when required in crime investigation.<br />

Additionally Security Assertion Markup Language (SAML) is an XML-based open standard for<br />

exchanging authentication and authorization data between security domains, that is, between an identity<br />

provider and a service provider. SAML is a product of the OASIS Security Services Technical Committee.<br />

The single most important problem that SAML is trying to solve is the Web Browser Single Sign-On<br />

(SSO) problem (Kaixing 2009) (Patrick 2009) (Takaaki 2009) (Greg 2008) (Christian 2008) (Weizhong<br />

2010).<br />

SAML assumes the principal has enrolled with at least one identity provider. This identity provider is<br />

expected to provide local authentication services to the principal. However, SAML does not specify the<br />

implementation of these local services; indeed, SAML does not care how local authentication services<br />

82


Choompol Boonmee et al.<br />

are implemented. In this paper since the citizen registration authority works likely as the identity provider,<br />

the user information can be verified by using the citizen registration database. Since SAML is the open<br />

standards, this can be widely deployed with high interoperability.<br />

In order to easier access to the web page, bookmark or favorite functions in the browser software is often<br />

helpful. However it helps only quickly access the web page. The user needs to authenticate by using<br />

account name and password in order to login without any browser assistant. We proposed to develop a<br />

software system to improve the Internet browsing and sign-on process. The access should be enabled<br />

automatically when citizen ID card is inserted without double-click. This improves the authentication<br />

process.<br />

As mentioned above presently a lot of online public services have been already provided via the Internet.<br />

For the first use of each service typically a citizen needs to register for new account. He/she has to take<br />

several steps from ‘create an account’ process to provide personal information and to verify the<br />

information, interacting with the systems for a while to obtain the account name and password. Not only<br />

inconvenient these processes do not guarantee the correctness and the accuracy of the information.<br />

However it takes a long time for each service. This makes the online public services not successful. We<br />

proposed the use of citizen ID card in the ‘create an account’ process. This makes the new account<br />

registration process faster, easier and more accurate.<br />

3. Software developments<br />

In this paper we proposed the user authentication sign-on mechanism using oasis SAML standard with<br />

Thai citizen ID card. We designed and develop a software system to implement the mechanism. The<br />

conceptual architecture of the software system is shown in figure 4.<br />

Figure 4: The conceptual architecture of SSO system with combination of SAML standards and Thai<br />

citizen ID card<br />

In Thailand the department of provincial administration (DOPA) is the citizen registration authority who<br />

issues the citizen ID card to Thai citizen. It manages the Thai citizen database. The database stores the<br />

citizen ID card issuance information. We introduced the Identity Provider defined under the SAML<br />

standard. The identity provider have access to the citizen database in order to verify the correctness of<br />

personal information retrieved from the ID card. As existing all service providers manage their own<br />

account database however at the client side or user side the citizen has access to the ID card via<br />

smartcard reader.<br />

83


Choompol Boonmee et al.<br />

Figure 5: The software architecture of the SSO software developed<br />

The authentication result has been recorded together with the user photo from the webcam attached to<br />

the client computer. This can be used as an evidence for later crime investigation if required.<br />

This SSO links with the Internet browser. Thus the authentication can be used by the browser in order to<br />

sign on the multiple applications without more account name and password input. Since this mechanism<br />

is developed based on the SAML open standard, it can be deployed widely with more and more<br />

applications.<br />

The newly developed SSO software has graphical user interface which interact with the users when card<br />

inserted as shown in figure 6. It is hidden when the ID card is not inserted. It becomes visible<br />

automatically immediately when the ID card is inserted. It communicates the SAML server, it retrieves the<br />

list of applications which the citizen often use through the attributes of SAML records. It helps the citizen<br />

by providing some shot-cuts to the applications to the citizen for more convenience. It helps the citizen to<br />

access the service with less clicks.<br />

Figure 6: The screen shot of the SSO software<br />

The SSO software can interact with the service provider applications during the ‘create a new account’<br />

phase in order to improve the new account registration process. The service provider applications that<br />

required this functionality need to modify their software by adding a pieces java scripts (about less than<br />

20 lines of code) in to their pages.<br />

4. Experiments<br />

Since more than 30 million citizen ID cards have been issued to Thai citizens, presently most of Thai<br />

people do have the smartcard as national ID card. It could be effective to provide a better service using<br />

the proposed mechanism in the real situation. This prototype development software has been used in a<br />

number of government agencies and public service applications in order to enhance the effectiveness of<br />

public service. Those applications includes health care services in hospitals and sanitariums,<br />

transportation services (buying tickets), banks and insurance services, education services (students<br />

enrollments), other public services and so on. Based our experiments and observation, we found that<br />

84


Choompol Boonmee et al.<br />

about 40% of Thai citizens carrying the ID card in their wallets, be able to obtain the benefit from the<br />

citizen card in services. However the real effectiveness need to be studied and measured more in the<br />

future.<br />

5. Conclusions<br />

In Thailand a number of web application style online public service have been developed to serve a<br />

better service for citizens. A new personal authentication sign-on mechanism using OASIS SAML open<br />

standard with citizen ID smart card have been introduced. We developed software system based on this<br />

proposed methodology. This makes sign on process easier with ID card. This improves the security and<br />

reliability by verifying the ID card and the camera. This helps multiple services access with a single sign<br />

on. This improves a new account registering process faster and more accurate. This prototype<br />

development software has been used in a number of government agencies in order to enhance the<br />

effectiveness of public service. However the real effectiveness need to be studied and measured more in<br />

the future.<br />

Acknowledgements<br />

We thank to the department of provincial administration and electronic data interchange promotion<br />

association (http://www.edipa.org/) to provide support of the project. We also thank to all government<br />

agencies for the great contributions.<br />

References<br />

Abdulrahman A.Mirza, Khaled Alghathbar (2009) “Acceptance and Applications of Smart Cards Technology in<br />

University Settings”, 2009 Eighth IEEE International <strong>Conference</strong> on Dependable, Autonomic and Secure<br />

Computing, dasc, pp.746-748.<br />

Adam N.Joinson, (2009) “Privacy Concerns, Trust in Government and Attritudes to Identity Cards in the United<br />

Kingkom”, 42 nd Hawaii International <strong>Conference</strong> on System Sciences, hicss, pp.1-10.<br />

Bae-Ling Chen, Wen-Chung Kuo, Lih-Chyau Wuu (2009) “A Robust Remote User Authentication Scheme Using<br />

Smart Card”, 2009 Second International Symposium on Electronic Commerce and Security, pp.7-11.<br />

Chen Yang, Zhengtao Jiang, Jianjun Yang, (2010) “Novel Access Control Scheme with User Authentication Using<br />

Smart Cards”, cso, vol.2, 2010 Third International Joint <strong>Conference</strong> on Computational Science and<br />

Optimization, pp.387-389.<br />

Christian Mauro, Ali Sunyaev, Jan Marco Leimeister, Andreas Schweiger, and Helmut Krcmar (2008) "A Proposed<br />

Solution for Managing Doctor's Smart Cards in Hospitals Using a Single Sign-On Central Arthitecture",<br />

Proceedings of the 41st Annual Hawaii International <strong>Conference</strong> on System Sciences (HICSS 2008), hicss,<br />

pp.256.<br />

Georg Aichholzer , Stefan Strauss (2009) “The Citizen's Role in National Electronic Identity Management - A Casestudy<br />

on Austria”,<br />

2009 Second International <strong>Conference</strong> on Advances in Human-Oriented and Personalized Mechanisms,<br />

Technologies, and Services, pp. 45-50<br />

Greg Goth (2008) "Single Sign-on and Social Networks", IEEE Distributed Systems Online, vol.9, no.12, pp.1<br />

Hamed Taherdoost, Mazdak Zamani, Meysam Namayandeh, (2009) “Study of smart card technology and probe user<br />

awareness about it: A case study of Middle Eastern students”, 2009 2 nd IEEE International <strong>Conference</strong> on<br />

Computer Science and Information Technology, iccsit, pp.334-338.<br />

Herbert Leitold, Arno Hollosi, Reinhard Posch, (2002), “Security Architecture of the Austrian Citizen Card Concept”,<br />

acsac, 18 th Annual Computer Security Applications <strong>Conference</strong> (ACSCC ’02), pp 391<br />

Kaixing Wu, Xiaolin Yu (2009) "A Model of Unite-Authentication Single Sign-On Based on SAML Underlying Web",<br />

2009 Second International <strong>Conference</strong> on Information and Computing Science, ISBN: 978-0-7695-3634-7,<br />

http://doi.ieeecomputersociety.org/10.1109/ICIC.2009.162<br />

Minwei He (2009) “The Research of Security Technology on E-commerce based on the second generation identity ID<br />

card and fingerprint”, 2009 Second International Symposium on Electronic Commerce and Security, isecs,<br />

vol.1, pp.394-397.<br />

Pan Tiejun, Xiong Chunlei, Zheng Leina, Han Yufeng, Bai Lingbin, (2010) “ONE-CARD System based on the second<br />

generation ID card in China”, ice, 2010 International <strong>Conference</strong> on E-Business and E-Government, pp 108-<br />

111.<br />

Patrick Harding, Leif Johansson, Nate Klingenstein (2008) "Dynamic Security Assertion Markup Language:<br />

Simplifying Single Sign-On", http://www.computer.org/portal/web/csdl/doi/10.1109/MSP.2008.31<br />

Raja Naeem Akram, Konstantinos Markantonakis, Keith Mayes (2010) “Simulator Problem in User Centric Smart<br />

Card Ownership Model”, 2010 IEEE/IFIP International <strong>Conference</strong> on Embedded and Ubiquitious Computing,<br />

euc, pp.679-686.<br />

Ramaswamy Chandramouli, (2008) “Policy Specification and Enforcement for Smart ID cards deployment”, 2008<br />

IEEE Workshop on Policies for Distributed System and Networks, pp 127-134.<br />

Ramaswamy Chandramouli, Philip Lee (2007), “Infrastructure Standards for Smart ID Card Deployment”, IEEE<br />

Security and Privacy, vol.5, no.2, pp 99-96.<br />

85


Choompol Boonmee et al.<br />

Robert Nitschke, (2002) "National ID card, electronic ID card becomes reality in Europe", [online] NOVOSEC<br />

Aktiengesellschaft,http://www.novosec.com/documents/eCommerce_ElectronicIDcard.pdf<br />

Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Briller (2003) “Public Attitudes towards a National Identity “Smart Card”<br />

Privacy and Security Concerns”, 36 th Annual Hawaii International <strong>Conference</strong> on System Sciences (HICSS’03)<br />

– Track 5, hicss, vol.5, pp.139a.<br />

Takaaki Komura, Yasuhiro Nagai, Shoichi Hashimoto, Makiko Aoyagi, Kenji Takahashi (2009) "Proposal of<br />

Delegation Using Electronic Certificates on Single Sign-On System with SAML-Protocol", 2009 Ninth Annual<br />

International Symposium on Applications and the Internet, saint, pp.235-238.<br />

Weizhong Qiang, Aleksandr Konstantinov (2010) "The Design and Implementation of Standards-Based Grid Single<br />

Sign-On Using Federated Identity", 2010 IEEE 12th International <strong>Conference</strong> on High Performance Computing<br />

and Communications, hpcc, pp.458-464.<br />

Yen-Cheng Chen, Lo-Yao Yeh (2005) “An Efficient Authentication and Access Control Scheme Using Smart Cards”,<br />

11 th International <strong>Conference</strong> on Parallel and Distributed Systems –Workshops (ICPADS’05), icpads, vol.2,<br />

pp.78-82.<br />

86


A Pilot Development of PKI Digital Signature on Electronic<br />

Correspondence Using Citizen ID Smartcards<br />

Choompol Boonmee 1 , Peera Tharaphant 1 and Pipop Damtongsuk 2<br />

1<br />

Thammasat University, Klong Luang, Pathumthani, Thailand<br />

2<br />

Department of provincial administration, Bangkok, Thailand<br />

choompol@tu.ac.th<br />

peera@thaiidcard.net<br />

pipop@dopa.go.th<br />

Abstract: Since 2006 among Thai government agencies, official correspondence letters electronic interconnections<br />

have been developed under national electronic government interoperability framework or e-GIF. The project involved<br />

more than 40 ministerial departments and more than 15 electronic document software developers. The official letter<br />

was signed on the paper using pen. Then it was digitalized using scanner, and then is sent to destination agency<br />

electronically by using national standard XML schema. In 2001 electronic transaction act was announced allowing<br />

digital signature can be legally used in electronic documents. Since the year 2004 Thai citizens older than 15 years<br />

old are required to have citizen ID by law to certify his/her citizenship. Thai citizen ID card has a microchip as a<br />

secured personal information storage called smartcard. It also has PKI signature function that can be activated to<br />

create digital signature on electronic documents. The idea is that to adapt PKI digital signature on electronic official<br />

correspondence letter by using PKI function on Thai citizen ID card. Four ministries involved in this pilot development<br />

projects using smartcard in digitally signing of official electronic letters. The findings show that change management<br />

of existing business process and culture becomes significant even though the project seemed to be technically<br />

successful.<br />

Keywords: citizen ID card, digital signature, smart card, government document<br />

1. Readiness and expectation for electronic correspondence letter<br />

In Thai government there are more than two hundred ministerial departments and more than 7000 local<br />

government administration offices. They communicate to each other by using official correspondence<br />

letters based on specified regulations. The official correspondence letters can also be applied as<br />

command systems between government agencies.<br />

In order to send/receive an official letter from/to an agency typically the following process sequence is<br />

executed. For sending agency the process starts with writing the draft letter, followed by signing the letter<br />

by the top governor, creating the unique letter identifier (ID) number, after recording the ID in the<br />

registration book then make a copy and store it in the archive, folding and putting into an envelope and<br />

then sending the letter to the receiver. For the receiving party the process starts with receiving the letter,<br />

checking the receiver of the letter written on the envelope, recording the received letter in the registration<br />

book, issuing the receive notification, sending the receive notification to the sender, make a copy then<br />

deliver the letter to the receiver.<br />

A lot of such paper based correspondence letters have been produced daily. However since the whole<br />

process have been performed based on paper, the process takes much time. This becomes obstacles to<br />

improve public service efficiency and quality. Since 2004, Thai government had been developing the<br />

methodology and procedure for the electronic official correspondence letters. The procedure of<br />

correspondence letters had been performed based on paper at the first stage. Then the electronic<br />

procedure of correspondence letters was then allowed legally in the second stage. The third stage is to<br />

establish the data standard to enable the interoperability (Thailand 2006) (Sunet 2008) (Apitep 2008)<br />

(Choompol 2009). However the document signing process stills base on written signature style which<br />

becomes much time-taken and ineffective in document management. The objective of this paper is to<br />

study what facilitation is required to enable and to encourage the use of digital signature.<br />

As mentioned above at the first stage the whole process had been performed based on paper. In the<br />

second stage there had been a number of attempts trying to adapt the information and communication<br />

technology (ICT) in the correspondence letter management process. Some agencies tried to adopt<br />

electronic mail as a letter sending methodology. Others developed particular software systems in order to<br />

manage the whole process electronically. Those developed software systems are called electronic<br />

correspondence letter management system (e-CMS). As a result a lot of different e-CMS software had<br />

been developed. However they could not communicate to each other because there was no standard<br />

87


Choompol Boonmee et al.<br />

data format in common. In November 2006 Thailand Electronic Government Interoperability Framework<br />

(TH e-GIF) was first announced in order to enable the electronic collaboration among e-Government<br />

software systems (Thailand 2006) (Sunet 2008). Then in the third stage of the e-CMS evolution, the<br />

common data format for the official letter is created and announced as the first Thai electronic data<br />

standard. By using the common data format more than 40 government agencies can send/receive letter<br />

to/from each other by using more than 15 different e-CMS software systems (Apitep 2008). From the<br />

stage 1 through stage 3 the correspondence letter had been signed on papers using pen. It is digitalized<br />

using scanner, and then is sent to destination electronically by using the national standard data format<br />

based XML schema (Choompol 2009). Thai government had planned to enter the next stage of official<br />

letter communications. In this paper we introduced methodology and procedure to adopt digital signature<br />

in government document. Therefore the fourth stage is to sign the official letter digitally using digital<br />

signature standard.<br />

Figure 1 shows the evolutions of electronic correspondence letter management system (e-CMS) in<br />

Thailand. There have been three stages of evolutions and the next stage of development as mentioned<br />

above. In the 1 st stage both letter sending and archive management have been performed based on<br />

papers. In the 2 nd stage there had been various kinds of management software which could not be<br />

interoperated electronically. The letter sending was performed based on paper but the letter archive could<br />

be managed electronically. In the 3 rd stage both letter sending and archiving could be performed<br />

electronically (Apitep 2008) but the letter is signed on paper using pen. In the 4 th stage the signature will<br />

be performed digitally using digital signature standard which the methodology and procedure need to be<br />

designed.<br />

Figure 1: Electronic correspondence letter management system (e-CMS) evolutions in Thai government<br />

In 2001 electronic transaction act was announced allowing digital signature to be legally used in<br />

electronic documents. Digital signature is a digital code that can be attached to an electronic data that<br />

uniquely identifies the signer. Like a written signature, the purpose of a digital signature is to guarantee<br />

that the individual signing the message really is who he or she claims to be.<br />

A number of countries are issuing electronic ID cards to their citizens (Robert 2002) (Georg 2009) (Pan<br />

2010). Using those cards public agencies can provide better services to their citizens easier. Most main<br />

88


Choompol Boonmee et al.<br />

objectives are to improve security in online services and unify authentication (Herbert 2002)<br />

(Ramaswamy 2008) (Ramaswamy 2007) (Chen 2010) (Yen-Cheng 2005). Since the year 2004 Thai<br />

citizens older than 15 years old are required to have citizen ID by law to certify his/her citizenship. Thai<br />

citizen ID card has a microchip as a secured personal information storage called smartcard. The ID card<br />

also has PKI signature function that can be activated to create digital signature on electronic documents<br />

(Xin 2009) (Luon-Chang 2008) (Starr 2003) (Hamed 2009). In this paper we introduce the methodology<br />

and procedure to use the ID card as a signing tool to create digital signature for government document. In<br />

2009 the ministry of information and communication technology (MICT) started the pilot project to<br />

develop the PKI digital signature on electronic correspondence letter by using the citizen ID smartcard.<br />

In the series of developments mentioned above, Thai government has developed their readiness for<br />

electronic correspondence letters. Presently more than 60 government units can manage their<br />

documents electronically. They can send/receive correspondence letter electronically. The required law<br />

for electronic document has been established. However for higher effectiveness in document system,<br />

further research and development on digital signature adoption is required.<br />

This paper consists of six sections. After the evolution background of electronic government document is<br />

mention in this first section, then we clarify the objective of this study in the next section. In the third<br />

section the proposed methodology and procedure of digital signature are explained. The software<br />

development is in the fourth. The observations and discussions are in the fifth section. The last is<br />

conclusions.<br />

2. The requirements toward digital signature<br />

Digital signature is a digital code that can be attached to an electronic data that uniquely identifies the<br />

signer. Like a written signature, the purpose of a digital signature is to guarantee that the individual<br />

signing the message really is who he or she claims to be. A Public Key Infrastructure (PKI) supports the<br />

application of digital signature technology. PKI is defined as "a set of policies, processes, server<br />

platforms, software and workstations used for the purpose of administering certificates and public-private<br />

key pairs, including the ability to issue, maintain, and revoke public key certificates."<br />

PKI involves the use of two cryptographic keys, one private and one public. Information encrypted with<br />

one key in the pair can only be decrypted with the other key. Private keys are generally stored securely<br />

on the user's equipment that may be called signing equipment which can be thought to be an electronic<br />

pen in written signature. The publicly available key is embedded in a certificate with personal details<br />

about the user. The key is easily distributed through the Internet. Figure 2 shows the concept of digital<br />

signature process. Digital signatures use PKI technology to create legally binding proof of signature for<br />

online transactions or contracts. A digital signature is based on a mathematical transformation that<br />

combines the private key with the data to be signed in such a way that: Only someone possessing the<br />

private key can create the digital signature, providing authentication of the signing party. Anyone with<br />

access to the corresponding public key can verify the digital signature, enabling a non-repudiate<br />

transaction. Any modification of the signed data invalidates the digital signature, providing integrity proof<br />

for the parties involved.<br />

Figure 2: Digital signature: signing process and verifying process<br />

89


Choompol Boonmee et al.<br />

Generally smartcard with PKI signing function stores the private key securely and should not be allowed<br />

to be out of the card. The document signing process will be performed only inside the smartcard.<br />

Therefore the result signature value could not be computed elsewhere except the card.<br />

Figure 3 shows Thai citizen ID card. Thai citizen registration information is printed on the card surface.<br />

Presently more than 30 million cards have already been issued to Thai citizens by department of<br />

provincial administration (DOPA). The ID card is able to embed PKI signature functionality to create<br />

digital signature of electronic document. By using the function, the ID card can be used as digital signing<br />

equipment. However until now DOPA have been issuing the ID cards without digital signature function.<br />

Figure 3: Thai citizen ID card is a smartcard issued by department of provincial administration. More than<br />

30 million cards have already been issued to Thai citizens<br />

Since the communication between government agencies correspondence letter occurs every day,<br />

implementing digital signature in the real situation affects daily operation. In paper based signing<br />

procedure the signer uses pen to make his/her signature on the paper. The existing correspondence<br />

letter paper based signing procedure needs to be studied carefully in order to design a new procedure for<br />

digital signature.<br />

Figure 4 shows the signing procedure in stage 3 which is paper based signing or written signature. In this<br />

case the signer can physically see and touch the paper. He or she can use a pen to create a written<br />

signature on the paper. The procedure starts with creating the letter, signing the letter, through digitalizing<br />

the letter into electronic format then send to the receiver electronically. Since the sent letters need to be<br />

received and to be understood by various kinds of e-CMS software systems, the common standard<br />

electronic format had to be openly specified. Electronic correspondence letter documents have to be<br />

formatted compliant with the common standard format. Thai government established and openly<br />

announced the electronic standard format for correspondence letter (Apitep 2008). However the standard<br />

format did not support digital signature.<br />

Figure 4: Correspondence letter signing procedure in stage 3: paper based written signature<br />

90


Choompol Boonmee et al.<br />

Figure 5 shows the common standard electronic format of Thai correspondence letter. The left picture<br />

shows the paper based letter format which has been used for a very long time compliant with Thai<br />

regulations. The eXtensible Mark-up Language (XML) had been used as a basic international standard<br />

for the electronic format. The format includes several parts; letter ID, subject, secret, speed, sender,<br />

receiver, main letter and etc. In this stage it did not include digital signature. This common format has<br />

been used to send/receive the correspondence letter among Thai government agencies in stage 3 as<br />

mentioned above.<br />

Figure 5: Standard electronic correspondence letter format has no digital signature support in stage 3<br />

The requirement, for adopting digital signature in electronic correspondence letter, includes the signing<br />

methodology, private key holding methodology, the new electronic standard format which support digital<br />

signature, a newly modified signing procedure and a pilot project to encourage the real use in daily<br />

operations. The idea proposed in this paper is to adapt PKI digital signature on electronic official<br />

correspondence letter by enabling PKI function on Thai citizen ID card, to design and modify the<br />

document format of government document to support digital signature, to design and/or modify the<br />

procedure for digitally document signing and to promote and to encourage the use by running a pilot<br />

project.<br />

3. Methodology and procedure to use ID card as a signing tool<br />

In this research we embedded PKI function into the ID cards. The digital certificates have been issued to<br />

document signers by certificate authorities (CA) which the signer preferred and is compliant with the<br />

electronic transaction act. We used the ID card as a secure private key storage. This allowed Thai citizen<br />

ID card to become a document signing tool.<br />

By connecting smartcard reader to a computer the software can send an electronic document to the card<br />

and request for signing to the device. Figure 6 shows the concept how it works. The computer creates an<br />

electronic document then request to the card for signing. To maintain the interoperability we specified the<br />

methodology to interface with the card to be compliant with the Hardware Security Modules Public-Key<br />

Cryptography Standards (PKCS#11), published by RSA Laboratories, according to TH e-GIF. After<br />

signing process the card return the computed digital signature value back to the computer. Then the<br />

digital signature is attached to the original document using a new proposed specific format stated later.<br />

In order to make use of digital signature some procedure changes have to be made. We introduced the<br />

procedure of correspondence letter signing and management as shown in figure 7. Unlike paper based<br />

document in figure 4-5 there is no need to print the document on papers. The drafted unsigned document<br />

is delivered to the signer electronically. The signer verifies the document using a computer then inserts<br />

the ID card into the card reader in order to make a digital signature on the document. And again not like<br />

91


Choompol Boonmee et al.<br />

paper based document since it is already in the electronic form, there is no need to digitalize the<br />

document. When the signer decides to sign, he/she inserts the ID card and authenticates by using<br />

password and may additionally authenticate by finger print. In this procedure there is no need to print out<br />

the letter to sign by the signer. For the receiver side, there is also no need to print out to the reader.<br />

These would shorten document management process time and result higher effectiveness.<br />

Figure 6: The use of the citizen ID card as digital signing equipment<br />

Figure 7: The proposed letter signing procedure using citizen ID card: digital signature<br />

However the signed document needs to be shared with other parties. Typically correspondence letter will<br />

be delivered electronically from sending party to receiving party. It may be referred to and/or be reused<br />

by other parties as well. It should be based on open standard, independent and self contained. Therefore<br />

the signed correspondence letter needs to be formatted in a specific format. Standard format of the<br />

electronically signed correspondence letter had been designed as shown in figure 8. It had been<br />

announced by the ministry of information and communication technology in 2010. It is designed based on<br />

Thailand electronic government interoperability framework (TH e-GIF) which is a collection of open<br />

standard specifications, for examples, UN/CEFACT Modeling Methodology (UMM) (UN/CEFACT 2006),<br />

UN/CEFACT Core Component Technical Specification (UN/CEFACT 2003), UN/CEFACT XML Naming<br />

and Design Ruls (UN/CEFACT 2006), XML Signature and etc.<br />

In order to implement the digital signature with citizen ID card in Thai government official correspondence<br />

letter three issues have be considered; 1.enabling PKI function of the ID card, 2.developing the signing<br />

software and 3.changing the letter signing procedure. Since the first two issues depend on specific<br />

vendors who are experts in the fields, thus there is not much problem in managing the issues. However<br />

the last issue ‘changing the signing procedure’ likely becomes the most significant. With the newly<br />

designed procedure we proposed a pilot project to encourage and to promote the real use in government<br />

agencies. A number of agencies involved in the pilot project.<br />

92


Choompol Boonmee et al.<br />

Figure 8: The standard electronic format of singed document was designed to be delivered interoperable<br />

4. Software developments and experiments<br />

The ministry of information and communication technology started the pilot project adopting the citizen ID<br />

card in digital signature on the correspondence letters. More than ten ministerial departments involved in<br />

this pilot development projects using smartcard in digitally signing official electronic letters. They include<br />

the prime minister office (PMO), the ministry of finance (MOF), the ministry of transportation (MOT) and<br />

the ministry of information and communication technology (MICT). Under MICT there are eight ministerial<br />

departments which also involved in the project. In the project three types of signing equipments were<br />

allowed; USB token type, generic PKI smartcard type, and PKI enabled citizen ID card. All of the signing<br />

equipments are compliant with program interface open standard PKCS#11. This allows a developed<br />

software system to interface with the various kinds of signing devices without code modification. In this<br />

pilot project forty PKI enabled citizen ID cards had been issued to document singers in the project.<br />

Document signing software is developed for document signing in this project.<br />

Figure 9 shows the architecture of the document signing software developed in this pilot project. Since<br />

the software is developed using java technology, it can be executed on various operation system<br />

including Microsoft windows, linux and etc. It works with PKCS#11 compliance signing devices. In this<br />

case we used the PKI enabled citizen ID card as a signing device.<br />

Figure 9: The developed software architecture for digital signature<br />

Figure 10 shows some screen shot of the developed digital signature creation software. When the<br />

program is executed the top bar background color is ‘yellow’ which indicates that not ready for signing.<br />

When the signer is ready he/she presses the button on the screen then the bar color becomes ‘green’<br />

which indicates that it is ready to receive a letter to sign. When the draft letter is created it will be sent<br />

from the central server to the signing software via the Internet using open standard specifications, for<br />

examples, https, reverse SOAP, ws-addressing, ws-security, etc. When the signing software received the<br />

document for signing the bar color becomes ‘orange’ which indicates that there is an unsigned document<br />

waited to be signed. Then after the signer verify the content of the letter properly, the signer then inserts<br />

the ID card into the card reader and input the password to create the digital signature. The software<br />

sends the document to the card to compute the signature value. The software retrieves the returned<br />

93


Choompol Boonmee et al.<br />

signature value put them together with the original document in the standard format specified. Then this<br />

signed document will be sent to the receiver by using standard communication protocols.<br />

Figure 10: Screen shots of digital signature software are shown; 1.wait for new unsigned letter, 2.the<br />

letter is ready to be signed and 3.It is prompted to alert the signer to insert the ID card and<br />

put the password to sign the letter<br />

5. Observations and discussions<br />

A number of ministerial departments involved in the pilot project of using digital signature. There were<br />

222 signers from those agencies involved in the project. The digital certificates have been issued for<br />

them. Among these signers forty of them chose Thai citizen ID cards as a signing tool or a private key<br />

holder. The newly designed procedure had been used for the correspondence letter signing procedure.<br />

The newly designed standard electronic format had been used to store the signed document for<br />

interoperability. The newly developed software has been used to sign the correspondence letter digitally.<br />

The observations of the experiments in the pilot project have been performed for more than three<br />

months. A number of correspondence letters have been created and digitally signed. In the project a<br />

number of people with different roles get involved; draft writers, signers, senders, receivers, document<br />

management staffs, and so on. All of them have been familiar with the legacy paper based signature for a<br />

long time. All agencies in the project developed and deploy their signing software. They started signing<br />

document following the procedure proposed, send/receive the correspondence letter following the<br />

standard formats, and some of them use citizen ID cards as signing tool.<br />

However since they have not been familiar with digital signature, they may have no confidence with pure<br />

digital signature without pen-based/paper-based signature. Most organizations in the project decided to<br />

use both signature methods to ensure the formality of the documents. Based on our observations, they<br />

first create the correspondence letter and print out on the paper. Then they let the signer firstly sign the<br />

document on the paper, then digitize it into electronic format using the standard. For the letter receivers,<br />

instead of reading the received letter via compute, they preferred to print out on the paper first then<br />

deliver to the reader.<br />

Figure 11 shows the procedure exactly used in the project. Instead of just writing the draft and send to<br />

the signer electronically as the proposed procedure, they firstly print out on papers, let the signer sign on<br />

the paper, then digitalize it into electronic format using scanner then digitally sign. Basically this is not<br />

against the procedure proposed since finally the letter is delivered to the signer electronically then is<br />

signed digitally using the ID card. For the receiver party, they preferred to print out on the paper for<br />

94


Choompol Boonmee et al.<br />

reading. However this additional extra process of paper base signing does neither shorten the time<br />

consumed nor enhance the effectiveness as expected.<br />

Figure 11: Base on the observation of using digital signature to replace legacy procedure in the pilot<br />

project, we found; a) the officer is not confident enough to purely sign digitally, he/she signs<br />

on the paper before digitalization and then digitally sign and b) he/she still need the<br />

touchable paper, he/she prints it out<br />

This may be because various people involved get used to the paper base documents for a long time.<br />

Based on our interviews, they need more practice regulation and/or guideline manuals to ensure the<br />

formality of the digital signature of the correspondence letter.<br />

6. Conclusions<br />

A number of signers in the project have been using the system to signing and sending the electronic<br />

correspondence letter for a period of time. Based on our observations and interviews we found that the<br />

significant obstacle is the change of the signing procedure. Various kinds of personnel involved in the<br />

procedure, from writing the draft letter, verifying the letter, signing methodology, registering the document<br />

and sending/receiving the letter. Especially the draft writer and the signer interact to each other most<br />

often until the letter is signed and sent. Based on our observations and interviews, it seems that they still<br />

need the touchable paper based signed documents, despite that the law approved the equality of<br />

electronic document and paper-base document. The findings showed that change management of<br />

existing business process and culture becomes significant even though the project seem to be technically<br />

successful. They need more specific regulations and practice guideline for more confidence. Future study<br />

on the change management and support was planned to be performed.<br />

Acknowledgements<br />

We thank to department of provincial administration and ministry of information and communication<br />

technology to provide support of the project. We also thank to all government agencies for the great<br />

contributions.<br />

References<br />

Apitep Saekow, Ajin Jirachiefpattana, Choompol Boonmee (2008) "Electronic Government Interoperability in<br />

Thailand: A Pilot Project on Official Electronic Correspondence Letters Exchange between Heterogeneous<br />

Software Products", 8th <strong>European</strong> <strong>Conference</strong> on E-Government.<br />

Chen Yang, Zhengtao Jiang, Jianjun Yang, (2010) “Novel Access Control Scheme with User Authentication Using<br />

Smart Cards”, cso, vol.2, 2010 Third International Joint <strong>Conference</strong> on Computational Science and<br />

Optimization, pp.387-389.<br />

Choompol Boonmee, Apitep Saekow (2009) "Data Set Standardization and Its Reusability in e-government under an<br />

interoperability framework --- A pilot project to enhance the reusability of the agreed data sets in seven<br />

government domains ---", 9th <strong>European</strong> <strong>Conference</strong> on E-Government.<br />

95


Choompol Boonmee et al.<br />

Georg Aichholzer , Stefan Strauss (2009) “The Citizen's Role in National Electronic Identity Management - A Casestudy<br />

on Austria”,<br />

2009 Second International <strong>Conference</strong> on Advances in Human-Oriented and Personalized Mechanisms,<br />

Technologies, and Services, pp. 45-50<br />

Hamed Taherdoost, Mazdak Zamani, Meysam Namayandeh, (2009) “Study of smart card technology and probe user<br />

awareness about it: A case study of Middle Eastern students”, 2009 2 nd IEEE International <strong>Conference</strong> on<br />

Computer Science and Information Technology, iccsit, pp.334-338.<br />

Herbert Leitold, Arno Hollosi, Reinhard Posch, (2002), “Security Architecture of the Austrian Citizen Card Concept”,<br />

acsac, 18 th Annual Computer Security Applications <strong>Conference</strong> (ACSCC ’02), pp 391<br />

Iuon-Chang Lin, Chin-Chen Chang (2008) “A Novel Digital Signature Scheme for Application of Document Review in<br />

a Linearly Hierarchical Organization”, 2008 International <strong>Conference</strong> on Intelligent Information Hiding and<br />

Multimedia Signal Processing, iih-msp, pp.1367-1370.<br />

Pan Tiejun, Xiong Chunlei, Zheng Leina, Han Yufeng, Bai Lingbin, (2010) “ONE-CARD System based on the second<br />

generation ID card in China”, ice, 2010 International <strong>Conference</strong> on E-Business and E-Government, pp 108-<br />

111.<br />

Ramaswamy Chandramouli, (2008) “Policy Specification and Enforcement for Smart ID cards deployment”, 2008<br />

IEEE Workshop on Policies for Distributed System and Networks, pp 127-134.<br />

Ramaswamy Chandramouli, Philip Lee, “Infrastructure Standards for Smart ID Card Deployment”, IEEE Security and<br />

Privacy, vol.5, no.2, pp 99-96.<br />

Robert Nitschke, (2002) "National ID card, electronic ID card becomes reality in Europe", [online] NOVOSEC<br />

Aktiengesellschaft,http://www.novosec.com/documents/eCommerce_ElectronicIDcard.pdf<br />

Starr Roxanne Hiltz, Hyo-Joo Han, Vladimir Briller (2003) “Public Attitudes towards a National Identity “Smart Card”<br />

Privacy and Security Concerns”, 36 th Annual Hawaii International <strong>Conference</strong> on System Sciences (HICSS’03)<br />

– Track 5, hicss, vol.5, pp.139a.<br />

Sunet Boonmee, Mr.Apitep Saekow, Choompol Boonmee (2008) "A Group Collaboration Support System to Assist<br />

Building and Managing National Core Component Dictionary and XMLSchema Standards", 8th <strong>European</strong><br />

<strong>Conference</strong> on E-Government.<br />

Thailand, Ministry of Information and Communication Technology (2006) “Thailand e-Government Interoperability<br />

Framework Version 1.0”<br />

UN/CEFACT (2006), Techniques and Methodologies Group, United Nations Centre for Trade Facilitation and<br />

Electronic Business. (UN/CEFACT), “UN/CEFACT Modeling Methodology Version 1.0 Technical specification<br />

(UMM).”<br />

UN/CEFACT (2003), Techniques and Methodologies Group, United Nations Centre for Trade Facilitation and<br />

Electronic Business. (UN/CEFACT), “Core Components Technical Specification (CCTS) – Part 8 of the ebXML<br />

Framework.”<br />

UN/CEFACT (2006), Techniques and Methodologies Group, United Nations Centre for Trade Facilitation and<br />

Electronic Business. (UN/CEFACT), “XML Naming and Design Rules Version 2.0 (NDR).”<br />

Xin Yu, Lishuan Hu (2009) “Digital Signature Based on User Role Token and Its Application to E-Government”, 2009<br />

International <strong>Conference</strong> on E-Learning, E-Business, Enterprise Information Systems, and E-Governemtn.<br />

Yen-Cheng Chen, Lo-Yao Yeh (2005) “An Efficient Authentication and Access Control Scheme Using Smart Cards”,<br />

11 th International <strong>Conference</strong> on Parallel and Distributed Systems –Workshops (ICPADS’05), icpads, vol.2,<br />

pp.78-82.<br />

96


Development of Electronic Correspondence Letter Time-<br />

Stamping Service Using Oasis Digital Signature Services<br />

Choompol Boonmee 1 , Rattapol Chatchumsai 1 and Sunet Boonmee 2<br />

1<br />

Thammasat University Rangsit Campus, Pathumthani, Thailand<br />

2<br />

IT Dabos Co. Ltd., Bangkok, Thailand<br />

choompol@tu.ac.th<br />

rattapol@thaiidcard.net<br />

sunet@itdabos.co.th<br />

Abstract: Since 2006 among Thai government agencies, official correspondence letters electronic interconnections<br />

have been developed under national electronic government interoperability framework or e-GIF. The project involved<br />

more than 40 ministerial departments and more than 15 software developers. In the correspondence sending and<br />

receiving process, time-stamping and its reliability become significant. In 2001 electronic transaction act was<br />

announced promoting digital signature can be legally used in electronic documents. The computer crime act B.E.<br />

2550 requires that servers synchronize with a public time server and maintain precision. The Organization for the<br />

Advancement of Structured Information Standards (OASIS) has developed the Digital Signature Services (DSS)<br />

standard to let administrators control centralized digital signature systems. In this paper we proposed the<br />

development of electronic correspondence letter time-stamping service using the DSS standard.<br />

Keywords: citizen ID card, digital signature, timestamp, government document<br />

1. Introduction<br />

In electronic government where there is not complete trust between documents’ sender and receiver<br />

operation time, something more than authentication is needed. The most attractive solution to this<br />

problem is the digital signature with current time of the third reliable party which is analogous to the<br />

handwritten signature. The signature is formed by taking the hash of the message and encrypting the<br />

message and the time with the creator’s private key. It guarantees the source and integrity of the<br />

operation time. A number of signature algorithms have been developed and deployed (Zhu 2008)( Xiaomi<br />

2009). Trusted timestamp authority has been established by national standard time service in some<br />

countries (Hong-Jiao 2008). In Japan the official gazette needs the timestamp service to enhance the<br />

document reliability (Japan 2011). In Malaysia there have been attempts to utilize digital timestamp (Kok-<br />

Wah). In Thai government there are more than two hundred ministerial departments and more than 7000<br />

local government administration offices. They communicate to each other by using official<br />

correspondence letters based on specified regulations. When the letter is sent and/or received<br />

electronically the reliable operation time becomes important. However most of the timestamp service<br />

patterns previously developed does not suit the correspondence letter timestamp requirements.<br />

In order to send/receive a paper based official correspondence letter from/to government agencies<br />

typically the following process sequence is performed. For sending agency the process starts with writing<br />

the draft letter, followed by signing the letter by the governor, creating the unique letter identifier (ID)<br />

number, after recording the ID in the registration book then make a copy and store it in the archive,<br />

folding the letter and putting into an envelope and then sending the letter to the receiver and recording<br />

the sending time. For the receiving party the process starts with receiving the letter, checking the receiver<br />

of the letter written on the envelope, recording the received letter and time-stamp in the registration book,<br />

after checking the validity of the received letter then issuing the acceptance notification, sending the<br />

accepting notification and time-stamp to the sender, make a copy then deliver the letter to the receiver.<br />

The whole process had been performed based on paper for a long time. The time-stamping has been<br />

performed for two points of time; the sending time, and the accepting time.<br />

In November 2006 Thailand Electronic Government Interoperability Framework (TH e-GIF) was first<br />

announced in order to enable the electronic collaboration among eGovernment software systems<br />

(Thailand 2006) (Sunet 2008). The common electronic data format for the official letter is created and<br />

announced as the first Thai electronic data format standard. By using the common data format more than<br />

40 government agencies could send/receive letter to/from each other by using more than 15 different<br />

electronic correspondence management systems (e-CMS) (Apitep 2008).<br />

As occurred in paper based correspondence letter communication, time-stamping becomes important in<br />

electronic communication. Since delivering letter electronically can be performed very fast and there may<br />

97


Choompol Boonmee et al.<br />

be trouble during the communication, three significant points of time have been taken into account; letter<br />

sending time, letter received time and accepted time. Figure 1 shows three significant points of time in<br />

electronic correspondence letter communication. The issue focuses on the reliability, the openness and<br />

the acceptability of the timestamp methodology and procedure.<br />

Figure 1: Electronic correspondence letter communication and the operation time concerned<br />

When the document is created, signed and sent, the sending time is stamped on the document to prove<br />

that the document was sent at or before the point of time. When the letter was received by the e-CMS of<br />

the receiver party, the receiving time was stamped on the document to prove that the document was<br />

received at or before the point of time. Similarly after the receiver checked the validity of the document<br />

then accept the letter, the accepting time was stamped on the document to guarantee that the document<br />

was accepted by the receiver party at or before the point of time.<br />

Figure 2: The time concerned includes 1.letter sending time, 2.letter received time and 3. letter accepted<br />

time<br />

Figure 3 shows a correspondence letter with timestamps. This set of information is often required in<br />

various situations in order to prove the integrity of the document and its operation time. The problems<br />

include;<br />

No national standard timestamp mechanism, which guarantees that the correspondence letter has<br />

not been changed since a specific point time, is specified.<br />

No timestamp protocol of digital signature service, which is open and technology neutral to allow fair<br />

competition in the e-CMS market, is specified.<br />

No standard encryption for timestamp service protocol is specified since the confidentiality of<br />

correspondence letter is needed.<br />

No national timestamp service with reliable standard clock is available<br />

No nationwide accepted data standard format for storing and managing correspondence letters with<br />

timestamps. This becomes significant since the information has to be shared and visible among Thai<br />

government.<br />

98


Choompol Boonmee et al.<br />

Centralized styled timestamp service introduces network congestion at the center. This issue can be<br />

a bottle neck problem.<br />

Figure 3: The correspondence letter with timestamps ensures the time it was sent, the time it was<br />

received by the receiver party and the time it was accepted<br />

2. Standard time and time-stamping<br />

Electronic clocks in most servers, workstations and networking devices keep inaccurate time. Most of<br />

these clocks are set by hand to within a minute or two of actual time and are rarely checked after that.<br />

Many of these clocks are maintained by a battery-backed, clock-calendar device that may drift as much<br />

as a second per day. Having any sort of meaningful time synchronization is almost impossible if such<br />

clocks are allowed to run on their own. In document time-stamping time synchronization is critical. The<br />

Network Time Protocol (NTP) has long been the widely used time-setting software. In NTP, stratum<br />

levels define the distance from the reference clock. A reference clock is a stratum-0 device that is<br />

assumed to be accurate and has little or no delay associated with it. The reference clock typically<br />

synchronizes to the correct time (UTC). Stratum-0 servers cannot be used on the network, instead, they<br />

are directly connected to computers which then operate as stratum-1 servers.<br />

A stratum-2 server is connected to the stratum-1 server over the network. Thus, a stratum-2 server gets<br />

its time via NTP packet requests from a stratum-1 server. A stratum-3 server gets its time via NTP packet<br />

requests from a stratum-2 server, and so on. Thailand’s Computer Crime Act B.E. 2550 (A.D. 2007) took<br />

effect on July 19, 2007. The Act requires that servers synchronize with a public time server and maintain<br />

precision. This can be used as a reliable correct time for timestamp.<br />

Trusted time-stamping is the process of securely keeping track of the creation and modification time of a<br />

document. Security here means that no one, not even the owner of the document, should be able to<br />

change it once it has been recorded provided that the timestamper's integrity is never compromised<br />

(Karel 2002) (Pei-yih 2008) (Arne 2003).<br />

A trusted timestamp is a timestamp issued by a trusted third party (TTP) acting as a time-stamping<br />

authority (TSA). It is used to prove the existence of certain data before a certain point, in the e-CMS<br />

communication, for examples sending time, receiving time and accepting time, without the possibility that<br />

the owner can backdate the timestamps as shown in figure 4. Multiple TSAs can be used to increase<br />

reliability and reduce vulnerability.<br />

Anyone trusting the time-stamper can then verify that the document was not created after the date that<br />

the time-stamper vouches (Xin 2009) (Luon-Chang 2008) (Karel 2002) (Pei-yih 2008). It can also no<br />

longer be repudiated that the requester of the timestamp was in possession of the original data at the<br />

time given by the timestamp. As shown in figure 5 to prove this the hash of the original data is calculated,<br />

the timestamp given by the TSA is appended to it and the hash of the result of this concatenation is<br />

calculated, call this hash X. Then the digital signature of the TSA needs to be validated. This can be done<br />

by checking that the signed hash provided by the TSA was indeed signed with their private key by digital<br />

signature verification. The hash X is compared with the hash B inside the signed TSA message to<br />

confirm they are equal, proving that the timestamp and message is unaltered and was issued by the TSA.<br />

If not, then either the timestamp was altered or the timestamp was not issued by the TSA. In 2001<br />

electronic transaction act was announced allowing digital signature can be legally used in electronic<br />

documents. Therefore the time-stamping on the document can be legally referenced by the law.<br />

The requirements around correspondence letter management system (e-CMS) timestamp include;<br />

99


Choompol Boonmee et al.<br />

A timestamp standard methodology and storing format to guarantee that the correspondence letter<br />

has not been changed since a specific point time is required.<br />

A request/response styled standard protocol, which is technology neutral and easy to implement, is<br />

required.<br />

A national timestamp service for correspondence letter needs to be developed and made available<br />

using the reliable standard time.<br />

Centralized network congestion and data confidentiality need to be considered.<br />

A national data standard of correspondence letter with time timestamps needs to be developed.<br />

Figure 4: The trusted time-stamping process shows that the time-stamping is computed using private key<br />

in PKI<br />

Figure 5: Verifying the validity of the time-stamping afterward<br />

3. Main idea<br />

The main idea is to use the trusted time-stamping model in correspondence letter communication. One<br />

time-stamp server (TSS) is established in order to perform the centralized time-stamping process. The<br />

TSS clock is synchronized with Thailand public standard time maintained by National Institute of<br />

Metrology as specified by law, stratum 2.<br />

The correspondence letter communication time-stamping model is introduced as shown in figure 6.<br />

Logically one time-stamp server (TSS) is established as one document stamper with one standard time<br />

clock. The TSS is authorized as a trusted party to stamp time together with the document at a certain<br />

point of time.<br />

There is one centralized document stamper called Time-stamp server (TSS) as shown in figure 7. The<br />

TSS works like a centralized document stamper. It receives the time-stamp requests, computes the timestamp<br />

with the requested document then returns the digital signature to the requester. When a<br />

correspondence letter is sent, is received or is accepted, a request for time-stamp is sent to TSS in order<br />

to compute the document time-stamping properly. The TSS processes the request by computing the PKI<br />

digital signature with the document and current time then returns the digital signature called time-stamp<br />

100


Choompol Boonmee et al.<br />

vouches. The digital signature service protocol is selected to be used as the open standard timestamp<br />

protocol.<br />

Figure 6: The proposed model for correspondence letter time-stamping set one document stamper as<br />

time-stamp server (TSS) with one clock synchronized to the Thailand public standard time<br />

Figure 7: Time-stamp server (TSS) works as a centralized document stamper, it receives the time-stamp<br />

requests, computes the time-stamp with the requested document then returns the digital<br />

signature to the requester as its response<br />

Figure 8 shows the concept of the correspondence letter with three time-stamps; sending, receiving and<br />

accepting time-stamps of the letter. The timestamps are digitally signed using PKI. They can also no<br />

longer be repudiated that the requester of the timestamp was in possession of the original data at the<br />

time given by the timestamp. Since this information need to be shared among government agencies and<br />

becomes significant in various situations, the national accepted open data format need to be specified.<br />

Since the correspondence letters need to be sent, received and shared by various kinds of e-CMS<br />

software systems, the common standard electronic format had to be specified and announced based on<br />

world wide web consortium (W3C) ‘s XML signature standard. All electronic correspondence letter<br />

documents have to be formatted compliant with the common format. Figure 9 shows the sample standard<br />

format of the correspondence letter without time-stamp vouches. In the figure left picture is the paper<br />

based correspondence letter while the right picture shows the corresponding electronic format.<br />

101


Choompol Boonmee et al.<br />

Figure 8: The correspondence letter with time-stamp vouches; sending, receiving and accepting of the<br />

letter<br />

Figure 9: Sample standard format of the electronic correspondence letter without time-stamp vouches<br />

Respectively since the time-stamp vouches need to be shared by various parties, the common standard<br />

electronic format had to be specified. All electronic correspondence letter with time-stamp vouches have<br />

to be formatted compliant with the common format. Figure 10 shows the sample standard format of the<br />

correspondence letter with time-stamp vouches. In the figure the left picture is the paper based<br />

correspondence letter while the right picture shows the corresponding electronic format with time-stamp<br />

vouches. This standard format has been then formally accepted to store and manage the<br />

correspondence letter among Thai government agencies.<br />

In the model proposed the time-stamp server (TSS) need to be developed using some specific protocols<br />

and standards. The communication between time-stamp requester and TSS can be designed as simply<br />

as request-response style web services.<br />

Figure 11 shows the request-response style communication between time-stamp requester and TSS. The<br />

time-stamp requester sends a time-stamp request with document to the TSS. The TSS then computes<br />

digital signature of the document with current time and returns the time-stamp vouch with signature value<br />

back to the requester. According to TH e-GIF mentioned earlier the open standards and/or protocols<br />

have to specified and announce openly for the higher interoperability. The OASIS Digital Signature<br />

service specification had been chosen for the communication (Nick 2006) (Stefan 2007) (Trevor 2007).<br />

The specification describes two XML-based request/response protocols – a signing protocol and a<br />

verifying protocol. Through these protocols a client can send documents (or document hashes) to a<br />

server and receive back a signature on the documents; or send documents (or document hashes) with a<br />

signature to a server, and receive back an answer on whether the signature verifies the documents.<br />

102


Choompol Boonmee et al.<br />

Figure 10: Sample standard format of the electronic correspondence letter with three time-stamp<br />

vouches; sending time, receiving time and accepting time<br />

Figure 11: Request-response style communications between time-stamp requester and TSS<br />

These operations could be useful in various contexts – for example, they could allow clients to access a<br />

single corporate key for signing press releases, with centralized access control, auditing, and archiving of<br />

signature requests. They could also allow clients to create and verify signatures without needing complex<br />

client software and configuration.<br />

Figure 12 and 13 show samples of time-stamp request/response which are send/receive to/from<br />

requester and TSS based on OASIS DSS standard. This customized timestamp service protocol<br />

becomes a national accepted standard for correspondence letter timestamp.<br />

Figure 12: Sample time-stamp request which is sent from the requester to the TSS.<br />

103


Choompol Boonmee et al.<br />

Figure 13: Sample time-stamp response which is sent from the TSS back to the requester to<br />

The proposed idea mentioned above can be summarized as followed;<br />

XML signature standard published by W3C has been chosen for timestamp open standard to<br />

guarantee that the correspondence letter has not been changed since a specific point time.<br />

OASIS digital signature service (DSS) with timestamps has been chosen as an open standard<br />

request/response styled protocol which is technology neutral, easy to implement, to allow fair<br />

competition in the e-CMS market.<br />

National standard timestamp service for correspondence has been developed and made available in<br />

the government network using the clock synchronized with national standard time.<br />

The timestamp service request has been specified so that the correspondent letter itself is not sent<br />

with the timestamp request, but only the computed hash number is sent to the timestamp service to<br />

solve the central network congestion.<br />

XML encryption standard published by W3C has been chosen to encrypt the data to keep the<br />

confidentiality during the timestamp communication.<br />

A national data standard of correspondence letter with timestamps has been developed using XML<br />

schema under TH e-GIF. It is independent and self-contained it can be viewed by using any software<br />

not a specific software.<br />

4. Experiments and analysis<br />

In 2009 the proposed time-stamp model had been introduced. The ministry of information and<br />

communication technology (MICT) started the pilot project to implement the concept in the real systems.<br />

More than 40 ministerial departments had involved in the project. Those parties have their own different<br />

e-CMS software in use. The software systems had been modified to support the new concept of timestamping.<br />

There had been more than 15 software vendors involved in the software modification. One<br />

newly introduced time-stamp server was developed to support the time-stamping concept proposed in<br />

this paper.<br />

The development and implementation of the new concept finished successfully. After a real use of the<br />

system for a period of time, we found that some problems arise. One important problem, due the stability<br />

and bandwidth of the overall network connection, is the bottle-neck of the only one time-stamp server<br />

(TSS). On every sending/receiving of document the request/response type connection to TSS have to be<br />

established, cause the large traffic from all nodes toward TSS. This problem may need to be studied<br />

more in the future.<br />

104


Choompol Boonmee et al.<br />

The result of the experiments can be summarized as the following;<br />

The international standard, XML signature published by W3C has been used to store timestamp<br />

required to guarantee the integrality of the correspondence letter at or before a point time.<br />

The open standard protocol for OASIS digital signature service (DSS) has been selected to use with<br />

timestamp which is technology neutral, easy to implement, to allow fair competition in the e-CMS<br />

market. However some supports and services may be needed to promote the development, for<br />

example, software compliant test services.<br />

The national data standard for managing correspondence letter with timestamp has been established<br />

and openly available.<br />

Without sending the clear text correspondence letter with timestamp request, the required bandwidth<br />

for centralized timestamp services become smaller. The congestion problem is then resolved.<br />

However for security reason the redundant design of the services may be required.<br />

Since the XML encryption standard is chosen as a methodology to encrypt the confidentiality of data<br />

is resolved while keeping fair play in the market place. However this process consume much<br />

computing resource, further study on this may be required.<br />

The procedures, protocols and formats of storing and managing correspondence letters with timestamp<br />

have been established. They can be retrieved and reused later in various situations as legal evidences<br />

with high interoperability.<br />

5. Conclusions<br />

By using the common data format more than 40 government agencies can send/receive letter to/from<br />

each other by using more than 15 different electronic correspondence management systems (e-CMS).<br />

The document time-stamping becomes as important in electronic communication. The trusted timestamping<br />

is the required process of securely keeping track of the creation and modification time of a<br />

document. The main idea is to use the trusted time-stamping model mentioned above. One time-stamp<br />

server (TSS) is established in order to perform the centralized time-stamping process. When a<br />

correspondence letter is sent, is received or is accepted, a request for time-stamp is sent to TSS in order<br />

to compute the document time-stamping. The TSS processes the request by computing the PKI digital<br />

signature with the document and current time then returns the digital signature called time-stamp vouch.<br />

The time-stamp requester sends a time-stamp request with document to the TSS.<br />

The TSS computes digital signature of the document with current time and returns the time-stamp<br />

vouches with signature value back to the requester. The open standards and/or protocols have to<br />

specified and announce openly for the higher interoperability. The OASIS Digital Signature service<br />

specification, XML-based request/response protocols, was chosen for the communication. More than 40<br />

ministerial departments and more 15 vendors had involved in the time-stamp implementation project. The<br />

centralized network congestion problem needs to be studied more in the future.<br />

Acknowledgements<br />

We thank to the ministry of information and communication technology and electronic data interchange<br />

promotion association (http://www.edipa.org/) to provide support to the project. We also thank to all<br />

government agencies for the great contributions.<br />

References<br />

Arne Ansper, Ahto Buldas, Margus Freudenthal, Jan Willemson (2003) “Scalable and Efficient PKI for Inter-<br />

Organizational Communication”, 19 th Annual Computer Security Applications <strong>Conference</strong> (ACSAC ’03), acsac,<br />

pp.308.<br />

Apitep Saekow, Ajin Jirachiefpattana, Choompol Boonmee (2008) "Electronic Government Interoperability in<br />

Thailand: A Pilot Project on Official Electronic Correspondence Letters Exchange between Heterogeneous<br />

Software Products", 8th <strong>European</strong> <strong>Conference</strong> on EGovernment.<br />

Hong-Jiao Ma, Yu Hua, Wei Guo (2008) "Electronic Time Stamping Safety and Efficiency Optimize Technique<br />

Research," isecs, pp.1033-1036, 2008 International Symposium on Electronic Commerce and Security, 2008<br />

Japan Nation Printing Bureau (2011) "Official Gazette - Digital Signature and Time Stamp", [online],<br />

http://www.npb.go.jp/en/books/index.html<br />

Kok-Wah Lee, Gita Radhakrishna, and Lake-Tee Khaw, (2007) “The Proof of Copyright Ownership Using Digital<br />

Timestamp in Malaysia”, Proceedings of the MMU International Symposium on Information and<br />

Communications Technologies 2007 (MMU-M2USIC 2007), TS3A-1.pdf, pp. 20 & 37.<br />

105


Choompol Boonmee et al.<br />

Nick Pope, Juan Carlos Cruellas (2006) “Oasis Digital Signature Services: Digital Signing without the Headaches”,<br />

IEEE Internet Computing, vol.10, no.5, pp.88-84.<br />

Karel Wouters, Bart Preneel, Ana Isabel, Arturo Ribagorda (2002) “Towards an XML format for time-stamps”,<br />

Proceeding XMLSEC’02 Proceedings of the 2002 ACM workshop on XML security, ISBN:1-58113-632-3.<br />

Luon-Chang Lin, Chin-Chen Chang (2008) “A Novel Digital Signature Scheme for Application of Document Review in<br />

a Linearly Hierarchical Organization”, 2008 International <strong>Conference</strong> on Intelligent Information Hiding and<br />

Multimedia Signal Processing, iih-msp, pp.1367-1370.<br />

Pei-yih Ting, Fang-dar Chu (2008) “Enhancing the Security Promise of a Digital Time-Stamp”, 22 nd International<br />

<strong>Conference</strong> on Advanced Information Networking and Applications, aina, pp.342-347.<br />

Stefan Drees (2007) "Digital Signature Service Core Protocols, Elements, and Bindings Version 1.0<br />

OASIS Standard", Organization for the Advancement of Structured Information Standards, http://docs.oasisopen.org/dss/v1.0/oasis-dss-core-spec-v1.0-os.pdf<br />

Sunet Boonmee, Mr.Apitep Saekow, Choompol Boonmee (2008) "A Group Collaboration Support System to Assist<br />

Building and Managing National Core Component Dictionary and XMLSchema Standards", 8th <strong>European</strong><br />

<strong>Conference</strong> on EGovernment.<br />

Thailand, Ministry of Information and Communication Technology (2006) “Thailand eGovernment Interoperability<br />

Framework Version 1.0”<br />

Trevor Perrin (2007) "XML Timestamping Profile of the OASIS Digital Signature Services Version 1.0 OASIS<br />

Standard", Organization for the Advancement of Structured Information Standards, http://docs.oasisopen.org/dss/v1.0/oasis-dss-profiles-timestamping-spec-cs-v1.0-os.pdf<br />

Xiaomi An, (2009) "The Electronic Records Management in EGovernment Strategy: Case Studies and the<br />

Implications," 2009 International <strong>Conference</strong> on Networking and Digital Society, icnds, vol. 1, pp.17-20<br />

Xin Yu, Lishuan Hu (2009) “Digital Signature Based on User Role Token and Its Application to EGovernment”, 2009<br />

International <strong>Conference</strong> on E-Learning, E-Business, Enterprise Information Systems, and E-Governemtn.<br />

Zhu Na, Xiao Guo Xi (2008) "The Application of a Scheme of Digital Signature in Electronic Government," csse, 2008<br />

International <strong>Conference</strong> on Computer Science and Software Engineering , vol. 3, pp.618-621<br />

106


Framework Guidelines to Measure the Impact of Business<br />

Intelligence and Decision Support Methodologies in the<br />

Public Sector<br />

Roberto Boselli, Mirko Cesarini and Mario Mezzanzanica<br />

University of Milan Bicocca, Milan, Italy<br />

roberto.boselli@unimib.it<br />

mirko.cesarini@unimib.it<br />

mario.mezzanzanica@unimib.it<br />

Abstract: Public Administrations started exploiting decision support systems (DSS) only in (very) recent times with<br />

respect to the private sector where such systems have been used for long time to improve decision making activities<br />

(e.g. the DSS and Business Intelligence realm). Service efficiency and effectiveness improvement are the expected<br />

results of DSS exploitation, together with increased value for stakeholders. The adoption of DSS in the public sector<br />

raises some questions: how to identify the areas where DSS introduction could greatly improve service quality and<br />

how to measure the resulting added value? The paper will provide a literature review supporting the authors in<br />

identifying the key factors influencing DSS value generation in the public sector. An evaluation model will be<br />

sketched including a detailed set of dimensions. This paper aims at providing the ground for building an evaluation<br />

methodology for assessing DSS adoption and exploitation in the context of public sector and public service provision.<br />

Keywords: business intelligence, decision support systems, public administrations, public sector services, added<br />

value measurement<br />

1. Introduction<br />

Service delivery is among the most important functions of Governments and Public Administrations.<br />

Service delivery can be viewed as a value producing process for several stakeholders (Sanderson et al.<br />

2000). Service design and improvement issues have gained attention from the research community (e.g.<br />

Chesbrough and Spohrer 2006). Focusing on the public sector and services, several Public<br />

Administrations are adopting ICT to support and improve decision-making activities and active policies<br />

enactment. This is done on the basis that methodologies, paradigms, and approaches developed in the<br />

frame of the Business Intelligence (BI) and Decision Support Systems (DSS) areas could greatly improve<br />

the decision-making activities. Furthermore, the adoption of BI and DSS in Public Administrations (PAs)<br />

is expected to start an enhancement process where information integration, data quality, and<br />

development of analytical and reporting models activities can be improved.<br />

Some questions arise by focusing on the decision-making activities supported by ICT: which is the real<br />

added value provided by these systems in the public sector? Can existing methodologies be used for<br />

measuring the value generated by ICT in the public sector? Some literature works present models and<br />

methodologies to calculate the ICT value in the private sector, for example they address issues such as<br />

how to calculate the ICT impact on the organization's processes. Can these approaches be smoothly<br />

applied to Public Administrations? Can the ICT impact on public organization processes be evaluated in<br />

a similar way as in the private sector?<br />

These research questions stimulated the authors to define some framework guidelines trying to address<br />

these questions. The research presented in this paper focuses on BI and DSS adoption in PAs, and<br />

whether it is possible to identify and measure the BI and DSS impact on PA processes, especially on<br />

knowledge production and sharing. Different levels of PAs can be identified, e.g. local regional or state<br />

(i.e. National), this paper focus on common considerations valid for both levels, although each level has<br />

some peculiarities (e.g. extension of datasets, capabilities of funding DSS projects, involved processes,<br />

economy of scales) which have to be considered when applying the framework sketched in this paper.<br />

ICT impact measurement is strictly related to the evaluation of public service performance, and both are<br />

challenging research topics. BI and DSS impact measurement is also challenging, and still poorly studied<br />

especially in relation to the public sector. This paper will make a contribution in this direction.<br />

The novelty of our approach is in combining public sector services evaluation with BI and DSS systems<br />

adoption to improve public services performance. Issues such as the evaluation of service performances<br />

or the BI use in services are widely discussed in the literature, but the two issues have not been jointly<br />

addressed to the best of our knowledge. The public sector service performance is discussed in (Djellal<br />

107


Roberto Boselli et al.<br />

and Gallouj, 2008; Di Meglio et al. 2010; McAdam et al., 2005) with focus on measuring tangible<br />

performance indicators. The evaluation of public sector Information Systems is discussed in (Newcomer<br />

and Caudle, 1991) where the authors focus on specific success indicators. DSS adoption to improve<br />

service quality is addressed by (Pyon et al. 2009) but differences between the private and the public<br />

sectors are not considered; while (Ramamurthy et al. 2007; Khan et al. 2010) consider only the private<br />

sector when investigating the barriers and factors involved in DSS adoption. Another issue discussed in<br />

this paper is the measurement of ICT impact on services. Works such as (Brynjolfsson, 1993; Bielowski<br />

and Walczuch, 2002) consider the relation between service efficiency and ICT impact measuring outputs<br />

on the basis of statistical and economic models, still with focus on private sector.<br />

Furthermore, the paper introduces a framework to measure value, impact and adoption levels of BI in the<br />

public sector, on the basis of measurable indicators such as knowledge intensity, decision-making<br />

intensity and automation degree. The paper investigates the relationships among the aforementioned<br />

measures and indicators in the context of public services, and such relationships have been poorly<br />

discussed in literature.<br />

The paper is structured as follows: Sec. 2 will provide an overview of the differences between services in<br />

the private and public sectors, Sec. 3 will provide some definitions of BI and DSS, and will analyze some<br />

BI measurement methods, Sec. 4 will focus on the adoption of BI in the PAs, Sec. 5 will introduce the<br />

framework to evaluate and classify public services, and finally Sec. 6 will draw the conclusions and will<br />

illustrate directions for future work.<br />

2. The public sector services<br />

The public sector provides several types of services, from health services, education, to social and<br />

cultural services, infrastructure, defence. A shared classification of public sector services (NACE)<br />

includes: public administration, defence and compulsory social security, education, health and social<br />

work, other community, social and personal services. Service research and literature provide several<br />

definitions of the public sector, in this paper the authors consider the public sector to include all<br />

organizations providing the aforementioned services.<br />

2.1 Differences between private and public sectors<br />

It is worth to understand the PAs characteristics and to focus on the differences between the public and<br />

the private sectors in terms of objectives, information and knowledge utilization, and decision-making<br />

processes. One obvious difference between the public and private sectors is that the public sector is not<br />

profit driven and its primary goal is not to maximize profits (Røste and Miles 2005; Euske, 2003).<br />

Nevertheless, this should not lead to believe that public sector employees and managers are not<br />

concerned about financial matters. Similarly to private companies, PAs fight for funding and power, and<br />

mainly for costs saving, but operate in a political environment and basically work to reach political goals<br />

(Murray, 1975). The PAs implement policies to provide benefits to the society as a whole, by delivering<br />

basic services to citizens that other organizations are not able to efficiently or equitably provide. To do<br />

this, PAs have to meet objectives regarding productivity, efficiency and quality of services.<br />

The way political goals are reached is influenced by the PA decision-making processes which are mainly<br />

conditioned by the available information and the knowledge quality. Knowledge is essential to support<br />

decision-making activities (McAdam and Reid, 2001). Decision making and process activities are strongly<br />

based on knowledge sharing and production processes that involve different actors, the service users<br />

being the most important.<br />

According to (Halvorson et al. 2005) PA services depend on revenues that are allocated according to<br />

political decisions rather than market performances. The central government funds public sector activities<br />

to cover the costs. The national budget makes public sector activities possible, and its allocation defines<br />

the boundaries for public sector activities. Often public sector activities contents and scopes are far from<br />

being fully understood by citizens. Typically PAs do not specify in details how the funds are allocated and<br />

used. The next section will provide some answers on how PAs may improve their services.<br />

2.2 Evaluation and improvement of public services<br />

Citizens demand for better services while supporting PAs services with their taxes (Langergaard and<br />

Scheuer 2009). Therefore, two requirements deserve special attention among PAs: cost reduction and<br />

service improvement, the latter involving concepts like service quality, effectiveness, and efficiency.<br />

108


Roberto Boselli et al.<br />

Service improvement may require several actions: to modify the service processes, to improve the<br />

information quality, and eventually to carry out strategic knowledge management activities. Knowledge is<br />

a key factor in affecting PA service quality: knowledge is required to design, produce and deliver better<br />

services, furthermore knowledge may also represent the main output of some services.<br />

Service quality improvement relies on evaluation, process and service evaluation requires useful and<br />

measurable indicators. As widely reported in the management literature, processes or services cannot be<br />

appropriately managed without measurements (Pyon 2009).<br />

In the private sector efficiency and effectiveness measures are ultimately related to profit maximization<br />

and to profitability for stakeholders. Therefore, in the private sector a classic performance metric is the<br />

return on investment (ROI) and the set of related indicators. However the public sector does not have<br />

profit maximization as main objective, but rather focuses on policy and service outcomes improvement.<br />

Unfortunately outcomes indicators are hard to identify since they are strictly domain dependent, and they<br />

are affected by the complex set of factors influencing the customer perception and service satisfaction,<br />

both in short and long terms (Djellal and Gallouj, 2009).<br />

Public services performance evaluation activities have been carried out only in recent times (Afonso,<br />

2006; Di Meglio et al. 2010). Two main approaches can be found in literature: the technical approach<br />

evaluates performances on the basis of productivity gains (Wölfl 2005; Kox and Rubalcaba 2007; Timmer<br />

et al. 2007); on the other hand, performances are evaluated according to management viewpoints<br />

(Osbourne and Gaebler 1992; Boland and Fowler 2000; Propper and Wilson 2003; de Brujin 2002).<br />

Service productivity measurement is a challenging issue in the service research. Measuring public<br />

service performances only on the basis of productive efficiency is undoubtedly a partial indicator of<br />

overall performance, on the other hand it is restrictive to consider only the economic indicators. Some<br />

scholars started adopting a more holistic perspective outlining innovation as a lever for improvement<br />

(Andersen and Corley, 2009). Therefore, the use of performance indicators in PAs has generated<br />

innovation demands and expectations in public service delivery processes.<br />

PAs should introduce innovation at different levels to improve services: organizational and administrative<br />

innovations, conceptual and policy innovations, innovations in service design processes, in the delivery<br />

processes, and in the systems of interaction (Halvorson et al. 2005; Langergaard and Scheuer 2009).<br />

Innovation in the public sector is mainly driven by the need to improve governance and service<br />

performance, including improved efficiency, in order to increase public value (Hartley 2005). ICT is being<br />

promoted within government and PAs as a means of improving the efficiency and effectiveness of service<br />

delivery to produce value for internal and external stakeholders (Sanderson et al. 2000; Beynon-Davies<br />

2007).<br />

Several methodologies and paradigms are available in the literature to evaluate the added value provided<br />

by ICT in the service sector. Few of them focus on calculating the ICT value in the public sector and<br />

fewer on BI and DSS. In the next sections the authors will show how BI and DSS can be used for PAs<br />

services, and how the output of these systems can be evaluated for improving services.<br />

3. BI and DSS<br />

According to (Golfarelli et al. 2004) “BI can be defined as the process of turning data into information and<br />

then into knowledge […] BI was born within the industrial world in the early 90’s, to satisfy the managers’<br />

request for efficiently and effectively analyzing the enterprise data in order to better understand the<br />

situation of their business and improving the decision process”.<br />

According to (Lonnqvist and Pirttimäki 2006) BI has the purpose to aid in controlling the stocks and the<br />

flows of business information around and within the organizations by identifying and processing the<br />

information into condensed and useful managerial knowledge and intelligence. BI presents business<br />

information in a timely and easily consumed way and provides the ability to reason and understand the<br />

meaning behind business information through, for example, discovery, analysis, and ad hoc querying<br />

(Azoff and Charlesworth 2004). A BI system can be viewed as a DSS system focusing on data. The<br />

terms will be alternatively used in this paper.<br />

Different PAs have started projects for integrating the content of several administrative archives into<br />

comprehensive repositories for statistical and analytical purposes, however the “BI portion” of the task<br />

109


Roberto Boselli et al.<br />

often lags behind. The delay of BI and DSS exploitation is only one of the differences between the public<br />

and the private sector.<br />

3.1 BI measurement methods<br />

In the BI literature several authors have identified BI measurement as an important task (Solomon 2006;<br />

Viva 2000) but scholars agree that it is a difficult task to carry out (Gartz 2004; Hannula and Pirttimäki<br />

2003; Simon 1998). According to a recent survey only few organizations have any metrics in place for BI<br />

value measurement (Marin and Poulter 2004).<br />

According to some works in literature (Popovic et al. 2010; Williams and Williams 2004; Lonnqvist and<br />

Pirttimäki 2006) BI is an activity or a process like any other business process. Therefore, it is possible to<br />

apply business performance measurement methods to BI.<br />

BI measurement serves two main purposes: first, to prove that it is worth the investment, and second to<br />

help managing the BI process, i.e. to ensure that the BI products satisfy the users' needs and that the<br />

process is efficient. Before describing methods for measuring BI value, it is necessary to clarify the<br />

concept of value in this context. From the point of view of a company using BI, the value is related to<br />

profit improvement; while from the BI (end) user point of view, the value is somewhat related to perceived<br />

usefulness. Any BI value assessment needs to answer the following questions:<br />

1) How much does BI cost?<br />

2) Which are the expected benefits of applying BI?<br />

Calculating BI costs requires calculating labour costs, software and hardware expenditure, external<br />

information purchases, and other related expenses. BI benefits measurement is not as simple as<br />

measuring the costs. Indeed, BI provides mainly non-financial, intangible benefits such as improved<br />

quality and timeliness information (Hannula and Pirttimäki 2003). ROI calculation is the typical method to<br />

measure an investment value, however the “BI outputs” (e.g. information and knowledge) are very<br />

difficult to assess and quantify (Popovic et al. 2010). In literature (Davison 2001) proposed the CI<br />

Measurement Model (CIMM) to calculate the ROI of a BI project. This model identifies various nonfinancial<br />

measures of strategic outputs useful to quantify the success of a BI project, for example whether<br />

the targets set at the beginning of the project have been met, as well as the decision makers’ satisfaction.<br />

The limit of this model is that it is based mainly on qualitative assessments.<br />

Shifting from the private to the public sector, measuring the value of BI gets even more difficult for<br />

several reasons, firstly the lower importance given to profit and other financial indicators. Furthermore,<br />

the public sector is characterized by complex systems and multiple intangible variables which are difficult<br />

to measure.<br />

Effectiveness and efficiency are considered among the main measures to assess the public sector. The<br />

effectiveness of BI in public sector could be evaluated by exploiting the measures defined by (Herring<br />

1996) and (Sawka 2000) for the private sector. These measures could help investigating the decision<br />

outcomes while taking into consideration the public sector specificities. Namely, the BI contribution could<br />

be evaluated by focusing on the specific decisions or actions (supported by the BI) and then looking at<br />

the benefit or detriment this decision brought to the related policy. This method identifies four paradigms:<br />

1) BI can help in avoiding unnecessary costs, 2) decisions based on BI processes may lead to enhanced<br />

revenues (e.g., from taxes), 3) BI information may help in improving resource allocation, and 4)<br />

identification of the direct link between a BI decision and service performance. The BI professional is the<br />

principal user of the information, therefore some of the most important BI measures focus on the<br />

efficiency of the personnel using BI, the resource allocation, the quality of the BI products and the user<br />

satisfaction. The CIMM model is useful for this scope. Other methods to measure BI performance, mainly<br />

in the private sector are the Balanced Scorecard and the Performance Prism (Lonnqvist and Pirttimäki<br />

2006). Nevertheless they should be tailored to meet the public sector peculiarities.<br />

4. BI adoption in PA<br />

BI and DSS exploitation in the public sector is far behind the private one. Several reasons can be added<br />

to explain this. (Nutt 2006) has investigated the differences between public and private decision-making<br />

practices. Some of the differences found can also be used to explain the aforementioned lag.<br />

110


Roberto Boselli et al.<br />

Private sector managers are more apt to support budget decisions made with analysis and less likely<br />

to rely on bargaining. Public sector managers are less likely to support budget decisions backed by<br />

analysis and more likely to support those that are derived from bargaining with agency people.<br />

Legislative mandates constrain budgets, in the past public sector leaders were limited or even<br />

prohibited from spending money to collect information for decision-making. Many PAs were<br />

prohibited from diverting funds from service delivery to collect data on emerging trends in service<br />

delivery. Even when information collection is now possible, professionals are reluctant to divert<br />

resources from service provision to collect such data.<br />

PAs have multiple goals, which can be vague, controversial, or both (Baker 1969; Bozeman 1984).<br />

Goal ambiguity makes vital performance outcomes unclear for public sector organizations.<br />

Although many of the reasons just introduced still hold in the PA, the pressure for obtaining knowledge<br />

about the population (and in real time), the need to offer better services with constrained resources have<br />

reduced the barriers for BI exploitation. Furthermore the cost of the technologies necessary to implement<br />

a BI/DSS project has diminished significantly in the past years, making the development of such projects<br />

affordable by all levels of the PA.<br />

Therefore, BI is playing more and more a key role in successful performance management initiatives<br />

because it allows managers to easily access up-to-date information and provide a comprehensive view of<br />

what is happening in their area of responsibility. The information that BI provides aids decision-making<br />

and helps civil servants monitoring and managing performances. Increasingly, public sector managers<br />

are using BI dashboards – visual displays that provide up-to-date indicators – and scorecards to track<br />

performance and budgets. In this way specific strategies can be defined and enacted by using a series of<br />

metrics and by setting thresholds that trigger alerts when they are exceeded.<br />

In private organizations often the introduction of BI has acted as a catalyst to improve the data quality<br />

and to restructure the management processes, leading to big improvements in information accuracy and<br />

availability. The same goal is pursued in public sector organizations where data quality is felt as a big<br />

issue. Moreover, BI strategies, technologies, and solution exploitations within the public sector lead to<br />

better business outcomes. For the past few years, BI has consistently ranked as a top priority for<br />

government CIOs (Khan et al. 2010). Through collecting and analyzing data, BI creates detailed reports<br />

that provide inestimable insights. The benefits of these analyses are manifold; they can help better<br />

managing an organization, improve performance and lower the cost of service delivery and so on. In<br />

summary, BI can be useful in the public sector for several activities, including:<br />

Measure, manage and report on performances<br />

Policy formulation<br />

Planning and budgeting<br />

Explore data hidden relationships<br />

Disease surveillance and public health<br />

Identify tax fraud and money laundering<br />

Homeland security<br />

Crime prevention<br />

Moreover, BI technology has proved a useful application in many different areas of the public sector,<br />

including:<br />

Financial Systems<br />

Acquisition, Logistics and Supply Chain<br />

Health & Human Services<br />

Citizen Relationship Management<br />

Knowledge / Case Management<br />

Intelligence Assessment<br />

Education & Campus Management<br />

PAs can apply BI to improve their constituency’s knowledge, their ability to provide services and to obtain<br />

accurate measurements of actions and policies effects. Moreover, PAs need to improve decision-making<br />

111


Roberto Boselli et al.<br />

processes, and BI tools and methodologies can enhance efficiency and performance, helping policy-level<br />

decision-making.<br />

5. Framework guidelines<br />

The framework this paper proposes is based on the public service key features highlighted and on the<br />

considerations made in the past sections. Moreover, some specific models and frameworks in the service<br />

literature influenced this work. One of them is the framework about knowledge and technology<br />

dimensions in the service sector (Kang 2006). Kang studied the different roles of technology and<br />

knowledge in services, and proposed a framework where services are classified in two categories:<br />

Knowledge-embedded services, where the majority of knowledge is embedded in the service<br />

production system (i.e. the technology);<br />

Knowledge-based services, where the majority of knowledge is held by the actors providing the<br />

service (e.g. knowledge intensive business services - KIBS).<br />

The Kang framework is mainly aimed at classifying private sector services, but its logic can be applied to<br />

the public sector.<br />

The authors propose to integrate the Kang classifications with some other dimensions in order to build a<br />

framework useful for classifying public services. The resulting framework allows to evaluate (and to lay<br />

the ground for improvement of) ICT-based services focusing on the following aspects: cost savings,<br />

knowledge as value, improved policy and decision-making processes, data and information integration.<br />

The identified dimensions are: expenditure, knowledge intensity, decision-making intensity and<br />

automation degree. The knowledge-intensity and the automation degree dimensions are drawn upon the<br />

Kang framework logic. The knowledge-intensity evaluates the importance of knowledge within the service<br />

while the automation degree evaluates how much ICT automates the information management<br />

processes and conversely how much human intervention is required.<br />

Services will be evaluated using a variable for each of the aforementioned dimensions. Some public<br />

sector areas have been chosen to test the framework: administration, health, education and employment<br />

services. These areas provide knowledge intensive services and have different expenditure levels.<br />

Furthermore, the services of the same area may have different degrees of ICT-based automation and<br />

different degrees of decision-making intensity.<br />

The public sector services considered for the present framework (and showed later in the quadrants) are:<br />

Administrative services, e.g. registry certifications;<br />

Healthcare services;<br />

Vocational training services;<br />

Public employment services (PES).<br />

The services are showed in the quadrants of Figure 1 and Figure 2. The Health services are<br />

characterized by high expenditure and high knowledge intensity; administrative services are less<br />

knowledge intensive but still have a high level of expenditure, while the other services have low<br />

expenditure and a middle degree of knowledge intensity. Figure 1 classifies the services according to the<br />

Expenditure and Knowledge intensity dimension.<br />

In the second quadrant (Figure 2) the same services are classified with the other two dimensions, namely<br />

degree of (ICT-based) automation and degree of decision-making intensity. According to these<br />

dimensions health services, PES and vocational training services have low level of automation, while<br />

health services have higher decision intensity than the others. Only the administrative services show a<br />

high degree of automation and low decision intensity.<br />

The development of a BI or a DSS system is a very resource consuming task, DSS and BI projects are<br />

on/off investments: they return positive results (i.e. they provide value to the decision-making activities)<br />

only if the decision maker’s needs are correctly identified, useful indicators and measures are computed,<br />

data quality issues are resolved, the technological support is correctly deployed, the data provision<br />

system is user-friendly and affects the decision-making process and the overall service provisioning<br />

process. Should only one of this aspects not being properly managed, the resulting decision support<br />

system will fail to provide an added value to its users.<br />

112


Figure 1: Knowledge and expenditure dimensions<br />

Roberto Boselli et al.<br />

Figure 2: Decision and automation dimensions<br />

The costs and the probability of failure are lower when prior knowledge about the domain and the project<br />

are available among the users and the ICT personnel involved in the project (e.g. because people<br />

already worked on similar contexts). However, fewer successful projects are available in the public sector<br />

compared to the private, because of the aforementioned lack of DSS diffusion among the public sector.<br />

For these reasons, it can be suggested to start DSS projects in the public domain where the probability of<br />

failure is low and where the expected benefits could be very high. The dimensions and the quadrants<br />

introduced in this section help identifying the PA sectors where DSS projects could provide tangible<br />

results lowering at the same time the probability to fail (and consequently to waste public funds). Namely<br />

PA sectors (or services) having high knowledge intensity could benefit from the introduction of DSS<br />

systems, furthermore the decision-making activities would benefit from the introduction of BI systems (i.e.<br />

DSS systems focusing on data). The introduction of DSS systems could lead to huge savings in sectors<br />

having high expenditures, or could lead to a service level improvement without cost changes. Services or<br />

sector having a high degree of decision will have a relief from the introduction of DSS systems, while a<br />

high level of automation is an indicator of the availability of electronic data upon which the DSS can be<br />

built. Where a lot of electronic data is available, a lot of useful information can be identified and extracted<br />

with low effort. Thus a high level of automation may contribute to lower the costs (and the risk of failure)<br />

of a DSS project.<br />

6. Conclusions<br />

The research presented in this paper focuses on BI and DSS adoption in PAs, and whether it is possible<br />

to evaluate the BI and DSS impact on knowledge production and sharing processes within PAs. A<br />

113


Roberto Boselli et al.<br />

literature survey on public sector services helped to identify available service measurement and<br />

evaluation methodologies. With the analysis of BI and DSS adoption in PAs it was possible to identify<br />

some drivers and motivations to use BI in public services, and also to identify some dimensions which<br />

are useful to classify public services. These dimensions shape an initial framework to classify public<br />

services.<br />

Moreover, the framework should also help to identify dimensions of analysis to assess the BI impact in<br />

public services. The quadrants proposed in the paper will allow to create a map of all public sector<br />

services, and to identify areas where BI adoption could be effective in improving the service efficiency<br />

and effectiveness. BI and DSS are especially useful in areas having complex service production<br />

processes (e.g. Healthcare sector). These areas are characterized by high expenditures and by high<br />

knowledge intensity and decision intensity degrees. In future works the framework will be tested with<br />

empirical data collected in the frame of public service case studies. The proposed framework dimensions<br />

have to be enriched with indicators about, for example, user satisfaction, policies outcome and other<br />

related topics.<br />

References<br />

Afonso, A., Schuknecht, L. and Tanzi, V. (2006) "Public Sector<br />

Efficiency: Evidence for New EU Member States and<br />

Emerging Markets", Working Paper Series, No. 581.<br />

Andersen B. and M.Corley<br />

(2009), Productivity and the Service Sector: Theories, Concepts and Measurements,<br />

Edward Elgar.<br />

Azoff, M. and Charlesworth, I. (2004) The New Business Intelligence. A <strong>European</strong> Perspective, Butler Group, White<br />

Paper.<br />

Baker, R. (1969) "Organizational theory in the public sector", Journal of Management Studies, Vol. 6, No.1.<br />

Beynon-Davies, P. (2007) "Models for eGovernment", Transforming Government: people, process and policy, Vol. 1,<br />

No. 1.<br />

Bielowski, A.G. and Walczuch, R. (2002) "ICT-Impact on Services",<br />

Proceedings of the 35th Hawaii International<br />

<strong>Conference</strong> on System Sciences, vol. 8, pp.259-268.<br />

Boland,<br />

T. and Fowler, A. (2000) "A systems perspective of performance management in public sector<br />

organisations", The International Journal of Public Sector Management, Vol. 13, No. 5, pp 417-446.<br />

Boze man, B. (1984) "Dimensions of "publicness": An approach to public organization theory", New directions in<br />

public administration, Vol. 46.<br />

Bryn jolfsson, E. (1993). "The productivity paradox of information technology", Communication of the ACM, Vol. 36,<br />

No.12. pp. 67-77.<br />

Chesbrough, H. and Spohrer,<br />

J. (2006). "A research manifesto for services science", Communication of the ACM,<br />

Vol. 49, Num. 7.<br />

Davison, L. (2001) "Measuring Competitive Intelligence Effectiveness: Insights<br />

from the Advertising Industry",<br />

Competitive Intelligence Review, Vol. 12, No. 4.<br />

De Brujin H. (2002) "Performance measurement in the public sector: strategies to cope with the risks of performance<br />

measurement", The International Journal of Public Sector Management, Vol. 15, No. 7, pp 578-594.<br />

Di Meglio G., Stare M., Maroto A. and Rubalcaba L. (2010) "Public services in the enlarged<br />

EU: An assessment of<br />

performance and efficiency", Proceedings of RESER2010, Goteborg, Sweden.<br />

Djellal, F. and Gallouj, F. (2008)<br />

Measuring and improving productivity in services: Issues, strategies and challenges,<br />

Edward Elgar, London.<br />

Djellal, F. and Gallouj, F. (2009) "Public services and the productivity challenge", Deliverable 2.1-A2.1, ServPPIN<br />

Project.<br />

Euske, K.J. (2003), "Public, private, not-for-profit: everybody is unique?", Measuring Business Excellence, Vol. 7 No.<br />

4, pp. 5-11.<br />

Gartz, U. (2004) "Enterprise Information Management", in Raisinghani, M. (Ed.) Business Intelligence<br />

in the Digital<br />

Economy: Opportunities, Limitations and Risks, Idea Group Publishing, Hershey, PA.<br />

Golfarelli, M., Rizzi, S. and Cella, I. (2004) "Beyond data warehousing: what’s next in business intelligence?",<br />

Proceedings of the 7th ACM international workshop on Data warehousing and OLAP, ACM.<br />

Halvorson, T., Hauknes, J., Miles I. and Røste, R. (2005)<br />

On the Differences Between public and private sector<br />

innovation, Public Report No. 9, NIFU STEP.<br />

Hannula, M. and Pirttimäki, V. (2003) "Business Intelligence - Empirical Study<br />

on the Top 50 Finnish Companies",<br />

Journal of American Academy of Business, Vol. 2, No. 2, pp 593-599.<br />

Hartl ey, J. (2005) "Innovation in Governance and Public Services: Past and Present", Public Money and<br />

Management, pp. 27-34.<br />

Herring, J. (1996) "Measuring the Value of Competitive Intelligence: Accessing and Communicating CI's Value to<br />

Your Organization", SCIP Monograph Series, Alexandria, VA.<br />

Khan,<br />

A.M.A., Amin, N. and Lambrou, N. (2010) "Drivers and Barriers to Business Intelligence Adoption: A Case of<br />

Pakistan", Proceedings<br />

of the <strong>European</strong> and Mediterranean <strong>Conference</strong> on Information Systems (EMCIS2010),<br />

Abu Dhabi, UAE.<br />

Kang, H. (2006) "Technology management in services:<br />

knowledge-based vs. knowledge-embedded services",<br />

Strategic Change, Vol. 15, No.2, pp 67-74.<br />

114


Roberto Boselli et al.<br />

Kox, H. and Rubalcaba, L. (2007) "The Contribution of Business Services to <strong>European</strong> Economic Growth", in<br />

Rubalcaba and Kox (ed.) Business Services in <strong>European</strong> Economic Growth, Palgrave/Macmillan, pp 74-94.<br />

Langergaard, L.L. and Scheuer, J.D. (2009) Specificities of public sector service innovation, ServPPIN Deliverable<br />

2.1.<br />

Lonnqvist, A. and Pirttimäki, V. (2006) "The measurement of business intelligence", Information Systems<br />

Management, Vol. 23, No. 1.<br />

Marin, J. and Poulter, A. (2004) "Dissemination of Competitive Intelligence", Journal of Information Science, Vol. 30,<br />

No. 2, pp 165-180.<br />

McAdam, R. and Reid, R. (2001), "A comparison of public and private sector perceptions and use of knowledge<br />

management", Journal of <strong>European</strong> Industrial Training, Vol. 24, No. 6, p. 317.<br />

McAdam, R., Hazlett, S.A. and Casey, C. (2005) "Performance management in the UK public sector", International<br />

Journal of Public Sector Management, Vol. 18, No. 3, pp. 256-273.<br />

Murray, M.A. (1975) "Comparing Public and Private Management: An Exploratory Essay", Public Administration<br />

Review, Vol. 35, No. 4 pp. 364-371.<br />

NACE, Statistical Classification of Economic Activities in the <strong>European</strong> Community, [online]<br />

http://ec.europa.eu/competition/mergers/cases/index/nace_all.html.<br />

Newcomer, K. E. and Caudle, S. L. (1991) "Evaluating Public Sector Information Systems: More Than Meets the<br />

Eye", Public Administration Review, Vol. 51, No. 5, pp. 377-384.<br />

Nutt, P. (2006) "Comparing public and private sector decision-making practices", Journal of Public Administration<br />

Research and Theory, Vol. 16, No. 2.<br />

Osbourne, D. and Gaebler, T. (1992) Reinventing Government, Addison-Wesley.<br />

Popovic, A., Turk, T. and Jaklic, J. (2010) "Conceptual Model of Business Value of Business Intelligence Systems",<br />

Journal of Contemporary Management Issues, Vol.15, No.1.<br />

Propper, C. and Wilson, D. (2003) "The use and usefulness of performance measures in the public sector", CMPO<br />

Working Paper Series Vol. 03, No. 73.<br />

Pyon, C.U., Lee, M.J. and Park, S.C. (2009) "Decision support system for service quality management using<br />

customer knowledge in public service organization", Expert Systems with Applications, 36, pp. 8227-8238.<br />

Ramamurthy, K.R. (2007) "An empirical investigation of the key determinants of data warehouse adoption", Decision<br />

Support Systems, Vol. 44, No. 4, pp 817-841.<br />

Røste, R. and Miles, I. (2005) "Difference between public and private sector innovation", Publin Report.<br />

Sanderson, I., Bovaird, T., Davies, P., Martin, S. and Foreman, A. (2000) "Made to Measure: Evaluation in Practice<br />

in Local Government", Local Government Management Board, London.<br />

Sawka, K. (2000) "Are We Valuable?", Competitive Intelligence Magazine, Vol. 3, No. 2.<br />

Simon, N.J., (1998) "Determining Measures of Success", Competitive Intelligence Magazine, Vol. 1, No. 2, pp 45-48.<br />

Solomon, M. (1996) "The Intelligence Asset-Building Process", Competitive Intelligence Review, Vol. 7, N. 4, pp 69-<br />

76.<br />

Timmer, P.M., O'Mahony M. and van Ark, B. (2007) "EUKLEMS Growth and Productivity Accounts: Overview",<br />

[online] www.euklems.net.<br />

Viva Business Intelligence Inc. (2000) "Measuring the Benefits of Business Intelligence", Pro-How Paper, Vol. 2.<br />

Williams, S. and Williams, N. (2004) "Capturing ROI through Business-Centric BI Development Methods", DM<br />

Review, August.<br />

Wölfl, A. (2005) "The service economy in OECD countries", STI Working Paper, Vol. 3.<br />

115


Avoiding Disasters – Ensuring PKI-Service Availability<br />

Harald Bratko, Peter Lipp, and Christof Rath<br />

Graz University of Technology, Austria<br />

harald.bratko@iaik.tugraz.at<br />

peter.lipp@iaik.tugraz.at<br />

christof.rath@iaik.tugraz.at<br />

Abstract: Public-Key Infrastructures have become critical infrastructures. A breakdown of such a critical<br />

infrastructure would have disastrous consequences. This paper describes our research work that focuses on<br />

enabling transferability of such services, designing a framework and creating a prototype implementation for the<br />

design.<br />

Keywords: public-key infrastructures, critical infrastructures, emergency CA services<br />

1. Introduction<br />

As a result of implementing the <strong>European</strong> Digital Signature Directive (<strong>European</strong> Commission, 1999) in<br />

Austria as well as in other <strong>European</strong> countries, Public-Key Infrastructure technology based on X.509<br />

(ISO, 2005) has become a critical infrastructure. The state depends on the operativeness of that<br />

technology. Austria is especially exposed, since electronic signatures are deeply interweaved into<br />

administrative and legislative processes. A breakdown of this critical infrastructure would have disastrous<br />

consequences. In this paper we present a project we are working on, aiming at securing the<br />

operativeness and availability of the Austrian PK Infrastructure to ensure smooth and uninterrupted<br />

functionality of applications relying on these technologies. Core goal of research is the definition of the<br />

required properties for a service to be transferable. In an emergency, the service will have to be taken<br />

over from an existing service provider, whose infrastructure typically will not be ready for transfer.<br />

We will discuss the prerequisites and required properties of a “change management enabled PKI”<br />

framework, a full design of such a framework and a prototype implementation. Based on a<br />

comprehensive survey and definition of emergency scenarios, a concrete framework with the required<br />

properties will be designed. This framework must safeguard the PKI and keep downtime to the absolute<br />

minimum. This design will be implemented as a prototype and tested with a simulated emergency<br />

scenario. Experiences with this test will be fed back into the prototype. After the end of the project a<br />

concrete implementation for an emergency service provider will be realized based on further<br />

development of the components. This implementation will be made available to be ready for any real<br />

emergency that may occur. This research is accompanied by studies on privacy issues and loss of trust,<br />

resulting from the involved takeover of critical data from one service provider to another service provider.<br />

It will provide suggestions to minimize such loss of trust. Since <strong>European</strong> standardization and<br />

interoperability issues are influencing the details of the emergency service design, a survey, gap analysis<br />

and concrete suggestions for improvements of standards, interoperability guidelines and conformance<br />

checking are also an important part of the project.<br />

For the following, we assume a single service provider to operate a critical PKI, who decides to close<br />

down its operation, for example, because of bankruptcy. §12 of the Austrian Signature Act requires the<br />

service provider to announce the end of operation at least three weaks before closing. If no other service<br />

provider can take over the tasks of providing revocation- and directory-services, and if the federal<br />

government doesn’t declare providing such services of public interest, all certificates will be revoked. If<br />

instead the certificates are declared being of public interest, the federal government has to ensure<br />

continued provision of these services. In this case, the former service provider is legally forced to provide<br />

all necessary means and information to allow for such provisioning. This paper focuses on the scenario<br />

where the federal government needs to ensure such provisioning and thus needs the means to take over<br />

the services itself or have them taken over by some third party. While the law requires the service<br />

provider to cooperate, we can’t take full cooperation for granted and will discuss different options.<br />

2. The initial situation assumption<br />

In the case of cessation of operation of a service provider, taking over directory- and revocation services<br />

for CA-services that have been declared to be of public interest is the first and most important step for an<br />

emergency service provider. Thus, all essential services have to be identified first.<br />

116


Harald Bratko et al.<br />

For this project, we assume having a single certification service provider, A-Trust, issuing qualified<br />

certificates to the public. This provider currently is the only Austrian provider of qualified certificates and<br />

also essential for all eGovernment services. This is the only reason for assuming an emergency take over<br />

for A-Trusts services. We in no way want to imply such a scenario would at all be likely to occur. A-Trust<br />

offers several services:<br />

Certification services: services issuing X.509 certificates. These may be qualified certificates or non<br />

qualified certificates (<strong>European</strong> Commission, 1999) for persons or certificates for other purposes, like<br />

SSL-certificates for webservers. Such certificates certify that a certain entity (person, web server) is<br />

in control of a key.<br />

Revocation services: services for revoking certificates issued by one of the CA services. Revocation<br />

information is published using certificate revocation lists (CRLs) (Cooper et al., 2008) and OCSP<br />

(Sermersheim, 2006) .<br />

Directory services: A-Trust supports LDAP (Myers et al., 1999) as an access protocol to their<br />

directory services. LDAP can be used to retrieve certificates as well as certificate revocation lists .<br />

A-Trust currently runs the following CA-services:<br />

Service for qualified certificates a-sign-Premium-Sig-01, a-sign-Premium-Sig-02, a-sign-Premium-<br />

Sig-03 and a-sign-premium-mobile-03, which themselves are placed under the top-level root CAs A-<br />

Trust-Qual-01, A-Trust-Qual-02 and A-Trust-Qual-03 (see fig:Qualified-CA-Services-in). CA-service<br />

a-sign-Premium-Sig-01 seems not to issue any certificates any more while a-sign-Premium-Sig-03<br />

seems not to have issued any certificates so far (no certificate has been published to their LDAPserver).<br />

a-sign-Premium-mobile-03 issues certificates for mobile signature services.<br />

Service for non-qualified SSL/TLS-certificates for webservers Generally taking over non-qualified<br />

services like this one is not required. Such certificates can be easily replaced by conventional<br />

certificates from other commercial service providers. However, a certain class of servers are critical<br />

within Austrian EGovernment and hence must be supported in any case. These servers belong to a<br />

specific domain (.gv.at) and the corresponding certificates can therefore be identified by their names.<br />

Service for non-qualified certificates used for specific purposes, e.g. the identity link signer<br />

certificates or public authority certificates. The Person Identity Link is an integral part of the Citizen<br />

Card concept. It is a data structure signed by the issuing public authority that assigns a unique<br />

identification feature of a person (for example a registration number) to one or more certificates<br />

belonging to this person. As such, the person identity link can be used for the unique, automated<br />

identification of a person when that person approaches the public authority during the course of a<br />

procedure. (Bundeskanzleramt Oesterreich, 2005) These certificates can be identified by extensions<br />

including specific OIDs and must be supported by the emergency CA, since they are used in<br />

eGovernment applications.<br />

Service for other non-qualified certificates These certificates are not of interest and must not be<br />

supported.<br />

Figure 1: A-trust's qualified CA-services in Austria<br />

117


3. Taking over revocation services<br />

Harald Bratko et al.<br />

A functional revocation service is the foundation for all Austrian eGovernment processes based on the<br />

Austrian citizen card. Taking over revocation services therefore is the most critical element of an<br />

emergency certification service and has to be made available as soon as possible. A-Trust offers two<br />

types of revocation status information services for their certificates. They are based on<br />

Certificate revocation lists (CRLs) and<br />

The on-line certificate status protocol (OCSP)<br />

Both services will have to be provided by an emergency service. We have developed two scenarios for<br />

providing such a service:<br />

In the first scenario the takeover will be a planned action where it will be possible to get access to the<br />

keys used at the time of takeover. Keys are stored and handled by a hardware security module<br />

(HSM), so we assume to be able to get that HSM, that it can be transported to a new location without<br />

a loss of keys or that it can continue to work in the original environment using the emergency CA<br />

software.<br />

The other scenario assumes this not to be possible, for whatever reason. Either the service provider<br />

is not cooperative or the HSMs cease to work or any other reason that may exist for not getting<br />

access to the keys.<br />

The following sections describes our model for each case.<br />

3.1 Certificate revocation lists<br />

All certificate revocation lists in the hierarchy of qualified CA services of A-Trust are direct CRLs. This<br />

means that the CRL has to be signed with the same key that is used for signing the certificates. This<br />

structure is shown in fig:Certificate-Revocation-Lists. In these diagrams, boxes are entities like CAs, CRL<br />

or OCSP issuers (represented by their certificates). Solid lines show that an entity issues something,<br />

dashed lines point from a certificate to an entity that makes statements on the validity of a certificate.<br />

Figure 2: Certificate revocation lists<br />

3.1.1 Keys taken over from A-Trust<br />

In case the emergency CA service can continue using the keys from the original service provider, the<br />

revocation service structure of the emergency CA service can be identical to the original service.<br />

3.1.2 No keys taken over from A-Trust<br />

In case the original keys cannot be used by the emergency service, two different scenarios exist:<br />

118


Takeover of all names including domain name<br />

Harald Bratko et al.<br />

If it is not possible to continue using the key material, or if the key material has been destroyed or lost,<br />

but it is possible to continue using the original domain name and all names used in the certification<br />

services, the structure of the revocation service can mirror the one from the original CSP. The emergency<br />

CA service however has to reissue all CA-certificates. The identical names make it possible to build valid<br />

chains from unchanged end entity certificates to the old root certificates and to use the new CA<br />

certificates for validating the corresponding new crls. Care has to be taken to use names that are fully<br />

identical to those from the corresponding certificate from the taken over services. Fully identical means<br />

that even the encoding must be identical.<br />

Figure 3: Takeover of all names<br />

All this allows a signature verification application to accept the revocation list, even if it was in fact issued<br />

by a CA different from the one used to sign the certificate. This is similar to the renewal of an old CAcertificate<br />

together with a key rollover (replacement of the old keypair with a new keypair), but without<br />

doing an explicit key rollover procedure. This type of renewal of CA-certificates is common and also used<br />

by A-Trust and does not conflict with the requirements defined in (Cooper et al., 2008) regarding the use<br />

of direct CRLs. However, the new CA certificates must be distributed to all certificate verification clients.<br />

Care has to be taken of course that the serial numbers used do not conflict with the serial numbers of<br />

already issued certificates.<br />

No takeover of names or domain name possible<br />

If neither the domain nor the names within the certificates can be kept, the structure in fig:Certificate-<br />

Revocation-Lists cannot be taken over. An indirect method has to be used then, where the key and<br />

certificate used for signing a CRL is different to the one used for signing the certificate to be checked.<br />

Several options to do so exist:<br />

A single CRL issuer issuing a single CRL for all A-Trust certificates In this model a single key pair<br />

and certificate is used to issue a single CRL for all qualified certificates taken over from A-Trust,<br />

irrespective of the CA that had issued a certificate. This is possible, since according to the certificate<br />

policy (A-Trust, 2009) used by A-Trust, all certificates issued by them (whatever hierarchy they are<br />

placed in) get a unique serial number.<br />

A single CRL issuer per A-Trust hierarchy issuing one CRL for each hierarchy Similar to the first<br />

case, but separate CRLs are kept for each hierarchy. Here we create separate keys and certificates<br />

for CA services issuing a single CRL per hierarchy. In addition, each CA could also issue new<br />

certificates. This version again has two options:<br />

All new issuers are directly placed under the NCA-root This makes the new issuers independent from<br />

each other. However, this does not allow to use them to issue certificates under the direct model of<br />

the NCA since this would mix qualified and non qualified certificates under one root..<br />

Each CRL is responsible for old certificates, that have been taken over, and newly issued certificates<br />

Here each CRL has direct entries for certificates newly issued by the emergency CA and indirect<br />

entries for the certificates taken over from A-Trust. For performance reasons this option is not<br />

recommended, since certain A-Trust CRLs are already large in size (approx. 873kb for the a-sign-<br />

Premium-Sig-02-CRL) and will grow when revoking certificates issued by the emergency CA. Hence<br />

119


Harald Bratko et al.<br />

separating CRLs for certificates taken over and newly issued certificates into two entirely<br />

independent hierarchies is the preferred way.<br />

The CAPSO-Model CAPSO is the CA-Software the presented implementation will be based on.<br />

CAPSO uses the same model as A-Trust : direct CRLs. This model has to be extended for indirect<br />

CRLs, as discussed. The result is depicted in fig:CAPSO-Model. There is one CA only used for<br />

signing CRLs for certificates having been taken over. This results in a clear separation from newly<br />

issued certificates and keeps the CRLs as small as possible. It also allows keeping certificates that<br />

have been taken over in a separate CAPSO instance than the newly issued ones.<br />

Figure 4: CAPSO-model<br />

Thus we believe the structure depicted in Figure 5 on page 7 will be best suited for the purpose:<br />

3.2 Checking revocation<br />

By changing from the direct to the indirect model, the following problems occur when checking certificate<br />

revocation:<br />

According to PKIX, support for indirect revocation in client applications is optional. Thus we cannot<br />

expect every client to support indirect CRLs.<br />

The CRLDistributionPoints-extension of the certificates doesn’t fulfill the requirements set in section<br />

4.1.2.13 of (Cooper et al., 2008).There a certificate is required to contain the CRLIssuer field in the<br />

DistributionPoint. This is not given for A-Trust certificates since their use of direct CRLs. Hence a<br />

PKIX-conformant client must reject a CRL issued by the emergency CA.<br />

For Austrian eGovernment, MOA-SP (Modules for On-line Applications - Signaturprüfung) is responsible<br />

to check signatures (and thus revocation). MOA-SP can be configured with alternative CRL-distribution<br />

points, allowing MOA-SP to accept these CRLs.<br />

3.3 OCSP<br />

As an alternative to CRLs A-Trust offers an OCSP service. However, OCSP is supported for enduser<br />

certificates only, but not for CA certificates. fig:Revocation-structure-for shows that structure. A-Trust<br />

uses a structure for OCSP that is totally different from the one used for CRLs. A systemwide pseudodelegated<br />

OCSP-responder answers OCSP-requests for all parts of the hierarchy. We call this pseudodelegated,<br />

since it is not a real delegated responder but a responder using a certificate issued by a CA<br />

fully independent of any other CA in the hierarchy. Strictly speaking a validation client should not accept<br />

an OCSP response from such a responder, since it is neither direct nor delegated. However, in practice<br />

all clients accept such a behavior. A-Trust follows here the Common PKI-Model (T7 and Teletrust, 2009).<br />

Validating certificates this way requires more effort than using direct CRLs, since the certificate chain for<br />

the OCSP-responder has to be validated as well. In the context of qualified certificates it might be seen<br />

as problematic too, because it requires a validator to either explicitly trust the OCSP-responder<br />

certificate, or one of the CA certificates above. As a result the trust store for validating qualified<br />

certificates has to contain a non-qualified (CA) certificate, which is problematic since the CA certificate<br />

issuing the OCSP responder certificate is used by A-Trust to issue other non-qualified certificates, too.<br />

One has to avoid the trap of accepting non-qualified certificates; the trust store is no longer a sufficient<br />

configuration method for that purpose.<br />

120


Figure 5: The final model<br />

Harald Bratko et al.<br />

121


Harald Bratko et al.<br />

Figure 6: Revocation structure for a-sign-Premium-Sig-02<br />

3.3.1 Keys taken over from A-Trust<br />

Even if all keys can be taken over, using the A-Trust hierarchy for OCSP doesn’t make sense, since it<br />

would also require providing revocation services for the A-Trust-OCSP-responder certificate. Thus, the<br />

single OCSP-responder certificate will not be taken over in any case.<br />

In principle it would be possible to replace the single responder by a responder per CA. Each CA then<br />

would sign it’s own OCSP-responses. However, all certificates contain the AuthorityInfoAccess-extension<br />

pointing to the single responder. A single pointer cannot be used for multiple services easily. In case<br />

MOA-SP is the only validation client in use, this problem could be circumvented with multiple alternative<br />

distribution points as describe above. For the general case, an OCSP proxy could be installed parsing the<br />

OCSP-requests and forwarding it to the correct OCSP-responder based on the CertID contained in the<br />

request.<br />

The AuthorityInfoAccess-extension in CA-certificates however does not contain an accessMethod-field<br />

for OCSP. Using OCSP for CA certificates would therefore only be possible if the validation client could<br />

be manually configured to do so. Otherwise, CRLs have to be used.<br />

3.3.2 No keys taken over from A-Trust<br />

If naming and domain names cannot be taken over, or it is decided against doing so, take over of the A-<br />

Trust OCSP certificate does not make any sense at all. Basically, all strategies discussed in the CRLsection<br />

can also be applied for OCSP. Generally, revocation checking using OCSP is much less<br />

problematic, since most validation implementations support the single-responder model. fig:OCSP-<br />

Model-for-the shows a possible structure. It is similar to that of A-Trust, with the exception that under<br />

certain conditions (configuring alternative distribution points) OCSP for CA certificates would be possible<br />

too. The single responder is responsible for dealing with all requests relating to certificates taken over<br />

from A-Trust. However, since the domain is not being taken over, validation clients need to be<br />

reconfigureable to be able to access the new service.<br />

If the domain is taken over, the new OCSP-responder will listen at the original address or requests to this<br />

address will be redirected to the new address.<br />

Since the new OCSP-responder certificate will be issued by a new root, the new root has to be added to<br />

the clients trust stores to be able to accept the new responders certificate. Note, that this root will issue<br />

no other certificate than the OCSP responder certificate and hence it can be added to the trust store used<br />

for validating qualified certificates without trapping the side effects discussed above regarding A-Trust’s<br />

original OCSP responder certificate.<br />

4. Directory services<br />

When taking over directory services, the emergency service has to provide ways to search and download<br />

certificates and CRLs taken over from the previous provider. A-Trust uses an LDAP-server for providing<br />

directory services, which contains all certificates and CRLs from all parts of the hierarchy. Certificates<br />

only refer to CRLs (CRLDistributionPoints) using the LDAP-method. AuthorityInfoAccess-extensions use<br />

HTTP as the protocol to point to CA-certificates and OCSP-responders.<br />

122


Harald Bratko et al.<br />

Replicating the A-Trust structure exactly would be advantageous, as this can be done by an LDIF ex- and<br />

import.<br />

Figure 7: OCSP-model for the emergency CA<br />

5. Conclusions<br />

We have presented several options for taking over revocation and directory services from an existing PKI<br />

in case of an emergency and discussed their advantages and disadvantages. Which one will be chosen<br />

in case of an emergency will depend on the conditions for the takeover. For our prototype implementation<br />

we assume being able to continue using domain names and the names of the CAs, and possibly the keys<br />

as well. We have finished implementing parts of the emergency CA software and will now try to simulate<br />

a real emergency case including the takeover of services. Results of these tests will be fed back into the<br />

design and implementation of the prototype. We also plan to adapt this emergency software to make it<br />

useful for other scenarios, not restricted to the Austrian boundary conditions.<br />

References<br />

A-Trust (2009), ‘Anwendungsvorgaben (certificate policy) für qualifizierte zertifikate a.sign premium für qualifizierte<br />

signaturen, version 1.3.2, 27.02.2009’.<br />

Bundeskanzleramt Oesterreich (2005), ‘Xml definition of the person identity link’. URL: http://www.buergerkarte.at/<br />

Cooper, D., Santesson, S., Farrel, S., Boyen, S., Housley, R. W., P. (2008), ‘Rfc 5280: Internet x.509 public key<br />

infrastructure certificate and certificate revocation list (crl) profile’. URL: http://www.ietf.org/rfc/rfc5280.txt<br />

<strong>European</strong> Commission (1999), ‘Directive 1999/93/ec of the european parliament and of the council of 13 december<br />

1999 on a community framework for electronic signatures’.<br />

ISO (2005), ‘Itu-t recommendation x.509 (2005) — iso/iec 9594-8:2005, information technology - open systems<br />

interconnection - the directory: Public-key and attribute certificate frameworks.’.<br />

Jonsson, J. and Kaliski, B. (2003), ‘Public-key cryptography standards (pkcs) 1, rsa cryptography specifications<br />

version 2.1’. URL: http://www.ietf.org/rfc/rfc3447.txt<br />

Myers, Ankney, Malpani, Galperin and Adams (1999), ‘X.509 internet public key infrastructure online certificate status<br />

protocol - ocsp’. URL: http://tools.ietf.org/html/rfc2560<br />

Polk, W., Housley, R. and Bassham, L. (n.d.), ‘Rfc 3279: Algorithms and identifiers for the internet x.509 public key<br />

infrastructure certificate and certificate revocation list (crl) profile’. URL: http://www.ietf.org/rfc/rfc3279.txt<br />

Sermersheim, J. (2006), ‘Lightweight directory access protocol (ldap): The protocol’. URL:<br />

http://tools.ietf.org/html/rfc4511<br />

T7 and Teletrust (2009), ‘Common pki specifications for interoperable applications’. URL: http://www.t7ev.org<br />

123


Achieving Optimum Balance in the Simplification of tax<br />

Compliance Obligations for Business Customers and<br />

Management of Compliance and Collection Risks by<br />

Revenue<br />

Leonard Burke 1 and Kieran Gallery 2<br />

1<br />

The Revenue Commissioners, Limerick, Ireland<br />

2<br />

University of Limerick, Ireland<br />

lenburke@revenue.ie<br />

kieran.gallery@ul.ie<br />

Abstract: Governments and Revenue administrations worldwide strive to simplify tax administration. This paper<br />

examines whether the Irish Revenue authorities have achieved the optimum balance in relation to business<br />

customers between easing their filing and payment obligations relating to fiduciary taxes on the one hand and<br />

managing risks to compliance and collection by Revenue in respect of these taxes on the other. It focuses on<br />

advances made in the past decade to progress the wider simplification agenda, focusing in detail on the<br />

advancement of administrative arrangements in respect of three business taxes – Employers’ payroll taxes, VAT and<br />

Relevant Contracts Tax - and also considers what further possibilities exist and merit consideration both for these<br />

specific taxes and the wider simplification agenda. Advancement of the wider agenda in tax systems in developed<br />

countries is a continuous process. It necessarily requires having a balanced approach between simplification on the<br />

one hand and management of compliance and collection risk on the other. What is arguably the most challenging is<br />

simplifying the tax code or tax design. Taxes that are sensibly constructed are cheap and easy to operate tend to be<br />

easier for taxpayers to understand and pay. Continued examination and reshaping of existing tax administration is<br />

required to make it as easy as possible for taxpayers to meet their obligations in terms of information provision and<br />

compliance. In many countries such simplification has been achieved in an ad-hoc rather than a strategic way.<br />

Additionally there is limited evidence of it being championed amongst administrations and an argument can be made<br />

that such an approach ought to be taken. Measuring the real cost to business of tax administration in meeting<br />

compliance obligations is something that needs to be examined as part of determining what needs to be done to<br />

attain optimal balance. Consultation with taxpayers and their representatives, continued use of analytics, risk<br />

management tools, and the electronic medium are all key in furthering the simplification agenda in Revenue<br />

administrations.<br />

Keywords: simplification, collection, administration, risk<br />

1. Introduction<br />

Simplification of tax administration is a continuing goal of revenue administrations worldwide. It is widely<br />

recognised that well designed tax systems facilitate ease of compliance, which in turn contributes to<br />

successful tax regimes. The Irish revenue authorities (The Revenue Commissioners, hereinafter referred<br />

to as “Revenue”) have achieved some success in this regard, being ranked as the easiest country for<br />

businesses to pay taxes within the EU (Forum on Tax Administration 2010a).<br />

Achieving simplified tax administration requires revenue authorities to continually focus on how they can<br />

ease the compliance burden on taxpayers, while at the same time ensuring that risks to compliance in<br />

filing tax returns and making timely payments are not compromised.<br />

When dealing with its business customers, Revenue’s strategic direction and priorities so far this century<br />

have been driven by the need to identify and manage risk, while making it easier to comply on a voluntary<br />

basis. Combining risk management and simplification agendas brings about a natural tension in<br />

delivering on Revenue’s commitment to ensuring that everyone complies with their tax and customs<br />

responsibilities while providing quality and innovative services that support all its customers (Revenue<br />

Commissioners 2008). A balanced approach to both these agendas therefore is necessary.<br />

Taking the above into account, this paper will examine whether the Irish Revenue authorities have<br />

achieved the optimum balance in relation to business customers between easing their filing and payment<br />

obligations on the one hand and managing risks to compliance and collection on the other. Efforts that<br />

have been made to date by Revenue in advancing simplified administrative arrangements in respect of<br />

the three business taxes, (with due regard to compliance and collection risk) are reviewed, while further<br />

possibilities that may exist and merit consideration at this juncture are also explored.<br />

124


Leonard Burke and Kieran Gallery<br />

The remainder of this paper is divided into four parts. Part 2 examines some of the literature from<br />

academic, government and economic organisations published to date concerning tax simplification. Part<br />

3 provides information on Revenue’s activity in progressing the simplification agenda from 2006 onwards<br />

in relation to three of the most burdensome taxes encountered by businesses in Ireland, namely<br />

Employer’s PAYE/PRSI (Payroll Taxes), Value-Added Tax (VAT) and Relevant Contracts Tax (Relevant<br />

Contracts Tax (RCT) applies to payments made by a principal contractor to a subcontractor in respect of<br />

goods and services provided in the construction, forestry or meat processing industries. Part 4 outlines<br />

the methodology and analyses the results of interviews with top-ranking Revenue officials. Finally,<br />

Chapter 5 details the authors’ conclusions arising from the research (while also acknowledging its<br />

limitations), together with proposed recommendations.<br />

2. Literature review<br />

Tax simplification can easily be seen as a contradiction in terms. Due to the multi-faceted nature of most<br />

modern tax systems, simplifying tax is far from being a simple issue (Tran-Nam 1999, James 2007).<br />

Cooper (1993, cited by James and Wallschutzky 1997) suggested that when commentators referred to<br />

the simplicity or complexity of a tax system, they may be referring one or more of at least seven different<br />

issues, namely: predictability, proportionality, consistency, compliance, administration, co-ordination and<br />

expression. In addition, Cooper posited that tax simplification could be approached from four different<br />

levels:<br />

The tax base;<br />

The design of rules to be applied to the tax base;<br />

The expression of those rules, and<br />

The administrative requirements imposed on those taxpayers.<br />

It follows that tax simplification measures can focus on one aspect of the compliance regime (such as<br />

changes to tax legislation) or can equally deal with process re-engineering designed to improve the<br />

taxation system as a whole (Forum on Tax Administration 2010a). James highlights that simplifying one<br />

level cannot be undertaken without due consideration do the potential repercussions to the other levels.<br />

Tran-Nam (1999) describes the required level of complexity (or conversely, simplicity) in any tax system<br />

as “a two-way, interactive process” (p.514), believing that complexity can in part be attributable to<br />

taxpayers seeking ways to minimise their tax liabilities.<br />

Tax simplification does not come without potential conflicts that need to be considered. While it may be a<br />

desired trait of the tax system, many leading commentators stress that it should not be achieved at the<br />

expense of other potentially more important characteristics (as set down by Adam Smith(1776)), such as<br />

certainty (James 2008) and fairness (James and Ewards 2007).<br />

Numerous examples exist of previous attempts at tax simplification from around the world. The OECD<br />

(2010a) lists various measures being used to achieve simplification in OECD countries, such as:<br />

Regulatory management reform to improve the framework of the administrative system;<br />

Organisational re-engineering including process redesign, use of information and communication<br />

technologies (or “ICT”),<br />

Better information on the delivery of services, administrative requirements, and<br />

Co-ordination of multiple requirements stemming from public administration.<br />

Another trend has been to organise operations principally around taxpayer segments, a model adopted<br />

by the US Internal Revenue service as part of the 1998 Restructuring Act. This rationale is based on<br />

different characteristics and tax compliance behaviour that presents different risks. Grouping key<br />

functional activities in this way increases the likelihood of improving overall compliance (Owens 2006).<br />

Studies into the effectiveness of such measures have also evolved. For example, investigations have<br />

been undertaken to determine the impact of improving the comprehensibility of tax legislation (Tan and<br />

Tower 1992, Richardson and Sawyer 1998, Richardson and Smith 2002), providing taxpayers with prefilled<br />

tax returns (Klun 2009) and improvements to on-line administration (Forum on Tax Administration<br />

2010b).<br />

125


Leonard Burke and Kieran Gallery<br />

3. Recent revenue simplification initiatives<br />

McKerchar (2007) identifies those parties that are directly affected by tax complexities (or lack of<br />

simplification) as taxpayers, practitioners and the tax administrators.<br />

“In a self-assessment tax system ... these three parties by necessity have a close and dynamic working<br />

relationship. They may not always be working together, but they are working side by side, observing what<br />

they can of each other, and adjusting and readjusting their behaviours and strategies according to their<br />

assessment of the risks they face”(p.185).<br />

Reducing the compliance burden for business continues to be a priority for Revenue (High Level Group<br />

on Business Regulation 2009). As part of the High Level Group on Business Regulation, it has committed<br />

to continuing with the simplification agenda in accordance with the Government’s target of reducing the<br />

administrative burden on business by 25% by 2012. Revenue has carried out a number of wider<br />

developments that impact on the business taxes in the areas of electronic filing and payment, and VAT<br />

reverse charging. However, the focus of this paper relates to the reduction in payment and filing<br />

obligations.<br />

3.1 Payment and filing obligations<br />

In Ireland, Payroll Taxes, VAT and RCT each have significant administration requirements. Payroll Taxes<br />

are normally paid and filed on a monthly basis, with any potential balancing payment to be made in<br />

conjunction with an annual return. Similarly, VAT is collected by VAT registered traders on their supplies<br />

of goods and services supplied within the State and is usually paid and filed on a bi-monthly basis. VAT<br />

registered traders are also required by law to submit a detailed annual information return of trading<br />

details. For RCT, where tax clearance has not been authorised (i.e. where Revenue is satisfied with the<br />

tax compliance record of the subcontractor), a principal contractor deducts RCT at 35% from payments to<br />

subcontractors and returns this to Revenue on a monthly basis. Principals are also required to submit an<br />

annual informational return. The principal must also provide the subcontractor in question with an RCT<br />

deduction certificate, setting out the amount of RCT that has been deducted from each payment (When<br />

the subcontractor submits this to Revenue, Revenue will credit the subcontractor’s account with an<br />

equivalent amount, generally by offsetting an equivalent figure against outstanding taxes, or make a<br />

repayment to the subcontractor).<br />

In Ireland Irish businesses classed as small to medium face a proportionately greater administrative<br />

burden in terms of compliance obligations (Forum on Tax Administration 2010a). It is logical therefore<br />

that efforts to ease this burden have formed part of Revenue’s agenda in recent times.<br />

Revenue has made significant efforts to reduce payment and filing frequency. From 2006 Employers’ with<br />

an annual Payroll Taxes liability of less than €28,800 are now only obliged to submit returns and<br />

payments on quarterly basis. This was followed in 2007 by similar measures for VAT, with payment/filing<br />

requirements reduced from once every two months to once every four months (for annual liabilities of<br />

less than €14,400) or once every six months (for annual liabilities of less than €3,000).<br />

Historically, an annual payment and filing option for Payroll Taxes and VAT was available to small<br />

businesses. Revenue considered extending this to all business customers but the annual liability was<br />

viewed as being potentially too high for many to pay at once. When the four and six monthly frequencies<br />

were introduced for VAT in 2007, the annual filing option was withdrawn for new customers. For<br />

consistency the arrangements were also withdrawn for new Payroll Taxes customers. In January 2011<br />

quarterly payment and filing for RCT for small businesses was introduced to 40,000 taxpayers whose<br />

annual RCT liability was less than €28,800.<br />

3.1.1 Risks versus benefits<br />

It is important to acknowledge that simplification measures bring with them the risk of increased noncompliance.<br />

The identified risks for Revenue centred on the potential for an increase in the level tax<br />

debts that would more readily accumulate without Revenue intervention. Management of these business<br />

taxes is vital to Revenue in terms of cash flow, with Payroll Taxes and VAT accounting for over 57% of<br />

Revenue’s total receipts in 2009 (Revenue Commissioners 2010). There is also a significant risk to the<br />

Collector General should taxes go unpaid. The scale of this risk is a function of the size of the business,<br />

126


Leonard Burke and Kieran Gallery<br />

its associated tax liability and the length of time between returns being required – the smaller the<br />

business/liability, the lower the risk in less frequent payments.<br />

Historically, data available to Revenue showed that 85% of Payroll Taxes, VAT and RCT were paid by<br />

15%-16% of business taxpayers. The data for 2010 shows that the proportion of business taxes<br />

accounted for by this group increased to approximately 90% (Table 1 refers). Consequently while the risk<br />

attached to this group is significant, reduced payment and filing frequency for smaller businesses is seen<br />

as a positive approach to easing the burden on compliance while having due regard to compliance and<br />

collection risks.<br />

Table1: % of tax paid by business type – payroll taxes, VAT and RCT<br />

Tax Type % of businesses % value of tax payments<br />

Large Other Large Other<br />

Payroll Taxes 16.5% 83.5% 93.8% 6.2%<br />

VAT 15.4% 84.6% 89% 11%<br />

RCT 15.8% 84.2% 91.3% 8.7%<br />

Source: Collector General’s Management Information Services September 2010<br />

In addition to the expected benefits to small businesses in terms reducing all aspects of compliance costs<br />

(i.e. time, financial and psychological costs (Bennett et al. 2009)) and cash flow gains (Revenue<br />

Commissioners 2007),there are administrative benefits to Revenue, with reduced time, printing, postage<br />

and administration costs resulting from the number of returns and payments that have to be handled.<br />

4. Revenue interviews<br />

In order to establish Revenue’s understanding of the simplification agenda, and how it managed<br />

associated compliance and collections risks involved, a series of in-depth interviews with senior<br />

management within Revenue was undertaken.<br />

Qualitative research was seen as the most appropriate method for the purposes of this study. The focus<br />

was on gleaning what McKerchar (2008 p.15) describes as ‘thick’ data, i.e. “the rich information that the<br />

researcher is looking for that doesn’t fit into Likert scales, the data that will help the researcher explore<br />

the complexity of the research problem and build an understanding or an interpretation”.<br />

The interviewees were selected using purposive sampling, i.e. based on their intimate knowledge of, and<br />

exposure to, the subject matter. According to Patton (1990 p.169):<br />

“The logic and power of purposeful sampling lies in selecting information-rich cases for study in depth.<br />

Information-rich cases are those from which one can learn a great deal about issues of central<br />

importance to the purpose of the research, thus the term purposeful sampling.”<br />

In advance of the interviews a detailed set of questions was forwarded to each interviewee for<br />

consideration, examining tax simplification and the management of associated compliance risks.<br />

In addition, as part of the overall tax simplification agenda, the interviewees were asked for their views on<br />

aspects of compliance automation, primarily dealing with Revenue’s Online Service (ROS).<br />

4.1 Simplification and the management of compliance risks<br />

Views varied as to what was understood by simplification. Characteristics identified by the interviewees<br />

tended to conform with the various aspects of tax simplification identified by Cooper (1993, cited by<br />

James and Wallschutzky 1997). Tax simplification was seen as including:<br />

Tax codes that were simple to administer, easily understood and not alone benefited business, but<br />

also Revenue.<br />

Minimal administration costs.<br />

127


Easy payment of tax and filing of returns.<br />

Refunds should be provided automatically.<br />

Leonard Burke and Kieran Gallery<br />

Less time should be spent on filling in returns and making payments.<br />

One interviewee suggested that simplification was best viewed as a subset of the compliance agenda,<br />

making it easier for businesses to comply but not impacting adversely on tax take and flow to the<br />

exchequer. It included a range of measures including reduced filing frequency, working with<br />

intermediaries, communicating with taxpayers and business representatives and responding to their<br />

concerns.<br />

4.1.1 Payroll taxes, VAT and RCT<br />

Regarding the payment and filing simplification measures introduced to Payroll Taxes, VAT and RCT, it<br />

was acknowledged that progress had been made, with minimal cost to the exchequer in the year of<br />

introduction. Despite the possibilities of other agendas taking precedence, simplification and<br />

management of compliance risk we viewed as being at the core of the new measures. However, the<br />

economic downturn was seen as negatively impacting the opportunity for further simplification, due to the<br />

possible loss of cash flow to the exchequer.<br />

Views on the impact of simplification measures on compliance risk varied. Interviewees agreed that<br />

Revenue has managed the administrative arrangements around payment and filing frequencies well,<br />

focusing on those who are low risk from a compliance perspective. The underlying sense was that it<br />

worked well for taxpayers and Revenue alike, with cash flow wins for business and productivity benefits<br />

for Revenue. It was disclosed that feedback from representative bodies on the changes to the<br />

payment/filing arrangements has also been positive. However, one potential downside from the<br />

measures which had not been anticipated related to smaller tax practitioners, who heretofore were reliant<br />

on income they received from taxpayers for making returns frequently for customers. It was suggested<br />

that this may have militated against some taxpayers availing of the reduced frequency.<br />

Interviewees were asked if a taxpayer’s compliance record should determine frequency of payment and<br />

filing regardless of case size. Practical difficulties such as cash flow to the exchequer, cash flow<br />

management by taxpayers, resulting in a risk to Revenue were identified. One interviewee suggested that<br />

reduced frequency arrangements could have the impact of reducing compliance, as some taxpayers<br />

would take the opportunity to opt out of the arrangements altogether.<br />

Management of compliance risk was not seen as necessarily being about a good enforcement regime,<br />

but rather an efficient organisation that does not want to place unnecessary administrative burdens on<br />

taxpayers. For example, if Revenue could increase compliance levels through simplification or other<br />

similar measures, then audit levels could be reduced. It was contended that this would be the ultimate tax<br />

simplification, as the expense to both the taxpayer and Revenue of audits would be reduced.<br />

The overall direction of the simplification agenda was seen as a potential issue. While different Revenue<br />

divisions are involved in managing simplification, overall ownership of the simplification agenda within<br />

Revenue was described as ‘woolly’. As one interviewee described it ‘if everybody owns something and<br />

nobody has responsibility for it, it probably isn’t going to get done particularly well’. It was posited that if<br />

Revenue was to drive the simplification agenda both internally and externally it needed to properly assign<br />

ownership. It was also pointed out that ‘when Revenue wants to achieve significant things, an Assistant<br />

Secretary is given responsibility for a project board or programme’. Examples cited included the E<br />

Stamping initiative (for Stamp Duty) and the redesign of Capital Acquisitions Tax. It was suggested that a<br />

similar approach should be taken regarding simplification. While not on the same scale as the UK<br />

Government’s introduction of an Office of Simplification, this approach would demonstrate simplification is<br />

a major agenda item for Revenue.<br />

4.1.2 Automation<br />

ROS was described by interviewees as a good cheap system for obtaining payments and returns. It was<br />

not seen as a risk in terms of seeking less information from taxpayers. In addition its introduction allowed<br />

for far earlier availability, collation and transfer of data to other Government Departments.<br />

Caution was signalled against ROS being the only business channel, with the need to acknowledge that<br />

taxpayers might not or could not use it. The operation of ROS was not seen as being simple, with<br />

128


Leonard Burke and Kieran Gallery<br />

interviewees concerned that its use might be beyond some taxpayers. Other inhibitors to ROS take up<br />

posited were the complex registration process and a fear of being audited. In addition, it was<br />

acknowledged that the simple requirements in completing some paper-based returns militated against<br />

them being completed electronically because a taxpayer could manually enter figures quickly, attach a<br />

cheque and submit the form and payment via post.<br />

4.1.3 The future of simplification<br />

While accepting that payment and filing in some instances had been made easier, interviewees<br />

acknowledged that work remains on the filing of annual returns around payroll taxes and return of trading<br />

details for business. It was observed that some information requested on forms might be already<br />

available to Revenue. A commitment was suggested to review information received from businesses to<br />

establish if all information sought is still required. In addition, it was suggested that seeking information<br />

less frequently could allow for targeted compliance campaigns. An inventory of the data obtained by<br />

Revenue could be undertaken, attributing a value score to each piece of data.<br />

Further initiatives were also highlighted, such as upfront soliciting of input from business prior to<br />

developing future strategy statements.<br />

Technology can assist further simplification by using third party web technologies to allow taxpayers meet<br />

tax obligations. The E agenda overall is important in this respect, with the suggestion made that the use<br />

of web portals would allow greater interaction between business and Revenue.<br />

The potential for further use and refinement of ROS as an aid to simplification and compliance was<br />

identified and included:<br />

An outward channel where Revenue would advise taxpayers of things known through third party<br />

information supplied (caution would need to be exercised to ensure that taxpayers did not conclude<br />

that this was all that Revenue knew about them!).<br />

Developing internet applications to make it easier for taxpayers to pay and file returns should be<br />

considered.<br />

Linking of company accounting/reporting systems into ROS would enhance the information available<br />

to Revenue.<br />

Reviewing rules around the self-service channel for employees that inter alia allows updating credits<br />

and allowances.<br />

While Revenue has introduced reduced payment and filing frequencies it has not surveyed those who<br />

were directly affected by these arrangements. Interviewees were asked whether this should now take<br />

place to determine satisfaction levels. Views on this were mixed. Some suggested that the need to<br />

engage meaningfully with intermediaries, practitioners and business was vital, as it allowed the parties to<br />

identify blockages that could be removed - provided there was no compliance risk. In addition, an<br />

opportunity to develop an agenda recognising the cost associated with having to provide information,<br />

while advancing an agenda for streamlining requirements, was now seen as possible. Measuring the<br />

compliance cost for business through an academic study was suggested, where cost of normal bookkeeping/accounting<br />

compliance would be disaggregated from the compliance cost associated with tax<br />

payment and filing of returns.<br />

In contrast, a number of interviewees remained unconvinced of the need to undertake such surveys. A<br />

more appropriate approach suggested was to engage in a structured format (through consultative fora or<br />

by issuing consultation documents) in conjunction with adopting a simplification programme as part of<br />

Revenue’s overall strategy.<br />

Customer segmentation, personalisation and pre-filling of forms were also advanced as means of<br />

simplification. It was felt there was scope for Revenue to do more here.<br />

While it was acknowledged that Revenue has made it easier to comply through reduced payment and<br />

filing frequencies, the overarching view was that simplification must go beyond this and address tax<br />

design. Design was seen as the most critical element of simplification, with one interviewee concluding<br />

that ‘if we don’t get design simplified – administration is always playing catch up.’ A value for money<br />

129


Leonard Burke and Kieran Gallery<br />

review of the design of the tax codes was suggested to re-clarify what are the objectives of the different<br />

taxes. It was accepted that this would be a major undertaking.<br />

5. Conclusions and recommendations<br />

The overall impression gleaned from the interviews is that Revenue perceives that the simplification<br />

measures around the three Taxes have been positively received by business. There have been benefits<br />

for Revenue administratively with amongst other things the opportunity to grow its strategy of dealing with<br />

compliance from a risk standpoint by using various data analysis tool at its disposal. Structured feedback<br />

from business falls short, however, and more should be sought.<br />

The interviewees agreed that consideration of the three business taxes specifically examined could not<br />

be isolated from a wider examination of what Revenue and other tax administrations are seeking to<br />

achieve through the simplification process, and how the associated compliance risk is managed.<br />

5.1 Recommendations<br />

Both in the literature reviewed and the primary research undertaken the need for balance in advancing<br />

simplification of tax compliance obligations for business customers and management of compliance risks<br />

by Revenue authorities frequently is raised. There is a marked reluctance to suggest that optimal balance<br />

has been attained in this area. Indeed the evidence suggests that this might not be possible but rather<br />

opportunities exist with changes to tax codes and economic conditions that prevail to continually look at<br />

advancing the simplification and compliance agenda with risk at the heart of such advancements.<br />

Revenue is engaged in worthwhile simplification initiatives, but similar to other developed countries, is on<br />

a continuous learning curve. The view of those interviewed (and that of the authors) is that there is some<br />

scope to introduce further simplification measures in respect of the three business taxes, such as:<br />

Reduced payment and filing frequency should be extended to regular ‘nil’ filers.<br />

Annual filing and payment arrangements for taxpayers with very small liabilities should be<br />

reconsidered.<br />

A review should be carried out aimed at eliminating or reducing the need for annual information<br />

returns.<br />

Taxpayers and representative bodies should be surveyed to inform as to possibilities for further<br />

simplification.<br />

The recent introduction of a universal social charge offers the opportunity to look at the construction<br />

of payroll taxes and levies to establish what design changes may be merited.<br />

It is also suggested that a wider simplification agenda needs to be embraced by Revenue at a strategic<br />

level. Suggested measures would include the following:<br />

Make tax simplification a primary Revenue objective.<br />

Assign overall responsibility to one of the management team to champion simplification.<br />

Further develop a simplification programme that would include an expenditure review of tax codes to<br />

re-clarify their objectives.<br />

Continue structured consultation with representative bodies.<br />

Benchmark with other tax administrations as a norm.<br />

Conduct an academic study to measure the real cost to business of tax administration in meeting<br />

compliance obligations.<br />

Explore further the use of analytics and avail of the REAP system to assist both the simplification and<br />

compliance agenda.<br />

Re-assess the need for the range information currently being sought from taxpayers.<br />

While there is a degree of satisfaction and acceptance that simplification measures in relation to the three<br />

business taxes has been well advanced these are only a few of the measures undertaken by Revenue,<br />

and are presented as an indication of the much wider simplification agenda that exists within Revenue.<br />

130


Leonard Burke and Kieran Gallery<br />

It should be noted that, while the experience and status of the interviewees should give a good indication<br />

of the Revenue perspective on the simplification/compliance issue, the interviewees’ views do not<br />

represent the views of the Revenue Commissioners as a whole.<br />

Moreover, the authors acknowledge that the study only sought Revenue’s perspective on whether an<br />

optimal balance has been achieved between tax simplification and compliance risk. However it is<br />

suggested that establishing a business perspective on this issue merits a study to give the external view<br />

on the topic. Research on tax simplification, and indeed, the implementation of the tax simplification<br />

agenda itself can be summed up in a slogan borrowed from Irish Rail: ‘We’re not there yet, but we’re<br />

getting there.’<br />

References:<br />

Bennett, F., Brewer, M. and Shaw, J. (2009) Understanding the Compliance Costs of Benefits and Tax Credits, The<br />

Institute for Fiscal Studies.<br />

Cooper, G. S. (1993) 'Themes and issues in tax simplification', Australian Tax Forum, 10.<br />

Forum on Tax Administration (2010a) Information Note: Programs to Reduce the Administrative Burden of Tax<br />

Regulations (follow-up report), OECD [online], available: http://www.oecd.org/dataoecd/58/27/44972185.pdf<br />

[accessed 04/05/2010].<br />

Forum on Tax Administration (2010b) Survey of Trends and Developments in the Use of Electronic Services for<br />

Taxpayer Service Delivery, OECD [online], available: http://www.oecd.org/dataoecd/20/49/45035933.pdf<br />

[accessed 01/03/2011].<br />

High Level Group on Business Regulation (2009) Second Report of the High Level Group on Business Regulation,<br />

Dublin: Department of Enterprise, Trade and Innovation.<br />

James, M. (2008) 'Tax Simplification: The Impossible Dream?', British Tax Review, (4).<br />

James, S. (2007) Tax Simplification is not a Simple Issue: The Reasons for Difficulty and a Possible Strategy,<br />

Discussion Papers in Management, University of Exeter, unpublished.<br />

James, S. and Ewards, A. (2007) How Far Should Tax research Take Account of the Wider Context? The Cases of<br />

Tax Compliance and Tax Simplification, Discussion Papers in Management, University of Exeter, unpublished.<br />

James, S. and Wallschutzky, I. (1997) 'Tax Law Improvement in Australia and the UK: The Need for a Strategy for<br />

Simplification', Fiscal Studies, 18(4).<br />

Klun, M. (2009) 'Pre-Filled Income Tax Returns: Reducing Compliance Costs for Personal Income Taxpayers in<br />

Slovenia', Financial Theory and Practice, 33(2).<br />

McKerchar, M. (2007) 'Tax Complexity and its Impact on Tax Compliance and Tax Administration in Australia', in<br />

2007 IRS Research <strong>Conference</strong>, Washington D.C.,<br />

McKerchar, M. (2008) 'Philosophical Paradigms, Inquiry Strategies and Knowledge Claims: Applying the Principles of<br />

Research Design and Conduct to Taxation', eJournal of Tax Research, 6(1).<br />

Owens, J. (2006) 'Fundamental Tax Reform: an International Perspective', National Tax Journal, 59.<br />

Patton, M. Q. (1990) Qualitative Evaluation and Research Methods, Newbury Park, CA: Sage.<br />

Revenue Commissioners (2007) Unpublished Minutes of Collector General Management Executive Meetings,<br />

Revenue Commissioners (2008) Revenue Statement of Strategy 2008-2010, Dublin: Revenue Commissioners.<br />

Revenue Commissioners (2010) Annual Report 2009, [online], available:<br />

http://www.revenue.ie/en/about/publications/annual-reports/2009/strategy1-1.html#table1 [accessed<br />

01/03/2011].<br />

Richardson, G. and Smith, D. (2002) 'The Readability of Australia's Goods and Services Tax Legislation: An<br />

Empirical Investigation', Federal Law Review, 30(3).<br />

Richardson, M. and Sawyer, A. J. (1998) 'Complexity in the Expression of New Zealand's Tax Laws: An Empirical<br />

Analysis', Australian Tax Forum, 14.<br />

Smith, A. (1776) An Inquiry into the Nature and Causes of the Wealth of Nations, Methuen & Co., Ltd [online],<br />

available: http://www.econlib.org/library/Smith/smWN.html [accessed 01/03/2011].<br />

Tan, L. M. and Tower, G. (1992) 'The Readability of Tax Laws: An Empirical Study in New Zealand', Australian Tax<br />

Forum, 9(4).<br />

Tran-Nam, B. (1999) 'Tax Reform and Tax Simplification: Some Conceptual Issues and a Preliminary Assessment',<br />

Sydney Law Review, 21.<br />

131


Risk Management in a Cooperation Context<br />

Walter Castelnovo<br />

University of Insubria, Italy<br />

walter.castelnovo@uninsubria.it<br />

Abstract: One-Stop Shop for Production Activities (SUAP) is the solution Italian Government has chosen to adopt,<br />

since 1998, in order to make it easier doing business. However, despite more than ten years of efforts, the ranking of<br />

Italy among the countries that have facilitated going into business have not improved over the past years. Thus, in<br />

2010 the Italian Government decided to further simplify the procedures by turning the current legislation from the<br />

traditional ex ante authorization regime into an ex-post controls regime. Under this new regime, all the required<br />

controls have to be operated within a fixed time interval defined by the law. Most often these controls have to be<br />

operated by different public agencies, thus determining two main problems: (a) the agencies involved should<br />

cooperate in order to make the controls efficient and effective; (b) since these agencies usually suffer from a chronic<br />

lack of resources, the only way to safeguard the public interest is by identifying, through a careful analysis of the<br />

potential risks involved, what controls really need to be made. In the paper I will consider how the public agencies<br />

involved in the functioning of the SUAP can satisfy the requirements determined by the new Italian legislation, by<br />

resorting to a form of inter-organizational risk management. In the first section of the paper, I will first provide a full<br />

explanation of the Italian model of SUAP and the recent changes in the Italian legislation concerning its functioning,<br />

and then I will show why the current regime of ex-post controls requires the SUAP to implement an adequate risk<br />

management system. In section 2 I will consider the Team Risk Management (TRM) model that has been originally<br />

developed to manage risks in software-dependent development programs involving different organizations. In section<br />

3, I will show how a slight revision of the TRM model can be integrated within the SUAP’s workflows to help all the<br />

public agencies involved to cope with the requirements stated by the new Italian legislation concerning starting,<br />

transforming or closing a business. Finally, I will discuss what conditions different public agencies should satisfy in<br />

order to implement an effective and efficient inter-organizational risk management system.<br />

Keywords: risk management, One Stop Shop, inter-organizational cooperation, interoperability<br />

1. One-Stop Shop for Production Activities<br />

Italy is one of the major economies in the world; notwithstanding this, Italy suffers from a serious problem<br />

of competitiveness. This mainly depends on the difficulty of doing business in Italy: in the 2010 World<br />

Bank’s ranking Italy occupies the 80 th position among the countries in which doing business is easier<br />

((World Bank 2010)). The Word Bank’s index is based on some general economic indicators, some of<br />

which directly concern the administrative burdens affecting businesses. For this reason the policies<br />

implemented in Italy to improve competitiveness have been mainly based on the simplification of the<br />

administrative procedures needed for starting, transforming or closing a business.<br />

Due to the legislation in force, most of the administrative procedures concerning business involve<br />

different public agencies. Thus, as a first step for reducing the administrative burdens on business, Italian<br />

municipalities have been required to implement One-Stop Shops for Production Activities (Sportello<br />

Unico per le Attività Produttive – SUAP), as a single point of access to services and information for<br />

business offered by different public authorities. The first legislation concerning the SUAP dates back to<br />

the late ‘90s and contains two fundamental principles: (i) municipalities are put in charge of the<br />

functioning of the SUAP, that could also be shared by different municipalities; (ii) the SUAP must give or<br />

deny a final authorization within a fixed term defined by the law, having previously acquired all the<br />

required authorizations from the competent agencies.<br />

Over the years the model of the SUAP has been under ongoing improvement, mainly by making it more<br />

and more ICT-based. The evolution of the SUAP toward virtualization can be described by the reference<br />

framework for One-Stop EGovernment of figure 1 (the dotted lines represent the evolution path of the<br />

SUAP):<br />

At the very beginning the main problem for the SUAP was how to bundle the services offered by different<br />

agencies (the step 1 in the figure above); this problem has been solved mainly in terms of inter-agencies<br />

agreements, often without considering how inter-agencies communications and workflows could be<br />

virtualized. A fundamental step toward the virtualization of the SUAP has been made with the innovation<br />

projects funded under the Italian National Action Plan for EGovernment between 2003 and 2008.<br />

Actually, 79 out of the 134 funded projects directly concerned the implementation of online services for<br />

enterprises. Moreover, despite their not being directly geared toward enterprises, most of the other<br />

infrastructural projects funded under the Action Plan aimed at creating the technological conditions for the<br />

132


Walter Castelnovo<br />

virtualization of inter-agencies communications and workflows, thus enabling the complete virtualization<br />

of the SUAP (the step 2 of figure 1). However, the ease of doing business in Italy has not improved<br />

during the past years, notwithstanding the simplification induced by the virtualization of the SUAP.<br />

Figure 1: Reference framework for one-stop eGovernment ((Hogrebe and Kruse 2008))<br />

To change this situation, in 2010 the Italian Government took new initiatives to make it easier starting,<br />

transforming or closing a business. Not only were new measures defined, in order to favour the complete<br />

digitalisation of inter-municipal communications and workflows, but even the procedures for starting,<br />

transforming or closing a business have been further simplified by turning the current legislation from the<br />

traditional ex ante authorization regime into an ex-post controls regime. Under this new regime, a new<br />

business can be started up simply through a communication (Segnalazione Certificata di Inizio Attività –<br />

SCIA, Certified Communication of the start of the activity) submitted online to the SUAP through the<br />

national portal www.impresainungiorno.it.<br />

The online procedure is such that it guarantees that the SCIA contains all the required information and<br />

that all the required documents have been attached (if the communication is incomplete it is rejected). A<br />

SCIA that has been checked for completeness gets registered to the system that automatically sends a<br />

receipt to the applicant. Upon receiving this receipt, an entrepreneur can start a new business without<br />

necessarily having to wait for the SUAP to complete the required controls. This is the main reason why<br />

the new ex-post controls regime is expected to make it easier to start a business in Italy.<br />

Upon registering the SCIA the SUAP has to operate all the required controls within an interval of time<br />

defined by the law (60 days). If any of the controls detects some inadequacy, then the business can be<br />

stopped (either temporally until the inadequacy will be removed or definitively, if the inadequacy can not<br />

be removed), otherwise it can operate without requiring any further authorizations.<br />

The new legislation is in force since 2010; hence it is not possible to evaluate yet, not even tentatively,<br />

the effects it can have on the ease of doing business in Italy. However, it is possible to evaluate the<br />

impact the new legislative regime has on the functioning of the SUAP, considering that it maintains the<br />

responsibility of the municipality on the SUAP and it does not reduce the number of public agencies and<br />

authorities having competences concerning starting, transforming or closing a business. This determines<br />

two relevant consequences; on the one hand, it is a responsibility of the municipality to implement,<br />

through the SUAP, an effective and efficient system for the management of all the ex-post controls<br />

133


Walter Castelnovo<br />

required by the new legislation. On the other hand, such a system must be based on the cooperation<br />

among the different public bodies involved. Both consequences can be problematic, given the chronic<br />

lack of resources characterizing the Italian municipalities, as well as many of the other public agencies<br />

having competences on starting, transforming or closing a business. Actually, even if they can be made<br />

more efficient by the use of ICTs, especially in coordinating the activities of the different agencies<br />

involved, the ex-post controls cannot be completely automated. They most often have to be manually<br />

performed by people that are likely to be also allocated to other activities within their organizations and<br />

that, for this reason, could have difficulties to promptly operate the controls.<br />

In such a situation the risk that the SUAP can not guarantee that all the ex-post controls will be operated<br />

within the required terms is concrete. It is a risk that can affect seriously the capacity of the municipalities,<br />

and other public agencies as well, to pursue public value through a careful management of the territory.<br />

Actually, given the lack of resources affecting the public bodies involved, the only way to safeguard the<br />

public interest is by identifying what controls really need to be operated, based on a careful analysis of<br />

the potential risks the SCIAs that have been submitted to the SUAP could entail.<br />

2. Risk management<br />

The word risk can assume different meanings according to the context in which it is used. (Alberts and<br />

Dorofee 2005) suggests that in order for a risk to exist the following three conditions must occur:<br />

There must be a loss associated with a situation<br />

There must be some uncertainty with respect to the eventual outcome<br />

Some choice or decision is required<br />

In the case we are considering (that is the processing of a SCIA under the new Italian legislation), all the<br />

three conditions occur.<br />

In 2009, 385.512 procedures for the starting of new enterprises and 406.751 procedures for the closing of<br />

enterprises have been registered in Italy. Even without considering the procedures for the transformation<br />

of already existent enterprises, it is apparent that in order to carry out all these procedures an intense<br />

activity is required to all the public bodies involved. Because of the lack of resources mentioned above, in<br />

order to guarantee that they will be operated at least on the more critical cases, the SUAP could be<br />

forced to decide whether or not a SCIA deserves all the ex-post controls normally required. Thus, in the<br />

case we are considering the condition (3) above holds.<br />

For the same reason, the condition (2) holds as well; actually, when the SUAP decides not to make the<br />

controls on a given SCIA, no one knows for sure what the consequences of that decision will be. Hence,<br />

the decision involves a certain degree of uncertainty with respect to its eventual outcome.<br />

For condition (1) above to hold there must be a possible loss related to the decision that is being taken. If<br />

the business whose starting has been communicated through a SCIA completely conforms to the<br />

regulation in force and does not involve any peculiarity that could recommend not establishing it there,<br />

not performing the ex-post controls has no problematic consequences. However, if the starting of that<br />

business involves some problems that would need attention, not performing the ex-post controls could<br />

have problematic consequences. In this case, by identifying the potential problems involved, the ex-post<br />

controls could avoid the occurrence of problematic situations (for instance in terms of non conformance to<br />

the building regulation, potential environmental risks or health risks for the employees and/or for the<br />

surrounding population, etc.). From this point of view, performing the ex-post controls is a way of<br />

preserving the public interest and pursuing public value.<br />

Similarly, disregarding the case in which in starting a new business something not conforming to the<br />

regulation in force has been consciously done, the ex-post controls allow an entrepreneur to know timely<br />

that something wrong has been done that could lead to some form of sanctioning or even to the closing<br />

of his business. In this sense, the ex-post controls can help an entrepreneur to avoid the occurrence of<br />

problematic situations, thus helping him doing business. This is a way to contribute increasing a country’s<br />

economic wellness and, consequently a way to indirectly pursuing public value.<br />

In both the cases considered, the decision of not performing the ex-post controls could cause a loss that<br />

ultimately concerns the pursuing of public value, that is the fundamental mission of a public<br />

134


Walter Castelnovo<br />

administration body. Hence, the SUAP’s decision whether or not to perform certain ex-post controls<br />

satisfies also the condition (1) above characterizing the existence of a risk.<br />

It can thus be concluded that, under the new Italian legislation concerning starting, transforming or<br />

closing a business, the activity of the SUAP could indeed involve some risk that needs to be managed to<br />

preserve public value. From this point of view, risk management should be considered as an essential<br />

part of the functioning of the SUAP.<br />

In the case we are considering, all the public agencies involved in the processing of a SCIA may have to<br />

decide whether or not to perform the ex-post controls normally required. However, the individual decision<br />

of each agency involved has consequences on the final result of the processing of that SCIA, thus<br />

affecting the other authorities' capability of pursuing their strategic mission. In order to avoid this<br />

possibility, it is necessary for all the actors involved in the processing of a SCIA to share both their<br />

evaluation of the potential risks it could entail and their decisions whether or not to perform some controls<br />

on it. This rises the problem of implementing an interoperable risk management system, that is a system<br />

whose goal is “to more effectively allow organizations to share information and perform necessary<br />

activities with regard to risk management that may affect their collective behaviour” ((Meyers 2006, 6)).<br />

The fundamental function of risk management is to help an organization to handle the risks it could<br />

encounter in its activities. As defined, for instance, in (Strategic Partnering Taskforce 2004) risk<br />

management includes identifying risks, assessing risk areas, developing risk-handling options, monitoring<br />

risks to determine how risks have changed, and documenting the overall risk management programme.<br />

In an inter-organizational risk management system all these activities must be shared by the partners.<br />

Although it has been devised specifically for managing risks in software-dependent development<br />

programs, the Team Risk Management (TRM) approach described in (Higuera et al. 1994) defines<br />

methods and tools that can help organizations to manage risks also in the cooperation scenario we are<br />

considering.<br />

Figure 2: The team risk management approach ((Higuera et al. 1994))<br />

In the original TRM approach three types of risk management processes are considered: (i) an intraorganizational<br />

process executed independently by each partner organization (the Baseline Risk<br />

Assessment); (ii) a set of continuous processes implemented as both intra and inter-organizational; (iii)<br />

an inter-organizational process conducted jointly by the partners (the Team Review Process).<br />

The risk management process begins with the baseline risk assessment that allows all the partners to<br />

identify the risks that are associated with their respective organizations. These risks are shared and<br />

jointly evaluated through the team review that combines the most important risks identified by the<br />

partners into a list of the most important risks faced by the program. The continuous processes comprise<br />

a cyclic set of activities, that roughly correspond to the risk management activities mentioned above;<br />

135


Walter Castelnovo<br />

these activities allow each partner to manage risks both at the intra-organizational level and at the interorganizational<br />

level, through a repeated execution of the team review process.<br />

Strictly speaking, the case we are considering does not involve the execution of a single mid to long term<br />

program, that is what the TRM approach has been specifically devised for. This means that, to be applied<br />

here, the model has to be modified in some ways. On the one hand, the original model only considers a<br />

dyadic relation between the partners, whereas in the processing of a SCIA many agencies could be<br />

involved. On the other hand, since there could be many different SCIAs that have to be simultaneously<br />

processed by the SUAP, it could happen that the partners are involved in the concurrent execution of<br />

different instances of the global risk management process described in figure 2 above. Finally, since the<br />

processing of a SCIA has to be completed within 60 days from its submission to the SUAP, the reiteration<br />

cycles of both the team review and the continuous processes must be much more shorter than those<br />

described in the original model. All these elements obviously affect the way in which the TRM model<br />

could be implemented as part of the SUAP’s activity.<br />

In the next section I will consider how, a slight revision of the TRM model can be integrated within the<br />

SUAP’s workflows to help all the public agencies involved to cope with the requirements stated by the<br />

new Italian legislation concerning starting, transforming or closing a business.<br />

3. Inter-organizational risk management<br />

As argued above, the need for the SUAP to implement a risk management system derives from the<br />

necessity to rest upon a careful analysis of the potential risks involved the decision whether a SCIA really<br />

deserves the ex-post controls normally required. Such controls most often concern matters on which<br />

different public agencies have competences besides the municipality that is responsible for the<br />

functioning of the SUAP. This determines two relevant consequences:<br />

The decisions should be shared among all the agencies involved;<br />

All these agencies should coordinate their control activities, since a possible delay in one agency’s<br />

activity could have consequences on the final result of the processing of a SCIA.<br />

A way to satisfy both these requirements is by integrating the TRM model within the SUAP’s workflows as<br />

defined by the new Italian legislation concerning starting, transforming or closing a business. The<br />

workflow of figure 3 below describes such an integration.<br />

Figure 3: Integration of TRM within the SUAP’s workflow<br />

The whole process is activated by an applicant submitting online a SCIA (and all the required documents)<br />

through the portal www.impresainungiorno.it. The SCIA and all the documents attached to it are<br />

forwarded to the competent SUAP that, after verifying the completeness of the documentation, releases a<br />

receipt to the applicant. From this moment onward, the activity that has been object of the SCIA can be<br />

started.<br />

136


Walter Castelnovo<br />

After registering the SCIA, the SUAP sends the relevant documentation to all the agencies having<br />

competences on it. Upon receiving the documents, the agencies can individually perform the baseline<br />

risk assessment process, with the aim of identifying all the potential risks that SCIA could entail. By using<br />

standard tools for risks analysis and evaluation (for instance those considered in (IMA 2007) and in<br />

(AIRMIC, ALARM, IRM 2002)), through this step each partner is thus able to associate to the SCIA under<br />

processing a level of risk, with respect to the matters on which he has competence. For each partner, this<br />

level corresponds to how much attention he thinks that SCIA deserves, based also on previous<br />

experiences in similar cases.<br />

Besides evaluating the potential risks involved, during this phase each partner can also plan the<br />

execution of the control activities on that SCIA. The timing of these activities depends both on the level of<br />

risk detected and on the other activities in which that agency is possibly already occupied. Actually, as<br />

observed above, the agencies involved in the processing of a SCIA are most often characterized by a<br />

limited availability of resources that usually have to be allocated also on different activities, besides those<br />

concerning starting, transforming or closing a business.<br />

The team review allows the partners to jointly evaluate the SCIA on the basis of the potential risks each<br />

one of them identified individually, thus arriving at a shared risk evaluation. Such an evaluation forms the<br />

basis for determining what is the more adequate risk treatment strategy to assume among accepting,<br />

rejecting or handling the risks. Accepting the risk means that the team evaluation is such that the level of<br />

risk of the SCIA is not ranked high; thus, also considering the other constraints that could possibly limit<br />

the partners’ activities, there is no particular problem in delaying, and even possibly avoiding, the ex-post<br />

controls. Rejecting the risk amounts to recognizing that the SCIA does not involve any particular risk and<br />

could thus be treated in terms of a silent-assent procedure. Finally, handling the risk means adopting<br />

mitigation plans with the aim of reducing the risks involved in the SCIA by implementing appropriate risk<br />

mitigation actions. Such actions will amount to the competent authorities planning and performing all the<br />

required ex-post controls with a timing that will allow the processing of the SCIA to be completed within<br />

the terms provided by law.<br />

In defining the risk handling actions through the team review, the partners are in position not only to<br />

identify what controls really need to be made, and by who, but also to consider what controls could be<br />

delayed or, possibly, even be dispensed with. Due to the scarcity of the resources each partner can<br />

devote to the controls, this is a way to optimize their use through a collaborative distribution of tasks.<br />

This point can be illustrated with an example. Suppose that a SCIA S has been submitted to the SUAP<br />

such that three public agencies (AG1, AG2, AG3) are involved in its processing. Suppose, moreover, that<br />

the baseline risk assessment is such that AG1 rates S as high risk, whereas AG2 and AG3 rate it as low to<br />

medium risk. All the three agencies involved should make the required controls, which forces all of them<br />

to allocate resources on this task. However, it could happen that despite the controls performed by AG2<br />

and AG3 didn’t detect any inadequacy, the SCIA has nevertheless to be rejected because of a serious<br />

problem detected by AG1. In this case, AG2 and AG3 have been forced to spend their scarce resources on<br />

activities that they could have avoided if they already knew the result of the controls operated by AG1.<br />

Given the scarcity of the available resources, the occurrence of such a situation should be avoided.<br />

In the example above this result could be achieved by scheduling the controls activities to be performed<br />

by AG2 and AG3 after those pertaining to AG1. The general strategy could then be scheduling the control<br />

activities the different agencies have to perform so as to execute first those with the highest level of risk<br />

detected, compatibly with the timing the agencies involved assign to the SCIA under processing. With<br />

respect to the example this means that, in case the timing for S defined by AG1 is not compatible with the<br />

general strategy, the partners could ask AG1 to revise its scheduling and to re-allocate its resources so<br />

that S could be processed earlier than originally planned. Of course, this requires AG1 to agree redefining<br />

its priorities in order to cope with those shared within the team review. However, this can be done only if<br />

there is a strong commitment of the partners toward the collaboration.<br />

Once defined and agreed on by all the participants to the team review, each partner has to implement its<br />

own risk handling actions, by entering in the continuous processes phases. These phases include action<br />

planning, tracking, control and routine risk identification and analysis.<br />

Action planning essentially amounts to each partner redefining its priority to align them to those defined<br />

by the team review. This step also presupposes a strong internal commitment, especially in the case the<br />

137


Walter Castelnovo<br />

agencies involved are small organizations. Actually, team risk management requires a strong internal<br />

commitment both to support the baseline risk assessment and to implement the risk handling actions<br />

defined within the team review.<br />

Consider, for instance, the case of a small municipality in which the presence of an organizational unit<br />

specifically devoted to the processes concerning starting, transforming or closing a business is extremely<br />

unlikely. Risk analysis and risk handling processes in small municipalities would most often be managed<br />

by resorting to resources available within different organizational units, that is people who already have a<br />

full-time job in the organization and are now tasked with something else. Of course, this rises a serious<br />

coordination problem within the organization, whose solution requires the commitment of both policy<br />

makers and senior managers that are asked to fix the priorities. Actually, a strong intra-organizational<br />

commitment is one of the fundamental conditions for the effectiveness of all risk management processes<br />

((ISO 2009), (AIRMIC, ALARM, IRM 2002, 2010)).<br />

By means of the tracking and control processes each partner can monitor the results of the risk handling<br />

actions implemented, at the same time providing a documentation of the whole risk management<br />

process. Once shared with the partners, these monitoring information constitute a common knowledge<br />

base that can be referred to, both at the intra-organizational level and the inter-organizational level, in the<br />

treatment of similar situations that could arise in the future. Of course, this can be done only if the<br />

partners share the risk monitoring system and the monitoring information are gathered and<br />

communicated by means of standardized reporting structures.<br />

Finally, the routine risk identification and analysis process amounts to a continuous activity through which<br />

all the partners can identify new threats arising during their day to day activities. These threats can<br />

depend on the occurrence of unforeseen situations that could affect the partners’ capacity to execute the<br />

risk handling actions within the terms agreed on. Such risks should be identified and treated timely since<br />

a delay in one partner’s activity could affect the final result of the processing of a SCIA. Moreover,<br />

because of the potential consequences they could have on the other partners’ activities, the emergence<br />

of these risks should be promptly communicated to the partners, in order to let them assume timely all the<br />

measures apt to cope with the new situation.<br />

In the TRM model, the sharing of the risk identification and the joint definition of the risk handling actions<br />

are part of the team review process. However, due to the strict temporal constraints the processing of a<br />

SCIA must satisfy, in the situation we are considering the team review process cannot be implemented<br />

simply as a periodic meeting among the partners. Rather, also team review should be implemented as a<br />

continuous communication process through which the partners interact on a day to day basis.<br />

4. Conclusions<br />

Joint risk management is a form of inter-organizational cooperation for the management of the risks<br />

related to activities involving the joint effort of different organizations. Such organizations could be highly<br />

heterogeneous, not only as regards their dimensions, organizational culture, competences in the use of<br />

ICT, but also as regards their legal status. However, the efficiency and effectiveness of an interorganizational<br />

cooperation strictly depends on how the partners will be able to ‘mesh’ their efforts, aiming<br />

at some degree of homogeneity with respect to some aspects of their activities, while maintaining<br />

heterogeneity in others. This raises the problem of what conditions can make it possible for<br />

heterogeneous partners to share an inter-organizational risk management system.<br />

The effectiveness of the inter-organizational risk management system described above, strictly depends<br />

on some conditions the partners must satisfy. Such conditions include:<br />

The sharing of the strategic vision among the partners, as the condition that allows them to assume a<br />

common view of what counts as a risk<br />

A strong commitment of the partners toward the cooperation, such that they consider themselves as<br />

part of an inter-organizational system (conceived as a system of systems)<br />

Considering the interaction with the partners as a standard modality in the day to day operations<br />

A continuous communication and sharing of information among the partners<br />

The integration of the inter-organizational risk management processes within each partner’s internal<br />

processes<br />

138


Walter Castelnovo<br />

A high operational flexibility of the partners, to cope with unforeseen situations and exceptions that<br />

can derive also from the activities of the other partners<br />

The sharing of standardized tools and methodologies for the identification, analysis, evaluation and<br />

description of risks<br />

Satisfying these conditions makes the partners interoperable with respect to risk management.<br />

Considered as interoperability requirements, these conditions are quite different from the usual<br />

requirements for systems interoperability. In risk handling the rapidity of the answer to threats is a key for<br />

success. In situations in which, like in the case considered in this paper, different organizations are<br />

involved, the rapidity of the answer strictly depends on the partners’ capability of working together. Of<br />

course, this entails the sharing of information, the efficiency of inter-organizational communication and<br />

the compatibility of the organizational processes; but it also presupposes a common organizational<br />

culture and a shared system of values. Risk management is a central part of any organisation’s strategic<br />

management; it is not possible for different organizations to share risk management without also sharing<br />

(some or all of) their strategic objectives. This means that, in order to share an inter-organizational risk<br />

management system like the one described in section 3, the partners have to achieve a high level of<br />

interoperability, not only in the technological domain but in the organizational and strategic domains as<br />

well.<br />

References<br />

AIRMIC, ALARM, IRM (2002), A risk management standard, The Association of Insurance and Risk Managers<br />

(AIRMIC), Association of Local Authority Risk Managers (ALARM) and The Institute of Risk Management<br />

(IRM).<br />

AIRMIC, ALARM, IRM (2010), A structured approach to Enterprise Risk Management (ERM) and the requirements of<br />

ISO 31000, Association of Local Authority Risk Managers (ALARM) and The Institute of Risk Management<br />

(IRM).<br />

Alberts, C.J. and Dorofee, A.J. (2005), Mission Assurance Analysis Protocol (MAAP): Assessing Risk in Complex<br />

Environments,TECHNICAL NOTE, CMU/SEI-2005-TN-032, Carnegie Mellon University.<br />

Higuera, R. P., Gluch, D. P., Dorofee, A. J., Murphy, R.L., Walker, J.A. and Williams, R. C. (1994), An Introduction to<br />

Team Risk Management. (Version 1.0), Special Report CMU/SEI-94-SR-1, Carnegie Mellon University<br />

Hogrebe, F. and Kruse, W. (2008), “One Stop eGovernment for Small and Medium-Sized Enterprises (SME): A<br />

Strategic Approach and Case Study to Implement the EU Services Directive”, eCollaboration: Overcoming<br />

Boundaries through Multi-Channel Interaction, Proceedings of the 21st Bled e<strong>Conference</strong>, Bled, Slovenia, June.<br />

IMA (2007), Enterprise Risk Management: Tools and Techniques for Effective Implementation, Institute of<br />

Management Accountants.<br />

ISO (2009), ISO 31000:2009, International Organization for Standardization.<br />

Meyers, B.C. (2006), Risk Management Considerations for Interoperable Acquisition, TECHNICAL NOTE, CMU/SEI-<br />

2006-TN-032, Carnegie Mellon University.<br />

Strategic Partnering Taskforce (2004), Risk Management - Technical Notes, Office of the Deputy Prime Minister, UK.<br />

World Bank (2010), Doing Business 2011 – Making a Difference for Entrepreneurs, The International Bank for<br />

Reconstruction and Development/The World Bank.<br />

139


The Effect of User's Satisfaction of web Security on Trust in<br />

eGovernment<br />

Lichun Chiang 1 , Ching-Yuan Huang 2 and Wu-Chuan Yang 3<br />

1<br />

National Cheng Kung University, Tainan, Taiwan<br />

2<br />

Shu-Te University, Kaoshiung, Taiwan<br />

3<br />

I-Shou University, Kaoshiung, Taiwan<br />

gardfieldc@gmail.com<br />

Abstract: The way that Web security has been managed by the government will influence user’s satisfaction and<br />

intention toward using web and trust in the government. The purpose of this research is to link user's satisfaction with<br />

web security in eGovernment and trust in government; that is, it aims to study the relationships among user’s<br />

satisfaction, trust and government. The main question is “does user’s satisfaction of web security in eGovernment<br />

influence user’s trust in the government?” The research explores the status quo of web security in government, and<br />

studies user’s satisfaction of web security which influences user’s trust in the government. The research focuses on<br />

the investigation of users’ satisfaction and trust of web security via the method of questionnaires applied the<br />

structural equation modeling (SEM) to analyze users’ trust in the use of web security. The statistic method is applied<br />

LISREL 8.54 to analyze questionnaires’ data. This research shows that the precursors of user intent to trust web<br />

security are multidimensional (i.e., ease of use, perceived usefulness, attitude and satisfaction) and identifies their<br />

critical influences on realizing government web security. These two dimensions are interwoven, and one must not<br />

focus exclusively on any single factor in assessing overall intention toward trust eGovernment.<br />

Keywords: eGovernment, satisfaction, service quality, trust, the structural equation modeling<br />

1. Introduction<br />

Since the government applied information technology (IT) to improve public services, government web<br />

application has become a convenient tool for users to search official documents and participate in public<br />

activities. Users using government Web sites are not only critical consumers but also demanding citizens<br />

(Welch et al 2005). Therefore, what citizen demand are on government web sites is concerned by<br />

eGovernment when developing digitalized public services via the Internet; that is, the way making citizens<br />

satisfaction with public services has to be considered by eGovernment. Welch, Hinnant and Moon (2005)<br />

pointed out that appropriate IT utilization, especially the Internet, by government has the potential to<br />

increase citizen satisfaction with government at the reason that more convenient services, more<br />

accessible and complete information can improve citizen trust in government. As Chadwick and Basden,<br />

(2001) said, trust built from experience, personal knowledge, and bias, and also based on the action that<br />

the trustee is about to take. Thus, user’s experiences with eGovernment, satisfaction with eGovernment<br />

and government Web sites are interrelated to trust in government and they affect each other.<br />

The way that Web security has been managed by the government will influence user satisfaction and<br />

intention toward using web and trust in the government (Welch et al. 2005; Liu, Guo & Hsieh 2010). As<br />

Hisamitsu and Takeda (2007) stated, the security of e-voting systems and their operational procedures<br />

are important factors to assess the attitude of trustworthiness of e-voting practices in Japan. The key<br />

factor affected user satisfaction of government web sites is considered as Web application security<br />

because of the nature of online activities: information exchange, payments and individual privacy. In<br />

addition, the quality of the public e-services users perceived is necessary consideration when discussing<br />

user satisfaction with government websites (Magoutas & Mentzas 2010). User behavioral intention<br />

towards e-service continuance is influenced by customer satisfaction, perceived usefulness and<br />

subjective norm according to the theory of Planned Behavior (TPB) and the Technology Acceptance<br />

model (TAM) (Bhattacherjee 2001; Liao et al. 2007). Thus, government web application security is<br />

interrelated to user satisfaction and trust.<br />

The purpose of this research is to link user's satisfaction with web security in eGovernment and trust in<br />

government; that is, it aims to study the influential factors which possibly affect the relationships between<br />

user’s satisfaction of government web security and trust in government. The main question is “does<br />

user’s satisfaction of government web application security influence user’s trust in the government?” In<br />

order to answer this question, the authors examine users perceptions of government web application<br />

security based on the Technology Acceptance model and other influential factors, such as perceived<br />

ease of use (PEU), perceived usefulness (PU), attitude of web security (AWS), service quality (SEQ),<br />

satisfaction of web security (SWS), confidence in web security (CWS), intention toward trust in<br />

140


Lichun Chiang et al.<br />

eGovernment (ITG), to assess user trust in government. TAM is seemed as the most widely used models<br />

in Information Systems, in part because of its understandability and simplicity (King & He 2006).The<br />

research method uses questionnaires with application of the structural equation modeling (SEM) to<br />

analyze user trust in the use of web security. The statistic method is applied LISREL 8.54 to analyze<br />

questionnaires’ data.<br />

In addition to Introduction, this paper is divided into four main parts: First, a review of the theoretical<br />

literature on the relationship among web application security, user satisfaction and trust in eGovernment,<br />

and discussion on some of the experimental evidence in support of the theory. The second part describes<br />

the research method used in this paper, including the methodological approach, the variables used in the<br />

analysis, the sampling of cases and the questionnaire design. In the third part, data analysis and results<br />

are presented. Finally, a discussion of these results is provided along with description of some of the<br />

implications and future work to be done in this research area.<br />

2. Literature review<br />

Since customers feel satisfied with e-services provided by the private companies, they know the<br />

efficiency and convenience to do business over the Internet; therefore, users demand the same level of<br />

digitalized services from government that they have come to expect from the private companies<br />

(Stamoulis et al. 2001). The concept of satisfaction implies the fulfillment of expectations as well as a<br />

positive and affective state based on previous results obtained in the relationship with the web site<br />

(Martin & Camarero 2009, p.4). The digitalization of the service functions has given a new idea about<br />

user satisfaction with the government. Service quality has been considered to be one of the primary<br />

drivers of customer satisfaction (Kristensen, Martensen, & Gronholdt 2000; Martensen et al. 2000; Hsu<br />

2008). In using e-services, customer interface quality and perceived security also positively affected<br />

customer satisfaction (Chang & Chen 2009; Magoutas & Mentzas 2010). Satisfaction with previous<br />

purchases, the Web site security and privacy policies, and service quality are the main determinants of<br />

trust (Hsu 2008; Martin & Camarero 2008). Mármol et al. (2010) applies a trust and reputation model for<br />

identity management systems to guarantee an acceptable level of security. Users built their institutional<br />

trust (or confidence) inductively through their experiences and reputation of e-services (Smith 2010).<br />

Therefore, user satisfactions are determined by their experiences of e-services, web security, and<br />

confidence in eGovernment.<br />

In addition to the above mentions, user attitude in accepting information technology has been an<br />

important issue in discussing security and trust regarding use of information technology. Since Davis<br />

(1989) provided the Technology Acceptance Model (TAM) and showed that the theoretical basis for<br />

actual use depends on behavioral intention, TAM has been primarily used to explain the usage of<br />

information technology (Ma & Liu 2004). This model focuses on the attitudinal explanations of individual<br />

intentions to use a specific technology. TAM involves two primary predictors: perceived ease of use and<br />

perceived usefulness. TAM uses the dependent variable of behavioral intention to predict attitude<br />

towards use of a technology. McKnight et al. (1998) and McKnight and Chervany (2001) are categories of<br />

research on trust: one is topology (conceptual types), such as, attitudes, beliefs, behaviors and<br />

dispositions, and the other is object of trust (different referents), which includes trust in something or in<br />

someone (e.g. the system). The former refers to the typology of trust construct, and the latter refers to the<br />

object of trust. According to conceptual trust, two important beliefs – perceived ease of use and perceived<br />

usefulness–are instrumental in explaining the variance in intention (Agarwal & Prasad 1999; Kramer 1999;<br />

Li et al. 2004). ‘Perceived ease of use’ encapsulates the degree to which a potential adopter views usage<br />

of the target technology to be relatively free of effort; ‘perceived usefulness’ captures the extent to which<br />

a potential adopter views the innovation as offering value over alternative ways of performing the same<br />

task (Davis et al. 1989; Karahanna et al. 1999; Gefen et al. 2005). In brief, ease of use refers to the<br />

property of a product or thing that a user can operate without having to overcome a steep learning curve.<br />

It expresses the relationship between experience and efficiency. In contrast, perceived usefulness means<br />

that a user believes in the existence of a positive use-performance relationship (Davis 1989). Johnson<br />

(2005) stated that perceived usefulness influenced a manager’s attitude to invest in information security.<br />

The importance of perceived ease of use and perceived usefulness as determinants of user intention is<br />

indicated by their joint effects on attitude towards using the system, such as e-commerce, information<br />

technology and the voting system (Al-Gahtani & King 1999; Xenakis & Macintosh 2005).<br />

Using new technology may involve both benefits and risks to the end-user, and before deciding to adopt<br />

the technology the individual may want to weigh risks and benefits (Horst, Kuttschreuter & Gutteling<br />

2007). For instance, if voters lacked trust in the electoral process that was used to select those who filled<br />

141


Lichun Chiang et al.<br />

the offices of those institutions of government, it seems unlikely they will then have trust in the<br />

performance of those institutions themselves (Parent, Vandebeek & Gemino, 2005; Alvarez, Hall &<br />

Llewellan 2006:4). In considering e-voting, voters are concerned with the process of electronic voting<br />

which must be confidential. At the same time, the process must be capable of satisfying the needs of<br />

participants and their security expectations. Security refers mainly to the technically guaranteed respect<br />

of confidentiality (secrecy), integrity and availability, but it also refers to a whole range of functions such<br />

as registration, eligibility and authentication (Gritzalis 2002; Dini 2003). Therefore, trust is not taking risk<br />

per se, but rather it is a willingness to take risk (Johnson-George & Swap 1982; Mayer, Davis &<br />

Schoorman 1995). Trust has a personal element to it. Trust is built from experience, personal knowledge,<br />

and bias (Chadwick & Basden 2001). The definition of trust is the willingness to believe in the reliability,<br />

honesty, worthiness and capability of another entity (Chadwick & Basden 2001; Lekkas 2003). Cho<br />

(2006) pointed out that perceived risk and trust were less important at present most likely because online<br />

legal services are still somewhat immature and focus mainly on less risky areas, such as information<br />

dissemination and marketing. Therefore, a safe and legal infrastructure in cyberspace would be important<br />

for regulating and protecting user privacy and rights. Trust is the main influential element on user attitude<br />

to apply information technology, technology acceptance and adoption (Bahmanziari 2003; Suh & Han<br />

2003). Perceived usefulness, ease of use, compatibility, risk perception and security control are<br />

significant antecedents of initial trust in predicting user intention to use information technology, such as<br />

eGovernment services and websites (Koufaris & Hampton-Sosa 2004; Carter & Belanger 2005; Horst<br />

2007).<br />

According to the above mentioned, user satisfactions of web security are determined by user perceived<br />

ease of use, perceived usefulness, attitude, e-service quality and trust. User intentions to apply eservices<br />

provided by government web application are affected by their confidence and satisfaction in<br />

government.<br />

3. Research method<br />

3.1 Research hypotheses and research model<br />

The research model shown in Figure 1 is based on prior research about TAM based on Davis (1989),<br />

Gefen et al. (2003), Koufaris & Hampton-Sosa (2004), Carter & Belanger (2005), Horst (2007). Note that<br />

the model discusses user perceptions of satisfaction in relation to trust eGovernment which led to the<br />

hypotheses. The research model, utilizing structural equation modeling, posits that user perceptions of<br />

ease of use, usefulness, service quality, satisfaction and confidence are research variables that are<br />

important to user attitude and intention toward trust in eGovernment.<br />

Figure 1: Research structure and hypotheses<br />

142


Lichun Chiang et al.<br />

In this research based on TAM model, perceived ease of use and perceived usefulness are to explore<br />

user acceptance of web application security when operating government web interface, as Davis et al.<br />

(1989) and Agarwal & Prasad (1999), Kramer (1999) and Li et al. (2004) stated. Furthermore, perceived<br />

ease of use and perceived usefulness influence attitudes toward using Web application security.<br />

According to Davis et al. (1989 & 1993) researches, perceived ease of use is an antecedent to perceived<br />

usefulness. Hsu (2008) and Martin & Camarero (2008) postulated that service quality was closely related<br />

to user attitude and that attitude in using government Web application security would influence user<br />

satisfaction. These hypotheses are replicated in H1, H2 and H3.<br />

H1: Perceived Ease of use (PEU) will have positive influence on Perceived Usefulness (PU) in using<br />

government Web application security.<br />

H2: Perceived usefulness (PU) will have positive influence on Attitudes (AT) toward using government<br />

Web application security.<br />

H3: Service Quality (SEQ) will have positive influence on Attitude (AT) toward using government Web<br />

application security.<br />

As Mármol et al. (2010) and Smith (2010) showed in their attitudinal research, using attitude can be used<br />

to predict user satisfaction. Therefore, the security of the Web system may influence user attitude and<br />

satisfaction to use government Web application security, as H4 postulates.<br />

H4: Attitudes (AT) towards using government application security will have positive influence on user<br />

satisfaction in using government Web application security.<br />

Chadwick & Basden (2001), Bahmanziari (2003) and Suh & Han (2003) argue that people have<br />

confidence in whatever they have had government web application security, such as information system<br />

or interface, to make them satisfy government web security. The decision to engage in user satisfaction<br />

requires citizen confidence in the government agency providing the service and security (Koufaris &<br />

Hampton-Sosa 2004; Carter & Belanger 2005; Horst 2007). Therefore, it is hypothesized that confidence<br />

directly affects user satisfaction to use Web while mediating satisfaction toward the intention to trust<br />

eGovernment, as shown in H5 and H6.<br />

H5: Confidence in web application security (CWS) will influence on user Satisfaction (SWS) in using<br />

government web application security.<br />

H6: User Satisfaction (SWS) in using government web application security will positively influence on<br />

intention (IN) toward trust in eGovernment.<br />

3.2 Research questionnaire design<br />

For testing the structural model, a draft questionnaire, based on relevant research literature identified<br />

above, was developed and given to doctoral students studying in the Department of Electronic<br />

Engineering (EE) in National Cheng Kung University (NCKU) in Tainan, Taiwan. After revising the<br />

questionnaire based on their feedback, a test trial was given in December 2010. The trial of the structural<br />

model was first conducted using 48 undergraduate students in EE of NCKU, each of whom completed a<br />

questionnaire. In analysis of these samples, Cronbach’s α for each item in this pretest questionnaire is<br />

greater than .70 (Cronbach’s α ≥ .70). In addition to asking about service quality, satisfaction and<br />

confidence, the questionnaire also elicited information regarding the respondent’s demographic data,<br />

such as gender, age and computer experience.<br />

Five-point Likert scales were used to measure the model variables in this study. Information regarding the<br />

relationships among the variables in the Structural Equation model (SEM) included model fitness and<br />

model explanation, selected χ 2 , the ration between χ 2 and degrees of freedom (df), goodness of fit index<br />

(GFI), adjusted goodness-of-fit index (AGFI), root mean square error of approximation (RMSEA) and<br />

Comparative Fit Index (CFI) to evaluate the suitability of the whole model (Bagozzi & Yi 1988; Bentler<br />

1990; Jöreskog & Sörbom 1992; Hair et al. 1998; Hu & Bentler 1995). Empirical data was supporting the<br />

theoretical relationship specified at the conceptualization stage was assessed. LISREL 8.54 was used for<br />

exploratory purposes with sequential steps of path analysis and factor analysis. Path analysis was used<br />

to provide visual representations of hypotheses.<br />

143


3.3 Research samples<br />

Lichun Chiang et al.<br />

In testing the structural model, a questionnaire based on the relevant research literatures, identified<br />

above, was developed and given to a sample of students in Kaoshiung City, Kaoshiung county and<br />

Tainan City in Taiwan. The decision to survey students at this location was based on both geographic<br />

and demographic rationales. First, the research was done at I-Shou University, Shu-Te University,<br />

National Sun Yat-sen University and National Cheng Kung University (NCKU), because the percentage<br />

of undergraduate students used the Internet is higher than that of other groups. Secondly, the study<br />

targeted university students because these individuals should have relatively high skills in learning how to<br />

use information technology and their interest in such a system should also be higher. Students at these<br />

campuses were randomly sampled to obtain 320 respondents, who participated in the study at the first<br />

week of January 2010. A total of 30 questionnaires were not analyzed because they were incomplete;<br />

thus, there were 290 valid respondents (99.91% of all respondents). Further, 269 of participants (75.40%)<br />

in valid questionnaires have used government websites, 21 participants (24.60%) do not have<br />

experienced to use them, therefore, these participants were excluded from the research sample.<br />

4. Research results<br />

The sample size for this analysis was Ν=269. As shown in Table 2, the sample of 269 participants<br />

included 139 (51.70%) males and 130 (48.30%) females. 97.40% of participants age are less than 25<br />

years old. About 61 percent of the respondents consider themselves having about average knowledge of<br />

Web security, and 22% of participants think themselves having knowledgeable or very knowledgeable of<br />

Web security. Table 1 shows the demographic data of the samples.<br />

Table 1: Demographic data<br />

Terms<br />

Sex<br />

Frequencies Percentage (%) N=269<br />

Male 139 51.70<br />

Female 130 48.30<br />

Total<br />

Age (Years Old)<br />

269 100<br />

Under 20 119 44.20<br />

22-25 143 53.20<br />

26-30 4 1.20<br />

31-35 0 0<br />

36-40 1 0.40<br />

41-45 1 0.40<br />

46-50 1 0.40<br />

Total<br />

Understanding Web Security<br />

269 100<br />

Barely 7 2.60<br />

Some 38 14.10<br />

About Average 165 61.30<br />

Knowledgeable 47 17.50<br />

Very Knowledgeable 12 4.50<br />

Total 269 100<br />

The items for each dimension were measured through a 5-item scale from 1 (strongly disagree) to 5<br />

(strongly agree). In discussing the threshold reliability of the measures, .60 is a recommended value for a<br />

reliable construct (Hu & Bentler 1995). As Table 1 shows, the composite reliability values range from .75<br />

to .85 (Cronbach’s α ≥ .60). Confirmatory Factor Analysis (CFA) was applied to assess the construct<br />

validity of the 7 scales (perceived ease of use, perceived usefulness, attitude, service quality, satisfaction<br />

of web security, confidence in web security and intention to trust eGovernment) with LISREL. Each item<br />

was modeled as a reflective indicator of its latent construct in the CFA model. Table 2 presents the<br />

results of the CFA analysis. For the average variance extracted by a measure, a score of .50 indicates<br />

acceptability (Jöreskog & Sörbom 1989). Table 3 shows that the average variances extracted by these<br />

measures range from .51 to .67, which fall within the acceptable range.<br />

144


Table 2: Results of confirmatory factor analysis<br />

Lichun Chiang et al.<br />

Variables Terms Reliability AVE<br />

Perceived Ease of Use (PEU) 3 0.79 0.51<br />

Perceived Usefulness (PU) 3 0.84 0.67<br />

Attitude (AT) 3 0.85 0.63<br />

Service Quality (SEQ) 4 0.81 0.61<br />

Satisfaction of Web Security (SWS) 3 0.75 0.65<br />

Confidence in Web Security (CWS) 3 0.85 0.59<br />

Intention (IN) 3 0.84 0.63<br />

Note: N = 269, Cronbach’s α should exceed .60, the composite reliability values range from .76 to .87 (Hu<br />

& Bentler 1995), AVE (Average Variance Extracted) should be near .50 (Jöreskog & Sörbom 1989).<br />

As shown in Figure 2, the structural model reflecting the assumed linear and causal relationships among<br />

the constructs is tested with the data collected from the validated measures (Bagozzi & Yi 1988; Bentler<br />

1990; Jöreskog & Sörbom 1992; Hu & Bentler 1995; Hair, et al. 1998). The model fit indices are within<br />

accepted thresholds: χ 2 to degrees of freedom ratio of 2.93 (χ 2 = 586.11; df = 200), AGFI = .82, GFI = .86,<br />

CFI = .94 and RMSEA = .08, suggesting adequate model fit, as Table 3 shows.<br />

Table 3: Model fit indices for the structural model<br />

Fit indices Results Recommended value<br />

χ 2 (p-value) 586.11 (.05) P ≥ .05<br />

χ 2 /df 2.93 (df=200) P ≤ 3~5<br />

AGFI 0.82 P ≥ .80~.90<br />

GFI 0.86 P ≥ .90<br />

CFI 0.94 P ≥ .80<br />

NFI 0.92 P ≥ .80<br />

RMSEA 0.08 P ≤ .10<br />

Note: GFI: Adjusted Goodness-of-Fit index, GFI: Goodness of Fit Index, CFI: Comparative Fit Index,<br />

NFI=Normed Fit Index, RMSEA: Root Mean Square Error of Approximation.<br />

Figure 2: SEM analysis of research model<br />

145


Note: χ 2 =586.11; df=200; p≦0.05; RMSEA=0.08<br />

Lichun Chiang et al.<br />

The results of the analysis are shown in Figure 2. The six paths exhibit a P-value less than .05. In the<br />

usefulness factors shown in Figure 2, perceived ease of use (PEU) presents a strong positive effect on<br />

perceived usefulness (t = 8.88, p ≤ .05). The results also showed that students perceived ease of use as<br />

influenced by several perspectives, such as ease of learning, simple and clear understanding and skillful<br />

users to use government web application security. Coinciding with Davis (1989, 1993), perceived ease of<br />

use may actually be a causal antecedent to perceived usefulness for user acceptance of information<br />

technology. This implication is helpful for research on user acceptance of government web application<br />

security.<br />

Figure 2 also shows perceived usefulness has significant influence in user attitude to use government<br />

web application security (t = 3.87, p ≤ .05). In addition, perceived ease of use required perceived<br />

usefulness as the intermediate factor to affect user attitude to use web application security in<br />

eGovernment. That is, perceived ease of use positively associated with perceived usefulness influenced<br />

user attitude to use web application security in eGovernment. Thus, hypothesis 1 and hypothesis 2 are<br />

supported, as many previous studies applied perceived ease of use to explain perceived usefulness,<br />

such as Agarwal & Prasad (1999), Kramer (1999) and Li et al. (2004) postulated. The respondents<br />

perceive the usefulness of government web application security because web application security can<br />

provide secure services, easily maintain data, and protect access to information.<br />

The perceived usefulness and service quality in government web application security both show<br />

significantly positive influences on Attitude toward using web application security (t = 3.87 and t = 5.02,<br />

respectively, p ≤ .05). This result also shows that service quality exhibits a significant influence stronger<br />

than perceived usefulness in user attitude for using government web security. The participants care about<br />

service quality for these reasons: government web application security can maintain the data<br />

confidentially, and most importantly, has a good secure system. Thus, hypothesis 3 is supported (See<br />

Table 5), as Hsu (2008), Martin & Camarero (2008) postulated.<br />

As shown in Fig. 2, the attitude toward using government web application security positively influences<br />

user satisfaction of web security (t = 3.76, P ≤ .05). Thus, hypothesis 4 is supported, as Lekkas (2003),<br />

Mármol et al. (2010) and Smith (2010) postulated. In fact, the participants pay attention to web security<br />

because of several important characteristics, such as good management, and confidentiality. As a result,<br />

when users have confidence in web application security, they have satisfaction to use web security.<br />

Therefore, confidence is an influential factor for user satisfaction of web security to influence user<br />

intention toward trust eGovernment. From perceiving usefulness and confidence in web application<br />

security, the respondents express strong willingness to use web application security for the protection of<br />

personal data and for work.<br />

Attitude and confidence in government web application security both show significantly positive<br />

influences on satisfaction toward using web application security (t = 3.76 and t = 8.15, respectively, p ≤<br />

.05). This result also shows that user confidence in web security demonstrates a significant influence<br />

stronger than user attitude for using government web security. The participants have confidence in web<br />

security for these reasons: government web application security is a worthwhile system to trust, maintains<br />

the data confidentially, and most importantly, accords with ethic norms. Thus, hypothesis 5 is supported,<br />

as Chadwick & Basden (2001), Bahmanziari (2003) and Suh & Han (2003) postulated. Figure 2 also<br />

shows user satisfaction to use web application security has significant influence in user intention to trust<br />

eGovernment (t = 2.54, p ≤ .05). Users are willing to trust eGovernment in the future because of good<br />

web application security management. Thus, hypothesis 6 and is supported, as many previous studies<br />

applied in the similar study, such as Koufaris & Hampton-Sosa (2004), Carter & Belanger (2005) and<br />

Horst (2007) postulated.<br />

5. Conclusions and limitations<br />

This study utilized the Technology Acceptance Model and accompanied it with the Structural Equation<br />

model to analyze the relationships among ease of use, perceived usefulness, attitude, service quality and<br />

investigated the effects of confidence on user satisfaction and intention toward trust eGovernment. The<br />

importance of this study lies in the attempt to model user satisfaction of web security and trust<br />

eGovernment in a single design. Structural equation modeling with Liseral revealed that intention to trust<br />

eGovernment is mainly predicted by perceived usefulness of web security in general. The results of this<br />

146


Lichun Chiang et al.<br />

analysis help us understand the complex process in which perceived ease of use and perceived<br />

usefulness influence intention towards trust eGovernment, and how confidence in web application<br />

security affects user satisfaction to use web application security. The research findings indicate that<br />

perceived usefulness is an important determinant indicator between perceived ease of use and attitude<br />

toward using web application security in Taiwan. Perceived ease of use presents a significant and<br />

positive influence on perceived usefulness. Government web application security is a secure and trusted<br />

electronic system to maintain the validity of information, keep original data and uphold a solid reputation<br />

in the information system and eGovernment infrastructure. In this research, the confidence in web<br />

security has a strong and positive effect on user satisfaction toward using it. If government web security<br />

can maintain these reliably along with privacy, then it can possibly gain user satisfaction.<br />

The second influential finding is that service quality is more influential than perceived usefulness in<br />

influencing user attitude toward using web security. In our findings, the indicator of service quality plays a<br />

determinant role to influence user attitude to use or accept web security. Therefore, when the<br />

government emphasizes the management of web application security, it has to primarily improve service<br />

quality for web security. Otherwise, without service quality of web security, users may not have positive<br />

attitude to accept web security. In addition, it is important for users to operate web application security<br />

easily. When they do not have difficulties using web security, they perceive the usefulness of web<br />

security, and then they will likely use it when they use government web sites. Therefore, perceived<br />

usefulness and service quality on web security show strong influence on user attitude toward using web<br />

application security.<br />

Finally, the results also indicate satisfaction of using web security is related to attitude and confidence in<br />

web security. Without confidence in web security, users do not have satisfaction regarding web security.<br />

This may lead to a drastic overhaul of existing ways of realizing government web security. If the<br />

government plans to spread adoption of web security, then it has to train user awareness of government<br />

web security, and show them web security to earn their confidence. Importantly, the government has to<br />

create an easy channel for users to apply and use web application security, then users have confidence<br />

in web sites which influence their satisfaction toward using government web security. The government<br />

must seriously rethink how to build user confidence and trust on web security while encouraging users to<br />

apply it. Therefore, security and confidence undoubtedly plays essential roles when users decide to use<br />

web security.<br />

In summary, the contribution of this study is threefold: First, this research analysis provides a better<br />

understanding of how user satisfaction of government web application security will impact user intent<br />

toward trusting eGovernments. Second, this research shows that the precursors of user intent to trust<br />

web security are multidimensional (i.e., ease of use, perceived usefulness, attitude and satisfaction) and<br />

identifies their critical influences on realizing government web security. These two dimensions are<br />

interwoven, and one must not focus exclusively on any single factor in assessing overall intention toward<br />

trust eGovernment. Finally, this research further explores user satisfaction of web security based on<br />

confidence for implementing web security. That is, without confidence, user satisfaction cannot influence<br />

user intent toward trust eGovernment. It is helpful to understand what factors interfere when trusting<br />

eGovernment. This study further provides several inductive results to enhance our understanding and<br />

management of government web security. Finally, regarding the research limitation, future studies should<br />

seek larger sample sizes to perform more complex model testing. This study selected only 4 departments<br />

in the 4 universities, but attempted in our selection to include four very different major subjects in different<br />

universities. Future studies should include a broader set of universities to validate these results.<br />

Acknowledgements<br />

This research was supported by grants from the National Science Council in Taiwan (NSC- 99-2410-H-<br />

006 -060).<br />

References<br />

Bahmanziari T., Pearson J.M. & Crosby L. (2003) “Is trust important in technology adoption? A policy capturing<br />

approach”, Journal of Computer Information Systems, Vol.43, No.4, pp.46-54.<br />

Bentler, P. M. (1990) “Comparative fit indexes in structural models”, Psychological Bulletin, Vol. 107, pp.238-246.<br />

Bhattacherjee, A. (2001) “Understanding information system continuance: an expectation-confirmation model”, MIS<br />

Quarterly, Vol.25, No.3, pp.351-370.<br />

Chadwick, D.W. & Basden, A. (2001) “Evaluating trust in a public key certification authority”, Computers & Security,<br />

Vol.20, No.7, pp.592-611.<br />

147


Lichun Chiang et al.<br />

Chang, H.H. & Chen, S.W. (2009) “Consumer perception of interface quality, security, and loyalty in electronic<br />

commerce”, Information & Management, Vol.46, No.7, pp.411-417.<br />

Carter L. & Belanger F. (2005) “The utilization of EGovernment services: Citizen trust, innovation and acceptance<br />

factors”, Information Systems Journal, Vol.15, No.1, pp.5-25.<br />

Cho, V. (2006) “A study of the roles of trusts and risks in information-oriented online legal services using an<br />

integrated model”, Information & Management, Vol.43, pp.502–520.<br />

Corritorea, C.L., Krachera, B. & Wiedenbeckb, S. (2003) “On-line trust: concepts, evolving themes, a model”,<br />

International Journal of Human-Computer Studies, Vol.58, pp.737–758.<br />

Davis, F.D. (1989) “Perceived usefulness, perceived ease of use, and user acceptance of information technology”,<br />

MIS Quarterly, Vol.13, No.3, pp.319-340.<br />

Davis, F.D., (1993) “User acceptance of information technology: system characteristics, user perceptions and<br />

behavioral impacts”, International Journal of Man-Machine Studies, Vol.38, pp. 475-487.<br />

Dini, G. (2003) “A secure and available electronic voting service for a large-scale distributed system”, Future<br />

Generation Computer Systems, Vol.19, pp.69–85.<br />

Gefen, D., Rose, G.M., Warkentin, M. & Pavlou, P.A. (2005) “Cultural diversity and trust in IT adoption: a comparison<br />

of potential e-vote in the USA and South Africa”, Journal of Global Information Management, Vol.13, No.1,<br />

pp.54-78.<br />

Gritzalis, D.A. (2002) “Principles and requirements for a secure e-voting system”, Computers & Security, Vol.21, No.6,<br />

pp.539–556.<br />

Hisamitsu, H. & Takeda, K. (2007) “The security analysis of e-voting in Japan”, pp.99-110. Alkassar, A. & Volkamer,<br />

M. (Eds), E-Voting and Identity, Springer-Verlag Berlin Heidelberg, New York.<br />

Horst M., Kuttschreuter M. & Gutteling J.M. (2007) “Perceived usefulness, personal experiences, risk perception and<br />

trust as determinants of adoption of EGovernment services in The Netherlands”, Computers in Human<br />

Behavior, Vol.3, No.4, pp.1838-1852.<br />

Hsu, S.H. (2008) “Developing an index for online customer satisfaction: Adaptation of American customer satisfaction<br />

index,” Expert Systems with Applications, Vol.34, pp.3033-3042.<br />

Hu, L. & Bentler, P.M. (1995) “Evaluating model fit” (pp.76-99), In Hoyle, R. H. (Ed.), Structural Equation Modeling:<br />

Concepts, Issues, and Applications. SAGE Thousand Oaks: CA.<br />

Johson-George, C. & Swap, W. (1982) “Measurement of specific interpersonal trust: construction and validation of a<br />

scale to assess trust in a specific other”, Journal of Personality and Social Psychology, Vol. 43, pp.1306–1317.<br />

Jöreskog, K. G. & Sörbom, D. (1992) LISREL: A Guide to the Program and Applications. (3 rd ) Scientific Software<br />

International, Inc: Lincolnwood, IL.<br />

King, W.R. & He, J. (2006) “A meta-analysis of the technology acceptance model”, Information & Management,<br />

Vol.43, pp.740-755.<br />

Koufaris M. & Hampton-Sosa W. (2004) “The development of initial trust in an online company by new customers”,<br />

Information & Management, Vol.41, No.3, pp.377-397.<br />

Kristensen, K., Martensen, A. & Gronholdt, L. (2000). “Customer satisfaction measurement at Post Demark: Results<br />

of application of the <strong>European</strong> customer satisfaction index methodology”, Total Quality Management, Vol.11,<br />

No.7, pp.1007-1015.<br />

Lekkas, D. (2003) “Establishing and managing trust within the public key infrastructure”, Computer Communications,<br />

Vol.26, pp.1815–1825.<br />

Liao, C., Chen, J.L. & Yen, D.C. (2007) “Theory of planning behavior (TPB) and customer satisfaction in the<br />

continued use of e-service: An integrated model”, Computers in Human Behavior, Vol.23, pp.2804-2822.<br />

Liu, C.T., Guo, Y.M. & Hsieh, T.Y. (2010) “Measuring user perceived service quality of online auction”, Service<br />

Industries Journal, Vol.30, No.7, pp.1177-1197.<br />

Ma, Q. & Liu, L. (2004) “The technology acceptance model: a meta-analysis of empirical findings”, Journal of<br />

Organizational and End User Computing, Vol.16, No.1, pp.59-74.<br />

Mármol, F.G., Girao, J. & Pérez, G.M. (2010) “TRIMS, a privacy-aware trust and reputation model for identity<br />

management systems”, Computer Networks, Vol.54, pp. 2899-2912.<br />

Magoutas, B. & Mentzas, G. (2010) “SALT: A semantic adaptive framework for monitoring citizen satisfaction from<br />

eGovernment services”, Expert Systems with Applications, Vol.37, pp.4292-4300.<br />

Martensen, A., Gronholdt, L. & Kristensen, K. (2000) “The drivers of customer satisfaction and loyalty: Cross-industry<br />

findings from Denmark”, Total Quality Management, Vol.11, pp.544-553.<br />

Martin, S.S. & Camarero, C. (2008) “Consumer trust to a web site: Moderating effect of attitudes toward online<br />

shopping”, Cyberpsychology & Behavior, Vol.11, No.5, pp.549-554.<br />

Martin, S.S. & Camarero, C. (2009) “How perceived risk affects, online buying”, Online Information Review, Vol.33,<br />

No.4, pp.629-654.<br />

Oostveen, Anne-Marie & Besselaar, P.V.D. (2005) “Trust, identity, and the effects of voting technologies on voting<br />

behavior”, Social Science Computer Review, Vol.23, No.3, pp.304–311.<br />

Smith, M.L. (2010) “Building institutional trust through eGovernment trustworthiness cues”, Information Technology &<br />

People, Vol.23, No.3, pp.222-246.<br />

Stamoulis, D., Gouscos, D., Georgiadis, P. & Martakos (2001) “Revisiting public information management for<br />

effective eGovernment services”, Information Management & Computer Security, Vol.9, No.4, pp.146-153.<br />

Suh, B. & Han, I. (2003) “The impact of customer trust and perception of security control on the acceptance of<br />

electronic commerce”, International Journal of Electronic Commerce, Vol.7, No.3, pp.135-161.<br />

Welch, E.W., Hinnant, C.C. & Moon, M.J. (2005). “Linking citizen satisfaction with eGovernment and trust in<br />

government”, Journal of Public Administration Research and Theory, Vol.15, No.3, pp.371-391.<br />

148


A Common Process Model to Improve eService Solutions -<br />

the Municipality Case<br />

Marie-Therese Christiansson<br />

Karlstad University, Sweden<br />

marie-therese.christiansson@kau.se<br />

Abstract: This paper describe a model for working on business processes as a result of a co-production between<br />

Karlstad University and Karlstad municipality, in the Smart Cities project focusing on eGovernment and eServices in<br />

the North Sea Region Programme of the <strong>European</strong> Union. The co-production began in February 2009 with an action<br />

research approach to develop a Common Process Model (a light-weight process methodology) to support the<br />

municipality in thinking, describing and improving business processes in a uniform, focused and reflective way. The<br />

co-production process was based on a close relationship, openness and willingness to learn and share in a large<br />

number of informal meetings, workshops, structured and unstructured interviews, as well as working together with<br />

analysis and outcomes of the project. The contribution of this paper is to present the building blocks in a Common<br />

Process Model and their implications in eService development. At the core of the process methodology is a set of<br />

values, concepts, a modelling structure, roles, directives, guidelines and templates to be able to identify, measure<br />

and improve business processes and eService solutions.<br />

Keywords: co-production, lightweight process methodology, eGovernment, eServices<br />

1. Introduction<br />

The <strong>European</strong> Commission initiatives strive towards a new generation of open, flexible and collaborative<br />

eGovernment services. Wider deployment and more effective use of digital technologies will provide<br />

<strong>European</strong>s with a better quality of life through better health care, safer and more efficient transport<br />

solutions, a cleaner environment, new media opportunities and easier access to public services and<br />

cultural content. To support and complements the Digital Agenda for Europe (<strong>European</strong> Commission,<br />

2010a), an Action Plan for 2011-2015 (<strong>European</strong> Commission, 2010b) identifies four key objectives to<br />

achieve (based on the Malmö Ministerial Declaration, 2009); to empower citizens and businesses in their<br />

needs for services; enable efficiency and effectiveness by reducing administration; facilitate mobility for<br />

setting up a business, studying, working, residing and retiring in Europe and to create the necessary key<br />

enablers and preconditions to make these things happen. By 2015, 50% of citizens and 80% of<br />

businesses should communicate in terms of eGovernment (<strong>European</strong> Commission, 2010b).<br />

EGovernment can be described as an instance of e-Commerce (Schneider, 2003), where governments<br />

provide administrative processes as eServices for their customers (citizens, visitors, companies and other<br />

government agencies) through web sites. This paper takes a holistic view on eServices beyond the frontend<br />

web site to the back-office and business processes supported or performed by IT (information<br />

technology), improving daily life for citizens and businesses. Well-structured and effective business<br />

processes are prerequisites for business performance in providing and performing eServices. Working<br />

with business process improvements is challenging. Major issues that organisations face in their efforts<br />

include e.g. lack of management or employee buy-in, lack of a common process mind frame, lack of<br />

standards, weaknesses in process specification, low modeling and process education and lack of<br />

methodology (Bandara et. al, 2007, zur Muehlen, 2008). This complexity requires a methodical approach<br />

to the implementation of process oriented EGovernment projects (Becker et. al 2003). This paper<br />

presents building blocks in a Common Process Model (a process methodology not the result of a process<br />

modelling) in a municipality case to support employees with guidance to think, describe and improve<br />

business processes in a uniform, focused and reflective way.<br />

2. Research design in the co-production<br />

The co-production between Karlstad University and Karlstad municipality can be described as a joint<br />

research-/development process based on a close relationship and an open mind to learn and share.<br />

Participating parties take part in formulating research questions and are investing in knowledge<br />

development and value creation. This means formulating the point of departure, contributing by producing<br />

and delivering results (e.g. a Common Process Model) as well as evaluating the co-production process.<br />

(Orr and Bennett, 2009; Christiansson, 2010). Karlstad University is part of the Smart Cities Regional<br />

<strong>Academic</strong> Network (SCRAN, 2011) with the principal role “to offer hands-on support to the government<br />

partners, to qualify good practices and to accurately translate pilots into transferable good practice, white<br />

papers and methodologies” (Smart Cities, 2011). <strong>Academic</strong> partners are working closely with local<br />

municipal partners to develop better eServices. In the municipality case, the close relationship can be<br />

149


Marie-Therese Christiansson<br />

described in terms of a mutual interest in the research question; - How do we get process modelling to<br />

happen in practice? This is a question that is placed high on the BPM (Business Process Management)<br />

agenda in conferences this year.<br />

The municipality case is an organisation with around 7000 employees performing services and<br />

operations to attract both people and companies to work and live in the city. Technical services and<br />

property management administration, with around 500 employees, works according to a management<br />

directive with mapping, measuring, benchmarking and improving their business processes. One driver (of<br />

many) to the process mapping is the possibility to identify needs and possibilities for eService solutions.<br />

The action research approach involves solving organisational problems through intervention and at the<br />

same time contributing to research (Benbasat et al. 1987; Davison et al. 2004). Strengths in this research<br />

method are the insider’s view as a participant to obtain in-depth and first hand understanding. The first<br />

version of the municipality Common Process Model was developed during five workshops (April –<br />

December 2009) and many meetings in between. The university and participants from five different<br />

administrations, with more or less experiences in process modelling and its use in business and systems<br />

development, defined ‘the process of mapping processes’ and identified experiences to share in terms of<br />

directives, guidelines and templates.<br />

To gather knowledge and experience in eService development, the municipality created a virtual<br />

organisation called the e-Office. The task of the e-Office is to coordinate and support the development of<br />

eServices in the municipality in order to offer more and better services to citizens and companies.<br />

Methodologies, tools, skills, common eService solutions and implementations are handled as well as the<br />

cooperation with the university. With a knowledge management approach with increasing collaboration,<br />

learning and sharing by the e-Office, administrations may work at the pace they prefer. The university has<br />

direct contact to the e-Office (mail, telephone, local web-based project management tool and a<br />

transnational wiki) and several meetings (informal and with a common interest to solve a problem) with<br />

employees from different areas and in different roles from management, business development and<br />

eService development. The municipality is continuously describing business needs and their BPM<br />

agenda at hand. Employees in key process roles (mainly from the e-Office and the Technical services<br />

and property management administration) study at the university (the flexible campus and/or distance<br />

course, Process Orientation in Practice). In the course participants have the opportunity to work with<br />

course assignments in their own business context learning from theory, using process methodologies and<br />

by experiences suggesting further improvements and development of the Common Process Model.<br />

In case study research, the objective is research and theory at their early, formative stages and practicebased<br />

problems where the experiences of the actors are important and the context of action is critical<br />

(Benbasat et al. 1987). Researchers with prior discourse (to stand objective of research, see e.g.<br />

Alvesson and Sköldberg, 2000) and practitioners with business context and prior experiences (Orr and<br />

Bennett, 2009) are characteristic features of co-production projects. A research relationship is based on<br />

each participant having their own interests and their own communities (which have a political impact on<br />

the research process) together with mutual interests in an issue and the mutual context of the coproduction<br />

(Christiansson, 2010). Employees in the municipality are anxious to bridge the gap between<br />

different kinds of process modelling techniques for business and IT solutions to be able to provide better<br />

services. For the municipality, the university’s presence is valuable in terms of access to research results<br />

as well as practical experiences from courses and research projects, and an independent partner in<br />

discussions and the assessment of BPM activities. The university will develop new knowledge in terms of<br />

supportive content, implementation and maintaining in practice in order to achieve usable and used<br />

process description as a basis for e.g. eService development. Knowledge increases the quality in<br />

university courses and the collection of empirical data further develops the generic process methodology<br />

to be suitable for different organisations and business contexts. The university gains access to real world<br />

data and the possibility to apply research results in practice, as well as new insights. Producing<br />

consumable research demands both rigour and relevance (Robey and Markus, 1998). In the municipality<br />

case, the researcher has acted in a more mentoring and supervising mode. Writing research papers<br />

together, attending conferences as well as transnational benchmarking is addressed in the co-production.<br />

A transnational workshop in Processes (September 2010) has evaluated the Common Process Model<br />

and generated new input to the generic and transnational model as a deliverable of the Smart Cities<br />

project (Christiansson, 2011).<br />

150


3. A common process model<br />

Marie-Therese Christiansson<br />

The concept of eService is two-fold, as service is something being produced and consumed in business<br />

processes and a result experienced by the consumer at the same time as the service is provided. The<br />

customers’ engagements include receiving information and requesting services (Warkentin et. al 2002)<br />

but also performing, receiving and experiencing business performance. The customer is a co-producer in<br />

the service and the ‘e’ states that the service is conducted, more or less, by IT solutions. Alsaghier (et. al<br />

2009) stress that most definitions of eGovernment revolve around the concepts of a government’s<br />

employment of technology, in particular web-based applications to improve the access and delivery of<br />

government services. EGovernment can be described in terms of the execution of administrative<br />

processes to enable governments to provide services for their customers (citizens, visitors, business and<br />

other governments) through web sites. Customer interact with the government through the Internet,<br />

asking questions and receiving answers, obtaining updated government regulations and government<br />

official documents, filing applications etc. (Alsaghier et. al 2009). EServices are one part of municipality<br />

business performance and provide access to government information and services. Services accessible<br />

across the EU strengthen and complement existing legislation in domains like e-Identification, e-<br />

Procurement, e-Justice, e-Health, mobility and social security (<strong>European</strong> Commission, 2010 b).<br />

Organisations focusing more on the ‘e’ than on the ‘business’ may forget that value-added idea, the<br />

understanding of the organisational environment and IT as enabler in the business and customer context,<br />

as well as the changing requirements (Hammer, 1993; Davenport, 1993) are essential prerequisites for<br />

an organisation’s return on its investments into modern information and communication technology (Alpar<br />

and Olbrich, 2005). With a view to realising an effective business development, a Common Process<br />

Model is developed as a general approach to support different applications, with eServices as one of<br />

many in the organisation. The model is designed to support applicable hands-on knowledge in a<br />

lightweight manner to be used for employees with various process modelling skills and use of tools, from<br />

drawing tools to more advanced modelling language and process tools. One success factor for usable<br />

process descriptions is that employees and management understand the ‘process thinking’. The goal is<br />

to bring about usable process descriptions that can be used by different roles and levels in the<br />

municipality case – political, management, operational and systems – so that development decisions are<br />

based on knowledge acquired by those who are performing the business operations and will be a part in<br />

or be affected by the solution. An understanding of the basic ideas in process orientation will explain what<br />

to describe and why in process modelling.<br />

A process oriented approach in services means (based on concepts in e.g. Davenport, 1993; Hammer,<br />

1993, Grönroos, 2000):<br />

Ensuring that the purpose and objectives of a business process are linked to the goal of the<br />

organisation.<br />

Basing the mapping on the knowledge of people who know the operation in question and on those<br />

who have expectations on it and are affected by its result; that is, a focus on how citizen and<br />

business service is created and delivers value.<br />

A holistic view on end-to-end processes adding significant value for an external customer’s<br />

experiences and results.<br />

Considering and describing operations horizontally from the point at which an external<br />

customer/client makes some kind of request which leads to a number of tasks being performed in a<br />

logic flow (in and between organisations) in order to meet the request.<br />

Proceeding from the user view of the result identifying value-creating tasks (what) and work<br />

procedures (how) that will satisfy the user and ensure a tangible value (e.g. an effective and useful<br />

eService).<br />

Identifying and describing available resources (e.g. IT) for optimal use and requirements/ requests for<br />

them.<br />

Ensuring that employees can identify their roles in the process flow and serve as the basis for their<br />

understanding and ability to change/improve operations.<br />

A Common Process Model will support employees to get useful process descriptions in an effective<br />

business development. Explicit preconditions, concepts, directives, guidelines, templates and roles will be<br />

used to create a platform for how to think, describe and work towards process improvements. See Figure<br />

1.<br />

151


Marie-Therese Christiansson<br />

Figure 1: A common process model<br />

Communicating knowledge of business operations is important in all organisations and development<br />

work. To achieve this, it is necessary that those who partake in development and those who need to<br />

explain, understand, and make decisions speak the same language. Across organisational boundaries,<br />

there is a shared obligation to meet the needs of citizens and companies in the municipality. Concepts<br />

and process descriptions must be understandable in and between organisations as this can become a<br />

national and international need as well when developing eServices across municipal and national<br />

boundaries. Working uniformly in a development project in and between organisations makes the work<br />

more effective and increases the chances to communicate and spread information. The opposite<br />

scenario, where process mapping is done differently, means that a great deal of reworking by the same<br />

people using different tools might be necessary, and this requires resources and consumes energy. A<br />

Common Process Model will work as a ‘living model’, maintained and continually updated by the e-Office<br />

and a model owner. The model is designed to be employed in all types of business development projects,<br />

major as well as minor efforts, and be operative without a modelling tool and/or modelling language as a<br />

driving force.<br />

A ‘process staircase’ may illustrate the intended degree of process orientation or process maturity in an<br />

organisation. See Figure 2. Working according to the Common Process Model will increase the<br />

possibilities for generating process descriptions in a way that ensures progression up the steps with a<br />

useful process description of all steps.<br />

Mapping processes entails identifying and describing processes. It is not until business operations are<br />

described in the form of processes that can we see and become aware of them as processes. A process<br />

modeller needs guidance at different points in the process modelling process, in different roles and with<br />

different levels of competence in modelling. A useful process description will be a result of a process<br />

mapping describing a business process with its elements, customer focus and a horizontally view<br />

according to the motives.<br />

Establishing processes can mean labelling the identified processes, saving and storing process<br />

descriptions to make them available to the appropriate people. It can also mean allocating responsibility<br />

for administering process descriptions. The idea in the municipality case is to store one core process<br />

description, which can then serve as a basis for different users, roles and target groups. A core process<br />

description will allow for measuring and improving business processes. It can also be copied and<br />

152


Marie-Therese Christiansson<br />

modified across administrations to be useful for e.g. different target groups, roles and multiple<br />

perspectives, as well as for people who don’t ‘think in boxes and arrows’. An established process will<br />

have a suitable name close to its purpose in business according to a convention easy to store, find and<br />

access. A useful process description can be used in communications and be published across<br />

administrations and organisations.<br />

Figure 2: Degree of process orientation (Christiansson, 2001)<br />

Evaluating processes can be based on measuring points and quality indicators identified in the<br />

descriptions of the current situation in order to clarify what is needed to move in the direction of a goal<br />

objective. Analysis of processes can take place from internal or external demands on performance and<br />

quality. An evaluated process will have suitable and defined indicators to support e.g. business process<br />

comparisons and improvements. A useful process description describes a business process with<br />

elements to measure (what) and relevant measurements (how) based on the use of process descriptions<br />

and motives for the evaluation (why).<br />

Monitoring processes means that employees and systems know how the operations work and are related<br />

to the whole. This step presupposes a horizontal view of management and control, which allows<br />

employees to be able, and have authority, to make decisions on how and which tasks contribute to value.<br />

A useful process description in this step is most likely automated and supported by a tool to prioritise and<br />

signal which task to act on.<br />

3.1 Preconditions<br />

Preparation is essential for business development and process modelling. To ensure that the municipality<br />

achieves applicable process descriptions the following preconditions must be met:<br />

The Common Process Model constitutes a knowledge base that all employees can access via the<br />

webpage (intranet) and via the tools to be used in the process mapping.<br />

Employees who map processes can understand and master the model.<br />

Employees who map processes use the model.<br />

Employees who map processes always store a core process description based on the directives in<br />

the model to be able to communicate across organisational boundaries.<br />

Employees with experience of process mapping can document and collect these experiences in a<br />

process report as feedback to the model owner to further development of the model.<br />

Continuous development of the model is based on internal experiences together with research results<br />

and experiences gained in other municipalities/organisations nationally and internationally.<br />

Current and future processes are mapped as a basis for defining the end objective, and should be<br />

described in process description according to the process model guidelines.<br />

153


Marie-Therese Christiansson<br />

The process descriptions are labelled, stored, published, disseminated and updated so that business<br />

developers can find and use current descriptions; that is, someone is responsible for them.<br />

A strategy (in terms of why, what and how) for performing business development as well as process<br />

modelling facilitates an effective business development (Christiansson, 2001; Becker et. al 2003). Becker<br />

(et. al 2003:148) states that, “When considering the aim of the process modelling (‘why’ modelling should<br />

be done, e.g. certification, selection of software, organisation design), it is necessary to determine both<br />

the object of modelling (‘what’ should be modelled, for example, a total model of the business vs. a partial<br />

model), and the modelling methods and tools (‘how’ modelling should be done)”. Relevant problem areas<br />

or target services for process improvements should be identified and prioritised with respect to financial<br />

and personnel resource constraints (ibid.). Drivers for eService development may also arise from<br />

demands from EU and national directives (to local action plans, see e.g. Magnusson and Christiansson,<br />

2011) as well as explicit service catalogues and customer demands for web-based communication<br />

(Christiansson, 2011).<br />

The main objectives of process modelling in eService development are business operations and system<br />

design. Becker (et. al 2003) mention that services can be classified by level of interaction (information,<br />

communication and transaction) and degree of integration (media break, no media break, and<br />

automated) to support decisions on business improvements and processes to analyse. A process<br />

modelling may focus on the current processes (as-is) to analyse and evaluate the service level. The<br />

process description communicates an administrative transparency to identify and explain weak points<br />

and arguments for potential improvements. The final decision to make, not the first, is the selection of<br />

suitable modelling methods and tools. Moving towards a process-oriented and eService supported<br />

administration needs process descriptions with a high level of clarity to be able to identify (e.g. problems,<br />

strengths, possibilities) in analysis. Moreover, the final target (to-be) processes must be understandable<br />

for a range of employees with heterogeneous backgrounds and different roles as well as customer and IT<br />

suppliers.<br />

3.2 Concepts<br />

The process model and its application have been explained with a number of central concepts. As an<br />

example, directive is defined as a steering instrument and directive should clearly stipulate prerequisites<br />

and basic ideas/rules to make it ‘happen’. The ambition to develop a common language makes it<br />

imperative that the concepts are made familiar, defined and disseminated in and between<br />

organisations/administrations. This effort also demands that the concepts are updated with changes in<br />

the language of the organisation. Concepts familiar in the business context to employees and customer<br />

may be part of the eService solution, digital forms and GUI (Graphical User Interface) to make sense and<br />

be usable for customer and employees.<br />

3.3 Guideline – motive, use, scope<br />

Business process improvement is key to providing, performing and delivering eServices, contact centres<br />

etc. in a municipality service portfolio. A range of different improvement activities is restructu-ring existing<br />

business process to provide new eServices and to implement new ways of working in municipalities. In<br />

customer services strategies and development of ever more complex eServices, understanding local<br />

business processes is a precondition (Christiansson, 2011).<br />

Establishing motives for business development at the same time define expected impacts.<br />

With a business driven eService development, business process improvements can be<br />

measured in business performance and customer value. Benefits in business performance<br />

can be mapped in process descriptions of e.g. case handling, explaining in detail what<br />

should be done, why, how and in what order. It will be traceable and possible to get reports<br />

of time spent in comparison with deliverance guarantees; indicators of quality can be<br />

determined and published. One of the main benefits is the empowering possibility for the<br />

employees to form their own job by giving knowledge of operational work in the design of<br />

how the work actually should be done. Other benefits in eService solutions are the use of<br />

digital forms for applications to ease the access ability for customers and reduce the<br />

workload for the employees. Further more, personnel changes and new employment will be<br />

eased by identified, defined, standardised and in some cases automated business<br />

processes. Employees may also find it a benefit to see the results of their work monitored<br />

continuously, and even published on a service level on the web. (Christiansson, 2011)<br />

According to Grönroos (2000), creating value is about a relationship with the customer in<br />

154


Marie-Therese Christiansson<br />

interactions and over time. Customer value includes benefits in service performance and<br />

service experience, e.g. in the possibility to do all communication by digital forms and emails<br />

and the customers ability to use the services (Christiansson, 2011).<br />

The purpose for developing and using process descriptions can pertain to operations and/or systems<br />

designed to e.g. identify, describe/illustrate/explain, analyse, communicate/disseminate/publish (internally<br />

and externally), understand/develop/learn from and learn new things, specify, evaluate, test, assess<br />

effects, construct/design solutions, purchase existing solutions, administer/maintain and introduce/train.<br />

Clarifying the use of process descriptions is important in regard to e.g. clarifying the motives to the<br />

participation in the mapping, to give incentive and make people committed.<br />

Defining the scope of a process involves identifying relevant stakeholders that need to be included in the<br />

mapping (e.g. affected actors/organisations) in order to obtain the knowledge required.<br />

The scope of the process mapping can be relevant to:<br />

Internal processes<br />

Externally oriented processes towards an external client<br />

Processes across organisational borders<br />

Interface (interaction/exchange) between stakeholders<br />

3.4 Mapping structure<br />

A process mapping can vary in size and complexity. In each step in the process mapping process, see<br />

Figure 3, there are different ‘lines’ to follow in directives, guidelines and templates. The green line, which<br />

refers to simple processes, must be followed by all employees and can be seen as mandatory in order to<br />

achieve a process description that can be used in the ‘process staircase’. The yellow line represents<br />

uncertain processes and the red line refers to complex processes across organisational boundaries. The<br />

colours reflect a view of the mapping assignment and the business development at hand; where green<br />

and yellow are sufficient to explain the business and the red line is needed to reach an understanding of<br />

it. Experience gained internally (via process reports) may determine the directives, guidelines and<br />

templates that will be recommended for use in each of the situations.<br />

Figure 3: The process of process mapping<br />

The modelling structure is clickable (white arrows in Figure 3) and is accessible via the municipal Intranet<br />

and a process tool (using the BPMN notation, see e.g. White, 2004). Activities in the detailed view of the<br />

modelling structure are connected with applicable directives, guidelines and templates. Given that the<br />

quality of process descriptions affects the outcome and impacts the benefits in business process<br />

improvements, it is important to reflect on the process by which the process descriptions are actually<br />

constructed. With a uniform way of describing processes, process descriptions may work as a basis for<br />

discussions and development between various administrations. For the municipality to appear as a single<br />

and integrated municipality to citizens, companies or visitors, eService solutions across administrations<br />

and other government agencies must be performed and experienced as one service provider. Identified<br />

and described daily operational business processes are particularly important to the specification of<br />

requirements for technology-based products/services, where a clear business understanding is needed. It<br />

is essential to understand not only how the municipality is delivering services, but also how people are<br />

accessing these services. Understanding business performance in delivery, customers and usage<br />

provides you with a context you can use to plan how to revise services.<br />

155


Marie-Therese Christiansson<br />

3.5 Directives – process modelling, to model, measure and re-design business<br />

processes<br />

Based on the motives for the mapping process and the use of process description, it may be relevant to<br />

document (to explain) or to model (to understand and change) processes. EService solutions are always<br />

changing. With a description of the current business process and the ability to measure flow, activities,<br />

information, experiences in results and so on, ‘a close to business’ requirement specification<br />

(Christiansson and Christiansson, 2006) can be used in the design of the eService solution. It is<br />

important to clarify what is relevant in each process mapping to get the right staffing and work<br />

procedures. The main message in modelling a process is to describe all mandatory elements required to<br />

describe a business process together with employees who know the daily business as well as customers<br />

and/or suppliers. If each process elements is mapped with a separate symbol, they can be translated<br />

between different kinds of modelling techniques if necessary. What you see in your process description is<br />

what you are able to communicate, measure and improve.<br />

4. Conclusions<br />

Process oriented analysis and improvements of administrative procedures are key for re-structuring<br />

municipal administration to eService solutions based on value-added business operations with digital<br />

support/enablers. The full potential of eServices can be achieved through structured processes to identify<br />

the needs and uses of information and communications technology. The building blocks in the Common<br />

Process Model entails agreement on the basic idea of and values in a process oriented approach –<br />

meaning and impacts to be achieved; central concepts – relevant definitions to use in offering, providing<br />

and delivering services; degree of process orientation – relevant motives and actions in the ‘process<br />

staircase’; roles and tools – necessary roles in organising and performing and possible support by<br />

functionality in tools; and modelling structure – modelling actions supported by directives, guidelines and<br />

templates to be able to identify, measure and improve business processes and eService solutions.<br />

References<br />

Alsaghier, H. Ford, M. Nguyen, A. and Hexel, R. (2009) Conceptualising Citizen’s Trust in e-Govern-ment:<br />

Application of Q Methodology, Electronic Journal of eGovernment, Vol 7, No. 4, pp 295-310.<br />

Alvesson, M. and Sköldberg, K. (2000) Reflexive methodology: New vistas for qualitative research, Sage, London.<br />

Alpar, P. and Olbrich, S. (2005) Legal Requirements and Modelling of Processes in eGovernment, The Electronic<br />

Journal of eGovernment, Volume 3 Issue 3, pp 107-116.<br />

Bandara, W. Indulska, M. Chong, S. Sadiq, S. (2007) Major Issues in Business Process Management: An Expert<br />

Perspective, In: Proceedings of ECIS, pp 1240-1251.<br />

Becker, J. Algermissen, L. Niehaves, B. (2003) Processes in EGovernment Focus: A Procedure Model for Process<br />

Oriented Reorganisation in Public Administrations on the Local Level, In: Traunmüller, R. (Ed.) Proceedings of<br />

EGOV 2003, LNCS 2739, pp 147-150.<br />

Benbasat, I. Goldstein, D. K. and Mead, M. (1987) The case research strategy in studies of information systems, MIS<br />

Quarterly, September, pp 369-386.<br />

Christiansson, M-T. (2001) Process orientation in inter-organisational co-operation – by which strategy? In: Nilsson,<br />

A. G. and Pettersson, J. S. (Eds.) On Methods for Systems Development in Professional Organisations – The<br />

Karlstad University Approach to Information Systems and its Role in Society, Studentlitteratur, Lund.<br />

Christiansson, M-T. and Christiansson, B. (2006) The Encounter between Processes and Components – Towards a<br />

Framework for a Close-to-Business Requirements Specification for Acquisition of Component-Based<br />

Information Systems, PhD thesis No. 14, Linköping University.<br />

Christiansson, M-T. (2010) Towards a Framework for <strong>Academic</strong>-Practitioner Collaborative Research in Coproduction,<br />

In: Proceedings of the International <strong>Conference</strong> on Information Systems, pp 199-207.<br />

Christiansson, M-T. (2011) Improving Business Processes and Delivering Better eServices - a Guide for<br />

Municipalities from Smart Cities (forthcoming at http://www.smartcities.info/)<br />

Davenport, T. H. (1993) Process Innovation – Reengineering Work through Information Technology, Harvard<br />

Business School Press, Boston.<br />

Davison, R.M. Martinsons, M.G. and Kock, N. (2004) Principles of canonical action research, Information Systems<br />

Journal, Vol. 14, No. 1, pp 65-86.<br />

<strong>European</strong> Commission (2010 a) A Digital Agenda for Europe, http://ec.europa.eu/information_society/digitalagenda/index_en.htm<br />

<strong>European</strong> Commission (2010 b) The <strong>European</strong> eGovernment Action Plan 2011-2015,<br />

http://ec.europa.eu/information_society/activities/egovernment/action_plan_2011_2015/index_en.htm<br />

Grönroos, C. (2000) Service Management and Marketing – A Customer Relationship Management Approach, 2 nd<br />

edition, Chichester, Wiley.<br />

Hammer, M. (1993) Reengineering The Corporation: A Manifesto for Business Revolution, N. Brealey Publishing,<br />

London.<br />

Magnusson, M. and Christiansson, M-T. (2011) Using Goal Modelling to Evaluate High-Level Goals with EService<br />

Alignment in Government (submitted paper).<br />

156


Marie-Therese Christiansson<br />

Malmö Ministerial Declaration on eGovernment (2009) http://www.epractice.eu/en/library/299149<br />

Orr, K., Bennett, M. (2009) Reflexivity in the co-production of academic-practitioner research, Qualitative Research in<br />

Organizations and Management: An International Journal, Vol. 4, Issue 1, pp 85-102.<br />

Robey, D. and Markus, M.L. (1998) Beyond rigor and relevance: Producing consumable research about information<br />

systems, Information Resources Management Journal, Vol. 11, No 1, pp 7-15.<br />

Schneider, G. P. (2003) Electronic Commerce (4 ed.), Boston, MA: Thomson Learning Inc.<br />

SCRAN (2011) Smart Cities Regional <strong>Academic</strong> Network, http://www.smartcities.info/academic-work<br />

Smart Cities (2011) Project Website, http://www.smartcities.info/<br />

zur Muehlen, M. (2008) Class Notes: BPM Research and Education – A Little Knowledge is a<br />

Dangerous Thing, BPTrends.<br />

Warkentin, M., Gefen, D., Pavlou, P. A. and Rose, G. M. (2002) Encouraging Citizen Adoption of eGovernment by<br />

Building Trust. Electronic Markets, 12(3), pp 157-162.<br />

White, S. A. (2004) Introduction to BPMN, BPTrends.<br />

157


Measuring Performance of eGovernment to the Disabled:<br />

Theory and Practice in Taiwan<br />

Pin-yu Chu, Tong-yi Huang and Ning-wan Huang<br />

National Chengchi University, Taipei, Taiwan<br />

vchu@nccu.edu.tw<br />

tyhuang@nccu.edu.tw<br />

96256011@nccu.edu.tw<br />

Abstract: Taiwan’s eGovernment programs have been formulated to improve the quality of government services. The<br />

success of eGovernment programs depends on a robust performance assessment that provides a valuable<br />

understanding of the impacts of individual projects on stakeholders, including citizens, government employees,<br />

businesses, and minorities. In this paper, we emphasize the importance of a citizen-centric approach and propose key<br />

indicators for measuring eGovernment programs. We examine the antecedents of the impact assessment of<br />

eGovernment in the context of an integrated model. The model incorporates a wide variety of important factors from<br />

previous research into a theoretical framework. In 2010 with the assistance of the Research, Development and<br />

Evaluation Commission, Executive Yu, we conduct an online survey and made detailed impact assessments of a<br />

Government to the Disabled (G2D) program in Taiwan. 5,895 members of three major non-profit organizations for the<br />

blind were invited to complete the online questionnaire. The main foci of the questionnaire are project impacts<br />

(including cost savings, benefits, and satisfaction), program quality (including program scope, marketing strategy, and<br />

social inclusion), web quality (including system quality, information quality, and service quality), user satisfaction, and<br />

public trust. This paper presents the results of the survey and summarizes the key findings from the impact<br />

assessment of the web accessibility program. The lessons from this study will help us identify the key factors affecting<br />

the success of eGovernment and pave the path for future eGovernment initiatives.<br />

Keywords: eGovernment, performance evaluation, impact assessment, web accessibility, disabilities<br />

1. Introduction<br />

The success of eGovernment programs hinges on a robust performance assessment that not only provides<br />

a valuable understanding of the impacts of individual programs on stakeholders including citizens,<br />

government employees, business, and minorities, but also provides an effective feedback mechanism for<br />

mid-course corrections. Thus, the performance evaluation of eGovernance has become an important issue<br />

for governments around the world. Among various approaches to eGovernment performance evaluation, a<br />

demand-side evaluation, which is the assessment in terms of citizen’ demands or needs, is highly<br />

desirable, because the promise of eGovernment is to engage citizenry in government in a citizen-centered<br />

manner.<br />

Among various e-services provided by eGovernment, Government to the Disabled (G2D) has gained much<br />

attention in recent years. Since 2003, Research, Development and Evaluation Commission (RDEC),<br />

Executive Yu, based on the international Web Content Accessibility Guidelines 2.0 (WCAG 2.0), has<br />

launched a Web Accessibility Initiative Program to improve the accessibility of the World Wide Web for<br />

people with disabilities in Taiwan. In section two, we, as researchers of the Taiwan EGovernance Research<br />

Center (http://www.teg.org.tw), review the development of web accessibility, and several essential<br />

theoretical models, such as the eGovernment value chain model (Heeks, 2006), the information system<br />

success model (DeLone and McLean, 2003) and e-SERVQUAL (Zeithaml, Parasuraman, and Malhotra,<br />

2002). Based on the eGovernment value chain model and the information system success model, we<br />

introduce our theoretical framework, which covers three aspects of eGovernment (quality, usage, and<br />

impact) in section three. In section four, we use survey methodology to examine the framework and make<br />

detailed assessments of performance of the G2D program. The concluding section discusses the key<br />

contributions of our research to the eGovernance impact assessment literature.<br />

2. Literature review<br />

2.1 Web accessibility<br />

Web accessibility means that individuals with disabilities can perceive, understand, navigate, and interact<br />

with the Web. It not only allows individuals with disabilities, regardless of the types of disabilities they have,<br />

to use the Web in a manner that is equal to the use enjoyed by others, but also benefits others, including<br />

older people with changing abilities due to aging (Jaeger, 2008). Indeed, web accessibility is of the utmost<br />

importance in current network society.<br />

158


Pin-yu Chu et al.<br />

In 1995, the Web Accessibility Initiative (WAI) of the World Wide Web Consortium first published WCAG 1.0<br />

based on needs of individuals with disabilities for accessing the Internet. In 2008, WAI further published<br />

WCAG 2.0 to correspond with changing information applications and provided strategies, guidelines, and<br />

resources to make the Web more accessible to people with disabilities (WAI, 2008). Lately, many countries<br />

all over the world are also concerned about the issue of web accessibility. For example, the United States<br />

passed the Section 508 of the Rehabilitation Act to ensure Federal employees and members of the public<br />

with disabilities have access to the Federal government's electronic and information technology. Similarly,<br />

the United Kingdom passed the Disability Discrimination Act to ensure web accessibility for blind and<br />

disabled users in 1995. In 2002, The Cabinet Office further established guidelines to ensure that UK<br />

government websites are developed to serve the largest possible audience using the broadest range of<br />

systems and that the needs of users with disabilities are considered (Cabinet Office, 2007). Australia<br />

passed Disability Discrimination Act in 1992 to ensure the rights of people with disabilities in provision of<br />

goods and services through websites (Australian Human Rights Commission, 2009).<br />

With all the mentioned efforts, users with disabilities still often face many barriers to accessing the Internet.<br />

Recently, researchers have addressed the complexities of accessibility and the reasons for continued<br />

inaccessibility on eGovernment sites, such as a fundamental lack of understanding of the true meaning of<br />

accessibility, requirements of law, web managers’ attitude, rapid improvement of technology, and lack of a<br />

standardized approach (Jaeger, 2006a, 2006b; Curran, Walters, and Robinson, 2007). Jaeger (2006a)<br />

argues that many researches did not sufficiently evaluate the depth and content of accessibility and<br />

proposes a multi-method approach to studying the accessibility of eGovernment sites in a user-centric<br />

context. The methods include a law and policy analysis of the standards of Section 508, user testing<br />

involving persons with disabilities interacting with eGovernment websites, expert testing of eGovernment<br />

websites, testing of eGovernment websites with automated testing software, and a survey of federal web<br />

developers regarding their perceptions about accessibility. Jaeger and Matteson (2009) further employ<br />

Technology Acceptance Model (Davis, 1989) to examine the policy-adoption behavior of government<br />

agencies.<br />

2.2 eGovernment value chain<br />

Heeks (2006) advocates the significance of developing a comprehensive eGovernment assessment<br />

framework and proposes the model of eGovernment value chain (EVC) to illustrate how an eGovernment<br />

initiative turns inputs into impacts and outcomes (see Figure 1). The EVC model suggests that the process<br />

of creating eGovernment value starts from the precursors such as telecommunications infrastructure and<br />

legal environment, and inputs such as the required financial and political support for eGovernment<br />

development. As a result, these precursors and government inputs, the so-called “readiness”, produce<br />

quality governmental web channels or systems and enable eGovernment adoption by both external and<br />

internal customers. Finally, these adoptions result in the desired outputs and outcomes (Heeks, 2006).<br />

Precursors<br />

Data systems<br />

Legal<br />

Institutional<br />

Human<br />

Technological<br />

Leadership<br />

Drivers/Demand<br />

Inputs<br />

Money<br />

Labor<br />

Technology<br />

Political<br />

support<br />

Strategy Targets Development<br />

READINESS<br />

Intermediates<br />

Web channels<br />

Other e-channels<br />

Back office<br />

systems<br />

AVAILABILITY<br />

Adoption<br />

UPTAKE<br />

Outputs<br />

Information &<br />

Decisions<br />

Actions &<br />

Service<br />

Transactions<br />

Exogenous Factors<br />

Figure 1: eGovernment value chain (source: Heeks, 2006 (p.14))<br />

Early studies (Wassenaar, 2000; Jassen, Rotthier, and Snijkers, 2004; Heintzman and Marson, 2005;<br />

Holden and Fletcher 2005; Wauters, 2006; Millard, 2008) apply EVC to understand factors affecting<br />

159<br />

Use<br />

Impacts<br />

Financial<br />

benefits<br />

Non-financia<br />

l benefits<br />

IMPACT<br />

Outcomes<br />

Public goals<br />

(e.g.MDGs)


Pin-yu Chu et al.<br />

eGovernment adoption. Some eGovernment benchmarking studies, such as the eGovernment website<br />

evaluation conducted by the United Nations (UN, 2001, 2003, 2008), mainly focused on system evaluation.<br />

These eGovernment studies, unfortunately, ignore the EVC downstream elements, e.g. impacts and<br />

outcomes (Huang and Lee, 2010). This limited focus is not only problematic but also makes it difficult to<br />

address the questions of whether eGovernment produces the desired value and how it does so. Until<br />

recently, researchers in various fields such as economics, information management, and public<br />

administration have addressed the importance of impact assessment of eGovernment (Chu and Huang,<br />

2010; Hsiao, Lee, and Chu, 2011; Verdegem and Verleye, 2009).<br />

2.3 Information system success model<br />

Based on thorough literature review and significant empirical efforts, DeLone and McLean (1992, 2003)<br />

develop a widely accepted information system success model, the so-called D & M Information Success<br />

Model (see Figure 2). In the model, information quality, systems quality, and service quality are the main<br />

factors affecting a user’s willingness to use a system, their satisfaction with its use, and its level of impact.<br />

More than 300 articles have referred to or made use of the D & M model. Wang and Liao (2008) provide the<br />

first empirical test of the D & M model in the context of eGovernment. They find that most hypothesized<br />

relationships in the D & M model are significantly supported except the link from system quality to use.<br />

Information<br />

Quality<br />

System Quality<br />

Service Quality<br />

Figure 2: DeLone and McLean’s updated IS success model (source: DeLone and McLean (2003))<br />

Besides the EVC model and the D & M model, various theoretical models and instruments, such as<br />

e-SERVQUAL (Zeithaml et al., 2002), WEBQUAL/eQual (Lociacono, Watson, and Goodhue, 2002), and<br />

eTailQ (Wolfinbarger and Gilly, 2003) that originated from the service sector, have been employed to<br />

examine service quality in eGovernment services. For example, Barnes and Vidgen (2003) use WebQual,<br />

with dimensions including usability, information quality and service interaction, to assess the quality of a<br />

specific cross-national website provided via the OECD. Connolly, Bannister and Kearney (2010) apply<br />

e-SERVQUAL to analyze user perceptions of the quality of the Irish revenue online service.<br />

3. eGovernment impact assessment framework<br />

We examine the impact assessment of G2D programs in the context of an integrated model. The model<br />

incorporates a wide variety of important factors from previous research into a single theoretical framework<br />

provided by the EVC model and the D & M Model. The framework proposes to divide the eGovernment<br />

impact assessment into three related causal parts: quality, adoption, and impact (see Figure 3). Since the<br />

aim of the Web Accessibility Initiative program is to improve the accessibility of the World Wide Web for<br />

people with disabilities in Taiwan, the impact assessment includes not only program quality, program<br />

adoption, and program impact but also web quality and web adoption. We define each of these constructs<br />

and develop the theoretical rationale for the causal relationship in this framework as follows (see Figure 3)<br />

3.1 Quality dimension – program and web<br />

Intention to<br />

use Use<br />

User Satisfaction<br />

Net Benefits<br />

Quality covers two parts: quality of the G2D program and quality of government websites. For the program<br />

quality, we evaluate scope, marketing strategy, social acceptance, and goals of the G2D program<br />

perceived by individuals with disabilities. For the web quality, we evaluate system quality, information<br />

160


Pin-yu Chu et al.<br />

quality, and service quality of government websites visited by individuals with disabilities. System quality<br />

refers to usability (Holzer and Kim, 2007) and linkage between websites; information quality refers to<br />

reliability, completeness, and accuracy features of the web information; and service quality refers to<br />

problem-solving and privacy protection level of the websites.<br />

Program quality<br />

1. Program scope<br />

2. Social acceptance<br />

3. Program goals<br />

Program adoption<br />

1. Awareness<br />

2. Support for the program<br />

Web quality Web adoption<br />

(D & M Model)<br />

1. System quality<br />

2. Information quality<br />

3. Service quality<br />

Usage experience of<br />

government websites<br />

Program impact<br />

1. Costs<br />

2. Benefits<br />

3. Attitudes<br />

Figure 3: Conceptualization of the eGovernance impact framework (source: this study)<br />

3.2 Adoption dimension – program and web<br />

Similarly, adoption covers two parts: adoption of the G2D program and adoption of government websites.<br />

For the program adoption, we evaluate awareness and support for the G2D program from individuals with<br />

disabilities. Web adoption refers usage experience of government websites.<br />

3.3 Impact dimension<br />

The impact construct encompasses costs, benefits, and attitudes of the users. For individuals with<br />

disabilities, the first impact of the G2D program can be in the form of time and money saved by finding<br />

information online and using accessible public web services (OECD, 2005). The second type of impact<br />

relates to attitude, which includes user satisfaction and trust in government (Hsiao et al., 2011; Welch et<br />

al., 2005).<br />

4. Method<br />

4.1 Data collection<br />

In 2010 with the assistance of the RDEC, we conduct an online survey and made detailed impact<br />

assessments of the particular G2D program. Based on the preceding theoretical framework, this section<br />

details the subsequent constructs and questionnaire items and the survey settings to collect the empirical<br />

data from individuals with disabilities.<br />

The main foci of the questionnaire are project impacts (including cost savings, benefits, and satisfaction),<br />

program quality (including scope, marketing strategy, and social inclusion), web accessibility quality<br />

(including system quality, information quality, and service quality), user satisfaction, and public trust. As the<br />

nature of web accessibility for blind people is quite different from that for regular people, quality<br />

measurement scales in eGovernment literature have been modified significantly. We also collect<br />

demographics and characteristics (information technology literacy, government website experience,<br />

willingness to reuse government websites, etc.) of the users with disabilities through the questionnaire.<br />

161


Pin-yu Chu et al.<br />

The questionnaire was reviewed by a committee (a team of government officials and experts from various<br />

domains like public administration, public management, and information management) and pretest on<br />

several people with disabilities to ensure its content validity and verify the clarity of the questions.<br />

According to their comments, the terminology in various sections was improved, and greater clarification of<br />

why individuals with disabilities are surveyed is made. Finally, the online questionnaire was designed to<br />

comply with WCAG 2.0.<br />

5,895 members of three major non-profit organizations for the blind, i.e., Tamkang Resource Center for<br />

Blind Students, Taiwan Foundation for the Blind, and Taiwan Digital Talking Books Association, were<br />

invited to complete the online questionnaire between August 2nd and August 31st; 563 of them finished<br />

the questionnaire, with 504 providing valid responses. The average reliability measure in terms of<br />

Cronbach’s alpha is 0.67.<br />

4.2 The results for the program quality and adoption<br />

Of the respondents, 53% are male. 60.3 % are fully blind, and 20.2% are mild low vision. The survey<br />

findings show that 74.8% of the respondents have used computers for over 6 years, and 64.1% of them<br />

have used the Internet for over 6 years. Almost half of them spend 1 to 5 hours surfing the Internet, and<br />

82% of them spend over 4 days a week on the Internet (see Table 1). The results imply that our<br />

respondents are experienced in using computers and surf the Internet frequently in their daily lives.<br />

Table 1: Characteristics and demographics of the respondents (n = 504)<br />

Gender<br />

Degree of visual<br />

impairment<br />

Experience of using<br />

computers<br />

Experience of surfing<br />

internets<br />

Days spent on the Internet<br />

per week<br />

Hours spent on the<br />

Internet per day<br />

Male Female<br />

267<br />

(53%)<br />

Mild low<br />

vision<br />

102<br />

(20.2%)<br />

237<br />

(47%)<br />

Moderate low<br />

vision<br />

88<br />

(17.5%)<br />

Severe vision<br />

impairments<br />

314<br />

(60.3%)<br />

1-5 years 6-10 years 11-15 years<br />

127<br />

(25.2%)<br />

204<br />

(40.5%)<br />

125<br />

(24.8%)<br />

1-5 years 6-10 years 11-15 years<br />

181<br />

(35.9%)<br />

Less than 1<br />

day<br />

21<br />

(4.2%)<br />

222<br />

(44%)<br />

81<br />

(16.1%)<br />

16-20<br />

years<br />

48<br />

(9.5%)<br />

16-20<br />

years<br />

20<br />

(4%)<br />

2-3 days 4-5 days 6-7 days<br />

70<br />

(13.9%)<br />

92<br />

(18.3%)<br />

321<br />

(63.7%)<br />

1-5 hours 6-10 hours 11-15 hours 16-20<br />

hours<br />

253<br />

(50.2%)<br />

156<br />

(31%)<br />

162<br />

56<br />

(11.1%)<br />

16<br />

(3.2%)<br />

More than 20<br />

hours<br />

14<br />

(2.8%)


Pin-yu Chu et al.<br />

4.3 The results for the program quality and adoption<br />

Table 2 summarizes the program quality and adoption perceived by our respondents. With all the efforts<br />

made by the RDEC, only 58.1% respondents are aware of the program, and those who have surfed<br />

government websites learn more about it. Not surprisingly, over 50% respondents are not really satisfied<br />

with the limited program scope and promotion strategies. Even though the rate of program awareness and<br />

satisfaction is not so high, more than 70% respondents are still willing to use government websites due to<br />

the accessibility improvement and 93.9% respondents think the government should continue promoting<br />

the web accessibility program.<br />

Table 2: The survey results of the program quality and adoption (n = 504)<br />

Yes No<br />

Aware of the program 293 211<br />

(58.1%) (41.9%)<br />

Very<br />

negative<br />

Program scope<br />

Completeness of accessible web 65<br />

(12.9%)<br />

Promotion of accessible web 147<br />

(29.2%)<br />

Social acceptance<br />

Willingness to surf the Internet 8<br />

(1.6%)<br />

Negative Neutral Positive Very<br />

positive<br />

196<br />

(38.9%)<br />

186<br />

(36.9%)<br />

23<br />

(4.6%)<br />

Continuous promotion 0 7<br />

(1.4%)<br />

Program goals<br />

Time saved on searching government information 11<br />

(2.2%)<br />

Trust in government 4<br />

(0.8%)<br />

4.4 The results for the web quality and adoption<br />

20<br />

(4%)<br />

38<br />

(7.5%)<br />

153<br />

(30.4%)<br />

124<br />

(24.6%)<br />

103<br />

(20.4%)<br />

22<br />

(4.4%)<br />

138<br />

(27.4%)<br />

217<br />

(43.1%)<br />

51<br />

(10.1%)<br />

28<br />

(5.6%)<br />

186<br />

(36.9%)<br />

133<br />

(26.4%)<br />

191<br />

(37.9%)<br />

164<br />

(32.5%)<br />

13<br />

(2.6%)<br />

9<br />

(1.8%)<br />

174<br />

(34.5%)<br />

340<br />

(67.5%)<br />

125<br />

(24.8%)<br />

67<br />

(13.3%)<br />

Don’t<br />

know<br />

26<br />

(5.2%)<br />

10<br />

(2%)<br />

10<br />

(2%)<br />

2<br />

(0.4%)<br />

19<br />

(3.8%)<br />

14<br />

(2.8%)<br />

More than 70% of them think government websites are easy to use and government online information is<br />

easy to understand. Overall, our respondents largely approve of the system and information quality of<br />

government websites since both measures receive less than 18% negative evaluation. Service quality,<br />

however, demonstrates much room for improvement (see Table 3).<br />

Web adoption refers our respondents’ usage experience of government websites. The results show that<br />

nearly 60% of government websites provide accessibility features of link purpose, bypass block, sitemap,<br />

and page titled. However, features of access key and alt design demonstrate room for much improvement<br />

(see Table 4).<br />

Table 3: The survey results of the web quality (n = 504)<br />

Usability of the government website<br />

Very<br />

negative<br />

Negative Neutral Positive<br />

System Quality<br />

11<br />

(2.2%)<br />

70<br />

(13.9%)<br />

Successful linkage between websites 10 78<br />

(2%) (15.5%)<br />

Information Quality<br />

163<br />

221<br />

(43.8%)<br />

188<br />

(37.3%)<br />

158<br />

(31.3%)<br />

168<br />

(33.3%)<br />

Very<br />

positive<br />

29<br />

(5.8%)<br />

43<br />

(8.5%)<br />

Don’t<br />

know<br />

15<br />

(3%)<br />

17<br />

(3.4%)


Readability of the government website<br />

Understandability of the government website<br />

Completeness of the government website<br />

Problem-solving level in general<br />

Effectiveness of privacy protection<br />

Pin-yu Chu et al.<br />

5<br />

(1%)<br />

Very<br />

negative<br />

9<br />

(1.8%)<br />

9<br />

(1.8%)<br />

Service Quality<br />

20<br />

(4%)<br />

25<br />

(5%)<br />

83<br />

(16.5%)<br />

223<br />

(44.2%)<br />

150<br />

(29.8%)<br />

Negative Neutral Positive<br />

52<br />

(10.3%)<br />

52<br />

(10.3%)<br />

104<br />

(20.6%)<br />

102<br />

(20.2%)<br />

211<br />

(41.9%)<br />

201<br />

(39.9%)<br />

205<br />

(40.7%)<br />

177<br />

(35.1%)<br />

186<br />

(36.9%)<br />

199<br />

(39.5%)<br />

141<br />

(28%)<br />

141<br />

(28%)<br />

Table 4: Accessibility features of government websites perceived by respondents (n= 504)<br />

31<br />

(6.2%)<br />

Very<br />

positive<br />

35<br />

(6.9%)<br />

31<br />

(6.2%)<br />

21<br />

(4.2%)<br />

34<br />

(6.7%)<br />

Yes No Don’t know<br />

Link purpose 278 (55.2%) 122 (24.2%) 104 (20.6%)<br />

Access key 179 (35.5%) 215 (42.7%) 110 (21.8%)<br />

Bypass block 320 (63.5%) 91 (18.1%) 93 (18.5%)<br />

Sitemap 289 (57.3%) 135 (26.8%) 80 (15.9%)<br />

Non-text content 166 (32.9%) 257 (51%) 81 (16.1%)<br />

Page titled 328 (65.1%) 119 (23.6%) 57 (11.3%)<br />

4.5 The results for the impact dimension<br />

12<br />

(2.4%)<br />

Don’t<br />

know<br />

11<br />

(2.2%)<br />

12<br />

(2.4%)<br />

13<br />

(2.6%)<br />

The main purpose the government promotes web accessibility is to satisfy the needs of people with<br />

disabilities, as well as earning positive perception from the general public. The impact measures<br />

summarized in Table 5 indicate positive responses from the respondents regarding their experience using<br />

the government webs. In the cost reduction dimension, though nearly 35% respondents think they need<br />

better computer hardware and software and 30% of them agree that the government should try to reduce<br />

their costs, 71.4% respondents are still more willing to use government websites due to the accessibility<br />

improvement. Most measures of time and effort saving benefits earn more than 60% positive perceptions<br />

from the respondents. For example, over 60% of the respondents reveal that they are able to access most<br />

public services online and complete their tasks without any assistance from others. Web accessibility even<br />

makes purchasing railway tickets online easy. However, over 30% of them still think search time efficiency<br />

for government websites needs to be further improved.<br />

As for the attitude toward the program, more than 90% of the respondents will continue using the online<br />

public services, and encourage the government to make efforts to promote the program. As for the future<br />

direction of the program, 80% of the respondents think that an official accreditation mechanism and<br />

organization is necessary. Also, inviting people with disabilities to get involved in the accreditation process<br />

will also be very helpful.<br />

We further compare the perceived impact of the G2D program on our respondents with different vision<br />

disabilities. Regarding trust in government and satisfaction with the particular program, there is no<br />

164<br />

25<br />

(5%)


Pin-yu Chu et al.<br />

significant difference between people with mild and moderate low vision and people with severe vision<br />

impairments (see Table 6).<br />

Table 5: The survey results for the impact dimension<br />

Need of better computer hardware (n = 504)<br />

Willingness to use government websites (n = 504)<br />

Be able to access most public services online. (n =<br />

504)<br />

Be able to access most public services without<br />

assistance from others (n = 504)<br />

Convenience of purchasing Taiwan Railway ticket (n<br />

= 234)<br />

Make continuous efforts to promote the program (n<br />

= 504)<br />

Willingness to continual usage (n = 504)<br />

Improving information literacy (n = 504)<br />

Institutionalization of web accessibility (n = 504)<br />

Building license system for web accessibility<br />

inspector (n = 504)<br />

Very<br />

negative<br />

Cost reduction<br />

14<br />

(2.8%)<br />

8<br />

(1.6%)<br />

Negative Neutral Positive<br />

84<br />

(16.7%)<br />

23<br />

(4.6%)<br />

Time and effort saving benefits<br />

15<br />

(3%)<br />

18<br />

(3.6%)<br />

5<br />

(2.1%)<br />

56<br />

(11.1%)<br />

61<br />

(12.1%)<br />

19<br />

(8%)<br />

Attitude toward the G2D program<br />

0<br />

(0%)<br />

2<br />

(0.4%)<br />

1<br />

(0.2%)<br />

1<br />

(0.2%)<br />

2<br />

(0.4%)<br />

7<br />

(1.4%)<br />

2<br />

(0.4%)<br />

3<br />

(0.6%)<br />

5<br />

(1%)<br />

13<br />

(2.6%)<br />

201<br />

(39.9%)<br />

103<br />

(20.4%)<br />

103<br />

(20.4%)<br />

106<br />

(21%)<br />

48<br />

(20.3%)<br />

22<br />

(4.4%)<br />

37<br />

(7.3%)<br />

33<br />

(6.5%)<br />

39<br />

(7.7%)<br />

62<br />

(12.3%)<br />

124<br />

(24.6%)<br />

186<br />

(36.9%)<br />

167<br />

(33.1%)<br />

170<br />

(33.7%)<br />

85<br />

(35.9%)<br />

133<br />

(26.4%)<br />

200<br />

(39.7%)<br />

132<br />

(26.2%)<br />

148<br />

(29.4%)<br />

156<br />

(31%)<br />

Very<br />

positive<br />

52<br />

(10.3%)<br />

174<br />

(34.5%)<br />

153<br />

(30.4%)<br />

139<br />

(27.6%)<br />

66<br />

(27.8%)<br />

340<br />

(67.5%)<br />

251<br />

(49.8%)<br />

332<br />

(65.9%)<br />

303<br />

(60.1%)<br />

247<br />

(49%)<br />

Table 6: The impact comparison among people with different vision disabilities<br />

Negative Neutral Positive Don’t<br />

know<br />

T test<br />

Trust in government<br />

People with mild and moderate low 11 98 75 6<br />

χ<br />

vision<br />

(69.5%) (22.6%) (4.7%) (3.2%)<br />

People with severe vision 31 119 156 8<br />

impairments<br />

(72.6%) (19.1%) (7%) (1.3%)<br />

2 = 10.364 (df=3) ,<br />

p-value=0.016


Pin-yu Chu et al.<br />

theoretical underpinning on the impact assessment of eGovernment programs. We propose a conceptual<br />

model to examine elements of web accessibility and the associations between program/web quality and<br />

program impacts with empirical evidence. We use survey methodology to examine this framework and<br />

make detailed assessments of performance of the Web Accessibility Initiative Program in Taiwan.<br />

Generally speaking, most respondents regard the program is in the interest of them, but there is still<br />

something left to be desired. In the short term, this research suggests the government should create<br />

incentives for compliance with the WCAG 2.0 guidelines. The government can promote the program<br />

through policy advocacy and marketing and let more potential users understand the policy and use public<br />

online services so to enlarge the advantage of the policy. For providing more incentives for government<br />

agencies, the government is suggested to add the Guidelines as criteria for financial subsidies and<br />

program evaluation for proactive compliance. The government can award enterprises with high<br />

performance on web accessibility and subsidize non-profit organizations to enhance their ability to provide<br />

Accessible Web.<br />

At the same time, the government should communicate closely with the demand side. The government is<br />

suggested to conduct more surveys and forums to understand the needs of the disabled so that the design<br />

of the websites can really meet their needs. We also suggest that the responsible agencies should provide<br />

professional trainings for both webmaster and users to strengthen their ability for operating and accessing<br />

websites.<br />

In the mid-future, the government is suggested to build an accreditation mechanism to certify webs with<br />

accessibility. Because the criteria of Accessible Web are stricter than general website, we suggest that only<br />

organizations with official accreditation are eligible for inspecting the web pages and certain ratio of the<br />

inspectors should be the blind. The inspecting organization should establish formal complain channel and<br />

clear punishment rules. Furthermore, if the government develops a barrier-free cross-boundary<br />

eGovernance mechanism, the program would be greatly strengthened. To be more specific, the<br />

government should proactively check whether governments’ website meet the disabled’s need, especially<br />

for those websites closely related to citizens’ lives such as public transportation and public banks. The<br />

governments should further offer one-stop web page and integrate back-office services to enhance policy<br />

satisfaction.<br />

In the long term, the governments should continue public communication and build a cross-sector<br />

eGovernance system. The government should let the public understand that Accessible Web is not only<br />

built for the disabled. Its design concept can also create advantage for the elders and the younger<br />

generation. Therefore, the government should start education and building a friendly environment to<br />

deepen the spirit of Accessible Web. The mentioned tasks not only pertain to technology provision and<br />

customization, but also need the cross-sector cooperation among government, private organizations, and<br />

the third sectors. The ultimate end is to make the Accessible Web concept realized in citizens’ lives.<br />

Despite all the care given to this study, there are several limitations that should be noted and addressed in<br />

any future research. First of all, the changes in perception and user behavior over any significant period of<br />

time, with regard to the promotion of the G2D program, have not been investigated in this research. It is<br />

therefore recommended that further research should be undertaken to examine whether, with increasing<br />

experience over time, there is any change in satisfaction and usage of public online services. Secondly,<br />

this paper only covers the program impact on people with eyesight problem. Further investigation on<br />

people with various disabilities should be carried to identify the key factors affecting the success of the<br />

web accessibility program in general.<br />

References<br />

Barnes, S.J. and Vidgen, R. (2003) “Measuring Website Quality Improvements: A Case Study of the Forum on<br />

Strategic Management Knowledge Exchange”, Industrial Management and Data Systems, Vol. 103, No. 5, pp<br />

297-309.<br />

Chu, P.Y. and Huang, T.Y. (2010) “Measuring EGovernance Performance: Theory and Practice in Taiwan”, Beyond<br />

eGovernment Measuring Performance: A Global Perspective, edited by Alan R. Shark and Sylviane Toporkoff,<br />

Public Technology Institute and ITEMS International, pp 279-292.<br />

Connolly, R., Bannister, F. and Kearney, A. (2010) “Government Website Service Quality: A Study of the Irish Revenue<br />

Online Service”, <strong>European</strong> Journal of Information Systems, Vol. 19, pp 649–667.<br />

Curran, K., Walters, N. and Robinson, D. (2007) “Investigating the Problems Faced by Older Adults and People with<br />

Disabilities in Online Environments”, Behavior and Information Technology, Vol. 26, No. 6, pp 447-453.<br />

Davis, F.D. (1989) “Perceived Usefulness, Perceived Ease of Use and User Acceptance of Information Technology”,<br />

MIS Quarterly, Vol. 13, No. 3, pp 318-339.<br />

166


Pin-yu Chu et al.<br />

DeLone, W.H. and McLean, E.R. (1992) “Information System Success: The Quest for the Dependent Variable”,<br />

Information Systems Research, Vol. 3, No. 1, pp 60-95.<br />

DeLone, W.H. and McLean, E.R. (2003) “The DeLone and McLean Model of Information System Success: A Ten-year<br />

Update”, Journal of Management Information Systems, Vol. 19, No. 4, pp 9-30.<br />

Heeks, R. (2006) “Benchmarking EGovernment: Improving the National and International Measurement, Evaluation<br />

and Comparison of EGovernment”, Paper presented at iGovernment Working Paper, University of Manchester,<br />

Manchester.<br />

Heintzman, R. and Marson, B. (2005) “People, Service and Trust: Is There a Public Sector Service Value Chain”,<br />

International Review of Administrative Science, Vol. 71, No. 4, pp 549-575.<br />

Holden, S. H. and Fletcher, P. D. (2005) “The Virtual Value Chain and EGovernment Partnership: Non-monetary<br />

Agreements in the IRS E-File Program”, International Journal of Public Administration, Vol.28, No. 7and8, pp<br />

643-664.<br />

Holzer, M. and Kim, S. (2007) Digital Governance in Municipalities Worldwide (2007) - A Longitudinal Assessment of<br />

Municipal Websites Throughout the World, The EGovernance Institute National Center for Public Performance<br />

Rutgers, the State University of New Jersey, Campus at Newark.<br />

Horan, T.A., Abhichandani, T. and Rayalu, R. (2006) “Assessing User Satisfaction of EGovernment Services:<br />

Development and Testing of Quality-in-use Satisfaction with Advanced Traveler Information System (ATIS)”,<br />

Paper presented at the 39th Hawaii International <strong>Conference</strong> on System Sciences, Hawaii.<br />

Hsiao, N.Y., Lee, C.P. and Chu, P.Y. (2011) “Impact of EGovernance on Businesses – Model Development and Case<br />

Study”, EGovernance and Cross-boundary Collaboration: Innovations and Advancing Tools, edited by Chu, P.Y.<br />

and Chen, Y.C., IGI Global.<br />

Jaeger, P.T. (2006a) “Assessing Section 508 Compliance on Federal EGovernment Websites: A Multi-method,<br />

User-centered Evaluation of the Accessibility of EGovernment”, Government Information Quarterly, Vol. 23, pp<br />

169-190.<br />

Jaeger, P.T. (2006b) “Telecommunications Policy and Individuals with Disabilities: Issues of Accessibility and Social<br />

Inclusion in the Policy and Research Agenda”, Telecommunications Policy, Vol. 30, No. 2, pp 112-124.<br />

Jaeger, P.T. (2008) “User-centered Policy Evaluations of Section 508 of the Rehabilitation Act: Evaluating<br />

EGovernment Websites for Accessibility for Persons with Disabilities”, Journal of Disability Policy Studies, Vol. 1,<br />

No. 19, pp 24-33.<br />

Jaeger, P.T. and Matteson, M. (2009) “EGovernment and Technology Acceptance: The Case of the Implementation of<br />

Section 508 Guidelines for Websites”, Electronic Journal of eGovernment, Vol. 7, No. 1, pp 87-98.<br />

Jassen, D., Rotthier, S. and Snijkers, K. (2004) “If You Measure It They Will Score: An Assessment of International<br />

EGovernment Benchmarking”, Information Polity, Vol. 9, No. 3-4, pp 121-130.<br />

Loiacono, E.T., Watson, R.T., and Goodhue, D.L. (2002) “WebQual: A Measure of Website Quality”, 2002 Marketing<br />

Educators’ <strong>Conference</strong>: Marketing Theory and Applications, Chicago, American.<br />

Millard, J. (2008) “EGovernment Measurement for Policy Makers”, <strong>European</strong> Journal of ePractice, Vol. 4, pp 1-14.<br />

OECD. (2005) “Proposed Outline for Accessing EGovernment Benefits”, [online] OECD publishing,<br />

http://webdomino1.oecd.org/COMNET/PUM/egovproweb.nsf/viewHtml/index/$FILE/GOV.PGC.EGOV.2006.1.d<br />

oc.<br />

The Australian Human Rights Commission. (2009) “A Brief Guide to the Disability Discrimination Act”, [online],<br />

http://www.hreoc.gov.au/disability_rights/dda_guide/dda_guide.htm.<br />

The Cabinet Office. (2007) “Guidelines for UK Government Websites”, [online],<br />

http://archive.cabinetoffice.gov.uk/eGovernment/docs/localgov/pdf/localgov.pdf.<br />

The United Nations /ASPA. (2001) “Benchmarking EGovernment: A Global Perspective”, [online],<br />

http://unpan1.un.org/intradoc/groups/public/documents/un/unpan021547.pdf.<br />

The United Nations. (2003) World Public Sector Report 2003: EGovernment at the Crossroads, United Nations, New<br />

York.<br />

The United Nations. (2008) United Nations EGovernment Survey 2008: From EGovernment to Connected<br />

Governance, United Nations, New York.<br />

The Web Accessibility Initiative. (2008) “Web Content Accessibility Guidelines (WCAG) 2.0. “, [online],<br />

http://www.w3.org/TR/WCAG20/.<br />

Verdegem, P. and Verleye, G. (2009) “User-centered eGovernment in Practice: A Comprehensive Model for Measuring<br />

User Satisfaction”, Government Information Quarterly, Vol. 26, No. 3, pp 487-497.<br />

Wang, Y.S. and Liao, Y.W. (2008) “Assessing EGovernment Systems Success: A Validation of the DeLone and<br />

McLean Model of Information Systems Success”, Government Information Quarterly, Vol. 25, No. 4, pp 717-733.<br />

Wassenaar, A. (2000) “EGovernment Value Chain Models: EGovernment from a Business (modeling) Perspective”, In<br />

Tjoa, A.M., Wagner, R.R. and Al-Zobaidie, A. (Eds.), Proceedings of the 11th International Workshop on<br />

Database and Expert Systems Applications, pp 289-293, IEEE Computer Society, Washington.<br />

Wauters, P. (2006) “Benchmarking EGovernment Policy Within the e-Europe Programme”, Asilib Proceeding, Vol. 58,<br />

No. 5, pp 389-403.<br />

Welch, E.W., Hinnant, C.C. and Moon, M.J. (2005) “Linking Citizen Satisfaction with EGovernment and Trust in<br />

Government”, Journal of Public Administration Research and Theory, Vol. 15, No. 3, pp 371-391.<br />

Wolfinbarger, M.F. and Gilly, M.C. (2003) “eTailQ: Dimensionalizing, Measuring, and Predicting eTail quality”, Journal<br />

of Retailing, Vol. 79, No. 3, pp 183-198.<br />

Zeithaml, V.A., Parasuraman, A. and Malhotra, A. (2002) “Service Quality Delivery through Websites: A Critical Review<br />

of Extant Knowledge”, Academy of Marketing Science Journal, Vol. 30, No. 4, pp 362-375.<br />

167


Predictive Analytics in the Public Sector: Using Data Mining<br />

to Assist Better Target Selection for Audit<br />

Duncan Cleary<br />

Revenue Irish Tax and Customs, Ireland<br />

dcleary@revenenue.ie<br />

Abstract: Revenue, the Irish Tax and Customs Authority, has been developing the use of data mining techniques as<br />

part of a process of putting analytics at the core of its business processes. Recent data mining projects, which have<br />

been piloted successfully, have developed predictive models to assist in the better targeting of taxpayers for possible<br />

non-compliance/ tax evasion, and liquidation. The models aim, for example, to predict the likelihood of a case<br />

yielding in the event of an intervention, such as an audit. Evaluation cases have been worked in the field and the hit<br />

rate was approximately 75%. In addition, all audits completed by Revenue in the year after the models had been<br />

created were assessed using the model probability to yield score, and a significant correlation exists between the<br />

expected and actual outcome of the audits. The models are now being developed further, and are in full production in<br />

2011. Critical factors for model success include rigorous statistical analyses, good data quality, software, teamwork,<br />

timing, resources and consistent case profiling/ treatments. The models are developed using SAS Enterprise Miner<br />

and SAS Enterprise Guide. This work is a good example of the applicability of tools developed for one purpose (e.g.<br />

Credit Scoring for Banking and Insurance) having multiple other potential applications. This paper shows how the<br />

application of advanced analytics can add value to the work of Tax and Customs authorities, by leveraging existing<br />

data in a robust and flexible way to reduce costs by better targeting cases for interventions. Analytics can thus<br />

greatly support the business to make better-informed decisions.<br />

Keywords: tax; predictive analytics; data mining; public sector; Ireland<br />

1. Introduction: Revenue and Ireland<br />

The Irish Revenue Commissioners were established by statute in 1923. Their mission is to serve the<br />

community by fairly and efficiently collecting taxes and duties and implementing Customs controls. In<br />

broad terms Revenue’s work includes:<br />

Assessing, collecting and managing taxes and duties that account for over 93% of Exchequer<br />

revenue;<br />

Administering the Customs regime for the control of imports and exports and collection of duties and<br />

levies on behalf of the EU;<br />

Working in co-operation with other state agencies in the fight against drugs and in other cross<br />

departmental initiatives;<br />

Carrying out agency work for other departments;<br />

Collection of PRSI (Pay Related Social Insurance) for the Department of Social Protection;<br />

Provision of policy advice on taxation issues.<br />

Net total receipts in 2009 were EUR 33bn. In 2010 receipts were ~ EUR 31.5bn.<br />

Increasingly, Revenue is applying advanced analytics in its business processes. One of these initiatives<br />

is applying predictive analytical techniques to assist in better case selection for audit. This paper<br />

describes this approach as applied recently by Revenue.<br />

2. Revenue’s research and analytics branch<br />

Revenue's Research and Analytics Branch conducts program-wide and macro-level research at a<br />

corporate level. The branch conducts analyses to transform data into information often using SAS<br />

analytical software. The branch’s work in Revenue includes large sample surveys, data mining<br />

(population profiling/ customer segmentation, pattern recognition, forecasting, predictive modelling) data<br />

quality exercises, experimental design for evidence based decision support, economic research and risk<br />

analysis. The branch uses both Revenue data and data from other sources. This work enables Revenue<br />

to make better use of its data and provides an improved understanding of the taxpayer population. The<br />

results are used to better target services to customers and to improve compliance.<br />

This paper focuses on a number of recent uses of predictive analytics in Revenue.<br />

168


2.1 Business context<br />

Duncan Cleary<br />

Revenue has a dual focus on its taxpayers. The first is on customer service, and the second is on<br />

compliance. RAB have conducted a number of exercises using analytics with a customer service focus<br />

(Refs). This paper will focus the use of analytics from a compliance perspective, with the following<br />

targets:<br />

Likelihood to yield if audited<br />

Likely amount of yield if audited<br />

Likelihood to liquidate (business failure)<br />

The aim of using analytics in Revenue is to show how analytics can assist the development of effective<br />

business strategies for Revenue, therefore optimising the use of Revenue resources. Analytics can<br />

demonstrably reduce costs, increase yields, and improve Revenue’s service to taxpayers.<br />

3. Why use predictive analytics for target selection?<br />

Increasingly analytics are being used in companies and entities that are seeking means of making<br />

smarter decisions and getting better results by utilising their data assets, advances in computational<br />

power and software and a new emerging class of analysts who can extract the knowledge from the vast<br />

amounts of data and information currently available. Thought leaders in this area are offering sound<br />

guidance to those who wish to improve how they go about their business and achieve their goals.<br />

Revenue is pursuing the use of analytics as it recognises the value that can be gained by such an<br />

approach. The reader is referred to a number of recent publications for a more detailed exposition of why<br />

using analytics is making increasing sense in both private and public sector (Davenport & Harris, 2007;<br />

Davis et. al, 2006; Miller et. al, 2006; Davenport & Harris, 2010).<br />

3.1 Data and variables: Data integration<br />

The primary source of data for the predictive models is Revenue’s sophisticated risk analysis programme,<br />

REAP (Risk Evaluation Analysis and Profiling), which electronically screens taxpayers’ data covering<br />

several years. It uses ~300 business rules to quantify risk for approx. 800,000 taxpayer entities, and a<br />

risk run is created at least three times annually. Predictive analytics can be used to extend from the<br />

quantification of risk in a case, to predicting, for example, likelihood of yield, if a case were to be audited,<br />

and the potential amount of yield, or likelihood to liquidate. The inputs for predictive models were<br />

therefore the outputs from the REAP system.<br />

As with any Data Mining exercise, there is considerable effort required at the data integration stage,<br />

before modelling proper can begin. A process of ETL (Extraction, Transfer and Load) must be conducted,<br />

and RAB use SAS DI Studio (DI = Data Integration). The purpose of using this DI tool is to establish a<br />

process that would be scalable and semi automatic. Data from the REAP system and other sources in<br />

Revenue’s Data Warehouse Environment are sourced and processed. Inherent in any data mining<br />

exercise is a review of data quality, which is not a trivial matter, and needs care and attention. The REAP<br />

system data is an opportunistic source of data, i.e. it is not designed specifically for predictive analytics.<br />

However, it is good quality in its format and completeness, which offers a solid platform for analysis. It is<br />

also readily available. Extensive work was required to understand the business context, the logic of the<br />

rules in REAP, and the underlying data that leads to those rules firing. A number of summarisations of the<br />

REAP system are produced for use in modelling, these included a table with the frequency of the rules<br />

fired in each case, and a binary indicator for rules firing/ not firing. In instances where data entailed many<br />

rows per entity, transpositions were performed, to create a flat file with one row per entity. Variables from<br />

the REAP system that summarise certain classes of rules, such as monetary risk and behaviour, are also<br />

assessed and incorporated for analysis. A target variable must be created for the training data (e.g.<br />

cases that had been audited in the previous two years). The target can be set as a binary target, e.g.<br />

where any yield over EUR 2,500= ‘1’, and yield < EUR 2500 = ‘0’. The reason why the target should be<br />

set at EUR 2,500 is to avoid modelling for cases where the yield will be below the cost of a typical audit. If<br />

the target is the monetary amount of yield, this can be the second stage of a two stage model with the<br />

binary yield/ no yield as the first stage. In the case of liquidations, a database of known liquidations is<br />

used to train the model, using the profiles of the cases in REAP before the case liquidated. Additional<br />

data can include variables such as geography and economic sector.<br />

This data integration process results in an ABT (Analytics Base Table) of one row per taxpayer with all of<br />

the attributes of interest as variables included for each taxpayer. These ABTs form the core inputs into<br />

169


Duncan Cleary<br />

the models. There will be a sub set where the target variable is populated (i.e. the data to be used to<br />

create the model). The bulk of the ABT will describe the population, which will be scored once the model<br />

is constructed. It should be noted that a lengthy exploratory analysis phase at univariate, bivariate and<br />

multivariate levels should be factored in and conducted with the raw input data and the final ABT. These<br />

univariate and bivariate analyses are performed by RAB in SAS Enterprise Guide (Ver. 4.3). Many<br />

variables are transformed to allow for better modelling, for example, to improve normality assumptions for<br />

continuous variables, or to optimally bin variables to better predict the target variable. ‘Unsupervised’<br />

techniques (i.e. analyses without a target) are also conducted on the data, to further understand the data<br />

before predictive models are attempted. These unsupervised techniques can typically include cluster<br />

analysis and association analysis. If time allows, a full segmentation of the ABT can prove fruitful prior to<br />

modelling.<br />

4. Data mining methodology<br />

A predictive model by its nature has a target or interest. It can therefore be described as a ‘Supervised’<br />

technique. Cases that have been audited (and been concluded), or cases that have gone into liquidation<br />

in the past can be used to train models. A predictive model produces a probability score for current and<br />

future cases of the likelihood of some outcome of interest occurring. This score can be deployed and<br />

used for decision support, e.g. case selection for audit. If the target is binary, both positive and negative<br />

outcomes need to be available to create a model to score unknown cases. If the target is numeric, e.g.<br />

monetary, a good range of values can be helpful.<br />

RAB use SAS Enterprise Miner as their tool of choice for producing predictive models. Essentially the<br />

modelling process can be summarised as SEMMA: Sample, Explore, Modify, Model, & Assess. This<br />

process has been developed by SAS and it forms a solid framework for analysis. Scoring the full<br />

population completes the process. As cases are worked/ events happen, these can be used to improve<br />

the model. It is a very iterative process, with backwards and forwards movement within the SEMMA<br />

steps. Figure 1 illustrates a typical process flow.<br />

Figure 1: Screen grab of SAS E Miner project, showing a SEMMA process flow<br />

4.1 Sample<br />

The ABT having been created, this essentially reflects a snapshot of the population of interest. Revenue<br />

is in the relatively luxurious position of not needing to worry about sampling as others may have to, who<br />

do not have access to full population data. However, training cases, or cases with a known outcome of<br />

interest, e.g. audit result, are often a biased sample. There are a number of ways of addressing this bias.<br />

170


Duncan Cleary<br />

One is to utilise a method known as ‘Reject Inference’. This is a common method used in Banking and<br />

Insurance, wherein cases that have been accepted, for example for a loan, form a biased sample for<br />

modelling. Reject Inference assigns an imputed outcome to cases (based on their profile) that never had<br />

a loan, so that they can be used in further modelling. This method has been used successfully by<br />

Revenue in instances where audit cases, which form an analogous biased training dataset, can be<br />

augmented by cases as yet not audited.<br />

Another means of addressing bias is to conduct random sample exercises, and record the outcome of<br />

interest for the random cases. This has two advantages. Firstly, it gives an approximation of the true<br />

proportions of, for example, a binary target’s two levels in the population, which may be very different to<br />

the proportions in biased training data. These proportions can be used to adjust any model using biased<br />

training data by telling SAS E. Miner in the Decisions Processing function the approximation for the true<br />

population proportions. Secondly, a random sample may surface factors that lead to an outcome of<br />

interest, that are not typically used in case selection, thus giving a better picture of the overall population,<br />

for example the full range of taxpayer risk types. Revenue has therefore used data from its Random Audit<br />

program as inputs to training predictive models.<br />

Over-sampling can be used when modelling rare events, such as liquidations. This is a process whereby<br />

when the target is binary (0,1), for example, a 100% representation of the ‘1’s is included in the sample,<br />

and a complimentary random sample of ‘0’s is selected from the population, often as a similar proportion.<br />

Thus one may have 50:50 proportioned ‘1’s and ‘0’s in the training data, even though the proportion of<br />

‘1’s in the population is very low, e.g. less than 1%. The purpose of this exercise is to avoid creating a<br />

model that is very accurate, but that classifies every case as a ‘0’.<br />

Data partition also occurs at the sampling stage. This is where the training data is divided randomly into<br />

two or three groups. These groups are used for different aspects of the modelling process. In SAS they<br />

are labelled ‘Training’, ‘Validation’, and ‘Test’. The proportions of cases in each category can vary<br />

according to the modeller’s preferences and the data available. A model will be created using the training<br />

data, often judged by the validation data, and finally verified by the test data (which is not used in model<br />

creation). One must maximise the data available for modelling, while allowing enough data for validation.<br />

Typically proportions such as 60:20:20, 70:30:0 and 40:30:30 are used, depending on the model method<br />

used and the amount of training data available.<br />

4.2 Explore<br />

A thorough statistical exploratory analysis must take place next, before modelling. Univariate, bivariate<br />

and in some instances multivariate (perhaps ‘unsupervised’) analyses should be conducted. This can<br />

surface any data quality issues, data distribution and content should be assessed, outliers identified etc.<br />

The findings from this analysis may demand that the ABT be reconfigured, or that the raw data is<br />

augmented, or that new derived variables be created. This process then leads to the next stage of data<br />

modification.<br />

4.3 Modify<br />

Nearly always in predictive modelling, it is wise to perform some transformations of the data. Typically<br />

this involves log (or other) transformations of highly skewed numeric variables, imputation of values<br />

where they are missing in the data, binning of categorical variables to remove rare levels, ranking of<br />

numeric data and creating a monotonic relationship between independent variables and the target<br />

variable. This last method is typically achieved by RAB using SAS Credit Scoring ‘Interactive Grouping’<br />

node, which allows manual adjustment of the bins in each variable to maintain their usefulness at<br />

predicting the target, but to also ensure that they do so in a logical way.<br />

4.4 Model<br />

Once the process flow has been developed to a sufficient point, modelling can begin.<br />

Several model methods are available in SAS E. Miner. Typically, a regression (for binary targets use<br />

logistic regression), a decision tree, and a neural network are chosen to prepare models. Various<br />

parameters can be set to suit the model requirements (see Sarma, 2007). For example, with logistic<br />

regression, a logit stepwise regression can be specified. The ranges of the options that are available in<br />

SAS E. Miner are beyond the scope of this paper, and the reader is referred to www.sas.com for details.<br />

171


Duncan Cleary<br />

Often, once models are produced, there is an iterative process involving returning to earlier steps in the<br />

model process flow. Issues heretofore unseen can be highlighted in the model results, and the modeller<br />

needs to adjust for problems like over-fitting. Typically many parameter changes will be made to<br />

maximise the predictive performance of the models, by for example making changes that increase the lift<br />

provided by the models, and by getting similar results for both training and validation data (i.e. making the<br />

model more robust). It should be noted however, that tweaking model parameters rarely exceeds the<br />

addition of new variables as a means of improving model performance.<br />

Figure 2: Results screen from a neural network<br />

The outputs from each model are examined and then their comparative performance is assessed.<br />

Outputs from a neural network (Figure 2) and a decision tree (Figure 3) are shown as examples here.<br />

Figure 3: Results screen from a decision tree<br />

172


4.5 Assessment<br />

Duncan Cleary<br />

Assessing models can be done in a number of ways. Three main methods are:<br />

Within model process-flow assessment<br />

Sample tests of cases ranked by a model<br />

Back validation of model with subsequent events.<br />

This section covers the first of these three; the next two are covered under the Results section below.<br />

SAS E Miner offers an assessment node. There are many criteria for assessing the performance of a<br />

model. As an example, here a logistic regression with a binary target will be used. Criteria such as<br />

misclassification or average square error can be used, but often the most effective measure of the<br />

success of a model is the ROC curve (Receiver Operating Characteristic). A ROC curve shows the<br />

values of the true positive fraction and the false positive fraction at different cut-off values (Sarma, 2007).<br />

The cut-off values can be set to maximise the number of true positives in a set of cases. A set of ROC<br />

charts can be produced, that compares Training, Validation and Test data (see Figure 4), for all of the<br />

models fed into the assessment node. Essentially, the model that looks most similar across the three<br />

modelling data sets, and also has the maximum distance between the curve and the diagonal line (which<br />

represents no predictive power, i.e. an equivalent to flipping a coin), is usually the best model to use for<br />

scoring the full population/ new cases.<br />

Figure 4: Results screen from a model comparison node<br />

5. Results and evaluation<br />

A number of successful models have been produced by RAB. Following within modelling process<br />

validation, these have also been field tested and back validated with success.<br />

Each model has been used to score the population of relevance. These scores have been assessed,<br />

binned into deciles and demi-deciles, and have been used to rank the case base in descending order of<br />

likelihood. Cut-offs have been set based on criteria such as misclassification rate and the amount of<br />

cases that can be worked based on resources available.<br />

For this paper the example results to be shown are for the Yield model, i.e. the Likelihood to yield if<br />

audited model.<br />

6. Yield prediction model<br />

A successful pilot exercise testing a predictive model focused on yield was conducted in 2009/2010. The<br />

pilot exercise resulted in a 3:1 hit rate for the cases provided for working. Both case specific reviews and<br />

‘Back Validation’ against all closed audits suggested that the approach was robust. Following on from<br />

173


Duncan Cleary<br />

this, a new predictive model was created using similar Data Mining techniques (the pilot used Credit<br />

Scoring, the subsequent model used a Neural Network model). The model uses data from the most<br />

recent REAP Risk run available as inputs, and was trained with closed audits from prior years, as before.<br />

As noted above, the purpose of the model is to identify cases, which have a similar profile to known<br />

yielding audits, and to rank the likelihood of yield in the event of an audit of those cases. The full case<br />

base receives a probability score, and for the purposes of this model a cut-off of 80% probability to yield<br />

has been set. This cut-off, which in effect creates a binary Yes/No indicator for each case, has been<br />

provided to auditors for case selection, through the REAP system. As such, each case selector and<br />

worker can access some of the power of this predictive analytics model. Approximately 40,000 cases (5%<br />

of case base) fired the rule. As with any model, feedback is critical for evaluation and model<br />

improvement.<br />

3500<br />

3000<br />

2500<br />

2000<br />

1500<br />

1000<br />

500<br />

0<br />

0.95 - 1.00<br />

0.85 - 0.90<br />

0.75 - 0.80<br />

0.65 - 0.70<br />

0.55 - 0.60<br />

0.45 - 0.50<br />

0.35 - 0.40<br />

0.25 - 0.30<br />

0.15 - 0.20<br />

0.05 - 0.10<br />

NonEvents<br />

Events<br />

Figure 5: Training cases, with yielding and non-yielding, by model probability score. X axis: Probability to<br />

yield left to right, high to low, Y axis: Training cases, frequency, events= yielding cases, non<br />

events = non yielding<br />

At the 0.8 (80%) cut-off and above shown by the red line (i.e. to the left) in Figure 5, the majority of cases<br />

were yielding in training data. Thus the focus was placed on cases scoring similarly to these cases in the<br />

full risk run population.<br />

An evaluation of the Predictive model using the latest REAP run was conducted in mid January 2011.<br />

The method used was ‘Back Validation’ of the 2010 yield prediction model, with closed audits (i.e. known<br />

results) from 2010. These audits were not used in the training of the model; hence the model can be<br />

assessed on the basis of how well it predicted events unknown to it at the time of its creation. The results<br />

were very positive, showing a strong relationship between predicted likelihood to yield and actual average<br />

yield. Each point on the graph below represents approximately 475 cases (total of 9500 cases<br />

represented in Figure 6). There is a strong positive correlation between realised yield and predicted audit<br />

outcome, i.e. as the probability to yield increases so too does the average (median) yield. This suggests<br />

that the model is robust and a good case selection tool. Cases from the uppermost probability deciles<br />

have yield on average twice that of cases from the lowermost deciles (Figure 7).<br />

7. Conclusions<br />

The Yield model has since been rerun (late 2010 REAP run), with modifications based on feedback, and<br />

incorporated in the nationally disseminated current REAP run in the form of an indicator rule for cases<br />

where there is a high probability to yield. In effect, the model output is available to case selectors. This<br />

qualifies the model as being in production. As cases are selected using this rule, results will be assessed<br />

and incorporated into future models. In addition, a liquidation probability model has also been made<br />

available by similar means, having been validated with events since model creation.<br />

174


Duncan Cleary<br />

Figure 6: Correlation between modelled likelihood to yield and actual audit yield, probability demi-deciles<br />

and median yield per decile<br />

Figure 7: Median yield per decile of model probability to yield<br />

RAB is developing more models for the business (e.g. quantity of monetary yield, specific economic<br />

sectors, regional models etc.). RAB continues to evaluate models through field-testing, in co-operation<br />

with Revenue regions. RAB thus hopes to extract more value from the data and information Revenue<br />

already has, and is increasingly making analytics more central to how Revenue performs its work.<br />

References<br />

Davenport, T.H. & Harris, J. 2007. Competing on Analytics: The New Science of Winning. Harvard Business School<br />

Press.<br />

Davenport, T.H. & Harris, J. 2010. Analytics at Work: Smarter Decisions, Better Results. Harvard Business Press.<br />

175


Duncan Cleary<br />

Davis, J., Miller, G.J. & Russell, A., 2006. Information Revolution: Using the Information Revolution Model to Grow<br />

Your Business. Wiley.<br />

Miller, G.J, Bräutigan, D. & Gerlach, S.V. 2006. Business Intelligence Competency Centres: A Team Approach to<br />

Maximising Competitive Advantage. Wiley.<br />

Sarma, Kattamuri S. 2007. Predictive Modelling with SAS Enterprise Miner: Practical Solutions for Business<br />

Applications. Cary, NC: SAS Institute Inc.<br />

SAS E. Miner reference (accessed March 2011):<br />

http://www.sas.com/technologies/analytics/datamining/miner/index.html<br />

176


Citizen Participation in Urban Planning: Looking for the “E”<br />

Dimension in the EU National Systems and Policies<br />

Grazia Concilio 1 and Francesco Molinari 2<br />

1 DiAP-Politecnico di Milano, Italy<br />

2 PARTERRE Project, Italy<br />

grazia.concilio@polimi.it<br />

mail@francescomolinari.it<br />

Abstract: This paper maps the EU27 national urban planning systems according to the provisions for citizens<br />

involvement at various stages of the decision making process. It also analyzes the scope and potential for ICT<br />

implementation in support to public participation as framed within the existing EU and Member State legislative and<br />

regulatory framework. To this end, it briefly overviews a variety of recently established methods and tools in a<br />

number of <strong>European</strong> countries. The common traits and the current gaps of a prospective <strong>European</strong> Union-wide (EU),<br />

Electronic (E), participatory governance model in the domain of spatial planning are introduced and assessed.<br />

Keywords: eParticipation, spatial planning, territorial development, strategic environmental assessment,<br />

participatory governance<br />

1. Background<br />

Empowering citizens and businesses through ICT (Information and Communication Technologies) for an<br />

increased access to public information and stronger involvement in the policy process is one of the four<br />

political priorities of the Malmö Declaration on eGovernment [2009] and the resulting Action Plan<br />

[<strong>European</strong> Commission, 2010b]. The latter borrows from the Digital Agenda for Europe [<strong>European</strong><br />

Commission, 2010] in underlying the capacity of people to have their voice heard and make decisive<br />

suggestions for policy actions as connatural to a new, extended concept of “digital citizenship” in modern<br />

Knowledge and Information Society.<br />

Traditionally, the spatial planning domain has been one of the earliest where the concept itself of public<br />

participation – and its opposites, see [Arnstein, 1969] – was rooted. Thus, it would be (and partly is) quite<br />

normal to find fertile ground here for ICT supported participation (eParticipation) as well. Yet the<br />

<strong>European</strong> scenario, not to speak of the international one [Yeh et al., 2010], is far more complex, and<br />

available evidence less clear-cut. Not only do we record a plethora of one-off experiments, some of which<br />

quite innovative under a purely technical viewpoint (as it is the case, by the way, for the whole electronic<br />

participatory governance model), but mostly unrelated to the underlying normative process and possibly<br />

unaware of each other’s achievements. Also, the majority of these experiences does not seem to grasp<br />

the full potential of ICT for improved transparency and better community engagement in any particular<br />

way.<br />

Does this have to do with the distribution of planning competences across public sector authorities in the<br />

various Member States? As it is well known [Nadin and Stead, 2008], spatial planning remains one of the<br />

very few policy domains in Europe where “diversity” and “self-government” are still more pronounced with<br />

respect to the usual strive for “harmonisation” and “coordination” deriving from the political centre – i.e.<br />

the Union’s institutions. However, there are some good examples of substantial improvement, even in<br />

that very respect: just think of the EU Territorial Agenda [Expert Document, 2003; COPTA, 2008] and the<br />

revised Cohesion Policy [<strong>European</strong> Commission, 2008], or the adoption of the Aarhus [2003/35/EC] and<br />

of the SEA - Strategic Environmental Assessment - [2001/42/EC] Directives, both of which have had<br />

substantial impact on enforcing, enlarging and systematising the available spaces for stakeholder<br />

integration into the design and implementation phases of key plans, programmes and projects for any<br />

urban and rural community in Europe.<br />

This paper aims to shed light on the current situation of participatory planning (whether technology<br />

assisted or not) in the EU27 Member States, assuming a particular, normative perspective: the one of<br />

identifying, and possibly nurturing, the possibility of introducing ICT solutions and tools as a stable<br />

component, not an optional alternative, of the policy making process. This is what has been called<br />

elsewhere [Molinari, 2010] a “sustainable approach” to eParticipation.<br />

The structure of the paper is as follows: Section 2 examines the provisions for public participation<br />

deriving from the Community initiative in the domains of SEA (Strategic Environmental Assessment) and<br />

177


Grazia Concilio and Francesco Molinari<br />

ESDP (<strong>European</strong> Spatial Development Perspective), as well as their historical antecedents. It also maps<br />

the situation at EU27 Member State level as far as the transposition of the ESDP and the participatory<br />

urban planning legislation and practice are concerned. Section 3 discusses the results and Section 4<br />

draws some conclusions and recommendations for future work.<br />

2. <strong>European</strong> state of the art<br />

In 1983, the Council of Europe’s <strong>Conference</strong> of Ministers responsible for Regional Planning (CEMAT)<br />

adopted the <strong>European</strong> Regional Spatial Planning Charter (so-called “Torremolinos Charter”). The Charter<br />

[http://www.coe.int/t/dg4/cultureheritage/heritage/cemat/versioncharte/Charte_bil.pdf] defined the scope<br />

of spatial planning and identified its key objectives and activities, including:<br />

Coordination between different policy sectors,<br />

Coordination and cooperation between the various levels of decision-making, and<br />

The promotion of public participation.<br />

A “participation principle” was stated as follows: “Any regional/spatial planning policy, at whatever level,<br />

must be based on active citizen participation. It is essential that the citizen be informed clearly and in a<br />

comprehensive way at all stages of the planning process and in the framework of institutional structures<br />

and procedures”. Clearly, there was a gap between this broad statement of principle (the promotion of<br />

“active” participation) and the resulting enforcement of citizen’s right to “clear and comprehensive”<br />

information, which is only preliminary to effective involvement in decision making.<br />

Later in 1992, the Agenda 21 Action Plan, adopted by 178 Governments at the United Nations<br />

<strong>Conference</strong> on Environment and Development (UNCED), devoted a whole chapter (#10) to the public’s<br />

participation in the planning and management of land resources. Here the “participation principle” was<br />

reformulated as per the following paragraphs:<br />

5.(d) “Create mechanisms to facilitate the active involvement and participation of all<br />

concerned, particularly communities and people at the local level, in decision-making on<br />

land use and management, by not later than 1996”.<br />

11.(c) “Provide the appropriate technical information necessary for informed decision-making<br />

on land use and management in an accessible form to all sectors of the population,<br />

especially to local communities and women”.<br />

10. “Governments … should establish innovative procedures, programmes, projects and<br />

services that facilitate and encourage the active participation of those affected in the<br />

decision-making and implementation process, especially of groups that have, hitherto, often<br />

been excluded, such as women, youth, indigenous people and their communities and other<br />

local communities”.<br />

Basically the first two paragraphs are simply rephrasing the Torremolinos Charter, so the third one<br />

represent the most important advance – although it shares with the former statements a generic<br />

reference to the nature of these “innovative procedures, programmes, projects and services” that are<br />

required to “facilitate and encourage” participation.<br />

In fact, a wide number of participatory approaches have been implemented to define the specific contents<br />

of Agenda 21 at local level worldwide. In retrospect, the role of ICT has been supportive, but apparently<br />

not decisive in making the difference with more “traditional” community involvement and evaluation<br />

processes [Lombardi et al. 2010].<br />

Another <strong>European</strong>-level instrument to coordinate spatial planning and public participation in policymaking<br />

is the Strategic Environmental Assessment (SEA), which was introduced by the Directive<br />

2001/42/EC of 27 June 2001 – hereinafter the 'SEA Directive'. The SEA is a “systematic process for<br />

evaluating the environmental consequences of proposed policy, plan or programme initiatives, in order to<br />

ensure they are fully included and appropriately addressed at the earliest appropriate stage of decisionmaking,<br />

on par with economic and social considerations” [Sadler and Verheem 1996]. In particular,<br />

Article 6 requires the introduction of public consultations of the citizens and environmental authorities,<br />

which reflect (and in some cases overlap to) the publicity and participation provisions of spatial planning<br />

regulations at Member State level.<br />

178


Grazia Concilio and Francesco Molinari<br />

By 2009, all EU27 Member States had transposed the SEA Directive. Recently, the Environment<br />

Directorate-General of the <strong>European</strong> Commission undertook a study to check the conformity of this<br />

transposition [http://ec.europa.eu/environment/eia/pdf/study0309.pdf], reaching the following results:<br />

A majority of Member States highlighted the contribution of the SEA Directive to an improved<br />

organisation and structure of the whole planning procedure;<br />

In terms of duration of the public consultation, only a few Member States have set fixed time frames.<br />

Most allow for consultations of at least one month, while others decide on a case-by-case basis.<br />

Generally speaking, the requirement of consulting with other competent authorities and the public<br />

have led to increased transparency in the planning and programming procedures;<br />

Experience also shows that public consultation, especially when organised at an early stage of<br />

planning and when understood as a process, contributes to a higher acceptance of the new plan or<br />

programme, and therefore to an early identification and resolution of conflicts.<br />

Since the SEA Directive does not provide detailed specifications about the procedures for public<br />

consultation, a wide range of methods are actually used: public announcements, publication in official<br />

journals or the press, public meetings, internet surveys and questionnaires. To a certain extent, the<br />

transposition process of Directive 2003/35/EC, providing for public participation in respect of the<br />

preparation, modification and review of plans and programmes relating to the environment – hereinafter<br />

the ‘Aarhus Directive' – has contributed to defining the above scenario in the following manner:<br />

Article 2 of the Directive had the effect of firmly establishing the right of the public to participate in the<br />

decision making process on plans and programmes uniformly in the environmental legislation of<br />

Member States, following the provisions of Article 7 of the Aarhus Convention signed on 25 th June<br />

1998;<br />

In particular, the new principle has been introduced that the public must be informed, “whether by<br />

public notices or other appropriate means such as electronic media where available”, about any<br />

proposals for such new plan or programme, “including inter alia information about the right to<br />

participate in decision-making and about the competent authority to which comments or questions<br />

may be submitted”.<br />

By 2009, all Member States had transposed the Aarhus Directive except Ireland. Article 2, however, has<br />

been transposed into all the national legal systems.<br />

In April 2010, the <strong>European</strong> Commission issued another report [COM(2010)143 final] to check the degree<br />

of conformity of the Aarhus Directive transposition and particularly of Article 2, with the following results:<br />

Some Member States, notably France, the Czech Republic and Belgium, have transposed, at least in<br />

part, Article 2 jointly with the adoption of the acts transposing the SEA Directive.<br />

Numerous Member States pointed out that, thanks to the new rules regarding public participation, the<br />

standard of information acquired by the public on environmental issues, including those linked to<br />

plans and programmes, had been raised significantly.<br />

This has kindled the public's interest in environmental issues, as well as the sensitivity of officials<br />

responsible for drafting plans and programmes, and of the political authorities responsible for<br />

adopting them with respect to the need to seek the public's opinion before approving them.<br />

“Greater effort might, however, prove necessary on the part of local authorities”, the report<br />

concludes.<br />

The <strong>European</strong> Spatial Development Perspective (ESDP) was approved in Potsdam by the Informal<br />

Council of EU Ministers of Spatial Planning in May 1999. It is a (legally non-binding) policy framework<br />

presenting action items for all tiers of administration with a planning responsibility. Its strategic aim is to<br />

achieve a balanced and sustainable spatial development across the EU, via a “<strong>European</strong>isation of state,<br />

regional, and urban planning”.<br />

Increased public participation is seen as an integral part of a well co-ordinated spatial development policy<br />

across the various administrative levels of a single Member State, among the different Member States by<br />

transnational cooperation, and within the EC Directorates involved. At national level, it is proposed that<br />

the Member States should take more account of the <strong>European</strong> dimension of spatial planning in their<br />

national policies and inform the public about <strong>European</strong> cooperation on spatial development. Moreover,<br />

cooperation and collaboration should involve, with a more prominent role than in the past, the lower tiers<br />

179


Grazia Concilio and Francesco Molinari<br />

of public administration (such as cities and regions) and the private sector as part of an extended<br />

governance system, in accordance with the principle of subsidiarity:<br />

(par. 7) “<strong>European</strong> integration could benefit spatial development by encouraging the<br />

participation of cities and regions”.<br />

(par. 21) “The ESDP conveys a vision of the future territory of the EU. In its aims and<br />

guidelines it provides a general source of reference for actions with a spatial impact, taken<br />

by public and private decision-makers. Beyond that, it should act as a positive signal for<br />

broad public participation in the political debate on decisions at <strong>European</strong> level and their<br />

impact on cities and regions in the EU”.<br />

(par. 100) “Many local problems cannot be solved nowadays without an integrated way of<br />

looking at towns and countryside, since they tend to be regional problems. Practical<br />

partnership expresses itself through co-operation and co-ordination. However, in order for<br />

co-operation to grow into a long-term successful partnership, several preconditions have to<br />

be created:<br />

The equality and independence of the partners;<br />

Voluntary participation in partnership;<br />

Consideration of different administrative conditions; and<br />

Common responsibility and common benefit”.<br />

(par. 164) “The successful development of a <strong>European</strong> … network depends on a spatially<br />

co-ordinated approach between different Community policies and on corresponding national<br />

measures. (…) The relationships between the elements of this network (…) must be<br />

identified and co-ordinated at a <strong>European</strong> level with the active participation of the local and<br />

regional levels”.<br />

(par. 186) “A number of Member States have institutionalised consultation processes on<br />

matters concerning spatial development. For development projects with a considerable<br />

spatial impact, some carry out territorial impact assessments. This is aimed at increasing the<br />

positive effects of investments on spatial development at an early stage through the<br />

participation of those affected”.<br />

(par. 316) “A well co-ordinated spatial development policy across the various administrative<br />

levels, including participation of the public, can assist…”<br />

In spite of all these references to public participation, no statement of principles is made (at least<br />

indirectly) and the ICT potential in support of electronic governance is not even mentioned.<br />

As there was no Community legal basis for ESDP, the policy debate on how to best ensure its<br />

implementation has continued over the years, leading to the formulation of a Territorial Agenda for the<br />

<strong>European</strong> Union, which was approved by the Informal Council of Ministers of Spatial Planning and<br />

Development in Leipzig in May 2007. The Agenda generically outlines the need for social dialogue and<br />

cooperation between stakeholders to reach the integration of the territorial dimension into national and<br />

EU policies, but once again, it falls short of highlighting the need for ICT take-up to ensure better<br />

participation.<br />

It is planned that the coming Hungarian EU Presidency will evaluate and review the Territorial Agenda in<br />

the first half of 2011. On that occasion, we would recommend:<br />

Generalising the “right to information” principle included in Article 2 of the Aarhus Directive (Directive<br />

2003/35/EC), so that electronic media become the “standard means of publicity” for any new plan or<br />

programme, including those concerning spatial development;<br />

Introducing the new principle that “electronic participation, where available” should integrate the<br />

technical means to involve citizens and stakeholders in thematic consultations and decision-making<br />

sessions.<br />

There is ample rationale for expanding these principles: everywhere, spatial planning decisions have<br />

such a wide and direct impact that the opportunities to participate in those decisions should be extended<br />

beyond the normal democratic process. Effective procedures for community involvement may enhance<br />

the legitimacy of policy- and decision-making by creating a sense of local ownership and ensuring<br />

appropriate consideration of citizens’ and property owners’ rights. A transparent decision-making process<br />

180


Grazia Concilio and Francesco Molinari<br />

implies that all citizens should made aware of the reasoning behind spatial planning decisions. ICT<br />

should be widely adopted to make sure that – without much pressure on financial and organisational<br />

costs for the competent authorities:<br />

Citizens get full access to information about development proposals, plans and policies,<br />

They are enabled to comment on proposals and if necessary, to make formal objections on draft<br />

plans<br />

They can easily communicate to the officers and political committees in charge for the process<br />

Those making proposals are enabled to appeal to a higher authority on negative or unfavourable<br />

decisions.<br />

2.1 National urban planning systems<br />

According to the EU Treaty, spatial planning is not the responsibility of the Community; this in spite of the<br />

paramount importance of the spatial planning aspects of EU and national policies, because:<br />

All political decisions are implemented in a given territory<br />

For the public opinion, the territory and its development are “vectors of coherence” for the Community<br />

policies.<br />

Land use planning is normally based on framework and regulatory instruments, the latter under the legal<br />

competence of the Municipality, while the former may belong to the State (in the relatively smaller<br />

countries), or to the Regional and/or Metropolitan tier of public administration (in the majority of EU27<br />

countries). Framework plans cover important parts of the national territory (if not the whole of it) and<br />

introduce general land use principles and infrastructure patterns through zoning criteria and land<br />

allocation maps. Regulatory plans provide detailed and site-specific indications like zonings for building,<br />

land use, and infrastructure.<br />

As the following picture shows, two main trends are characterising the EU27 Member State scenario:<br />

Devolution of planning power from the State to the “2 nd tier” (Regions and Counties or Districts),<br />

particularly as far as the framework instruments are concerned;<br />

Devolution of regulatory autonomy from the Regional/County/District level to the “1 st tier” (City and<br />

Municipality) level, in compliance with the framework instruments established.<br />

Figure 1: Devolution of spatial planning power – major trends<br />

181


Grazia Concilio and Francesco Molinari<br />

As a result of these trends, we can identify a first group of EU27 countries (such as Bulgaria, Cyprus,<br />

Czech Republic, Greece, Luxembourg, Malta, Portugal and Romania, the three areas depicted in light<br />

blue in the diagram), where the role of the central government is still predominant, and a second group of<br />

Member States, typically rather small in terms of population (such as Denmark, Estonia, Latvia,<br />

Lithuania, Slovakia and Slovenia), which have transitioned to a more uniform balance of power and<br />

competences.<br />

The remaining Member States can be clustered into three additional groups of almost the same<br />

numerical size:<br />

Countries where the devolution of power to local government is not associated with a strong role of<br />

the Regional level compared to the State – i.e. Finland, Hungary, Ireland, Sweden and the United<br />

Kingdom (depicted in pink colour);<br />

Countries where this devolution has progressed on par with the enhancement of the Regional<br />

government role in the planning system – i.e. France, Italy, and Netherlands (depicted in green);<br />

Countries where the devolution to Regions has not been associated with a stronger local autonomy –<br />

i.e. Austria, Belgium, Germany, Poland, and Spain (depicted in yellow).<br />

2.2 Participative planning practices<br />

Citizen engagement in planning decision-making is widely investigated in its current developments. Yet,<br />

academic research falls short of a comparative assessment of state of the art experiences and best<br />

practice at national level in Europe, particularly of identifying the government “tiers” holding the legal<br />

competence to act. Recently, the <strong>European</strong> Institute of Public Participation published a state of the art<br />

report [EIPP, 2009] referring to a wide range of policies, including the spatial planning domain, in three<br />

<strong>European</strong> countries (Germany, Italy and the UK). Among its conclusions is that “most public participation<br />

takes place at local and regional level” [EIPP, 2009: 40]. This is of no surprise, given the better proximity<br />

of this level to citizens and the significant devolution trends described in the previous section. At local<br />

level, many experiments of eParticipation in spatial planning have also been carried out [for a review see<br />

Kubicek, 2010] and others are being developed at present [see for example<br />

http://engagingcities.com/tagged/Project]. Support by electronic means looks promising to reduce the<br />

limits to participation [Innes and Boher, 2000; Coekoek et al., 2009; Brabham, 2009; EvansCowley and<br />

Hollander, 2010]. However, the use of ICT is often limited to rudimentary shifts of spatial planning<br />

settings into web-based environments, with reduced opportunities for process innovation. Most cases<br />

depend on the planners’ individual initiative and are therefore constrained by the planners’ ability to<br />

conceptualize the role of technologies with respect to participation.<br />

According to [Brabham, 2009: 2], “an embrace of technological solutions is needed. The medium of the<br />

Web enables us to harness collective intellect among a population in ways face-to-face planning<br />

meetings cannot. As open source production on the Web has proven itself as a collaborative method for<br />

designing superior software products, the crowdsourcing model may prove itself as a superior method for<br />

designing real spaces, planning the built environment.(...) The crowdsourcing model, a successful, Webbased,<br />

distributed problem solving and production model for business, is an appropriate model for<br />

enabling the citizen participation process in public planning projects”.<br />

3. Discussion<br />

The modes in which participation outputs are integrated into the plans are varying, in dependence of:<br />

The stage of planning process where participation is activated: it is widely shared that participation in<br />

spatial planning should have the purpose to develop a plan collaboratively and not to look for public<br />

consensus when the plan is already completed; even when purposes are high and intentions good,<br />

the integration is a really complex task;<br />

The real commitment of politicians and authorities and the related political mandate: participation is<br />

often a cosmetic stratagem of political actions, it adds an useful adjective to it thus enlarging the gap<br />

between citizens and administrators, reducing the will to participate and the trust towards institutions;<br />

The modes knowledge is managed and translated into planning action: knowledge is embedded in<br />

action, not revealed outside of action; it cannot be acquired, moved into and used in the planning<br />

action [Concilio, 2010]; rather it is planning that needs to enter the social space where (collective,<br />

collaborative, individual) knowledge is active within the public action;<br />

182


Grazia Concilio and Francesco Molinari<br />

The ability of participation managers to enable public capacity to negotiate their interests within a<br />

public discussion;<br />

The way participation is considered and regulated in the spatial planning normative environment (see<br />

previous sections);<br />

The structure and form of a plan: differently characterized by frameworks that vary across national,<br />

regional and local regulation systems, plans share a significant commonality, i.e. they have the form<br />

of “end products” that are not prone, in the way they are conceptualized, to be managed as “open<br />

products”. <strong>Academic</strong>s being aware of these intrinsic limits have transferred their attention from the<br />

plan (as product of plan making) towards the plan making process itself [Tewdwr-Jones, 2002; Hillier,<br />

2007; Albrechts, 2010b].<br />

Although participation in spatial planning is growing in importance as well as the acknowledgement of<br />

ICT potential, evidence shows persistent barriers [Brownill and Carpenter, 2007] that are basically the<br />

same all over Europe, if we control for national differences in democratic cultures and traditions<br />

[Wassenhoven, 2008].<br />

As early as in 2002, a survey of academics and practitioners within a Delphi framework [Albrechts, 2002]<br />

identified three main issues: 1) providing access to citizens and stakeholder groups to spatial planning<br />

settings; 2) adequate capacity building of citizens and public sector officials; and 3) how to ensure and<br />

visibly demonstrate real impact on decision making and outcomes.<br />

Concerning the first issue, structural, cultural and governance style barriers appear the most relevant<br />

obstacles to effective participation. Transversal to these barriers is the complexity of the planning task -<br />

especially when related to the larger geographical scale of individual plans. This in turn derives from the<br />

fragile attitude of non-experts to make their knowledge of large-scale spatial dynamics explicit and<br />

operational for plan making purposes. Non-expert knowledge is specifically linked to the micro-level: nonexperts<br />

are hardly aware of the interdependency of their experience with large-scale phenomena and the<br />

operational use of this knowledge into the plans is very difficult. This distance is particularly evident when<br />

dealing with participation of the weakest social groups: the problems discussed are far from their daily life<br />

and it is not clear enough how the decisions to be made will directly affect them [Piffero, 2009; Bauer et<br />

al., 2010; Monno, 2010].<br />

Related to the second issue, lack of experience in participation, in some cases this is mirrored by the<br />

inadequacy of rule settings, participatory protocols, and environments, which limits the collective capacity<br />

towards participation. Inadequacy has effect on both the public (citizens do not participate even when<br />

they are given the opportunity) and the planners or policy makers side (participation is not well prepared<br />

in advance, there are no codified procedures and its outcomes are inconclusive). Likewise, experience is<br />

very small in the use of eParticipation tools and methods in spatial planning, particularly considering the<br />

dynamics related to the explosion in the number of participants provoked by social networks and the<br />

small effectiveness these “wise crowds” seem to have in producing actual results [EvansCowley and<br />

Hollander, 2010].<br />

However, most crucial is certainly the third issue, represented by the need to guarantee participants that<br />

their views and interests will actually have an impact on policy making and related actions and decisions.<br />

This is generally true in a public policy domain [Friedmann, 1987], yet it is an extraordinary critical issue<br />

in spatial planning, which is strongly rooted in the political agenda of regional and local administrations<br />

and therefore under the risk of power groups’ influence and deviation. As the EIPP report puts it, “a core<br />

challenge for all public participation processes is the way the outcomes are fed into the decision making<br />

process; in order to increase the chance of public participation being successful, arrangements ought to<br />

be made in all countries to link public participation formally to the heart of decision making” [EIPP, 2009:<br />

40]. We agree with the conclusions of the Delphi survey of academics and practitioners according to<br />

whom “a legal guarantee is impossible” [Albrechts, 2002: 340). Yet, there actually are advantages from<br />

citizen involvement in spatial planning. According to Innes and Booher (2004), most justifications for<br />

public participation in planning decision-making are covered by five purposes:<br />

Public participation advances fairness and justice;<br />

Public participation helps ensure legitimacy for public decisions;<br />

Through participation, decision-makers can find out what the public’s preferences are and take<br />

Account of them in their decisions;<br />

183


Grazia Concilio and Francesco Molinari<br />

Decisions can be improved by incorporating citizens’ local knowledge;<br />

Participation is offered by planners and public officials because the law requires it.<br />

Apart from law requirements, we can split up these advantages in two groups:<br />

Reputation gains, as well as compliance with broader improvement and accountability goals for the<br />

government agency involved;<br />

Content related gains, which can be availed of either before or during the decision-making process<br />

(or in both stages of course).<br />

Grasping these benefits requires rethinking of spatial planning in several ways. The one that is most<br />

relevant to our discussion is to overcome the simplistic dichotomy of participation as something parallel<br />

or added on to the planning process [Funtowicz and Ravetz, 1993; Cerreta et al., 2010]. A second way is<br />

to reconceptualise the plan and make it a product of collective intellectual effort [Celino and Concilio,<br />

2006; Brabham, 2009]. Finally the planning process itself should fully open up to the potential of ICT,<br />

which are deeply restructuring the governance concepts, frameworks and dynamics.<br />

4. Conclusions and recommendations<br />

To sum up, existing evidence on EU27 spatial planning systems and policies displays a fair degree of<br />

complexity, a few commonalities across countries, and a considerable (context-related) variation in the<br />

provisions for public consultation and citizens involvement, both horizontally (= between) and vertically (=<br />

within) Member States. Cultures and traditions affect conceptualizations of participatory decision making;<br />

legal and social infrastructures determine different degrees of readiness of citizens and institutions<br />

towards public involvement; planning systems at different scales affect the way planners interpret their<br />

roles and related practices.<br />

Public participation has been a feature of the planning process for over 30 years during which many<br />

attempts have been made to improve access to citizens. Still spatial planning practices show inexorable<br />

barriers to participation, which have different causes. In spite of the wide development of ICT, there still is<br />

very limited usage of these in the context of participatory planning and programming processes.<br />

Practitioners act as if the demonstration of utility (= efficiency, effectiveness, quality of results) of ICT<br />

implementation into participatory spatial planning were required every time and on a case-to-case basis.<br />

In this scenario, it remains hard to disentangle how big the impact of Community policy has been on the<br />

creation and enlargement of “mandatory spaces” for civic engagement in the spatial planning process –<br />

not to speak of electronically enhanced participation.<br />

Lessons learnt are threefold:<br />

Evidence gathered shows a significant plurality and diversity of participative planning practices. This<br />

is mainly explained as a result of the growing and crucial need of planners to reinterpret wellestablished<br />

communication frameworks out of institutional protocols and to develop new ones that<br />

are better rooted in the dynamic contexts of the planning process. Consequently the use of ICT is still<br />

very differentiated and almost exclusively depending on planners’ personal visions and skills.<br />

The full potential of ICT is far from being grasped at the moment. ICT usage is currently limited to<br />

rudimentary protocols of the planning process and focused on the migration of selected stages of the<br />

process from off- to on- line environments. The majority of adopted systems merely mirror the<br />

traditional modes and tracks of citizen and stakeholder interaction with local planning agencies.<br />

There is significant room for <strong>European</strong> policy making here. Many electronic services already<br />

available in this domain are not scaling up at EU level (also) because of the different weight assigned<br />

to the “e” dimension in participation by the national urban planning systems. Based on the good<br />

progress made in the Aarhus and SEA directive implementation, additional efforts should be<br />

envisaged by the Commission and Member States towards the creation of electronically enhanced<br />

governance models for spatial planning and territorial development related issues.<br />

References<br />

Albrecths, L. (2010) “Strategic Planning and Regional Governance in Europe: Recent Trends and Policy Responses”.<br />

In: Yeh, J., Yeh, A.G.O. and Xu, J. (Eds.) Governance and Planning of Mega-City Regions: An International<br />

Comparative Perspective. Taylor and Francis group, pp. 75-97.<br />

Albrechts, L. (2010b) “More of the same is not enough! How could strategic spatial planning be instrumental in<br />

dealing with the challenges ahead?” In: Environment and Planning B, 37, pp. 1115-1127.<br />

184


Grazia Concilio and Francesco Molinari<br />

Albrechts, L. (2002) “The planning community reflects on enhancing public involvement. Views from academics and<br />

reflective practitioners”. In: Planning Theory and Practices, 3(3), pp. 331-347.<br />

Arnstein S. (1969): “A Ladder of Citizen Participation”. In: Journal of the American Institute of Planners, July Issue.<br />

Baker Associates and O’Rourke, T. (2008) Participation and policy integration in spatial planning. Spatial plans in<br />

practice: supporting the reform of local planning. Communities and Local Government, London. Retrieved<br />

online (January 2011) from:<br />

http://www.communities.gov.uk/documents/planningandbuilding/pdf/participationintegrationspat.pdf<br />

Bauer, V.E., Abma, T.A., and Widdershoven, A.M. (2010) Participation of marginalized groups in evaluation: Mission<br />

impossible? In: Evaluation and Program Planning, 33(3), pp. 238-245.<br />

Brabham, D.C. (2009) “Crowdsourcing the public participation process for planning project”. In: Planning theory 8(3),<br />

pp. 242-262.<br />

Celino A., and Concilio G. (2006) “Managing open contents for collaborative deliberation in environmental planning”<br />

in F. Malpica, A. Oropeza, J. Carrasquero, and P. Howell (Eds.) Proceedings of PISTA 2006. The 4th<br />

International <strong>Conference</strong> on Politics and Information Systems: Technologies and Applications, International<br />

Institute of Informatics and Systemics, July, Orlando, pp. 155-160.<br />

Cerreta M., Concilio G., Monno V. (Eds.) Making strategies in spatial planning. Knowledge and values. Springer.<br />

Concilio, G. (2010) “Bricolaging knowledge and practices in spatial strategy-making”. In: Cerreta, M., Concilio, G.,<br />

Monno V. (Eds.) Making strategies in spatial planning. Knowledge and values. Springer, pp. 281-302.<br />

COPTA (2008) The “Cooperation for Territorial Cohesion of Europe” portal. http://www.eu-territorialagenda.eu/Pages/Default.aspx<br />

Davies, H.W.E., Edwards, D., Hooper, A.J., and Punter, J.V. (1989) “Comparative Study”. In: Davies, H.W.E. (Ed.)<br />

Planning Control in Western Europe. London: HMSO, pp. 409–442.<br />

EIPP (2009) Public participation in Europe. An international perspective. Report of the <strong>European</strong> Institute for Public<br />

Participation. Retrieved online (January 2011) from: http://www.participationinstitute.org/wpcontent/uploads/2009/06/pp_in_e_report_03_06.pdf<br />

<strong>European</strong> Commission (2010). A Digital Agenda for Europe. COM(2010) 245 final.<br />

http://ec.europa.eu/information_society/digital-agenda/index_en.htm<br />

<strong>European</strong> Commission (2010b) The <strong>European</strong> eGovernment Action Plan 2011-2015. Harnessing ICT to promote<br />

smart, sustainable & innovative Government. COM(2010) 743. Retrieved December 15, 2010 from<br />

http://ec.europa.eu/information_society/activities/egovernment/action_plan_2011_2015/docs/action_plan_en_a<br />

ct_part1_v2.pdf<br />

<strong>European</strong> Commission (2008) Green Paper on Territorial Cohesion. Turning territorial diversity into strength.<br />

Brussels, 6.10.2008 - COM(2008) 616 final<br />

<strong>European</strong> Commission (1997) The EU Compendium of Spatial Planning Systems and Policies. Regional<br />

Development Studies. Luxembourg: Office for Official Publications of the <strong>European</strong> Communities.<br />

EvansCowley, J., and Hollander, J. (2010) “The new generation of public participation: internet-based participation<br />

tools”. In: Planning practice and research, 25(3), pp. 397-408.<br />

Expert Document (2003) “Managing the Territorial Dimension of EU Policies after Enlargement”. Retrieved online<br />

(30.12.2010) from http://ec.europa.eu/regional_policy/debate/document/futur/member/esdp.pdf<br />

Farinós Dasi, J. (Ed.) (2007) Governance of Territorial and Urban Policies from EU to Local Level. Final Report of<br />

ESPON Project 2.3.2. Esch-sur-Alzette: ESPON Coordination Unit.<br />

Friedmann, J. (1987) Planning in the public domain: from knowledge to action, Princeton University Press, Princeton,<br />

N.J.<br />

Funtowicz, S., and Ravetz, J. (1993) "Science for the Post-Normal Age". In: Futures 25(7), pp. 739-755.<br />

Hillier, J. (2007) Stretching Beyond the Horizon. A Multiplanar Theory of Spatial Planning and Governance, Ashgate,<br />

Aldershot.<br />

Innes, J.E., and Booher, D. E. (2004) “Reframing Public Participation: Strategies for the 21 st Century”. In: Planning<br />

Theory & Practice, Vol. 5, No. 4, December, 419-436.<br />

Innes J.E., and Booher, D.E. (2000) Public Participation in Planning: New Strategies for the 21st Century. URD<br />

Working Paper Series, Institute of Urban and Regional Development, UC Berkeley. Retrieved online (January<br />

2011) from: http://escholarship.org/uc/item/3r34r38h<br />

Jackson, J.B. (2010) “Cohering the spatial and strategic planning in the Czech Republic”. In: Proceedings of the<br />

REAL CORP <strong>Conference</strong>, Vienna 18-20 May, pp. 1041-1046.<br />

Janin Rivolin, U. (2004) <strong>European</strong> spatial planning. La governance territoriale comunitaria e le innovazioni<br />

dell'urbanistica. Franco Angeli<br />

Kingston, R. (2007) “Public Participation in Local Policy Decision-making: The Role of Web-based Mapping’”. In: The<br />

Cartographic Journal, 44(2), pp. 138-44.<br />

Koekoek A., Lammeren, van R.J.A. Vonk G.A. (2009) “The potential of integrating E-participation in planning support<br />

systems”. In: URISA Journal, 21(2), pp. 39-47.<br />

Kubicek H. (2010) “The Potential of E-Participation in Urban Planning: A <strong>European</strong> Perspective”. In: Carlos Nunes<br />

Silva (Ed.) Handbook of Research on E-Planning: ICTs for Urban Development and Monitoring, IGI global, pp.<br />

168-194.<br />

Lombardi, P., Huovila, P., and Sunikka-Blank, M. (2010) “The Potential of E-Participation in Sustainable<br />

Development Evaluation: Evidence from Case Studies”. In: Reddick C.G. (Ed.) Politics, Democracy and E-<br />

Government: Participation and Service Delivery. IGI Book Publishing Co. DOI: 10.4018/978-1-61520-933-0<br />

“Malmö Declaration on eGovernment” (2009). Retrieved online (September 2010) from http://www.egov2009.se/wpcontent/uploads/Ministerial-Declaration-on-eGovernment.pdf<br />

185


Grazia Concilio and Francesco Molinari<br />

Molinari, F. (2010) “On Sustainable eParticipation”. In: Proceedings of the IFIP ePart2010 <strong>Conference</strong>, Lausanne<br />

(Switzerland).<br />

Monno, V. (2010) “When strategy meets democracy: exploring the limits of the ‘possible’ and the values of the<br />

‘impossible’”. In: Cerreta M., Concilio G., Monno V. (Eds.) Making strategies in spatial planning. Knowledge and<br />

values. Springer, pp. 161-184.<br />

Nadin, V., and Stead, D. (2008) “<strong>European</strong> Spatial Planning Systems, Social Models and Learning”. In: The Planning<br />

Review 44 (1), pp. 35-47.<br />

Newman, P., and Thornley, A. (1996) Urban Planning in Europe: International Competition, National Systems, and<br />

Planning Projects. London: Routledge<br />

Piffero, E. (2009) What happened to participation? Urban development and authoritarian upgrading in Cairo’s<br />

informal neighborhood. Emil di Odoya Ed., Bologna.<br />

Sadler, B., and Verheem, R. (1996) Strategic Environmental Assessment: Status, Challenges and Future Directions,<br />

Report 53, Ministry of Housing, Spatial Planning and the Environment, The Hague, Netherlands.<br />

Tewdwr-Jones, M. (2002) The Planning Polity: Planning, Government and the Policy Process. Routledge, London.<br />

Wassenhoven, L. (2008) “Territorial Governance, Participation, Cooperation and Partnership: A Matter of National<br />

Culture?”. In: Boletín de la A.G.E. (46), pp. 357-362.<br />

Yeh, J., Yeh, A.G.O. and Xu, J. (2010) Governance and Planning of Mega-City Regions: An International<br />

Comparative Perspective. Taylor and Francis group<br />

186


Social Media and Local Government in England: Who is<br />

Doing What?<br />

Martin De Saulles<br />

University of Brighton, UK<br />

mdesaulles@gmail.com<br />

Abstract: This paper presents research on the use of social media by English local authorities. It presents<br />

quantitative data on the extent to which unitary authorities in England use social networking services such as<br />

Facebook, Twitter and YouTube to communicate with interested parties. A more qualitative analysis is carried out on<br />

a sample of the bodies in terms of the types of information they are pushing out through these services. The research<br />

presented in this paper shows a considerable range in the usage of social media by these bodies and raises<br />

interesting questions about why this might be the case. The paper provides some tentative answers to these<br />

questions and offers practical advice to local authorities wanting to better understand this area and how it might help<br />

them in their relations with the communities they serve.<br />

Keywords: social media, local government, eGovernment, web 2.0<br />

1. Introduction<br />

1.1 English local government<br />

The structure of local government in England is relatively complex with several tiers of bodies each with<br />

varying levels of authority. It is worth noting that the system in England differs to that found in Scotland,<br />

Wales and Northern Ireland. At the highest level in England there are 9 regional bodies which vary in<br />

authority from the London Assembly that has elected members and a Mayor to less powerful bodies that<br />

do not elect members and are more concerned with regional development issues. Below these 9 regional<br />

authorities are the county and then district level bodies which comprise 369 councils varying in size from<br />

the 6 large metropolitan counties down to far smaller district councils. This paper focuses on the 55<br />

unitary authorities that cut across county and district level bodies and range in size from 39,000<br />

constituents to over 500,000, representing over 12 million citizens in total. Most of these 55 bodies were<br />

established from the 1990s onwards and have responsibilities ranging from education and housing to<br />

transport, waste collection, leisure, recreation and libraries. Significantly, they also have revenue<br />

collection powers via the system of council tax. These wide-ranging responsibilities and fiscal duties give<br />

unitary authorities a high public profile, particularly in the current climate of budget cuts from central<br />

government. Many of the austerity measures being implemented by the current British coalition<br />

government will be most visible at the local level as libraries and leisure facilities are cut back and, in<br />

some instances, closed. Elected leaders of the unitary authorities and other local bodies will be under<br />

increasing pressure to explain to their constituents why the cuts are being made and what measures are<br />

being adopted to minimise their impact on front-line services. It is within this context of budgetary<br />

pressures and the increasing expectation by citizens of more transparent public bodies that the research<br />

described in this paper has been undertaken. Social media offers organisations of all types cost effective<br />

channels to communicate with individuals in a more interactive way than has been possible with more<br />

traditional media.<br />

1.2 The state of social media<br />

The term social media refers to a range of web-based services which emerged out of the second wave of<br />

internet innovation, often referred to as Web 2.0. According to Kaplan and Haenlein (2010):<br />

“Social Media is a group of Internet-based applications that build on the ideological and<br />

technological foundations of Web 2.0, and that allow the creation and exchange of User<br />

Generated Content.” (page 61)<br />

They use the term, User Generated Content (UGC) to describe one of the key differences of social media<br />

and Web 2.0 services from the first generation of internet services. The first wave of internet services<br />

were less dynamic and often resembled traditional media in that information was broadcast out via<br />

websites from centralised producers of content. Following the dotcom bust of the early 2000s, a new<br />

wave of web services emerged that offered far more interaction with users and, in many cases, relied on<br />

their users to generate much of their content. A good example of this is YouTube that hosts hundreds of<br />

millions of videos, many of them uploaded by individuals. Facebook also relies on UGC as it offers a<br />

platform for individuals and organisations to communicate and share information. Without the content that<br />

187


Martin De Saulles<br />

is uploaded by users, Facebook, YouTube, Twitter, MySpace and other social media services would not<br />

exist. It is the rapid growth of many of these services and their daily use by hundreds of millions of people<br />

across the world that has attracted the interest of organisations, public and private. Communicating with<br />

large numbers of people, whether for public service or commercial marketing reasons, has traditionally<br />

been an expensive and often inefficient process. Printing and sending out leaflets and brochures,<br />

advertising across traditional media or conducting telephone marketing campaigns is costly in time and<br />

money and beyond the budgets of many organisations. The internet and, more specifically, social media<br />

offer a chance to bypass the old media gatekeepers and to communicate directly with customers, voters<br />

or any other social media users at no or extremely low cost. Mui and Whoriskey (2011) point out that<br />

Facebook in mid-2010 had over 500 million active users, a number that had doubled in less than 2 years.<br />

For many people now, Facebook and other social media sites provide their primary interaction with the<br />

internet and are increasingly attracting public organisations, including local government bodies. Of<br />

course, the dynamic and rapidly changing nature of the internet means that services such as Facebook<br />

and YouTube come and go and organisations can be swept up in the general enthusiasm to have a<br />

presence on these sites. However, the extent to which the internet and certain social media services are<br />

now a part of many people’s lives is a sign that they or whatever new services replace them are<br />

significant channels for communication. Gibson (2010) argues, in the context of local government and<br />

social media, that:<br />

“...not engaging now represents a far greater risk than engaging. Citizens will still use these<br />

networks to talk about you, whether you add your voice to the conversation or not....The<br />

challenge for all councils now is to move social media off their list of challenges, and on to<br />

their list of opportunities.” (Page 5)<br />

While Gibson has practical experience in the use of social media to promote causes and organisational<br />

objectives and is broadly enthusiastic about its potential for enhancing democracy, it is important to<br />

beware of adopting a technologically deterministic approach to studies of social media use and impact.<br />

Technologies can be transformative but organisational changes are usually achieved in conjunction with<br />

other factors whether social, political or economic. Bertot et al. (2010) point out that the use of social<br />

media tools by government bodies can help increase transparency but the political will for change needs<br />

to exist first and that the technology comes second to aid the process.<br />

2. The study<br />

A key objective of the research described here was to measure the extent to which the 55 unitary<br />

authorities in England use social media in their external communications. The methodology adopted was<br />

a detailed analysis of the websites of these bodies to determine what social media profiles they linked to<br />

and the level of engagement with these services. This analysis was carried out on the 26 October 2010.<br />

Engagement with any social media services were looked for during the data gathering stage and, after<br />

examining all 55 websites, the following social media services were found to be used: Facebook, Twitter,<br />

YouTube and Flickr as well as the syndication technology RSS for updating users of new content being<br />

posted to the websites. The level of activity by the authorities on each of these services, where they were<br />

being used, was then measured to determine how engaged they were. These measures took the form of<br />

the number of tweets on Twitter, regularity of posting, number of videos uploaded to YouTube and<br />

number of views, number of photographs posted to Flickr and number of “likes” and members of<br />

Facebook pages and groups. A score was allocated to each authority based on whether they used any of<br />

the 5 social media services listed above. Giving a point for each service used, Figure 1 summarises the<br />

distribution of points awarded.<br />

As Figure 1 shows, only one unitary authority was found to be using all 5 of the social media services<br />

while 17 were not using any. Twitter was the most popular service with 27 authorities using the<br />

microblogging service followed by RSS (20 authorities), Facebook (16 authorities), YouTube (8<br />

authorities), Flickr (8 authorities). A statistical analysis was carried out to look for correlations between<br />

the size of authorities, in terms of both the geographical areas covered and populations served, and their<br />

social media usage but no statistically significant correlations could be found. The 23 authorities that<br />

scored 2 points or more in their aggregate social media usage score are shown in Figure 2.<br />

The ways in which the authorities use social media varies quite significantly but a common theme seems<br />

to be using these channels to make announcements relevant to their constituents. The most active<br />

council in this space, Darlington (www.darlington.gov.uk), uses Facebook and Twitter to post<br />

announcements about council meetings, news-worthy stories about local schools and council initiatives<br />

as well as job postings for the bodies they are responsible for. The local nature of these postings means<br />

188


Martin De Saulles<br />

their appeal is limited primarily to local people but for this group their relevance is significant. In terms of<br />

multimedia, Darlington uses YouTube to post public information videos it has been involved in producing<br />

while it uses the image sharing site, Flickr, for sharing photographs of local events as well as the entries<br />

to local photography competitions.<br />

Figure 1: Aggregate social media scores<br />

Figure 2: Most active social media users<br />

One of the issues that many organisations face when starting to use social media to communicate with<br />

stakeholders is being able to sustain the maintenance of their online presence. Opening a Twitter or<br />

Facebook account only takes minutes but creating a successful and thriving profile requires steady and<br />

sustained input from those responsible. A Facebook or Twitter page that has not been updated in weeks<br />

or even days may be worse, in terms of public perceptions, than not having a social media presence at<br />

all. This is particularly true with Twitter that is used by many people as a notification service. Unlike a blog<br />

where visitors may spend the time reading archived posts, Twitter posts which are more than a day or<br />

two old are seldom looked at. The frequency of posting to Twitter was considered in the analysis of<br />

unitary authority social media usage by looking at the number of tweets posted in the previous 7 days.<br />

The average was 13 tweets but the range went from 0 to 69. This wide variance may be an indication of<br />

the novelty of such a service with authorities still experimenting in terms of optimal activity. Of the 8<br />

189


Martin De Saulles<br />

authorities with their own YouTube channels there was also a considerable range in the extent to which<br />

they posted videos as well as the number of viewers for their videos. One council’s YouTube channel had<br />

received over 126,000 views while another had only 300. These variances are partly explained by the<br />

length of time the council had been on YouTube but the frequency of updates and how the main council<br />

webpage promoted the channel also seemed to play a part. A closer look at the content of the videos<br />

posted to YouTube by the councils offers the greatest clue to the popularity of their channels. The<br />

YouTube channel with the lowest number of views was dominated by relatively dry interviews with<br />

councillors while the channels with significantly higher views had a broader range of videos that looked at<br />

council activities such as library and welfare services. While 20 authorities offered RSS feeds of updates<br />

to the content posted to their websites, the visibility and utility of these feeds varied. Cheshire West and<br />

Chester’s website, for example, offered 4 clearly marked RSS feeds covering news, events, its Twitter<br />

posts as well as one for information about its cold weather initiatives such as road gritting. Other councils<br />

offered RSS feeds for job vacancies, press releases and road works updates. Most of the councils that<br />

provided RSS feeds also had a webpage explaining what the technology was and how people could use<br />

the feeds as well as, in some instances, providing links to RSS feed readers.<br />

3. Benefits of social media to local government<br />

By its nature, much of the content uploaded to social media sites is of limited utility and appeal to most<br />

people. The conversations and images that are shared are often very personal in nature and not intended<br />

to viewed or read by users outside the social circles of the people that posted them. However,<br />

organisations are beginning to realise that the amount of time many people spend on these networks and<br />

their wide reach offer opportunities for communication and sharing information that can be of mutual<br />

benefit to all (Agichtein et al. 2008, Qualman 2010, Scott 2010, Weber 2007). Large corporations such as<br />

Starbucks, Coke and Nike have created and developed large online communities around their brands<br />

and, to varying degrees, been successful in building customer loyalty through engaging in conversations<br />

with those purchasing their products. However, the potential of social media to directly connect with<br />

customers can also be a double-edged sword. Kiley (2009) describes the marketing challenge for<br />

Dominoes Pizza in the United States when 2 employees posted a video of themselves at work to<br />

YouTube showing them performing unsavoury acts with the pizzas they were making. Although<br />

Dominoes fired the employees and eventually restored consumer confidence in their products, the video<br />

did have an immediate impact on pizza sales as well as confirming the worst fears of many managers<br />

about the dangers of social media.<br />

While media coverage on the success and failure of high-profile social media initiatives tends to focus on<br />

the activities of large companies, less attention has been paid to how smaller and less visible<br />

organisations are engaging with these new technologies. Park and Cho (2009) and Kuzma (2010) point<br />

to the opportunities that social media offers public bodies in terms of connecting with their stakeholders<br />

and developing trust. This could be seen as particularly important at a time when politicians in many<br />

economies are increasingly viewed with suspicion. The personal nature of many social media services<br />

allows human voices and real personalities to be seen and heard as opposed to the faceless corporate<br />

messages of traditional public relations initiatives. However, as with the Dominoes example mentioned<br />

earlier the potential for public bodies and officials to be embarrassed by these channels is also a reality.<br />

The recent Wikileaks releases of confidential documents relating to the Iraq and Afghan wars is evidence<br />

of this.<br />

As well as using social media to develop trust between local government and their electors, there are<br />

also financial benefits from migrating services to the web. According to Gibson (2010), research by the<br />

Society of Information Technology Management concluded that customer service interactions cost on<br />

average 27 pence when conducted via the web, £3.22 by phone and £6.56 face-to-face. Gibson (2010)<br />

sees a broader role for social media in this context and believes:<br />

“...the really exciting cost-savings will come from restructuring the existing processes<br />

entirely. Social media allow far more people to contribute to solving a problem, which means<br />

potentially far greater efficiency overall, even given the increased burden on communicating<br />

and responding to the public.” (page 10)<br />

The heavy snow that fell across the UK in January 2010 showed the value of social media and Twitter, in<br />

particular to local councils in their attempts to help residents with transport problems. Cartmell (2010)<br />

describes how Brighton and Hove used Twitter successfully to appeal to residents with 4x4 vehicles to<br />

help with meals on wheels deliveries while Kirklees Council and Essex Council used Twitter to broadcast<br />

messages about the status of road gritting. Following the snow and in an attempt to deal with the<br />

190


Martin De Saulles<br />

resulting potholes in the roads, Birmingham City Council encouraged its residents to contact them via<br />

Twitter with details of the location of holes in the road.<br />

4. Best practice for deploying social media<br />

In terms of making the most of social media initiatives, the lessons for local government are often no<br />

different than for any organisation. Drawing on literature from digital marketing and social media<br />

practitioners, there are some key factors that need to be taken into account:<br />

Although it will probably evolve once a council starts experimenting with social media, it is important<br />

to set objectives for what it hopes to achieve. This will help in the selection of the most appropriate<br />

social media platforms (Hay 2011);<br />

Employees need to know who is responsible for posting information and responding to messages<br />

and time needs to be allocated to them for these tasks. Unless working with social media is seen as<br />

part of someone’s job description it is unlikely it will be taken seriously across the council (Safko &<br />

Brake 2010);<br />

Before creating profiles on Facebook, Twitter, YouTube or other services, it is worth experimenting in<br />

a low-key way to develop a feel for how those platforms work and the ways that users interact with<br />

them. Observing the types of messages and information that are being posted and looking at the<br />

discussions that take place online help develop an understanding of what people value (Fox 2010);<br />

Where appropriate, try to inject a personal touch into the information and messages that are posted.<br />

Simply posting press releases onto Twitter or Facebook is unlikely to be of much interest to<br />

constituents. However, posts that show a genuine concern by council employees for the services<br />

they provide can break down barriers. This does not need to be applied in all instances as sometimes<br />

just a straightforward information broadcast is most appropriate such as pushing out travel updates or<br />

cold weather warnings (Fox 2010);<br />

Without being too prescriptive it is important that a council sets out some broad guidelines for what is<br />

and is not appropriate as subjects for posting online as well as expectations in terms of style and tone<br />

(Elser & Lee 2010);<br />

Monitor the success of social media initiatives by using free tools such as Hootsuite for tracking<br />

Twitter postings. It is important to know which initiatives are generating the most interest so efforts<br />

can be focused on those and away from activities that are not working (Kaushik 2009).<br />

One of the problems that many councils have when starting to use social media is determining which are<br />

the most appropriate. This will largely depend on what the body wants to achieve but it is important that<br />

they tread carefully and not be seen as acting inappropriately. 16 of the 55 unitary authorities surveyed in<br />

this research were using Facebook to share information but some argue that Facebook, in the way it is<br />

used by private individuals, is often not the best place for councils to be online. The Head of<br />

Communications and Marketing for Medway Council, Simon Wakeman ((Wakeman 2009)), believes<br />

Facebook users identify with specific services that their council provides but are not generally interested<br />

in the council itself:<br />

“In Medway we’ve not created an official Facebook presence for the council, but we have<br />

used Facebook groups to promote festivals and theatres – as we know that the customers<br />

for these services do have a sense of belonging with the service and so there’s a basis for<br />

an online community to form.” (Wakeman 2009)<br />

5. Conclusion<br />

The rise of social media is a very recent phenomena with most of the high-profile services such as<br />

Facebook and Twittter only gaining a mass base of users in the last several years. The rapidly changing<br />

and dynamic nature of the sector means that new services will come and go; the rapid decline of<br />

MySpace and Bebo are evidence of that. However, the hundreds of millions of people that engage with<br />

social media on a daily basis mean that any organisation wanting to develop closer ties with its<br />

stakeholders needs to, at the very least, be aware of the potential of these services to strengthen links.<br />

Assuming that social media is a fad and only something for young people might be similar to someone in<br />

1995 dismissing email as a viable communications tool. Local government, in particular, may have a lot<br />

to gain from using these platforms to get closer to its electors and enhance the services it already offers.<br />

As Gibson (2010) states:<br />

191


Martin De Saulles<br />

“Citizens will expect their council to engage with them on their terms, via their channels, and<br />

to be openly available online. In fact, it is becoming increasingly clear that if councils don’t<br />

use these tools, the citizens will do it for them, and bypass the council entirely.” (page 5)<br />

As someone who makes his living by consulting on social media for organisations, Gibson could be<br />

accused of exaggerating the potential dangers to local government from neglecting to use these tools in<br />

their communications with electors. It is obviously in the interests of such consultants to encourage a<br />

perceived need for their services amongst potential clients. It is certainly true that many public sector<br />

investments in information and communications technology projects do not have a good track record<br />

(Gauld & Goldfinch 2006). However, the fact that the social media services described here are already<br />

being used by a significant proportion of the English population and, in most cases, cost little or nothing<br />

to deploy might indicate there may be real value in their use. The research described here is a<br />

preliminary step to developing a better understanding of how social media is being used by local<br />

government and what its potential might be for enhancing democracy. Further studies are planned to<br />

explore some of the more qualitative aspects of social media use through interviews with both local<br />

government employees deploying these services as well as members of the public interacting with them.<br />

It is hoped these interviews will allow a better understanding of the value being derived from using such<br />

tools. The research methodology presented here will also be repeated at the end of 2011 to determine<br />

the extent to which the use of social media tools by English unitary authorities is increasing or declining.<br />

References<br />

Agichtein, E. et al., 2008. Finding high-quality content in social media. Proceedings of the international conference on<br />

Web search and web data mining - WSDM ’08, pp.183 - 193. Available at:<br />

http://portal.acm.org/citation.cfm?id=1341531.1341557 [Accessed December 23, 2010].<br />

Bertot, J.C., Jaeger, P.T. & Grimes, J.M., 2010. Using ICTs to create a culture of transparency: E-government and<br />

social media as openness and anti-corruption tools for societies. Government Information Quarterly, 27(3),<br />

pp.264-271. Available at: http://linkinghub.elsevier.com/retrieve/pii/S0740624X10000201 [Accessed September<br />

7, 2010].<br />

Cartmell, M., 2010. Councils Go Digital During Bad Weather. PR Week, (January). Available at:<br />

http://www.prweek.com/uk/news/977387/Councils-go-digital-during-bad-weather [Accessed December 14,<br />

2010].<br />

Elser, E.L. & Lee, M., 2010. The nine commandments of social media in public administration. PA Times, 33(3), p.3.<br />

Fox, V., 2010. Marketing in the Age of Google: Your Online Strategy IS Your Business Strategy, Hoboken: John<br />

Wiley & Sons.<br />

Gauld, R. & Goldfinch, S., 2006. Dangerous Enthusiasms: E-Government, Computer Failure and Information<br />

Systems Development, Dunedin: Otago University Press.<br />

Gibson, A., 2010. Local by Social, London: I&Dea. Available at: http://www.idea.gov.uk/idk/aio/17801438.<br />

Hay, D., 2011. Social Media Survival Guide: Strategies, Tactics, and Tools for Succeeding in the Social Web<br />

Book/CD Package, Austin: Dalton Publishing.<br />

Kaplan, A.M. & Haenlein, M., 2010. Users of the world, unite! The challenges and opportunities of Social Media.<br />

Business Horizons, 53(1), pp.59-68.<br />

Kaushik, A., 2009. Web Analytics 2.0: The Art of Online Accountability and Science of Customer Centricity, Hoboken:<br />

John Wiley & Sons.<br />

Kiley, D., 2009. Domino ’ s Pizza Youtube Video Lesson. Business Week, pp.4-5. Available at:<br />

http://www.businessweek.com/the_thread/brandnewday/archives/2009/04/dominos_pizza_youtube_video_less<br />

on_focus_on_standards_and_pack_your_own_lunch.html [Accessed December 28, 2010].<br />

Kuzma, J., 2010. Asian Government Usage of Web 2 . 0 Social Media. <strong>European</strong> Journal of ePractice, (9), pp.1-13.<br />

Mui, Y.Q. & Whoriskey, P., 2011. Facebook tops Google; social networking passes search as web users’ top activity.<br />

San Jose Mercury News. Available at: http://www.mercurynews.com/business/ci_16983464.<br />

Park, J, Cho, K., 2009. Declining relational trust between government and publics, and potential prospects of social<br />

media in the government public relations. In EGPA 2009. Available at:<br />

http://www.egpa2009.com/documents/psg1/ParkCho.pdf.<br />

Qualman, E., 2010. Socialnomics: How Social Media Transforms the Way We Live and Do Business, Hoboken: John<br />

Wiley & Sons.<br />

Safko, L. & Brake, D., 2010. The Social Media Bible: Tactics, Tools, and Strategies for Business Success, Hoboken:<br />

John Wiley & Sons.<br />

Scott, D.M., 2010. The New Rules of Marketing and PR: How to Use Social Media, Blogs, News Releases, Online<br />

Video, and Viral Marketing to Reach Buyers Directly, Hoboken: John Wiley & Sons.<br />

Wakeman, S., 2009. Public Sector Communications and Marketing. Available at:<br />

http://www.simonwakeman.com/2009/02/25/why-local-government-shouldnt-be-on-facebook/ [Accessed<br />

December 14, 2010].<br />

Weber, L., 2007. Marketing to the social web: how digital customer communities build your business, Hoboken: John<br />

Wiley & Sons.<br />

192


Electronic Health Records Management and Preservation:<br />

The Case of Slovenia<br />

Mitja Decman<br />

University of Ljubljana, Slovenia<br />

mitja.decman@fu.uni-lj.si<br />

Abstract: This paper presents and discusses the technological possibilities that information technology (IT) offers<br />

within the health sector, focusing on health information technology (HIT), electronic health records (EHR), personal<br />

health records (PHR) and practice management systems (PMS). The current development in this area in the world<br />

shows that this topic is important and is included in the strategies, policies and plans of many countries, in some<br />

places even being pushed to the obligatory level. Consequently, there is a huge interest within the private sector for<br />

development and marketing of products that cover this area. Governments also therefore include the private sector in<br />

the strategic planning of solutions that can integrate different networks of public administration, particularly in the<br />

health sector. As is always the case and particularly here, because of the many players involved, these projects cost<br />

a lot of money, causing sceptics and critics to question the reasonableness, usefulness, ROI and similar topics.<br />

Slovenia is no exception in this area, in both positive and negative sense. Slovenian health reforms include the<br />

development of integrated health systems costing over a hundred million Euros, and many health practitioners in<br />

Slovenia lack internet connections, modern IT equipment, etc. Empirical research regarding the Slovenian health<br />

sectors, which was carried out in 2011 and is examined within the preliminary analysis presented in this paper, will<br />

outline the real situation in this area.<br />

Keywords: e-Health, health information technology, health information systems, electronic health records (EHR),<br />

medical health records (MHR), public health services<br />

1. Introduction<br />

Healthcare is a strategic element of each country, because it influences many areas of the society and<br />

the development of the whole nation. Although minor deficiencies might not cause a lot of damage,<br />

broader negative health trends and diseases may cause a lot of damage to the population, economy,<br />

growth, etc. In more recent years, informatics is gaining a more important role in many fields, including<br />

health. As stated in the communication of the <strong>European</strong> Commission, e-Health is important and enables<br />

improvements in terms of access to healthcare and boosts the quality and effectiveness of the services<br />

offered (<strong>European</strong> Commission, 2004).<br />

E-Health covers the area of services and systems that are available to citizens (patients), professionals<br />

and health authorities and includes electronic health record systems (EHR), practice management<br />

systems, personal health record systems (PHR), health portals, etc. These are primarily based on the<br />

internet and other information and telecommunication technologies that enable cooperation, sharing of<br />

data, exchange of data, knowledge based tools, etc.<br />

The reason for our research in this field is the lack of research regarding the drivers and barriers related<br />

to the implementation of EHR systems. Using the theory of EHR, we conducted empirical research in the<br />

Slovenian health sector to prove or disprove the theoretical statements and stress or weaken their<br />

importance.<br />

1.1 EHR, EPR, EMR, PHR, PMS …<br />

To have a clear start, it is important to resolve the definition of electronic health records (EHR) and other<br />

similar terms. There are many various definitions of what EHR is. At the same time, the term’s definition<br />

overlaps with terms like electronic patient record (EPR), electronic medical record (EMR), personal health<br />

records (PHR) and practice management system (PMS). PMS basically deals with the day to day<br />

operations of a medical practice including data about patient’s demographics, appointments, bills, etc.<br />

(administrative and financial data). These same data can also be found in EMR, which is more focused<br />

on clinical data and whose principle purpose is to support individual patient care (Rector, Nowlan & Kay,<br />

1991). The EMR can also be the legal patient record that is created in hospitals and ambulatory<br />

environments and is the data source for the EHR (Habib, 2010). The National Alliance for Health<br />

Information Technology (2008) defines EMR as “The electronic record of health-related information on an<br />

individual that is created, gathered, managed, and consulted by licensed clinicians and staff from a single<br />

organisation who are involved in the individual’s health and care,” while EHR is defined as “An electronic<br />

record of health-related information on an individual that conforms to nationally recognised<br />

193


Mitja Decman<br />

interoperability standards and that can be created, managed, and consulted by authorised clinicians and<br />

staff across more than one healthcare organisation.” The Healthcare Information and Management<br />

Systems organisation (HIMSS) stressed that EMR is “a legal record created in hospitals and ambulatory<br />

environments that is the source of data for EHR.” While EMR is owned and managed by an organisation,<br />

EHR is the aggregation of EMRs from different sources and demands connectivity. In the case of a<br />

country wide solution, it requires a network that is accessible to all stakeholders including patients, who<br />

can access and append information by using health portals. The HIMSS even developed a 7 stage<br />

adoption model (Figure 1) for EMR with the abilities of EHR (HIMSS Analytics, 2010). Thus the key<br />

property of EMR in order to be a part of EHR is interoperability according to standards (e.g. HL7, CCHIT)<br />

(Brailer, 2005).<br />

Stage Cumulative Capabilities<br />

Stage 7<br />

Complete EMR; CCD transactions to share data; Data<br />

warehousing; Data continuity with ED, ambulatory, OP<br />

Stage 6<br />

Physician documentation (structured templates), full CDSS<br />

(variance & compliance), full R-PACS<br />

Stage 5 Closed loop medication administration<br />

Stage 4 CPOE, Clinical Decision Support (clinical protocols)<br />

Stage 3<br />

Nursing/clinical documentation (flow sheets), CDSS (error<br />

checking), PACS available outside Radiology<br />

Stage 2<br />

CDR, Controlled Medical Vocabulary, CDS, may have Document<br />

Imaging; HIE capable<br />

Stage 1 Ancillaries - Lab, Rad, Pharmacy - All Installed<br />

Stage 0 All Three Ancillaries Not Installed<br />

Figure 1: 7-stage EMR adoption model, (source: HIMSS Analytics Database),<br />

http://www.himssanalytics.org/<br />

We might transfer the definition to a mathematical formula: EHR = EMR + data exchange capability. The<br />

data exchange capability is also called the health information exchange (HIE). EMR systems therefore<br />

include much data and functionality. Within a data set, we can find a patient’s demographic details, family<br />

history, medical history, allergies and alerts as well as a summary of services provided to the individual<br />

that are gathered from hospitals, dental clinics, emergency departments, etc. (Lazakidou, 2006). Within<br />

the set of functionalities, we can include the management and exchange of data, orders for laboratory<br />

tests, prescriptions, etc. A survey done in the United states defined a fully functional EHR as a system<br />

capable of “recording patients’ clinical and demographic data, viewing and managing results of laboratory<br />

tests and imaging, managing order entry (including electronic prescriptions) and supporting clinical<br />

decisions (including warnings about drug interactions or contraindications)” (DesRoches et al., 2008).<br />

Despite these definitions, the primary goal of any health information system should be patient<br />

participation, because the patient’s improved health care must be the main objective, as is argued by<br />

Karsh (Karsh, Weinger, Abbott, & Wears, 2010).<br />

1.2 Benefits<br />

We could endlessly expound upon the benefits of EHR as stated by various authors. In 2003,<br />

Waegemann stressed data sharing, uniform documentation, better information management and<br />

consecutively improved workflow and efficiencies of the patient care process (Waegemann, 2003).<br />

DesRoches also found a positive link between more capable systems and greater benefits (DesRoches<br />

et al., 2008). Galani and Nikiforu divide the benefits into groups including patients, the general public,<br />

health professionals, health administrators, policy makers, researchers and governments (Lazakidou,<br />

2006).<br />

From the patients’ point of view, the improved availability of data from various medical treatments,<br />

increased security through encryption, fewer mistakes during pharmacy orders by using the<br />

pharmaceutical database and electronic prescriptions are the most important benefits. Medical data can<br />

be available to them for access, checking and education (linking to the web pages or medical knowledge<br />

194


Mitja Decman<br />

databases). All of this allows patients to assume more control over their health records and become more<br />

active in their own care. Currently, one of if not the biggest healthcare IT programme in the world is<br />

gathering patients’ data into one huge IT system (the NHS database) in Great Britain and is expecting to<br />

gather over 50 million health summary records (Davies, Eccles, Braunold & Thick, 2008).<br />

From the health professionals point of view, there are benefits such as easier access to patient data, thus<br />

providing better decision-making support and consequently reducing medical error rates (Ford,<br />

Menachemi, & Phillips, 2006). The accessibility can also cause an increase in productivity. There is also<br />

a greater accountability of staff since their actions are tracked more easily (Hillestad et al., 2005).<br />

By moving away from paper media, electronic health systems also reduce out-dated and cumbersome<br />

paperwork, reduce the need for large storage facilities, do away with the problems of paper fragility and<br />

searchability, enable its availability to many people while storing it in only one place and enable an<br />

efficient aggregation of data (Lazakidou, 2006). At the University of Wisconsin Hospital and Clinics, a<br />

significant reduction (more than 85%) in the volume/cost of paper forms and a significant reduction in<br />

space required for storage was recorded after EHR implementation (HIMSS Analytics, 2010). Hillestad<br />

also adds that eliminating handwritten documents would improve the accuracy of patient data, adding<br />

that electronic forms would eliminate the danger of data loss resulting from natural disasters such as<br />

hurricanes, floods and fire (Hillestad et al., 2005).<br />

From the governments’ point of view, reduced health care costs are another benefit of health information<br />

technology (Lazakidou, 2006) and could save $81 billion annually in the US if the healthcare system<br />

would be properly upgraded (Hillestad et al., 2005). The potential includes reducing the hospital lengthof-stay,<br />

medication usage, nurses’ administrative time, etc. With electronic records, there is a huge<br />

potential for thorough statistical analysis, enabling better decisions, actions and planning and leading to<br />

better quality of health services (Ford, Menachemi, & Phillips, 2006). Researchers and scientists would<br />

also be stakeholders that would benefit from those data.<br />

1.3 Weaknesses<br />

So if there are so many benefits, why don’t we see EHR systems implemented everywhere? That is<br />

because there are also many weaknesses, and in that regard, Waegeman in particular indicated the lack<br />

of frameworks and standards, lack of motivation, lack of direct benefits for practitioners and confusion<br />

regarding the concept (Waegemann, 2003).<br />

At the level of the IT itself, EHR is a very crucial system that needs to run not only 24x7, but without<br />

mistakes, bugs, crashes, unpredicted states, etc. A dropping of the network connection or the crash of a<br />

system might mean losing lives, and it is indicated that EHR systems are among the least reliable<br />

(Johnson, 2006). The influence of errors is strong as well. A mistyped piece of information about a<br />

specific drug at the National Drug Centre might lead to hundreds of wrong decisions the next second<br />

within the EHR systems. Although a less-errors benefit is argued as a positive side of EHR, the risk of<br />

errors is shifted to system users since they make the decisions and confirm it in the system. This paradox<br />

is also stressed by Karsh et al. (2010).<br />

Economic barriers such as the lack of easily apparent returns on investments and the inadequate<br />

usability of ERH because of the network effect problems might cause a negative decision regarding<br />

implementation of EHR. Although the HIT Leadership Panel in the United States concluded that the<br />

potential benefits outweigh costs (Lewin Group, 2005), there is a problem of necessary large investments<br />

in software, hardware, installation, training, wiring and communications as well as a lack of certification<br />

and standardisation (Hillestad et al., 2005). The ability EHR has to exchange the data of individual<br />

organisations (e.g. one hospital) with others (e.g. competing hospitals) for free also represents a<br />

problematic issue in this area.<br />

Focusing on EHR as the interoperability portion of EMR, it often integrates or connects existing EMR or<br />

EHR systems. Such an integration of many different legacy systems might be very problematic. Not only<br />

within one organisation, such as hospital with different departments using different systems, but even<br />

more so on a national or international level. Within such a process, standards play a very important role.<br />

The users of EHR are countless: physicians, nurses, patients, pharmacies, insurance companies, drug<br />

providers, social workers, governments, etc. All of them need knowledge about EHR and training to use<br />

and gain from EHR. On the patient’s side, within environments where the digital divide and computer<br />

195


Mitja Decman<br />

illiteracy are problematic, not to mention problems such as using advanced secure technologies like<br />

smart cards, digital certificates and similar, are facing huge problems with the potentially low acceptance<br />

and adoption of EHR systems.<br />

We could not agree more with the National Academy of Science quote that EHR should be considered as<br />

“guilty until proven” (Karsh, Weinger, Abbott, & Wears, 2010).<br />

2. Health record management and preservation in electronic world<br />

E-Health promises a lot: assisting prevention, diagnosis, treatment, monitoring and lifestyle management<br />

(<strong>European</strong> Commission, 2004). Therefore, governments are expected to strengthen efforts to coordinate<br />

the adoption and use of health information technology and develop policies to achieve the goals (Lewin<br />

Group, 2005). The <strong>European</strong> Commission, in its Community Health Strategy for 2008–2013, stressed<br />

that one of the objectives is to “support dynamic health systems and new technologies, recognising that<br />

new technologies can improve disease prevention, diagnosis and treatment, facilitate patient safety and<br />

improve health systems’ coordination, use of resources and sustainability” (<strong>European</strong> Commission,<br />

2007). Within its i2010 strategy, the <strong>European</strong> Union also proposed a benchmarking system for e-Health,<br />

covering 27 <strong>European</strong> member states, Iceland, Norway, Canada and the United States. In its report from<br />

2009, the recommended set of indicators and the recommendation for the e-Health benchmarking<br />

approach were proposed (<strong>European</strong> Commission, 2009).<br />

A report from Empirica showed that almost all of the General Practitioner (GP) practices (87%) in the<br />

<strong>European</strong> Union use a computer, 69% of the EU27 GP practices have an Internet connection and<br />

broadband connections are used by almost half of the EU27 GP practices (Empirica, 2008). The same<br />

report stressed that simple e-Health applications (EMR) such as having electronic data regarding patients<br />

are quite common, while complex EHR systems are not. Denmark, the Netherlands, Finland, Sweden<br />

and the UK emerge as the <strong>European</strong> frontrunners in this regard.<br />

Since the primary player in the health system is of course the patient, countries are focused on the<br />

patient’s role and how to engage the patient. Eurostat data show that more and more people are seeking<br />

health information over the Internet (Figure 2). Research results from Norway, Denmark, Germany,<br />

Greece, Poland, Portugal and Latvia also indicated that people are seeking that information to read<br />

information about health matters and to decide whether to see a doctor and to prepare for and follow up<br />

on doctor's appointments (Andreassen et al., 2007).<br />

Figure 2: Percentage of individuals using the Internet to seek health information, whether for themselves<br />

or others (Source: Eurostat)<br />

196


3. The case of Slovenia<br />

Mitja Decman<br />

According to the Slovenian healthcare strategy, the benefits of health information technology correlate<br />

with the strategic goals of healthcare reform, namely an increased citizen role in health care and<br />

wellbeing, the enabling of safe and reliable access to medical records for health workers including for<br />

learning and knowledge management, easier planning and management of health organisations and<br />

health systems and increased ease of access for patients that would benefit from electronic means of<br />

healthcare (Ministry of Health, 2005).<br />

The Slovenian development of e-health was very influenced by the Slovenian Electronic Commerce, the<br />

Electronic Signature Act from 2000 as the base of e-commerce in public administration and the Strategy<br />

of Informatisation of the Slovenian Health System 2005–2010 (Ministry of Health, 2005), where e-Health<br />

was defined as a wide spectre of usage of information and communication technology within the<br />

Slovenian health system. It was more widely specified as a cluster of information systems and services<br />

that together with organisational changes and the development of new skills contribute to the progress of<br />

health, advances in the accessibility of health care, quality of services and efficiency and productivity.<br />

The strategy was also submitted to the <strong>European</strong> commission as a demand in the Alignment to<br />

Communication Regarding e-Health – Making Healthcare Better for <strong>European</strong> Citizens: An Action Plan<br />

for a <strong>European</strong> e-Health Area (<strong>European</strong> Commission, 2004).<br />

Despite all of this, the development did not produce the integration or interconnectivity of different<br />

systems. The reasons were the following:<br />

The development of informatics in health care was dispersed and not coordinated with the national<br />

strategy;<br />

Systems were used for administrative and technical support and lacked support for health workers<br />

while treating patients;<br />

A lack of technological and content-related exchange of data between health workers and<br />

organisations and between the primary and secondary level;<br />

Lack of knowledge regarding the importance and possibilities of informatics in health – expenses on<br />

average were 1% of the yearly health budget compared to 2.5 – 3% as the <strong>European</strong> average;<br />

Huge gap between the needs and possibilities of informatics within healthcare and other sectors<br />

(Ministry of Health, 2005).<br />

A similar situation was shown through Empirica’s benchmarking results, where Slovenia is one of the top<br />

places for indicators like the use of computers, internet access, practice websites, electronic recording<br />

and the storage of individual administrative patient data. It was among the worst, however, for indicators<br />

like the electronic storage of patients’ basic medical parameters, diagnosis data, medication data and the<br />

use of a computer during consultations (Empirica, 2008). This clearly shows that computer hardware and<br />

networking was widely adopted as part of the compulsory health insurance card system, while EMR and<br />

EHR systems were generally missing.<br />

Figure 3: Percentage of individuals in 2009 using the Internet to seek health information whether for<br />

themselves or others (source: Eurostat)<br />

197


Mitja Decman<br />

The last big milestone for Slovenia was the Action Plan for e-Health (April 2009) that announced the<br />

project called e-Health. This is one of the biggest national projects in the area of e-government, as it is<br />

projected to cost around 67 million Euros by 2015 (27 million Euros will be provided by the <strong>European</strong><br />

Social Fund). By the year 2023, the cost would total more than 130 million Euros. It is an important step<br />

for establishing efficient, flexible and modern national e-Health systems to support the strategic goals of<br />

the Slovenian healthcare system. The goal of the e-Health project is to create a modern interoperable<br />

health information system that would enable secure electronic business and efficient management of<br />

health and health related data. It includes three phases. The first one is the national EHR system (called<br />

eZIS) including the zNET health network (at a cost of 55 million Euros), the zVEM health portal (at a cost<br />

of 26 million Euros) and the EZZ health record notation. In the second phase, a national centre for health<br />

informatics (CIZ) would be established that would master and manage the eZIS system, and in the third<br />

phase, the improvement of health processes and accessibility of health services through promotion and<br />

education.<br />

It is obvious and logical that such a big project would need outsourcing. The huge amount of funding<br />

means good business for the private sector so “the battle can begin.” Already at the beginning of the first<br />

phase, the public procurement did not succeed, because the chosen provider was blamed for being<br />

connected with politicians and the leaders of health care institutions. That hindered the development of<br />

the project and the Minister of Health ordered a revision to find a solution. In the summer of 2010, the<br />

group of revisers from the <strong>European</strong> commission also came to Slovenia to check-on the spending of<br />

<strong>European</strong> money.<br />

4. Empirical research – analysis and findings<br />

Because of the lack of available data regarding the current state in the area of e-Health at the primary<br />

and secondary level of Slovenian health care, we decided to perform empirical research that would focus<br />

on practitioners in Slovenian health care at both levels.<br />

The survey was intended to find the level of general IT penetration into the health sector, the level of<br />

implementation of health systems, the opinion of respondents regarding the benefits and weaknesses of<br />

different properties of such systems and the level of agreement regarding the processes that are going<br />

on currently in the Slovenian health sector.<br />

The subject of the survey was one health care unit, for instance an outpatient’ department, hospital<br />

department, dispensary or whatever unit that involves a smaller group of people working with patients in<br />

a specific health area. We decided to use a web survey, finding respondents using the Business<br />

Directory of the Republic of Slovenia that includes data regarding basically all public and private<br />

organisations in the health care sector. We used a special standardised category filter that focused only<br />

on organisations working in the area of health care including hospital activities, general medical practice<br />

activities, specialist medical practice activities, dental practice activities, alternative medicine activities<br />

and residential care activities for the elderly and disabled (<strong>European</strong> Parliament, 2006). The survey email<br />

invitations were sent to 1064 organisational email addresses with requests to forward them to<br />

individual departments, dispensaries or divisions. Therefore, the primary focus group was not a final<br />

sample of respondents since forwarded invitations reached a second level of respondents unknown<br />

before the sending process. In 20 days, we received 161 fully answered questionnaires (N=161) from 97<br />

various organisations. We were using Survey System 10 software for invitations delivery, web surveys,<br />

password protection, data gathering, etc. Some answers were not answered by all respondents therefore<br />

N can be different in various charts. Among 161 respondents, 94 were doctors, 30 nurses, 10 heads of<br />

departments, 15 other medical staff and 12 other staff. Regarding the types of institutions, 21<br />

respondents were from hospitals, 54 from health centres, 28 from dental offices, 35 from specialist<br />

practices and 23 from other practices. Among respondents, 93 work in the private sector, 17 in the<br />

private sector only and 51 in private practices with concession.<br />

The analysis showed that although in 2004 Slovenia was already among the better equipped countries<br />

within the EU (number of computers per employee in the medical sector) (Meglič, Marušič, Anžur &<br />

Kodele, 2007), the situation in 2010 looks worse. Surprisingly large percentages of respondents<br />

described their internet connection and basic computer equipment as poor or very poor (Figure 4). The<br />

same respondent opinion was noted regarding printers, email, connection to the HIIS (which is<br />

compulsory for treating a patient and checking his/her insurance data) and EMR. Comparing them<br />

amongst each other, we noted that only basic IT, such as computers and printers with the addition of<br />

some application software for data management, was slightly better graded compared to other indicators.<br />

198


Mitja Decman<br />

Figure 4: Percentages of respondent answers to questions regarding basic IT satisfaction (N=154, 144,<br />

154, 160, 159, 160)<br />

Considering the benefits of IT in the area of the health sector, respondents agree with almost all benefits<br />

put forward by the theory, but they show more uncertainty regarding the benefits of faster patient<br />

treatment, lower health costs and improved patient care (Figure 5). Particularly regarding faster patient<br />

treatment, the level of disagreement was the highest.<br />

Figure 5: Percentages of respondent agreement with HIT benefits (N=152, 145, 152, 153, 154, 152, 153,<br />

153, 149)<br />

Considering the weaknesses of HIT, opinions are less one sided (Figure 6). On average, the respondents<br />

do not recognise problems in relation to data security threats but primarily in focusing on the computer<br />

instead of the patient and the “fear” of errors from process changes that arise with implementation of HIT.<br />

They do realise the importance of the widespread-ness and connectivity of EHR systems to minimise the<br />

weakness and inefficiency of isolated systems.<br />

Figure 7 shows that among the capabilities of EHR systems, the most important to respondents are the<br />

results from specialists and laboratory results. Various treatments can continue at the primary level after<br />

these results are received and even stored for future medical decisions at the health organisation instead<br />

of patients keeping them at home. Respondents also feel that the online checking of personal health<br />

records by the patients is not important including updating of this data by the patients alone. On average,<br />

however, they agree that all of the stated capabilities of EHR systems would significantly influence<br />

patients’ treatment and physicians’ work.<br />

Respondents detect various threats while implementing and using EHR systems (Figure 8).The most<br />

important on average is certainly the high costs of purchase and maintenance, while there is no fear that<br />

199


Mitja Decman<br />

the management of the organisation would not have enough interest is such projects. All of the other<br />

threats are graded on average to be relatively equal, giving some more concern to the limited or<br />

inadequate functionalities of existing solutions on the market.<br />

Figure 6: Percentages of respondent agreement with HIT weaknesses (N=144, 152, 155, 155, 155, 152)<br />

Figure 7: Percentages of respondent agreement regarding the importance of the stated capabilities of<br />

EHR (N=146, 147, 144, 145, 145, 151, 148, 150, 153)<br />

5. Conclusion<br />

Information technology in health care is a clear example of how complex and interconnected the field of<br />

informatics is. If not here, then where else are technology, legislation, knowledge, people and policies so<br />

connected and dependant upon one other? Each of these elements is important if not crucial for the<br />

whole and should be treated like that – carefully and of equal importance.<br />

Health information technologies, particularly EHR, are trends in health care, bringing together many<br />

theoretically and practically proven benefits and weaknesses as well so careful planning is essential.<br />

Although many papers question and criticise the most obviously stated benefits, they do not deny that<br />

health information technology should be in place now and in the future but warn that careful planning,<br />

design and implementation should also take place.<br />

200


Mitja Decman<br />

Figure 8: Percentages of respondent agreement regarding the importance of the stated obstacles to<br />

EHR implementation (N= 145, 146, 141, 136, 132, 138, 143)<br />

It should be understood the EMRs and EHRs are here to serve patients and their treatments. This is<br />

shown in the results of the Slovenian empirical research presented in this paper. EHR should be easy to<br />

use so doctors can focus on patients and not on computers as well as entering and retrieving data.<br />

Systems should be connected so patients would cease being the messengers, transporting prescriptions,<br />

laboratory results, orders, etc. Strategists, developers, managers, medical workers and other<br />

stakeholders should carefully consider existing and re-engineered business processes so as to create as<br />

few errors as possible when implementing health information technology.<br />

References<br />

Andreassen, H. K., Bujnowska-Fedak, M. M., Chronaki, C. E., Dumitru, R. C., Pudule, I., Santana, S., Voss, H., et al.<br />

(2007) “<strong>European</strong> Citizens use of E-health Services: A Study of Seven Countries”, BMC Public Health, No. 7,<br />

pp 53–53, doi:10.1186/1471-2458-7-53.<br />

Brailer, D. J. (2005) “Interoperability: The Key to the Future Health Care System”, Health Affairs,<br />

doi:10.1377/hlthaff.w5.19.<br />

Davies, M., Eccles, S., Braunold, G. W., and Thick, M. (2008) “Giving Control to Patients”, The British Journal of<br />

General Practice, Vol 58, No. 548, pp 148–149.<br />

DesRoches, C. M., Campbell, E. G., Rao, S. R., Donelan, K., Ferris, T. G., Jha, A., Kaushal, R., et al. (2008)<br />

“Electronic Health Records in Ambulatory Care — A National Survey of Physicians”, New England Journal of<br />

Medicine, Vol 359, No. 1, pp 50–60, doi:10.1056/NEJMsa0802005.<br />

Empirica. (2008) “Benchmarking ICT use among General Practitioners in Europe - Final Report”, [online], i2010 - A<br />

<strong>European</strong> Information Society for Growth and Employment,<br />

ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/gp_survey_final_report.pdf.<br />

<strong>European</strong> Commission. (2004) “Communication on e-Health - Making Healthcare Better for <strong>European</strong> Citizens: An<br />

Action Plan for a <strong>European</strong> e-Health Area”, [online], Information Society,<br />

ec.europa.eu/information_society/doc/qualif/health/COM_2004_0356_F_EN_ACTE.pdf.<br />

<strong>European</strong> Commission. (2007) “WHITE PAPER – Together for Health: A Strategic Approach for the EU 2008–2013”,<br />

Brussels: <strong>European</strong> Commission.<br />

<strong>European</strong> Commission. (2009) “eHealth Benchmarking (Phase II)”, [online], Information Society,<br />

ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/ehealth_ii_bench_final_report.pdf.<br />

<strong>European</strong> Parliament. (2006) “Regulation (EC) no. 1893/2006 of the <strong>European</strong> Parliament and of the Council<br />

Establishing the Statistical Classification of Economic Activities NACE Revision 2 and Amending”, [online],<br />

Official Journal of the <strong>European</strong> Union, eurlex.europa.eu/LexUriServ/LexUriServ.do?uri=OJ:L:2006:393:0001:0039:EN:PDF.<br />

Ford, E. W., Menachemi, N., and Phillips, M. T. (2006) “Predicting the Adoption of Electronic Health Records by<br />

Physicians: When Will Health Care be Paperless?”, Journal of the American Medical Informatics Association,<br />

Vol 13, No. 1, pp 106–112, doi:10.1197/jamia.M1913.<br />

Habib, J. L. (2010) “EHRs, Meaningful Use, and a Model EMR”. Drug Benefit Trends, Vol 4, No. 22, pp 1–3.<br />

Hillestad, R., Bigelow, J., Bower, A., Girosi, F., Meili, R., and Scoville, R. (2005) “Can Electronic Medical Record<br />

Systems Transform Health Care? Potential Health Benefits, Savings, and Costs”, Health Affairs: The Policy<br />

Journal of the Health Sphere, Vol 24, No. 5, pp 1103–1117.<br />

201


Mitja Decman<br />

Hillestad, R., Bigelow, J., Bower, A., Girosi, F., Meili, R., Scoville, R., and Taylor, R. (2005) “Can Electronic Medical<br />

Record Systems Transform Health Care? Potential Health Benefits, Savings, And Costs”, Health Affairs, Vol 24,<br />

No. 5, pp 1103–1117, doi:10.1377/hlthaff.24.5.1103.<br />

HIMSS Analytics. (2010) “Stage 7 Award”, [online], HIMSS Analytics,<br />

www.himssanalytics.org/hc_providers/stage7casestudies_UnivWisco.asp.<br />

Johnson, C. W. (2006) “Why did that happen? Exploring the Proliferation of Barely Usable Software in Healthcare<br />

Systems”, Quality and Safety in Health Care, Vol 15, No. 1, i76-i81. doi:10.1136/qshc.2005.016105.<br />

Karsh, B.-T., Weinger, M. B., Abbott, P. A., and Wears, R. L. (2010) “Health Information Technology: Fallacies and<br />

Sober Realities”, Journal of the American Medical Informatics Association, Vol 17, No. 6, pp 617–623.<br />

Karsh, B.-T., Weinger, M. B., Abbott, P. A., and Wears, R. L. (2010) “Health Information Technology: Fallacies and<br />

Sober Realities”, Journal of the American Medical Informatics Association, Vol 17, No. 6, pp 617–623,<br />

doi:10.1136/jamia.2010.005637.<br />

Lazakidou, A. A. (2006) Handbook of Research on Informatics in Healthcare and Biomedicine. Idea Group Inc (IGI),<br />

Hershey PA.<br />

Lewin Group. (2005) “Health Information Technology Leadership Panel Final Report”, [online], The Office of the<br />

National Coordinator for Health Information Technology, www.hhs.gov/healthit/HITFinalReport.pdf.<br />

Meglič, M., Marušič, D., Anžur, A., and Kodele, D. (2007) “Equipment and the Usage of Information Technologies in<br />

Hospitals and Health Care Centers in Slovenia”, Informatica Medica Slovenica, Vol 12, No. 2, pp 34–39.<br />

Ministry of Health. (2005) “E-Health Strategy 2010”, [online], Ministry of Health,<br />

www.mz.gov.si/si/delovna_podrocja/zdravstveno_varstvo/sluzba_za_informatiko/e_zdravje_2010.<br />

Rector, A. L., Nowlan, W. A., and Kay, S. (1991) “Foundations for an Electronic Medical Record”, Methods Inf Med,<br />

Vol. 30, No. 3, pp 179–186.<br />

The Health Insurance Institute of Slovenia. (2009) “Slovene Health Insurance Card”, [online], The Health Insurance<br />

Institute of Slovenia,<br />

www.zzzs.si/zzzs/internet/zzzseng.nsf/0/acb90e7f8d38b022c1256eb6002968b1/$FILE/informativni%20angle%<br />

C5%A1ki%20list.pdf.<br />

The National Alliance for Health Information Technology. (2008) “Defining Key Health Information Technology<br />

Terms”, [online], The Office of the National Coordinator for Health Information Technology (ONC),<br />

healthit.hhs.gov/portal/server.pt/gateway/PTARGS_0_10741_848133_0_0_18/10_2_hit_terms.pdf.<br />

Waegemann, P. C. (2003) “EHR vs. CPR vs. EMR”, [online], Healthcare Informatics Online,<br />

http://www.healthcareinformatics.com/issues/2003/05_03/cover_ehr.htm.<br />

202


Sustaining Electronic Governance Programs in Developing<br />

Countries<br />

Zamira Dzhusupova, Tomasz Janowski, Adegboyega Ojo and Elsa Estevez<br />

UNU-IIST Center for Electronic Governance, Macao, China<br />

zamira@iist.unu.edu<br />

tj@iist.unu.edu<br />

ao@iist.unu.edu<br />

elsa@iist.unu.edu<br />

Abstract: This paper focuses on the challenge of sustaining Electronic Governance (EGOV) initiatives in developing<br />

countries to ensure their real impact on the society. While the challenge is well-recognized in the international<br />

development community, there is little evidence of research that discusses this challenge and how it could be<br />

addressed. This paper attempts to fill this gap by presenting a comprehensive approach which directly addresses the<br />

sustainability issues as part of the EGOV development lifecycle, and demonstrates how this approach was applied in<br />

a real-life project context in Afghanistan, aimed at addressing country-specific EGOV sustainability challenges. In<br />

view of this experience, the paper also discusses the adequacy of the approach to meet a range of sustainability<br />

challenges, with concluding remarks to guide developing countries in their endeavors to sustain EGOV programs.<br />

Keywords: electronic governance program sustainability, electronic governance in developing countries, EGOV.*<br />

framework, national ownership, stakeholder engagement, institutionalization<br />

1. Introduction<br />

Electronic Governance (EGOV) in Developing Countries (DCs) is receiving increased attention given the<br />

‘leapfrogging’ opportunities available through modern technologies (Basu 2004). As in such countries,<br />

governments face resource constraints in improving their operations and delivering services to citizens,<br />

EGOV has been touted as a means of saving costs while improving quality, response times, and access<br />

to services (Westcott, C., Pizarro, M., Schiavo-Campo 2000). However, EGOV has yet to prove<br />

successful in the vast majority of DCs governments (Furuholt & Wahid 2008). Among other factors, the<br />

countries struggling with providing basic necessities to their citizens will not have the same priority for<br />

EGOV development as the wealthier nations (Evans & Yen 2006), (Backus 2001), (Heeks 2008).<br />

A general problem associated with EGOV in DCs, well recognized in the international development<br />

community, is the challenge of sustaining the benefits created by the EGOV programs. Many EGOV<br />

initiatives in DCs are supported by donor organizations which are more successful in achieving their initial<br />

objectives than in sustaining such initiatives beyond their completion time (Heeks 2003). Unfortunately,<br />

few studies focus on the challenges affecting sustainable implementation of EGOV initiatives and how<br />

these challenges could be addressed. This paper attempts to fill this gap. It presents an EGOV<br />

development framework (EGOV.*) which directly addresses a number of sustainability challenges as part<br />

of the EGOV development life-cycle, and discusses the experience with implementing this framework in a<br />

real-life EGOV project in Afghanistan (EGOV.AF).<br />

The remainder of this paper is organized as follows. Section 2 presents a methodology adopted in this<br />

research. Related work is reviewed in Section 3, followed by background in Section 4. The definition and<br />

major challenges for sustaining EGOV programs in DCs are outlined in Section 5, while the EGOV<br />

development framework and the experience of its practical application in Afghanistan are described in<br />

Sections 6 and 7 accordingly. Section 8 includes a discussion about the findings of this research, and<br />

Section 9 presents concluding remarks and recommendations for future work.<br />

2. Methodology<br />

This research was carried out in five steps. First, we conducted an extensive literature review related to<br />

EGOV sustainability, with the aim of synthesizing the EGOV sustainability factors. Second, we applied<br />

these factors to review an existing EGOV development framework called EGOV.* (Janowski et al. 2010)<br />

to address sustainability issues. Third, we localized the generic EGOV.* sustainability requirements to the<br />

case of Afghanistan. Fourth, we developed and implemented a concrete instance of the EGOV.*<br />

framework in Afghanistan (EGOV.AF) based on the localized requirements which include: collecting<br />

readiness assessment data at the national- and agency-levels, conducting interactive visioning and<br />

strategy development activities with focused groups, building human capacity in government agencies<br />

203


Zamira Dzhusupova et al.<br />

based on the training needs of the civil servants, etc. Fifth, based on the EGOV.AF experience, we<br />

identified certain preconditions for effective utilization of the EGOV.* framework in other DCs.<br />

3. Related work<br />

The discussion about sustainability of EGOV initiatives in DCs is still in its infancy (Schuppan 2009). A<br />

handful of the relevant scholarly articles are reviewed in this section. (Furuholt & Wahid 2008) indicated<br />

that long-term sustainability of the EGOV initiatives in DCs remains a challenge, even after a year of<br />

operation, and investigated the reasons. The paper claims that the greatest constraint to EGOV in DCs,<br />

and the reason of exposure to sustainability failures, is dependence on the aid agencies. The paper<br />

argues that strong political leadership, clear vision, early involvement of stakeholders, regular feedback<br />

and partnership are important to sustain progress with limited resources.<br />

Heeks claims that sustainability failures frequently occur because of the design-reality gap (Heeks 2003),<br />

lack of national ownership and weaknesses of the central EGOV institutions which fail to balance external<br />

and internal interests (Heeks 2001a). He argues that when many EGOV initiatives are donor-driven and<br />

key stakeholders are often ignored in planning, this results in insufficient focus on the local context. He<br />

highlighted the role of leadership, commitment of public officials, and the presence of institutions able to<br />

lead, coordinate and sustain EGOV. He emphasized the importance of strategic thinking, knowledge, and<br />

skills and attitudes, especially within the public sector.<br />

(Grönlund et al. 2005) identified the sustainability problem as a critical factor to overcome, claiming that<br />

even DCs at an early EGOV development stage require a comprehensive strategy in a country-specific<br />

context, with long-term political commitment to avoid dependence on the donor organizations. The paper<br />

also argues that sustaining the EGOV effort requires a decision-making system that provides substantial<br />

investment in human resources and social embedment to utilize local labor. (Kumar & Best 2006)<br />

examined the sustainability of EGOV projects in DCs and postulated that such projects fail to be<br />

politically and institutionally sustainable due to a range of people, management, cultural and structural<br />

factors: lack of effective public leadership and sustained commitment, inadequate training of government<br />

officials, and lack of performance evaluation and monitoring, and stakeholder involvement. (Schuppan<br />

2009) analyzed the potentials, opportunities, risks and implications of EGOV development in DCs, and<br />

claimed that a simple transfer of EGOV concepts from North to South is not working. The paper makes<br />

the case for considering the institutional, cultural, and wider administrative contexts to avoid unintended<br />

effects and for focusing on capacity development to build local management competence.<br />

Among the challenges to sustainable EGOV implementation in DCs, (Ali et al. 2009) identified the lack of<br />

capacity in government, limited financial and human resources, dependence on donor funding, lack of<br />

coordination among isolated projects and between levels of government, and lack of awareness and<br />

interest in EGOV from citizens. The paper argues that the reliance on foreign experts leads to little<br />

consideration of the cultural and social issues in the national context. In a summary, the reviewed<br />

literature identifies critical factors causing the EGOV sustainability failure in DCs. However, there is little<br />

evidence of research on possible ways of addressing such challenges.<br />

4. Background<br />

4.1 EGOV programs<br />

The evidence of the benefits and challenges facing EGOV implementations around the world was<br />

reported by the UN surveys (UNDESA 2010), OECD studies (OECD 2003b), reports by the World Bank<br />

and Asia Development Bank, and discussed in (Heeks 2001b), (Zwahr et al. 2005), (Gilgarcia & Pardo<br />

2005) and (Leitner 2006). Successful EGOV programs increase citizen satisfaction, improve government<br />

efficiency, drive down transaction costs (Jaeger 2003), (Evans & Yen 2006), transforms how citizens<br />

interact with government, and influences policy-making processes through e-democracy and eparticipation<br />

(Stanforth & Flynn 2008). However, the observation of the EGOV programs around the world<br />

shows that management-oriented organizational reform creates better conditions to EGOV<br />

implementation (Schuppan 2009).<br />

4.2 EGOV programs in DCs<br />

Many DCs initiated EGOV strategies and programs with support from donor organizations (Heeks<br />

2001a), (Schuppan 2009), (Grönlund et al. 2005), (Hanna & Qiang 2005), (Bhuiyan 2011) aimed at<br />

improving public services and delivering them efficiently and conveniently to customers (Schware &<br />

204


Zamira Dzhusupova et al.<br />

Deane 2003). Experience shows that EGOV can improve transparency and thus reduce corruption and<br />

poverty (Bhuiyan 2011). While the benefits of EGOV in DCs and developed countries are the same<br />

(Ndou 2004), many benefits remain unrealized in DCs due to their limited use of ICT.<br />

4.3 EGOV programs in DCs – implementation challenges<br />

As well described in the literature, EGOV initiatives face various challenges for successful<br />

implementation in DCs. (Furuholt & Wahid 2008) classified these challenges into: 1) management -<br />

strategy, change management, political leadership, institutionalization, and continuous project monitoring<br />

and evaluation; 2) infrastructure - ICT infrastructure, legislation and financial resources; and 3) human<br />

factors – competence, skills, training and trust. Alternatively, (Backus 2001) classified them into: 1)<br />

political - strategy and policy, law and legislation, leadership, decision making, funding, international<br />

affairs and political stability; 2) social - people, education, employment, income, digital divide, rural versus<br />

urban areas, rich versus poor, literacy and IT skills; 3) economic - funding, cost-savings, business<br />

models, e-commerce; and 4) technological - software, hardware, infrastructure, telecom, IT workforce,<br />

maintenance, safety and security. (Heeks 2008) identified ten success factors: 1) external pressure, 2)<br />

internal political desire, 3) overall vision and strategy, 4) project management, 5) change management, 6)<br />

politics and self-interest, 7) design, 8) competencies, 9) technological infrastructure and 10) others.<br />

(Grönlund et al. 2005) expressed concern about the lack of long-term political commitment, dependence<br />

on donor organizations and weak human capacity. Among EGOV failure factors (Kumar & Best 2006)<br />

pointed out the lack of effective public leadership and sustained commitment, inadequate training of<br />

government officials, lack of performance evaluation and monitoring, and lack of stakeholder<br />

involvement. (Schuppan 2009) postulated considering the institutional, cultural and administrative<br />

contexts, with particular focus on building local capacity in the setup of EGOV initiatives. Finally, (Ali et al.<br />

2009) identified the challenges to include lack of government capacity, lack of collaboration and<br />

partnership, dependence on external aid, lack of citizen awareness and cultural and social issues.<br />

Table 1 depicts a variety of views on the EGOV implementation challenges in DCs. Despite this variety, a<br />

common understanding among development researchers and practitioners is that the biggest concerns<br />

are policy, management, capacity, funding, cultural and social issues, not technology.<br />

Table 1: EGOV programs in DCs – implementation challenges<br />

(Furuholt & Wahid<br />

2008)<br />

Management - strategy, change, leadership, monitoring, evaluation<br />

Infrastructure - ICT, legislation, financial resources<br />

Human - competence, skills, training, trust<br />

(Backus 2001) Political - strategy, policy, legislation, leadership, funding, stability<br />

Social - education, employment, digital divide, literacy, IT skills<br />

Economic - funding, business models<br />

Technological - infrastructure, maintenance, safety/security<br />

(Heeks 2008) External pressure<br />

Internal political desire<br />

Overall vision and strategy<br />

Project management<br />

Change management<br />

(Grönlund et al.<br />

2005)<br />

(Kumar & Best<br />

2006)<br />

Lack of long-term political commitment<br />

Dependence on donor organizations<br />

Lack of focus on the country development context<br />

Weak human capacity<br />

Lack of public leadership and sustained commitment<br />

Weak government capacity<br />

Lack of evaluation and monitoring<br />

Lack of stakeholder engagement<br />

Politics and self-interest<br />

Design<br />

Competencies<br />

Technological infrastructure<br />

(Schuppan 2009) Lack of focus on institutional, cultural, and administrative contexts<br />

Lack of focus on local capacity and management competence<br />

(Ali et al. 2009) Lack of government capacity<br />

Dependence on donor organizations<br />

Lack of coordination in government<br />

5. Sustaining EGOV programs in DCs<br />

Lack of private sector partnership<br />

Lack of citizen awareness<br />

Cultural and social issues<br />

In this section, we explain the concept of EGOV program sustainability and determine the major<br />

challenges for sustaining EGOV programs in DCs.<br />

205


5.1 Sustaining EGOV programs – concept<br />

Zamira Dzhusupova et al.<br />

Despite the growing interest in EGOV program sustainability, no explicit definition was proposed in the<br />

literature. We refer to program sustainability as program continuation (Shediac-Rizkallah & Bone 1998)<br />

and particularly how a program can continue creating benefits to the stakeholders (Harvey 2006) through<br />

institutionalization (Pluye 2004) and local capacity building (Harvey 2006).<br />

5.2 Sustaining EGOV programs – challenges in DCs<br />

From the literature review in Sections 2 and 3, sustainability issues are common reasons for failure of the<br />

EGOV initiatives in DCs. Based on this review and our own experience, we identified seven challenges<br />

influencing the sustainability of EGOV programs in DCs:<br />

C1. Ownership - Lack of national ownership (Heeks 2001a), (Sarantis et al. 2011) results in the absence<br />

of a cohesive EGOV strategy (Ronaghan 2002), little consideration of the local context (Dada 2006) and<br />

cultural and social issues (Cloete 2004), (Schuppan 2009), (Bhuiyan 2011), (Kumar & Best 2006),<br />

(UNDESA 2008). The reasons are: reliance on external experts (Ali et al. 2009), (Grönlund et al. 2005),<br />

(Heeks 2003) and ignoring the main stakeholders in EGOV planning, causing lack of ownership, and<br />

dominance of politics and self-interest (Heeks 2001b), (Stanforth & Flynn 2008).<br />

C2. Leadership - Lack of leadership at different levels of government, especially sustained political<br />

leadership, (Heeks 2001b), (Grönlund et al. 2005), (Kifle et al. 2009), (Backus 2001), (OECD 2003a), lack<br />

of commitment from top management and senior officials, causing resource misallocation and negative<br />

message to other groups (Furuholt & Wahid 2008), (UNDESA 2008), (Rose & Grant 2010).<br />

C3. Vision and Strategy - Absence of a long-term vision (Backus 2001) and cohesive implementation<br />

strategy (Sarantis et al. 2011) results in the lack of guidance and connection between ends and means<br />

(Heeks 2008), uncoordinated and isolated projects, and dispersed responsibilities due to multiple<br />

ownership (Cloete 2004), (Ndou 2004).<br />

C4. Institutional Capability - Weak or absent institutions for EGOV policy and coordination (Heeks<br />

2001a), (Schuppan 2009), with low administrative capacity and management liabilities within government<br />

(UNDESA 2003), resulting in the lack of coordination among EGOV projects (Dada 2006), and lack of<br />

collaboration between different functions and levels of government and between public and private<br />

sectors (Heeks 2003). Also, poor project and program management, weakness of controls, ineffective<br />

procurement and change management (Ronaghan 2002), (Heeks 2001b), (Jaeger 2003).<br />

C5. Design Versus Reality - Unrealistic expectations (Dada 2006) and poor understanding of the needs<br />

of people (UNDESA 2008) resulting in poor design which does not match the local environment including<br />

culture, values and needs. This is caused by the lack of inputs from local stakeholders and occurs when<br />

foreign donors and consultants drive the EGOV efforts (Cloete 2004), (Heeks 2003).<br />

C6. Capacity and Awareness - A huge gap exists between the capacities required for EGOV and the<br />

capacities present in most DCs (Heeks 2001a), with shortage of qualified personnel in government and<br />

lack of awareness among officials (Ronaghan 2002) and citizens (Ali et al. 2009). Also the gaps between<br />

the educated and uneducated, the rich and poor result in negative attitudes to EGOV, resistance to<br />

change, and biased provision of e-services (Basu 2004).<br />

C7. Dependence on External Assistance - Because of limited financial and human resources, many<br />

EGOV initiatives in DCs are dependent on the aid agencies, vendors and consultants, making them<br />

particularly vulnerable when the outside funding ends (Heeks 2003), (Grönlund et al. 2005), (Furuholt &<br />

Wahid 2008). When donors work with different agencies, isolation, fragmentation and duplication of<br />

applications may be reinforced (Hanna & Qiang 2005), (Schware & Deane 2003).<br />

To address these factors, there is a need for a comprehensive approach to EGOV design and<br />

development which explicitly considers the sustainability issue.<br />

6. Sustaining EGOV program in DCs: The EGOV.* framework<br />

This section presents a holistic approach to EGOV program development in DCs called EGOV.*. By<br />

design, the approach addresses the challenges related to EGOV program sustainability.<br />

206


6.1 EGOV.* framework - overview<br />

Zamira Dzhusupova et al.<br />

The aim of the EGOV.* framework is to build the local ownership and capability for establishing and<br />

sustaining EGOV development in a given Public Administration (PA), particularly in the DCs context. The<br />

framework prescribes a set of six inter-related activities as follows:<br />

A1. Assessing EGOV Readiness – Establishing the state-of-readiness for EGOV development in the PA<br />

and identifying potential stakeholders and their interests, willing to provide inputs for developing a realistic<br />

strategy for EGOV in the PA and to engage in the implementation of this strategy.<br />

A2. Formulating EGOV Vision and Strategy – Engaging the stakeholders identified in A1 in formulating<br />

the long-term vision for EGOV in the PA and the goals, strategies and targets to realize this vision, based<br />

on the findings of the activity A1 and lessons learned from other countries.<br />

A3. Constructing EGOV Program – Setting up a whole-of-government program through which the EGOV<br />

strategy defined through A2 could be implemented across the PA, engaging the stakeholders.<br />

A4. Building Human Capacity – Raising the capacity of the government workforce in the PA, including<br />

leadership, management and technical skills to be able to lead, implement and maintain EGOV<br />

operations, and the capacity of citizens to be able to benefit from the EGOV program.<br />

A5. Building Institutional Capacity – Strengthening the organizational capacity in the PA to be able to<br />

implement and benefit from the EGOV Program constructed through A3.<br />

A6. Building Research Capacity – Building local EGOV research capacity, including the development and<br />

adaptation of methodologies, survey instruments, assessment tools and guidelines, and capacity for<br />

strategic planning and program management adapting international best practices to the local context.<br />

Three main actors in the EGOV.* framework is: government, local stakeholders and external assistance.<br />

The government acts in the role of driver, owner and leader. Local stakeholders are the major<br />

contributors to the EGOV strategy and its implementation. External assistance acts as a facilitator and<br />

mentor. Table 2 shows how the framework ensures a balance between these roles across its six<br />

activities.<br />

EGOV.* promotes the principles of:<br />

P1. National ownership<br />

P2. Strong leadership<br />

P3. Stakeholder engagement<br />

P4. Balancing internal and external roles<br />

Figure 1 depicts the six activities and four principles of the framework.<br />

6.2 EGOV.* framework – addressing sustainability challenges<br />

Here is how EGOV.* addresses the challenges to EGOV sustainability in DCs, identified in Section 4.2:<br />

C1.Ownership - EGOV.* helps secure the national ownership of the EGOV program by balancing the<br />

internal influences from the PA and external influences from the aid agencies, vendors and international<br />

consultants, and building leadership at all levels of the PA. Table 2 elaborates how this balance is<br />

achieved by all actors involved and across all EGOV.* activities.<br />

C2. Leadership - In order to build leadership in government, A4 prescribes the organization of schools for<br />

policy-makers, decision-makers and public managers to overcome EGOV implementation challenges<br />

through new competencies. Moreover, a governance structure defined within A3 aims at political,<br />

strategic and managerial leadership and long-term commitment to sustaining the EGOV program.<br />

207


Zamira Dzhusupova et al.<br />

C3. Vision and Strategy - Based on readiness assessment carried out in A1 and international<br />

experiences investigated in A6, A2 defines the vision and strategy for long-term EGOV operation, with<br />

concrete benefits created to various stakeholders. The participatory process ensures consensus on the<br />

EGOV direction among the key stakeholders and their collaboration in the EGOV implementation.<br />

P2 – Leadership P3 – Engagement<br />

A3 - Constructing EGOV Program<br />

P1 – National Ownership<br />

A2 - Formulating EGOV Vision and Strategy<br />

A1 - Assessing EGOV Readiness<br />

Figure 1: EGOV.* framework – principles and activities<br />

Table 2: EGOV.* framework – actors and roles<br />

Activities<br />

Government<br />

Actors and Roles<br />

Local Stakeholders External Assistance<br />

A1 -<br />

Raising awareness<br />

Providing information on Facilitating assessment process<br />

Assessing Building assessment team stakeholder profiles and Providing methodologies and tools<br />

EGOV Identifying/analyzing stakeholders<br />

interests<br />

Building assessment capacity<br />

Readiness Communicating with stakeholders Participating in the survey Adapting assistance to local<br />

Defining the scope of assessment Partnering in the assessment<br />

conditions<br />

Organizing the survey<br />

exercise<br />

Designing the assistance process<br />

Gathering data, providing Advisory and consultancy Analyzing survey data<br />

helpdesk<br />

services<br />

Providing feedback on<br />

assessment<br />

Offering recommendations<br />

A2 - Organizing visioning/strategy Providing inputs for vision, Facilitating visioning and strategy<br />

Formulatin<br />

events<br />

goals, strategies, directions development process and<br />

g EGOV Engaging stakeholders<br />

and action lines<br />

mentoring<br />

Vision and Gathering inputs from Providing feedback during Providing methodologies and tools<br />

Strategy<br />

stakeholders<br />

public consultation Building capacity for strategic<br />

Drafting strategy document Partnership for capacity<br />

planning<br />

Organizing public consultation building and strategic Analyzing and summarizing the<br />

Driving strategy adoption<br />

planning<br />

inputs from major stakeholders<br />

Building a partnership platform Advisory and consultancy<br />

services<br />

Offering recommendations<br />

A3 - Defining program objectives, Providing inputs for program Facilitating program development<br />

Constructin<br />

governance<br />

development<br />

between government and<br />

g EGOV Setting up planning, Capacity building for project<br />

stakeholders<br />

Program implementation, monitoring and<br />

management<br />

Providing methodologies and<br />

control of projects Partnership in implementation<br />

tools<br />

Adopting stakeholder, benefits, Advisory and consultancy Building program management<br />

portfolio and risk management<br />

services<br />

capacity<br />

Providing feedback on<br />

program design<br />

Offering recommendations<br />

A4 – Building Human<br />

Capacity<br />

P4 – Balancing Internal and External Roles<br />

208<br />

A5 – Building<br />

Institutional Capacity<br />

A6 – Building Research<br />

Capacity


Activities<br />

A4 -<br />

Building<br />

Human<br />

Capacity<br />

A5 -<br />

Building<br />

Institutional<br />

Capacity<br />

A6 -<br />

Building<br />

Research<br />

Capacity<br />

Zamira Dzhusupova et al.<br />

Actors and Roles<br />

Government Local Stakeholders External Assistance<br />

Raising awareness<br />

Organizing workshops and<br />

trainings<br />

Disseminating training materials<br />

Anchoring the culture of capacity<br />

building<br />

Disseminating learning materials<br />

Defining a platform for long-life<br />

learning of government managerial<br />

IT staff<br />

Adaptation of methodologies,<br />

surveys, tools and guidelines to<br />

local conditions<br />

Benchmarking studies and data<br />

analysis<br />

Partnership in developing<br />

human capacity for EGOV<br />

implementation and use<br />

Proving advisory and<br />

consultancy services<br />

Partnership in building<br />

leadership and management<br />

capability in government<br />

Advisory and consultancy<br />

services<br />

Designing capacity building<br />

programs<br />

Partnership in developing<br />

research capacity<br />

Providing advisory and<br />

consultancy services<br />

Facilitating partnership to build<br />

human capacity<br />

Providing methodologies, tools<br />

and courses<br />

Offering recommendations based<br />

on international experience<br />

Facilitating partnerships to build<br />

leadership and management<br />

capability<br />

Providing methodologies, tools,<br />

courses<br />

Offering recommendations<br />

Supervising and mentoring staff<br />

Facilitating partnership for<br />

research<br />

Engaging local staff in adapting<br />

instruments and data analysis and<br />

benchmark studies<br />

Providing methodologies, tools,<br />

courses, supervision, and<br />

mentoring<br />

C4. Institutional Capability - An EGOV program defined in A3 aims at raising the efficiency and assuring<br />

the alignment of EGOV initiatives with whole-of-government goals, towards institutionalizing EGOV<br />

development and ensuring its sustainable operation. The program facilitates the creation of new<br />

capabilities within government and engages various stakeholders in adopting tools to local conditions.<br />

C5. Design Versus Reality – A1 helps address this challenge by assessing the demand, capabilities and<br />

environment for EGOV, underpinning the development in A2 of a realistic EGOV strategy that responds<br />

to the local needs and context, and establishing within A3 a platform for sustaining EGOV.<br />

C6. Capacity and Awareness – In order to raise awareness of EGOV among the stakeholders and their<br />

capacity to contribute and benefit, A5 prescribes workshops on global trends, opportunities and<br />

challenges of EGOV in DCs, while A4 provides training to build capacity in the PA to lead, coordinate and<br />

implement the EGOV program. In addition, while implementing the EGOV program, a key strategy is<br />

building PA’s capacity to implement EGOV and citizen awareness to benefit from it.<br />

C7. Dependence on External Assistance - Active engagement of the EGOV stakeholders and building<br />

partnership with the private sector, academia and non-government organizations helps address the<br />

dependence on external assistance. In addition, balancing internal and external influences by defining the<br />

roles of different actors, focusing on building local capability and using local workforce for EGOV program<br />

implementation support self-sustained EGOV operation.<br />

7. Case study – EGOV.AF<br />

In this section we present our experience in applying the EGOV.* framework in Afghanistan and explain<br />

how the EGOV sustainability issues were addressed within the EGOV.AF project.<br />

7.1 About EGOV.AF project<br />

One of the poorest countries in the world, affected by long history of war and conflicts, Afghanistan has<br />

weak institutions (World Bank 2010) and low human development index (UNDP 2010). At the same time,<br />

the government recognizes that good governance, rule of law, human rights and public engagement are<br />

imperative for the country, and views the rapidly developing ICT sector as a huge opportunity.<br />

The EGOV.AF project was jointly initiated by the Ministry of Communications and Information Technology<br />

(MCIT) and the UNU-IIST Center for Electronic Governance (UNU-IIST-EGOV), aimed at developing the<br />

nationally-owned EGOV strategy and program, well-aligned with the national development and public<br />

reforms priorities. The authors designed this project and implementation it with MCIT.<br />

209


Zamira Dzhusupova et al.<br />

7.2 Addressing sustainability challenges within EGOV.AF<br />

The EGOV.* framework was utilized in Afghanistan through the project instance called EGOV.AF. Here is<br />

how EGOV.AF addressed the sustainability challenges specific to the Afghanistan context:<br />

C1. Ownership - Aiming to secure the local ownership of the EGOV program, the roles of the project<br />

partners and local stakeholders were agreed as follows: 1) MCIT, as project owner, coordinated all<br />

activities and communicated with internal and external stakeholders; 2) Local stakeholders - agencies,<br />

NGOs and international organizations, private sector ICT providers, banks and universities contributed to<br />

the assessment, vision, strategy and program design; 3) UNU-IIST-EGOV provided the direction,<br />

facilitation, methodological support, training, supervision and mentoring; and 4) program board was<br />

recommended to ensure the long-term top-level support to the EGOV program.<br />

C2. Leadership - While strong leadership exists in MCIT to drive EGOV and a few ICT champions are<br />

located in different ministries and agencies, the awareness of the role of EGOV is limited and the<br />

leadership capacity at different levels of PA to drive EGOV implementation is scarce, leading to isolated<br />

and often duplicated initiatives supported by different aid organizations and foreign consultants. In view of<br />

this, the project organized a series of schools and workshops for senior officials and managers from the<br />

central and provincial governments to build leadership at all levels. Active participation of government<br />

leaders from ministries and agencies and collaboration with MCIT during assessment and strategic<br />

planning were most useful. To ensure whole-of-government collaboration during program implementation<br />

and operation, it was recommended to establish the Government Chief Information Officer structure.<br />

C3. Vision and Strategy - A series of multi-stakeholder workshops were organized by MCIT and<br />

facilitated by UNU-IIST-EGOV, using local assessment data and international experiences to produce the<br />

whole-of-government EGOV vision, strategic goals and concrete action lines. The vision and strategy will<br />

guide MCIT in implementing EGOV to utilize the strengths of various stakeholders and to respond to the<br />

needs and development priorities of Afghanistan<br />

C4. Institutional Capability - In order to strengthen government capacity for developing and implementing<br />

the EGOV program, UNU-IIST-EGOV provided training, supervision and mentoring across all activities of<br />

the project, supplied methodologies and tools for stakeholder analysis, readiness assessment and<br />

strategy and program development, and offered fellowships to the staff from MCIT and Kabul University<br />

for learning and research. A whole-of-government EGOV program resulting from EGOV.AF will result in<br />

the institutionalization of EGOV development in Afghanistan.<br />

C5. Design Versus Reality - UNU-IIST-EGOV provided the assessment methodology and instruments,<br />

adapted them to the local context, and trained the local assessment team from MCIT. The team<br />

interviewed various stakeholders and reviewed official documents and reports, collecting information on<br />

the demand for EGOV, public services, enabling environment, available resources and capacity,<br />

perceptions and challenges, and stakeholders and their interests. The assessment helped develop a<br />

realistic EGOV strategy and a sustainable program that respond to the needs of Afghanistan.<br />

C6. Capacity and Awareness - A series of awareness-building events were organized by MCIT and UNU-<br />

IIST-EGOV to build support for EGOV, targeting representatives from government, private sector, NGOs<br />

and universities, while capacity building events developed the skills required for EGOV implementation -<br />

leadership, strategic planning, change management, program management and research. Among the<br />

key EGOV implementation strategies are: creating the enabling environment; building stakeholder<br />

partnership; and raising citizen awareness to be able to benefit from EGOV.<br />

C7. Dependence on External Assistance - This challenge has been addressed by assigning clear roles to<br />

major actors - MCIT as project owner, UNU-IIST-EGOV as facilitator and mentor, and local stakeholders<br />

as contributors, and using partnership arrangements to engage the stakeholders in implementation. For<br />

example, EGOV.AF enabled MCIT to establish the EGOV Competency Center in partnership with<br />

academia and international, to act as a source of local expertise.<br />

8. Discussion<br />

The sustainability of EGOV initiatives in DCs, characterized by resources constraints, corruption, weak<br />

governance and unstable political and economical conditions is a major need and challenge. In this<br />

study, based on existing works and our own field experience, we examined the major challenges to<br />

210


Zamira Dzhusupova et al.<br />

EGOV program sustainability in DCs. Our findings identified seven challenges: C1) lack of local<br />

ownership; C2) lack of leadership; C3) unrealistic or absent vision and strategy; C4) weak institutional<br />

capability; C5) design-reality gap; C6) lack of awareness and capacity; and C7) dependence on external<br />

assistance. To address such challenges, we proposed to use a holistic EGOV development framework<br />

called EGOV.*. EGOV.* prescribes six activities involved in the EGOV design and implementation, and<br />

focuses on building human, organizational and institutional capacity to be able to plan, coordinate,<br />

implement and sustain EGOV locally. EGOV.* identifies three main categories of actors and assigns<br />

them specific roles in EGOV development: the government leads, coordinates and implements EGOV;<br />

local stakeholders contribute to EGOV design, development, implementation and operation through<br />

partnerships; and external assistance facilitates the development of the national capacity. In particular,<br />

EGOV.* addresses the sustainability challenges throughout the EGOV program lifecycle, by utilizing<br />

strong leadership and stakeholder engagement to build the national ownership of the EGOV efforts, and<br />

by carefully balancing the internal and external influences to avoid dependence on external assistance.<br />

From our experience applying the EGOV.* framework in Afghanistan (EGOV.AF project), we observe that<br />

the presence of the following conditions is essential for successful EGOV implementation: 1) A<br />

government organization responsible for leading EGOV development, with dedicated staff for planning<br />

and coordination; 2) A few EGOV promoters at the political and strategic level, who can mobilize internal<br />

and external stakeholders; 3) Understanding of the complexity of EGOV design, development and<br />

implementation, at least within the government organization responsible for EGOV, and the recognition of<br />

the importance of building partnerships; 4) Some organisations outside government, with sufficient<br />

interest and capacity to engage in the partnership for EGOV; 5) A shared understanding within the<br />

government of the national development priorities and the potential of EGOV to offer improvements within<br />

and outside government; and 6) A critical mass of e-champions present in government ministries and<br />

agencies. When these conditions are not met, the effectiveness of the EGOV.* framework can be limited.<br />

9. Conclusions<br />

In this research, we examined the key challenges to sustaining the Electronic Governance (EGOV)<br />

programs in Developing Countries (DCs), and presented an approach to overcoming them, based on the<br />

EGOV development framework called EGOV.*. EGOV.* addresses the sustainability challenges<br />

throughout the EGOV program lifecycle by localization - considering the local context, promoting local<br />

ownership and developing local capability for leading, implementing and sustaining EGOV initiatives.<br />

Based on the EGOV.* implementation experience in Afghanistan (EGOV.AF), we argue that this<br />

approach could guide the development of sustainable EGOV programs in DCs. However, the effective<br />

application of this framework requires a number of conditions to be met. At present, the framework is<br />

being implemented in another country in Africa and a formal evaluation framework is under development<br />

to assess the sustainability of the resulting EGOV programs.<br />

References<br />

Ali, M., Weerakkody, V. & El-Haddadeh, R., 2009. The Impact of National Culture on E-Government Implementation :<br />

A Comparison Case Study. In Proceedings of the Fifteenth Americas <strong>Conference</strong> on Information Systems, San<br />

Francisco, California August <strong>6th</strong>-9th 2009. pp. 1-13.<br />

Backus, M., 2001. E-governance in Developing Countries, IICD Research Brief<br />

Basu, S., 2004. E-government and developing countries: an overview. International Review of Law, Computers &<br />

Technology, 18(1), pp.109-132.<br />

Bhuiyan, S.H., 2011. Modernizing Bangladesh public administration through e-governance: Benefits and challenges.<br />

Government Information Quarterly, 28(1), pp.54-65.<br />

Cloete, F., 2004. Maximising the potential of transforming policy failure into policy success : E-government , the<br />

digital divide and e-development In Annual Congress of the International Institute of Administrative Sciences<br />

(IIAS). pp. 14 - 18.<br />

Dada, D., 2006. The Failure of E-Government In Developing Countries: A Literature Review. The Electronic Journal<br />

on Information Systems in Developing Countries http://www.ejisdc.org, 26(1), pp.1- 10.<br />

Evans, D. & Yen, D., 2006. E-Government: Evolving Relationship of Citizens and Government, Domestic, and<br />

International Development. Government Information Quarterly, 23(2), pp.207-235.<br />

Furuholt, B. & Wahid, F., 2008. E-government Challenges and the Role of Political Leadership in Indonesia : the<br />

Case of Sragen. In Proceedings of the 41st Hawaii International <strong>Conference</strong> on System Sciences. pp. 1-10.<br />

Gilgarcia, J. & Pardo, T., 2005. E-government success factors: Mapping practical tools to theoretical foundations.<br />

Government Information Quarterly, 22(2), pp.187-216.<br />

Grönlund, Å., Andersson, A. & Hedström, K., 2005. NextStep eGovernment in developing countries: Report D1:<br />

State-of-the-art in eGovernment in developing countries , including needs , lessons learned , and research<br />

findings,<br />

211


Zamira Dzhusupova et al.<br />

Hanna, N.K. & Qiang, C.Z.-wei, 2005. National E-Government Institutions: Functions, Models, and Trends. In<br />

Information and Communications for Development 2009: Extending Reach and Increasing Impact. World Bank,<br />

pp. 83-102.<br />

Harvey, G., 2006. Exploring Program Sustainability : Identifying Factors in Two Educational Initiatives in Victoria.<br />

Evaluation, 6(1), pp.36-44.<br />

Heeks, R., 2001a. Building e-Governance for Development: A Framework for National and Donor Action. Working<br />

Paper Series, I-Government<br />

Heeks, R., 2003. Most eGovernment-for- Development Projects Fail: How Can Risks be Reduced? Working Paper<br />

Series, I-Government<br />

Heeks, R., 2008. Success and Failure in eGovernment Projects. Success and Failure in eGovernment Projects,<br />

p.eGovernment for Development. Available at: http://www.egov4dev.org/success/ [Accessed January 20, 2011].<br />

Heeks, R., 2001b. Understanding e-Governance for Development. Working Paper Series, I-Government<br />

Jaeger, P., 2003. E-government Around the World: Lessons, Challenges, and Future Directions. Government<br />

Information Quarterly, 20(4), pp.389-394.<br />

Janowski, T., Ojo, A. & Estevez, E., 2010. EGOV .* An Action Framework for Governance 2.0. , (May). Available at:<br />

http://unpan1.un.org/intradoc/groups/public/documents/un-dpadm/unpan039408.pdf.<br />

Kifle, H., Low, P. & Cheng, K., 2009. e-Government Implementation and Leadership – the Brunei Case Study.<br />

Electronic Journal of e-Government Volume www.ejeg.com, 7(3), pp.271 - 282.<br />

Kumar, R. & Best, M., 2006. Impact and Sustainability of E-Government Services in Developing Countries: Lessons<br />

Learned from Tamil Nadu, India. The Information Society, 22(1), pp.1-12.<br />

Leitner, C., 2006. e-Government: People and Skills in Europe s Administrations. Proceedings of the 39th Annual<br />

Hawaii International <strong>Conference</strong> on System Sciences (HICSS 06).<br />

Ndou, V. (Dardha), 2004. E– government for Developing Countries: Opportunities and Challenges. The Electronic<br />

Journal on Information Systems in Developing Countries, http://www.ejisdc.org, 18(1), pp.1-24.<br />

OECD, 2003a. Checklist for e-Government Leaders, Available at: www.oecd.org/dataoecd/62/58/11923037.pdf .<br />

OECD, 2003b. The e-government imperative : main findings, Available at:<br />

www.oecd.org/dataoecd/60/60/2502539.pdf.<br />

Pluye, P., 2004. Making Public Health Programs Last: Conceptualizing Sustainability. Evaluation and Program<br />

Planning, 27(2), pp.121-133.<br />

Ronaghan, S.A., 2002. Benchmarking E-government : A Global Perspective, New York. Available at:<br />

http://unpan1.un.org/intradoc/groups/public/documents/un/unpan021547.pdf.<br />

Rose, W.R. & Grant, G.G., 2010. Critical Issues Pertaining to the Planning and Implementation of E-Government<br />

Initiatives. Government Information Quarterly, 27(1), pp.26-33.<br />

Sarantis, D., Charalabidis, Y. & Askounis, D., 2011. A Goal-Driven Management Framework for Electronic<br />

Government Transformation Projects Implementation. Government Information Quarterly, 28(1), pp.117-128.<br />

Schuppan, T., 2009. E-Government in developing countries: Experiences from sub-Saharan Africa. Government<br />

Information Quarterly, 26(1), pp.118-127.<br />

Schware, R. & Deane, A., 2003. Deploying e-Government Programs: The Strategic Importance of “I” before “E.” Info,<br />

5(4), pp.10-19.<br />

Shediac-Rizkallah, M.C. & Bone, L.R., 1998. Planning for the Sustainability of Community-based Health Programs:<br />

Conceptual Frameworks and Future Directions for Research, Practice and Policy. Health education research,<br />

13(1), pp.87-108.<br />

Stanforth, C. & Flynn, M.O., 2008. The Promotion of E-Governance in Developing Countries : Reflections on E-<br />

Government in Two Asia-Pacific Countries 1 . Introduction : Good Governance and Development. In Prato<br />

CIRN 2008 Community Informatics <strong>Conference</strong>: ICTs for Social Inclusion: What is the Reality? Refereed Paper.<br />

pp. 1-20.<br />

UNDESA, 2008. United Nations e-Government Survey 2008 From e-Government to Connected Governance,<br />

Available at: http://unpan1.un.org/intradoc/groups/public/documents/un/unpan028607.pdf.<br />

UNDESA, 2010. United Nations E-Government Survey 2010 Leveraging e-government at a time of financial and<br />

economic crisis, Available at: http://unpan1.un.org/intradoc/groups/public/documents/un/unpan038851.pdf.<br />

UNDESA, 2003. World Public Sector Report 2003: E-Government at the Crossroads, New York. Available at:<br />

http://unpan1.un.org/intradoc/groups/public/documents/un/unpan012733.pdf.<br />

Wescott, C., Pizarro, M. & Schiavo-Campo, S., 2000. The Role of Information and Communication Technology in<br />

Improving Public Administration. In To Serve And To Preserve: Improving Public Administration In A<br />

Competitive World. Asian Development Bank.<br />

Zwahr, T., Finger, M. & Mueller, P., 2005. More than Digitisation - The Transformative Potential of E-Governance :<br />

An Exploratory Case Study. In Proceedings of the 38th Hawaii International <strong>Conference</strong> on System Sciences.<br />

pp. 1-9.<br />

UNDP 2010, Human Development Report, viewed 25 April 2010, .<br />

World Bank 2010, Countries and Economies, viewed 20 April 2010, .<br />

212


Adapting Family Card System by Means of Smart Cards<br />

Magdy Elhennawy, Tarek Saad, Ashraf abdel Wahab and Sameh Bedair<br />

Ministry of State for Administrative Development (MSAD), Cairo, Egypt<br />

mhennawy@ad.gov.eg<br />

tsaad@ad.gov.eg<br />

awahab@ad.gov.eg<br />

sbedair@ad.gov.eg<br />

Abstract: The Egyptian government has defined policies to provide subsidies to support its citizens. However, there<br />

have been obstacles in defining the citizens who truly deserve the subsidies as well as a need to monitor the<br />

allocation of funds more closely, and enhance the level of implementation of the process. The smart family card<br />

would replace the traditional ration book, which was filled out by hand at the grocery store registered as an outlet for<br />

rations and signed by the ration book holder. The system was no longer efficient enough to accommodate the<br />

growing population, and documentation was not accurately updated to ensure that subsidized goods were reaching<br />

targeted citizens. The new system allowed the registered outlet only replacing goods that have already been claimed<br />

by smart card, with all transactions being electronically monitored and documented, thus eliminating waste or illegal<br />

transactions. The electronic system for the family card was designed to provide citizens with the services offered by<br />

the government; such as pensions and medical insurance as well as subsidized goods or their monetary equivalent.<br />

The smart cards can be used at grocery stores authorized to sell subsidized goods as well as at ATM machines. The<br />

family card project has provided a comprehensive database of Egyptian families which can be used by decision<br />

makers in defining the families in need, as well as tracing consumption levels and patterns across the country. The<br />

implementation has resulted in over US$1,217 Million gross till now in savings through controlling distribution of<br />

subsidies. The system takes into consideration the need for constant updates to guarantee the accuracy of<br />

information. After in-depth study and analysis it was found to be financially feasible to outsource the project to a<br />

private sector company, who would be responsible for the design, implementation and maintenance of the<br />

technology related to the project as well as applying high level international standards for data and process<br />

security.In this research, Family Card System has been presented. In section 1, background about MSAD is<br />

presented. The case is introduced in section 2. The reason why using smart cards is introduced in section 3. The<br />

case is introduced in section 4 covering the operatuional aspects, the technical architecture, acceptance and<br />

development methodologies, then the lessons learned. The encountered obstacles is introduced in section5. The<br />

neat profit from the system deployment is introduced in section 6. The analysis of the system results is discussed in<br />

section 7. Finally the conclusions and future work is written in section 8.<br />

Keywords: smart cards, network communications, Information security<br />

1. Organization background<br />

One of the main roles of the Ministry of State for Administrative Development is to improve the<br />

governmental services provided to citizens, through evolved information and communications<br />

technologies.<br />

MSAD has been doing a lot of effort to achieve its roles, which improved Egypt international rank in<br />

human capital index; from 140 in 2003 to 138 in 2010, in e-Government; from 162 in 2003 to 23 in 2010,<br />

and in general rank; from 140 in 2003 to 86 in 2010. Figure 1 shows the above status over years.<br />

Figure 1: Egypt’s ranking in human capital, e-Government, and general ranking worldwide<br />

213


Magdy Elhennawy et al.<br />

MSAD has designed its organization structure in a resilient and effective way to cope with the rapidly<br />

changing market, as it divides its core activities into four programs; 1) Government Services<br />

Development, 2) Enterprise Resource Planning, 3) Establishing and Linking National Databases, and 4)<br />

Institutional Development Program.<br />

1.1 The government services development program<br />

In this program, objectives are set at: 1) Provide distinguished services for citizens, businessmen, and<br />

investors, 2) Provide a convenient working environment for both employees and citizens, 3) Promote<br />

transparency through separation between citizen and service provider , and 4) Enhance monitoring and<br />

follow-up procedures.<br />

To achieve such objectives, MSAD proposes the following service delivery channels which are: 1)<br />

Internet, through the Egyptian Government Portal (www.egypt.gov.eg), Investment Portal<br />

(www.investment.gov.eg), Business Portal, Education Portal, Governorates Portals , Phones ,<br />

Landline Phones (Call centers and CRM’s), and Mobile Phones, and 2) Service Providers, such as:<br />

Service Bureaus , and Individuals.<br />

For Internet Services, the number of visitors to the e-government portal www.egypt.gov.eg is about one<br />

million/month. On the other hand, the information provided on the investment portal<br />

www.investment.gov.eg is in four languages, for investors. Total number of visitors during 2009: 10<br />

million.<br />

1.2 The enterprise resource planning program<br />

In this program, objectives are set to increase accuracy & efficiency, and reduce expenditure. Many<br />

applications have been implemented to serve such objectives, such as: e-archiving & document<br />

exchange, financial units, purchasing, personnel & payroll, e-Inventory-exchange between different<br />

governmental bodies to reduce stagnant stock, Egyptian products online catalog, medical e-archiving,<br />

and payroll databases.<br />

Also, the government e-procurement portal, launched: January 2010, targets the following objectives:1)<br />

promote transparency in government procurement process , 2) provide Central registration of suppliers,<br />

3) optimize the procurement cycle through all government entities, 4) reduce procurement costs while<br />

increasing ROI, 5) optimize inventory levels through the adoption of efficient procurement practices, 6)<br />

improve the ability to audit the public procurement expenditures.<br />

1.3 The establishing and linking national databases program<br />

In this program, objectives are set to establish an integrated national database, where government<br />

entities and institutions can exchange data with one another in an efficient and safe environment. This<br />

will lead to simplifying the procedures for citizens, when requesting governmental services throughout the<br />

country. In addition, the program will also contribute to identifying various methods that could be used in<br />

delivering the different subsidized items to the specified target groups<br />

The objectives are to provide accurate & updated information to support the decision making process and<br />

serve investors, to cover both: social and economic outcomes.<br />

The social outcomes can be achieved by the family database, education database, and national ID<br />

database. Linking them together will reduce drop out from schools at for children in earlier stages. On<br />

the other hand, the economical outcomes can be achieved by the real-estate registration and unified<br />

economical establishments’ records.<br />

1.4 The institutional development program<br />

The objective is to study existing organizations in terms of roles & responsibilities, laws & regulations,<br />

and organizational structures to move from static hierarchical structures to dynamic structures from point<br />

of view of both teams & projects, cycles & processes, and human resources development & capacity<br />

building.<br />

214


2. Case introduction<br />

Magdy Elhennawy et al.<br />

The family card system has been proposed, studied, analyzed, designed, contracted and is currently<br />

operationally monitored by the MSAD. The stakeholders of the system include the Ministry of Social<br />

Solidarity (MSS), MSAD, and the Egyptian society.<br />

MSAD has outsourced the implementation of the system to a consortium which was responsible for the<br />

following: building the system components, technical support to system programs and applications,<br />

hosting of family card database, availing service provision centers, availing call center, applying networks<br />

and communication lines, training of civil servants responsible for managing the system, system<br />

management, system operation and maintenance, and availing of necessary applications and tools.<br />

The family card system is intended to build a complete system for achieving a set of objectives. Such<br />

objectives are: Guaranteeing the delivery of the support services to the deserved people, provide a<br />

families database to support the services delivery and help decision maker, allow civilized environment to<br />

provide the service in a civilized mode. The system was composed of a set of basic components as<br />

shown in Figure 2, namely: centralized database hosted in a specialized data center, set of applications<br />

to achieve the system functionalities, call center to allow interaction with the citizens, technical support<br />

center to guarantee the system security and service provision continuity, supply offices automation to<br />

supervise system activities, service centers to conduct families data manipulation. To allow delivering<br />

more than one service to the citizen using the same smart card, the system employs a multi-application<br />

smart card technology. (Hendry, 2007).<br />

Call<br />

Center<br />

Interaction<br />

Wholesaler<br />

Technical<br />

Support<br />

Technical Support<br />

Family Database<br />

System Applications<br />

Data<br />

Manipulation<br />

Supervision Service<br />

Center<br />

Supervision<br />

Technical<br />

Support<br />

Technical Support<br />

Centers<br />

Technical<br />

Support<br />

Supply<br />

Offices<br />

Figure 2: The system basic components<br />

The Egyptian government adopted some strategies and objectives to implement the project:<br />

Big projects should start by a pilot to measure the feasibility before generalization all over the<br />

country.<br />

Outsourcing the implementation, operation, and maintenance of the system.<br />

Employing only one smart card to support all support services.<br />

Ensuring that the citizen should not bear any extra costs.<br />

Centralizing the design and decentralizing the implementation. The system is designed once and<br />

implemented as a pilot, then it is deployed in other governorates in Egypt with little customization<br />

according to each governorate requirements.<br />

Decentralizing service provision by creating untraditional outlets to fulfill the citizen's needs. Before<br />

the system, the social pension was delivered to the citizen from a specific social unit, which led to<br />

long queues and crowdedness. After the implementation of the system, other outlets like banks<br />

branches, ATM units, etc… are present to deliver the pension from anywhere<br />

Applying new methods of management that consider the aspect of efficiency and guarantee the ideal<br />

usage of the resources<br />

215


Magdy Elhennawy et al.<br />

3. Why was the implementation through smart cards?<br />

The Egyptian government decided, in 2005, to deploy a system allowing the citizen to deliver his monthly<br />

ration commodities from any grocer all over the Egypt. Before the system deployment, in the paper card<br />

system, each family is associated with a specific grocer that can deliver his monthly commodities only<br />

from hem. The requested system should be reliable enough such that each family can deliver her<br />

monthly ration commodities in more than one time and from any grocer all over Egypt. To achieve this<br />

aim, we need a smart token that can provide the following facilities: can store information about the<br />

deserved monthly commodities, can process such data to deliver part of his monthly total and compute<br />

the remaining for a next delivery time, and can communicate on-line with the central system to control the<br />

delivery of the monthly commodities from any grocer anywhere in Egypt. Besides, it can store and<br />

communicate such data securely with the central system. The only smart token that allows such<br />

specifications is the smart cards.<br />

4. Case description<br />

4.1 The situation before implementing the project<br />

Before the project implementation, the process of delivering food commodities was completely manual<br />

and paper based, which led to lack of follow up, high leakage ratios, and in-accurate delivery of the<br />

commodities to the deserved families. The process implied that, each group of targeted families, to<br />

receive food commodities, is linked to a specific grocer. Accordingly, each grocer receives, on a monthly<br />

basis, the products corresponding to the summation of commodities for all families linked to that grocer,<br />

referred to as a full quota even if the grocer did not deliver all such quotas to deserved families.<br />

Each family is provided a paper card to receive the relevant monthly commodities. The family used to go<br />

to the grocer, receives the commodities, and then, pays for what has been received and then signs a<br />

grocer paper document. As a matter of fact, the subsidized commodities are cheaper than the market<br />

prices as it is supported by government.<br />

Eventually, indispensable commodities are not monitored and the grocer can sell them outside the<br />

system. The grocer prepares a monthly report stating his quota, revises it with the associated supply<br />

office, and gets approval that the full quota has been delivered to deserved people and eventually proof<br />

that what he will receive is correct. Then, the report goes to the wholesaler to receive the grocer's quota.<br />

So, the grocer receives, on a monthly basis, the full quota irrespective if he is actually delivering all of<br />

them to the citizens or not.<br />

Another weakness of the manual and paper based system is when the grocer receives his full quota from<br />

the wholesaler; he can manipulate the quota limit assigned to him illegally and informally with the supply<br />

office.<br />

Moreover, any changes that occur in the family data (new born insertion in the paper card, family address<br />

change, grocer change …) should be registered on the paper document in the supply office, manually.<br />

The manual system is time consuming and gives great chances for inconsistency of registries, corruption,<br />

and mistakes. Not to mention the large storage space needed for filling such documents.<br />

Similarly, the delivery of social pensions suffered the same shortcomings before the system, (same<br />

process, and same disadvantages). The people attaining the social pension were registered and received<br />

the service manually. However, the social pension is given to families according to certain social criteria<br />

which, in the manual system, can be forged, consequently, non-eligible citizens can privilege from<br />

pensions.<br />

This is similar in the delivery of health insurance; it suffered the same weak points before the system. It<br />

subject to bad manipulation and weak provision of the service.<br />

Hence, the Egyptian government has adopted smart cards as a tool to provide various social and support<br />

services (food commodities, social pension, health insurance, educational support,…) to underprivileged<br />

citizens. Thus, the government relied on the use of information and communications technology as a<br />

means to manage and control the delivery of social services to citizens. Meanwhile, a database for the<br />

Egyptian family is implemented to support the decision making related to subsidized services.<br />

216


4.2 System operational aspects<br />

Magdy Elhennawy et al.<br />

The family card system consists of operational components, which allows the successful delivery of<br />

services to eligible families. Each family receives a smart card. Smart card contains indicators for the<br />

quantities allowed for that family. The grocer is equipped with a point of sale, POS, to register the<br />

commodities delivery transactions. The family card holder inserts his card in the POS located in the<br />

grocer shop and chooses the needed commodities, the POS issues a receipt of such chosen quantities.<br />

Accordingly, family card holder receives commodities, pays the grocers the value of money, and the<br />

transaction is sent to the central system through the system network. Accordingly, a lot of processing and<br />

many operational and statistical reports can be issued to plan for the service delivery and the decision<br />

making support. Figure 3 shows the system operational aspects.<br />

Issuing &<br />

personalizing<br />

Smart Cards<br />

Grocer Card Distribution<br />

Citizen Card Distribution<br />

Paper<br />

Cards<br />

Figure 3: The system operational aspects<br />

Generating Electronic<br />

Data<br />

Electronic<br />

Database<br />

Citizen<br />

Card<br />

Transaction<br />

Registration<br />

Grocer Shop<br />

POS<br />

Central<br />

System<br />

Grocer<br />

Card<br />

4.3 System technical architecture<br />

The system technical architecture defines the technologies to be used by (or built in) one, more, or all<br />

information systems in terms of its data, processes, interfaces, and network components. (Kendal, 2003).<br />

It defines the framework for the general design of the system.<br />

To avoid monopoly, the system has been implemented by three vendors, each is responsible about<br />

implementing the system in a group of governorates. MSAD has studied the system requirements,<br />

prepared its specifications, then delivered specifications to various vendors for implementation.<br />

The system is transaction based one; it records the transaction of delivering commodities to the citizens.<br />

This transaction happened in the grocer shop, is be transferred to the central system, in which the system<br />

applications and database are hosted. The applications and database are hosted in professional center<br />

that provides the standard specifications needed to secure database and applications. Such center has<br />

been equipped with several power sources, main and alternate power generators, more than one Internet<br />

connections. Meanwhile, firewalls and protection equipment are installed to prevent any inbound<br />

suspicious. Figure 4 shows the system technical architecture. MSAD, on the other hand, continually<br />

restores master and backup copies of family database for safety reasons.<br />

As the family card system is a national and process critical system; expandability, system resilience,<br />

system robustness, key management and security, interoperability, and continuity, were critical factors<br />

that have been taken into consideration during its design process.<br />

As the system is designed for expandability, the system allows to add new services in the future, even<br />

after the distribution of cards to citizens. It has been achieved by employing multi-application smart card<br />

technology (Hendry, 2007; EMVCO, 2000; Katherine, 2002), which allows installing more than one<br />

application on the card. This technology should allow adding new application to the card remotely.<br />

Moreover, the internal file structure of the card should be built to be adoptable and expandable.<br />

217


Magdy Elhennawy et al.<br />

As system is designed in such a way to achieve resilience, the system has been designed to be<br />

completely fault tolerant system (two nodes of each server, using high availability clusters). It has been<br />

also designed to have double communication lines between different components (POS can<br />

communicate either over LAN or GPRS with more than one operator - support centers communicate with<br />

data center using frame relay and backup internet lines - availability of backup strategy.<br />

Service<br />

Centers<br />

Date Center<br />

Group#1 Govs.<br />

System Applications<br />

Grocers<br />

3 rd Vendor<br />

Backup Copy<br />

Family Database<br />

Supply<br />

Offices<br />

Service<br />

Centers<br />

Main Copy<br />

Family Database<br />

Date Center<br />

Group#2 Govs.<br />

System Applications<br />

Grocers Supply<br />

Offices<br />

2 nd Vendor<br />

Service<br />

Centers<br />

Date Center<br />

Group#3 Govs.<br />

System Applications<br />

Grocers<br />

1 st Vendor<br />

Supply<br />

Offices<br />

Figure 4: The system technical architecture<br />

As system is designed in such a way to achieve robustness, the system should be rigid, and robust, and<br />

can work under worst condition. To achieve this, the system has been designed such that POSs can<br />

work offline as well as online. Besides, reports can be available both on application server over http and<br />

using client/server over TCP/IP. Relevant tools have been built to support manual operations for<br />

uploading transactions using USB to transfer and upload batches even if communication between POS<br />

and data center is down. If batches are corrupted, tools are available to fix corruption. If batch is lost,<br />

manual screen is used to enter them manually using the printed receipts. Meanwhile, data is available in<br />

more than one location which helps the reconstruction of information even when some data is lost.<br />

The system should be secure and protected from any unauthorized entity, process, or individual.<br />

(Schneier, 1996; Stalling, 1995). To achieve this, the transactions exchanged over the system are<br />

encrypted to allow confidentiality of exchanged information over the network. (Schneier, 1996; Stalling,<br />

1995). This process has been achieved by acquiring the Host Security machine, HSM, which is<br />

responsible for encryption key generation, referencing when encrypting or decrypting the exchanged<br />

transactions. Besides, the system has a Communication & switching server software which facilitates the<br />

transaction authentication API, card management system API. Meanwhile, each card has unique<br />

different 24 keys derived from a master key, Smart cards support multi-applications technology, so, each<br />

application is protected by different set of keys which helps the concurrent use of card between different<br />

service providers.<br />

As for the interoperability, any component in the system in one governorate is able to interface with other<br />

components in other governorate. Since three vendors were responsible for building the system in<br />

various governorates of Egypt, the interoperability between them is a vital issue. A group of<br />

interoperability tests have been designed and executed to insure the POS, smart cards, and other system<br />

components in belonging to various vendors are interoperable.<br />

The system continuity means the system continues working even in case of any unexpected events<br />

happened. This has been achieved in the system through using main and alternate servers, applying<br />

backup and disaster recovery strategies, providing the various security features, using uninterrupted<br />

power supply UPS with grocers POSs, training the system operators and servants, and finally, procuring<br />

the system HW with a specifications suitable to the field of application.<br />

218


Magdy Elhennawy et al.<br />

The system development strategy provides development environment, followed by testing and staging<br />

environment where we can develop the system initially, or modify any bugs in batches, as well as adding<br />

any new required features in the system. This strategy allows the operational system is continually<br />

operated while any requested modifications are in progress as shown in Figure 5.<br />

Production<br />

Environment<br />

Family Database<br />

Hosting<br />

Figure 5: System development strategy<br />

4.4 System acceptance<br />

Test/Staging<br />

Environment<br />

Development<br />

Environment<br />

The system acceptance has followed a user acceptance methodology, which guarantees the correct<br />

deployment of the system. During the system design phase, the acceptance tests document has been<br />

prepared, revised, and approved by MSAD project team. This document includes the set of tests to be<br />

conducted, which are classified as: functional tests, performance tests, installation tests, network<br />

connection tests, and database hosting tests. The document covers, for each test, the following: test<br />

name, test objectives, tests steps, expected results for each step, and corresponding test report that<br />

should be filled during execution of the test. On the other hand, the document should contain the test<br />

data, the tests scenarios, and timing execution frame. Finally, each test has been executed on the<br />

system platform as well as on the field after system installation.<br />

4.5 Key benefits of implementing the project<br />

The system guarantees the delivery of the services to the underprivileged citizens through a<br />

computerized application, up-to-date database, and efficient incurring system. It establishes monitoring,<br />

controls over the infiltration and loss in supports, and allows creation of a civilized environment through<br />

which underprivileged citizens can acquire their services. It achieves transparency through the<br />

establishment of clear and neutral processes for acquiring and managing subsidies.<br />

The project also resulted in reduction of consumption/beneficiary. This is mainly due to the fact that<br />

distribution was not as controlled in the past. And even though 18 million new beneficiaries were added to<br />

the subsidies system, it still resulted in savings of US$1,217 Million Egyptian Pounds gross till now over<br />

subsidies.<br />

The system includes building an integrated family database to support the system together with relevant<br />

statistics needed to analyze the behavior of the Egyptian families. It avails accurate, up-to-date, and<br />

timely data needed for future support planning and supporting decision making which targets a better<br />

quality of living. Hence, the government can use such database to identify social problems and<br />

consequently exert efforts to enforce Egyptian families to change their living style. This can happen<br />

through eradicating illiteracy, and working against unhealthy habits.<br />

The system includes a call center, with low cost call fees, to allow citizens call and record their problems,<br />

remarks, comments, and recommendations that may lead to improve the system. Accordingly, the citizen<br />

has the chance to participate and better express their needs through electronic mean leading to influence<br />

policy-making.<br />

The system was implemented in phases. Phase 1 consisted of a pilot project in one governorate in 2005.<br />

In Phase 2, other fifteen governorates were covered in 2008. In addition, the social pension service has<br />

been added to the smart card, as well. Phase 3 was covering the remaining governorates. It has been<br />

completely covered by July 2010. It is working now properly. The system currently covers 29<br />

governorates with 12 million smart cards. The Health Insurance service has been added to the card for<br />

one governorate (as a pilot) and has started from January, 2010. (Elhennawy, 2011). New governorates<br />

are soon starting to be covered.<br />

219


Magdy Elhennawy et al.<br />

Moreover, the culture of using smart cards, which is one of the worldwide De facto delivery mechanisms,<br />

is expanding in Egypt. Hence, Egypt's technological pointer is subject to improvement.<br />

4.6 The development and implementation Methodology<br />

The Egyptian government has planned to enlarge and empower the subsidy of commodities, the social<br />

pension, health insurance, and other services to cover underprivileged families. The family card is geared<br />

towards achieving such goal. As a key development issue, MSAD has followed the spiral methodology to<br />

implement the system development life cycle.<br />

The key development and implementation steps were:<br />

Establishing an electronic database for Egyptian families including the transactions performed for<br />

each type of service.<br />

Defining the overall system technical architecture, and defining the various technologies and<br />

implementation strategies.<br />

Preparing the top-level design of the system, and defining the system configuration.<br />

Developing, for each service, an application to manage the service database to support provision of<br />

the service to the deserved families.<br />

Issuing multi-application smart cards for services delivery.<br />

Building the network infrastructure of the system that allows all stakeholders for the service to<br />

communicate together.<br />

Building the service centers that will manage the database updates according to predefined rules. It<br />

also manages the replacement of the damaged and lost smart cards. A formula defining the number<br />

of service centers corresponding to the number of families required to be covered has been proposed<br />

and implemented accordingly.<br />

Building a call center to receive the citizens' requests and complaints. The call center is equipped<br />

with a complaints management system that traces the received complaints until fulfillment.<br />

Training the system users. The training includes a theoretical and on-the–job training sessions.<br />

Hardware and Software installation and overall system deployment.<br />

4.7 The resources allocated for the system<br />

MSAD has allocated four different resources for the below mentioned purposes:<br />

Database Technical Unit (DTU); a dedicated unit to electronic database activities management, such as<br />

database design, validation and verification procedures. In addition, the unit proposes and implements a<br />

set of criteria to link the Family database with other national databases for further validation and<br />

verification purposes as well as fulfillment of other citizen support services.<br />

Distributed Team (DT); a contracted team dedicated to survey the system activities amongst different<br />

Egyptian governorates. It is responsible for enforcing the system regulations and implementations in the<br />

governorates. Also, ensuring the right and smooth distribution of smart cards to citizens, as well as<br />

making sure that the PIN mailer distribution is proceeding correctly. After establishing the service, DT<br />

responsibility extends to monitor and guarantee the quality of the service provision.<br />

Family Project Task Force (FPTF); responsible for DTU supervision, DT follow-up, and ensuring that the<br />

overall system components are correct. It also manages and ensures the follow up of various system<br />

standards, such as: system development life cycle, data entry and conversion procedures, fault resolution<br />

and analysis, performance evaluation activities, and smart cards versus PIN mailer restrictive distribution<br />

procedures.<br />

220


Magdy Elhennawy et al.<br />

Project Management Group (PMG); responsible for the follow-up of all previously mentioned resources,<br />

as well as managing other project procedures, such as: financial, management, and technical issues. It<br />

manages the contractual aspects of the project.<br />

4.8 The impact and lessons learned<br />

The system have resulted in better targeting of underprivileged families (since all relevant data is stored<br />

in an electronic database, it was easy to identify them), and better decision making; if statistical data<br />

show less tendency to use certain items, they can be replaced by other highly demanded ones.<br />

The main lessons learned, can be summarized as follows:<br />

Big projects should start with a pilot project to prove the success of the system even if on a smaller<br />

scale, to discover problems, rectify them and create a win-win case with all stakeholders.<br />

Social considerations of the project should be considered prior to technical aspects. Citizen<br />

considerations and requirements should be taken into account from the start before planning and<br />

implementation phases.<br />

Capacity building of different stakeholders is crucial to the success of the system. The system covers<br />

a training to grocers, supply offices employee's, and service centers employee's<br />

Considerable effort is required to change the citizen’s culture to use new technologies for service<br />

delivery. Public symposia for each new implemented governorate have been executed, the system<br />

has been explained and a round discussion for all the participating entities was conducted.<br />

The key performance indicators of the system should be clearly stated and followed up.<br />

5. The main obstacles during design phase.<br />

The system has encountered various obstacles that have faced the deployment of the project. They can<br />

be summarized as follows:<br />

The first obstacle: To achieve the system objectives, we need a network that covers all grocers all over<br />

Egypt. It can be through the dial up or ADSL connection. Unfortunately, some grocers have no telephone<br />

lines. It can be achieved through the GSM mobile networks. But, the three available mobile networks<br />

(Mobinil, Vodafone, Etisalat) have shortage in coverage of some regions in Egypt. The selected optimal<br />

solution is to use manual transfer of batches through flash memory wherever there is no available dial up<br />

or ADSL connection or mobile networks coverage.<br />

The second obstacle: During the deployment of the system, the grocers and supply offices employees<br />

culture, who used to use manual system and paper cards, was one of the obstacles. The grocer<br />

reluctance to use the automated system is another obstacles. They did not use any automated systems<br />

or smart cards technology, and have no any technical background before. It has been overcome by<br />

conducting public announcements through different seminars, meetings, and symposiums to explain the<br />

system components and roles of individual system stakeholders. On the other hand, training to grocers<br />

and supply offices employees has been conducted. Training has covered theoretical in class rooms,<br />

practical upon the system equipments and on the job training during the system installation on site.<br />

The third obstacle: The system should guarantee the continuation of the service provision, even in case<br />

of power failure or in case of equipment failure. The continuation of the service provision, in case of<br />

power failure has been solved by providing UPS units accompanied with each POS, or using a<br />

rechargeable battery. The continuation of the service provision, in case of equipment failure has been<br />

solved by duplicating the POS in sites, besides, contracting with a support policy that enforces the<br />

contractor to replace the failed POS during 2 hours of failure announcement, on site.<br />

The fourth obstacle: The environmental condition on grocer shop, which faces the POS and system<br />

equipment with shocks. On the other hand, with reference to the grocery store environment, the Point of<br />

Sale (POS) used lies between packs of sugar, oil, flour, and other types of commodities. This can make<br />

the POS liable to be intentionally or non-intentionally damaged and broken by the grocer. This has been<br />

overcome by selecting POS with rigid characteristics and making covers to such equipments to keep it<br />

clean from any environmental contamination.<br />

221


Magdy Elhennawy et al.<br />

Other obstacles: Other minor obstacles have been encountered. obstacle lies in the culture of the<br />

citizen who used to deal with paper card and may never have dealt with electronic equipment, making it<br />

difficult for her/him to get acquainted with the new system. In addition, getting to know the citizens'<br />

feedback, complaints, and comments, was a major obstacle that we encountered. Another obstacle<br />

related to the citizen, was how to force her/him to keep her/his smart card and PIN number away from the<br />

grocer to avoid illegal transactions. Big propaganda and announcement campaign have been conducted<br />

leaded by the ministries themselves to convince the citizen overcome such problems..<br />

6. The neat profit of the system deployment can be summarized as follows<br />

The neat profit of the deployment of the project can be summarized as follows:<br />

Direct saving in allocated budgets, comparing with the status before the deployment. There is a save<br />

in budgets for about US$1,217 Million gross till now according to the first issued reports about the<br />

actual system operation. The following chart shows the ratio of saving from start deployment till now.<br />

Building a complete database for the families deserving ration support, together with the related<br />

delivery transactions. The transaction contains enough data to trace the delivery process, and<br />

delivery evaluation. It have had helped government to optimize the support delivery. The evaluation<br />

process have led to cancel the delivery of some rations (ex: the blubber delivery ratio was 2%), other<br />

doze have been increased (ex: the sugar with delivery ration 94% have been doubled from 1kg. to 2<br />

kg. per person, the same for oil with delivery ration 98%).<br />

A system infrastructure have been built, covering the system technical architecture, called centre,<br />

database hosting, service centers, which can be used to launch other types of citizen support using<br />

the same smart card and the same infrastructure. It is worthy to state that already two other services<br />

have been installed on the same card, using the same infrastructure, namely: social pension and<br />

health care services.<br />

The change of citizen culture, to be accommodated with smart card technology. And automated<br />

system is another big profit to the deployment of the system.<br />

7. Analysis of the achieved results after system deployment<br />

The system has been deployed using the incremental approach. Deployment has started in 2006 by one<br />

governorate, until finally the last group of governorates have been deployed in 2010. Table 1 shows the<br />

gradual deployment of Egypt’s governorates. Figure 6 shows the gradual deployed smart cards in<br />

thousands cards.<br />

Table 1: The gradual deployment of Egypt’s governorates<br />

Year 2006 2007 2008 2009 2010<br />

Number of governorates deployed 1 1 5 16 29<br />

Annual Number of deployed Smart Cards (in<br />

thousands)<br />

765 1020 10860 72396 144000<br />

Figure 6: The gradual deployed smart cards and associated governorates<br />

222


Magdy Elhennawy et al.<br />

The direct save in quantities of commodities have been calculated starting from 2006 till 2010. Table 2<br />

shows the save in quantities of commodities during the above 5 years. Figure 7 shows such saved<br />

quantities, as: sugar (main), oil (main), sugar (added), oil (added), noodles, and tea. However, the direct<br />

save in support budgets have increased gradually, until reaching the maximum in 2010. The total value of<br />

save till now is US$1,217 million gross with average about US$243 million gross. If we consider the<br />

implementation cost of the system, which is about US$492 million tell now, the total value of save till now<br />

is US$725 million net with average about US$175 million, since the system has been deployed partially<br />

in 2005. Figure 8 contains a chart that shows the gradual growth in direct save in support budgets.<br />

Table 2: The save in quantities of commodities during the years 2006 to 2010<br />

Name<br />

Oil (main)<br />

Sugar (main)<br />

Tea<br />

Rice<br />

Oil (added)<br />

Sugar (added)<br />

Total Save in Quantities (in Tons)<br />

2010<br />

2009<br />

9,859,980<br />

18,754,055<br />

21,682,510<br />

152,661,198<br />

33,143,472<br />

14,407,421<br />

5,672,291<br />

11,349,134<br />

10,161,084<br />

77,096,739<br />

27,467,676<br />

9,374,054<br />

Figure 7: The saved quantities, as: sugar, oil, noodles, and tea<br />

Figure 8: The gradual growth in direct save in support budgets<br />

223<br />

2008<br />

900,720<br />

1,865,893<br />

1,469,074<br />

7,102,142<br />

4,394,865<br />

3,520,800<br />

2007<br />

56,976<br />

113,618<br />

91,291<br />

295,097<br />

49,256<br />

48,903<br />

2006<br />

42,173<br />

84,070<br />

66,551<br />

96,202<br />

37,705<br />

37,029


Magdy Elhennawy et al.<br />

It is obvious that these saved values in commodities quantities, and eventually in direct save in budgets<br />

will continue to be exist as the system controls the leakages holes in the system. This save will increase<br />

when new services will be added to the system.<br />

8. Conclusions and future work<br />

The family card system together with its design and implementation issues has been presented. The<br />

system have been resulted in direct save in support budgets for about US$1,217 million gross till now,<br />

US$725 million net with average about US$175 million, and it is expected to increase this value after<br />

the addition of new support services. It is assumed that there is a complementary G2G (Government-to-<br />

Government services) system that will be linked with this system in the future to support the direct<br />

updating of the family databases from the original sources responsible for updating of such data. The<br />

expected completion of the total system will lead to a great electronic society.<br />

References<br />

Elhennawy, M. (2011) ‘Health Care Implementation by Means of Smart Cards’, The International Journal of<br />

Computer Science Issues, IJCSI, Volume 8, Issue 1, January.<br />

EMVCO, (2000), EMV2000, Integrated Circuit Card Specification for Payment Systems, Version 4.0, [Online],<br />

Available: http://www.emvco.com/Specifications.cfm [December 2000].<br />

Hendry, M. (2007) “Multi-application Smart Cards Technology and Applications”, Cambridge University Press, 2007.<br />

Katherine M. Shelfer and J. Drew Procaccino (2002), Smart Card Evolution, Communications of ACM, Volume 45,<br />

Issue 7, ACM Press.<br />

Kendal, E.(2003) “System Analysis and Design”, Printic Hall, 2003.<br />

Schneier, B. (1996), Applied cryptography, John Wiley & Sons, Inc., 1996<br />

Stalling, W. (1995) “Network and Inter-Network Security”, Printic Hall, 1995.<br />

224


Collaborative Network Analysis of two eGovernment<br />

<strong>Conference</strong>s: Are we Building a Community?<br />

Nuša Erman and Ljupčo Todorovski<br />

University of Ljubljana, Slovenia<br />

nusa.erman@fu.uni-lj.si<br />

ljupco.todorovski@fu.uni-lj.si<br />

Abstract: In the last two decades, eGovernment research maturated into an active scientific field with a number of<br />

publication venues, many of them taking form of regular annual conferences. In this paper, we address the central<br />

question of whether the active researchers of these different venues converge towards a joint eGovernment research<br />

community. To answer this question, we perform a comparative analysis of the collaborative networks of coauthorship<br />

relationships between scholars that published papers at the two leading conferences in the field: this one,<br />

the <strong>European</strong> <strong>Conference</strong> on eGovernment, and the International <strong>Conference</strong> on eGovernment. Surprisingly, the<br />

obtained results show that each conference has built its own relatively stable community, and there are only weak<br />

ties that do not really indicate an emergence of a joint eGovernment scientific community.<br />

Keywords: co-authorship network, scientific community, social network analysis<br />

1. Introduction<br />

eGovernment research (EGR) focuses on studying the use of information and communication technology<br />

in public administration and government activities. In the last two decades, the interest in EGR has<br />

dramatically grown, resulting in its evolution into an active scientific field. EGR scholars established a<br />

number of formal and informal communication channels to disseminate knowledge and research results.<br />

Among them, academic conferences comprise the exchange of information and reinstatement of<br />

discussion among the participants through the formal and informal patterns, which represent a useful<br />

feedback for the improvement of scholars’ work (Lisée et al. 2008).In the relatively young and dynamic<br />

area of eGovernment, a number of conferences have emerged. Three of them get most of the attention<br />

from the EGR scholars: International <strong>Conference</strong> on eGovernment (EGOV), <strong>European</strong> <strong>Conference</strong> on<br />

eGovernment (ECEG), and International <strong>Conference</strong> on Digital Government Research. Two other more<br />

general conferences hold regular sections on eGovernment: Hawaii International <strong>Conference</strong> on System<br />

Sciences and the <strong>European</strong> <strong>Conference</strong> on Information Systems.<br />

Many authors have analysed the process of development and the state-of-the-art of the EGR field and its<br />

community. The abovementioned conferences and other EGR publication venues represent a rich data<br />

source for such analysis. Authors have considered maturity (Grönlund 2004, Grönlund and Andersson<br />

2006) and the development (Heeks and Bailur 2007) of EGR field, as well as the analysis of the nature of<br />

contributions and the evolution of research interests(Bannister and Connolly 2010). The main analytical<br />

approach used in the above exemplary studies is content analysis (Busch et. al 2005) of articles used to<br />

identify article types, methodologies, and data used or topics and issues addressed. Although content<br />

analysis is widely used approach in the study of scientific communication, it is often limited with the<br />

number of papers we can include in the study and therefore it is also often limited to a single publication<br />

venue or a limited sample of papers from different venues. Scaling up those studies to a large number of<br />

papers and venues can be a serious challenge and mostly prohibitive.<br />

In our previous studies (Erman and Todorovski 2009, 2010), we proposed an alternative approach based<br />

on social network analysis (Nooy et. al 2005). We focus on qualitative analysis of networks of various<br />

types of scientific communication (collaboration and citation) among researchers in the EGR field. One of<br />

the limitations of our previous studies is that they focused on the papers published at a single publication<br />

venue, the EGOV conference. In this paper, we overcome this limitation by extending our study of the<br />

EGOV collaboration networks to the ECEG conference. More specifically, we observe the networks of<br />

relations between authors publishing at the two conferences, where the relations represent coauthorships<br />

of joint papers. We build these networks using the electronic manuscripts of the papers<br />

published in the respective proceedings in the five-year period from 2005 to 2009. The main aim of this<br />

paper is then to compare the networks emerging from ECEG and EGOV to the joint network of coauthorships<br />

between all the authors from both conferences. By this comparison, we can check the validity<br />

of our central hypothesis that through the time, the scholars publishing at these two conferences<br />

converge towards a joint community of eGovernment researchers. We also use the collaborative network<br />

225


Nuša Erman and Ljupčo Todorovski<br />

analysis to identify the most prolific authors in the community and identify emerging sub-communities<br />

dealing with specific eGovernment topics.<br />

The rest of the paper is organized as follows. Section 2introduces the notion of scientific community and<br />

collaborative co-authorship network as formalism for representing and analysing communities. In<br />

continuation, it presents the data used in this study and the resulting collaborative networks for the<br />

ECEG, EGOV and the joint community. Section 3 presents the results of the comparative analysis of the<br />

networks. Section 4 discusses and compares the results, putting them in the context of related work.<br />

Finally, Section 5 draws conclusions and outlines the directions for further research.<br />

2. Scientific community as collaboration<br />

Scientific community, defined as a totality of working and interacting scientists through common and<br />

standardized procedures of scientific communication, is usually quantified through the analysis of<br />

scientific publications. The most commonly used methods to perform such an analysis are methods of<br />

scientometrics and bibliometrics which measure scientific activities through different levels of<br />

aggregation, enabling the analysis of research collaborations, evolution of scientific fields, and<br />

corresponding scientific networks (Borgman 1990).<br />

The defining aspect of every scientific community is the scientific communication performed according to<br />

several communication patterns. In contrast to other communication scenarios which usually capture only<br />

formal part of scientific communication, academic conferences comprise the exchange of information and<br />

encourage the discussion among the participants, and hence as a data source enable to examine formal<br />

and informal part of scientific communication. Among several communication patterns, the collaboration<br />

among scientists is measured through the cooperation of scientists in writing scientific papers, better<br />

known as co-authorship collaboration. The most approximate way to study co-authorship collaboration is<br />

a network approach, where the nodes represent individual researchers, and links among them represent<br />

co-authorship relations. (Bordons and Gomez2001).<br />

In this paper, we are interested in the analysis of a community formed through the papers published in<br />

the proceeding of two major eGovernment conferences, ECEG and EGOV from 2005 to 2009. In the<br />

continuation of this section, we introduce the data and corresponding co-authorship networks.<br />

2.1 Data description<br />

We build the data set for this study as extension of the data collected in Erman and Todorovski<br />

(2010).Hence, the bibliographic data about papers from EGOV conference is upgraded with data about<br />

papers published at ECEG conference. For both conferences, we included papers published from 2005<br />

to 2009. The extended data set includes 475 papers; 314 new papers from the ECEG proceedings and<br />

161 papers from the EGOV proceedings. These 475 papers were co-authored by 765 different<br />

researchers.<br />

The graphs of Figure 1 depict the dynamics of the number of papers and the number of authors through<br />

years for each conference. The number of papers published at EGOV conference is relatively stable and<br />

ranges from 30 to 40 papers per year. In contrast, the number of papers published at the ECEG<br />

conference is higher, fluctuating between 50 and 83 papers per year. The similar pattern is observed<br />

when the number of authors is considered; the number of authors at the EGOV conference varies<br />

between 70 and 100, whereas at ECEG it varies from 100 to 180 authors per year.<br />

2.2 From data to co-authorship network<br />

The bibliographic data can be transformed to a co-authorship network following a simple procedure. For<br />

each paper, we collect the list of paper authors A. For each of them, we add a corresponding node to the<br />

network, if one has not been there yet. If the list consists of a single author we proceed with the next<br />

paper, since it does not introduces any co-authorship links in the network. Otherwise, for each pair of<br />

authors from A, we add an undirected link (edge) connecting the corresponding network nodes. If the link<br />

has been present already, we increase its weight by one; if the link is new, we set its weight to one. Thus,<br />

the weight assigned to an edge connecting two nodes in the network denotes the number of papers that<br />

the corresponding two researchers co-authored.<br />

226


Nuša Erman and Ljupčo Todorovski<br />

Figure 1: Number of papers published in the proceedings of the ECEG (left-hand side) and EGOV (righthand<br />

side) conferences and number of authors thereof in the period from 2005 to 2009.<br />

Following the outlined procedure, we generated five weighted undirected co-authorship networks for the<br />

yearly proceedings of ECEG and EGOV as well as a joint network of both proceedings for each year from<br />

2005 to 2009. Using the single-year networks, we also constructed five “cumulative” co-authorship<br />

networks; the first network contains data from 2005 and each successive network is built by joining the<br />

next year network to the current one.<br />

Table 1 summarizes the basic properties of the five cumulative networks for the three analyzed<br />

communities, i.e., EGOV, ECEG and the joint community. The number of nodes corresponds to the<br />

number of authors, while the number of edges corresponds to the number of co-authorships between<br />

pairs of researchers. The percentage of edges with weight larger than one represents the portion of<br />

research pairs that co-authored more than one paper, and the density represents the portion of all<br />

possible edges that are present in the observed network.<br />

As expected, all three communities induce steadily growing networks both in terms of the number of<br />

nodes and edges. This increase in size is being strictly followed by density decrease. The ECEG<br />

community network is very sparse and has three times lower density than EGOV network in 2005.<br />

Densities of both networks, as new authors enter both communities, decline, and the more rapid decline<br />

is observed in the EGOV network. The low density of ECEG community network is reflected in the<br />

sparseness of the joint community network, where in 2009only 0.33% of all possible edges are present.<br />

The very low density of the joint network might also indicate the lack of communication between the<br />

ECEG and EGOV community.<br />

Table 1: Basic properties of the “cumulative” co-authorship networks for the ECEG, EGOV, and joint<br />

ECEG+EGOV community<br />

Community<br />

ECEG<br />

EGOV<br />

Network<br />

Property 2005 2005-2006 2005-2007 2005-2008 2005-2009<br />

#nodes 123 192 266 353 491<br />

#edges 92 164 234 326 500<br />

%edges(w>1) 2.2 9.8 12.0 12.3 11.4<br />

Density 0.0123 0.0089 0.0065 0.0052 0.0041<br />

#nodes 74 136 208 262 307<br />

#edges 91 170 295 395 467<br />

%edges(w>1) 0.0 1.2 7.5 7.8 9.4<br />

Density 0.0337 0.0185 0.0137 0.0116 0.0100<br />

#nodes 194 318 456 588 765<br />

ECEG+EGOV<br />

#edges<br />

%edges(w>1)<br />

183<br />

1.1<br />

328<br />

7.0<br />

516<br />

11.1<br />

706<br />

10.9<br />

950<br />

11.2<br />

Density 0.0098 0.0065 0.0050 0.0041 0.0033<br />

On the other hand, the portion of edges with weight larger than one is higher in case of ECEG community<br />

networks stabilizing at the level of 12% in the last three years, indicating the establishment of long-term<br />

collaboration between community members. The higher collaboration level in ECEG community<br />

influences the increase of collaboration activity in the joint community. The higher percentage of long-<br />

227


Nuša Erman and Ljupčo Todorovski<br />

term collaboration edges might be also due to the fact that ECEG conference publishes more papers per<br />

year.<br />

To further explore these initial conjectures based on the basic network properties, we will continue with deeper<br />

analysis of the structural properties and dynamics of the observed networks.<br />

3. Structure and dynamics of the EGR community<br />

To perform the analysis of the built cumulative co-authorship networks, we use Pajek software tool (Nooy<br />

et. al 2005). The results are presented in three subsections: in the first one, we quantify and analyze the<br />

dynamic change of the EGOV, ECEG and joint networks from 2005 to 2009; second section identifies the<br />

most active and most collaborative authors in the joint community; and in the third subsection we analyze<br />

the joint community structure in terms of subgroups of co-authoring researchers, their geographical<br />

distribution, and the thematic topics of their research. In each section, we also compare the results with<br />

the extract from our previous research (Erman and Todorovski 2010) emphasizing the aspects of<br />

interaction between the two observed conferences.<br />

3.1 Comparative community dynamics<br />

Table 2 summarizes the results of the analysis of the dynamics of the three observed communities. We<br />

first observe the percentage of “stable” community members, that is, “returning” scholars that published<br />

their papers in more than one proceeding. At the beginning of the observation period, in 2005, all authors<br />

are considered to be new to the community. The portion of returning authors in both communities is very<br />

high: more than half of the authors publish their papers repeatedly at the same conference. The<br />

percentage steadily increased to more than 75% in all three communities. A notable exception is the drop<br />

to 72% in 2005-2009 ECEG community, which is due to the fact that a large number of 180 authors<br />

contributed 83 papers to the 2009 ECEG proceedings. This is in contrast with the tightly constrained<br />

EGOV publishing policy, where small number of accepted papers stabilized the community with up to<br />

85% of returning authors. The latter situation can be considered as a sign of a stabilizing community.<br />

The joint community shows similar stabilizing trend with 77% returning authors. However, note that the<br />

joint community is merely a “joined” community network. A surprisingly low percentage of authors (1.6)<br />

published papers at both ECEG and EGOV in 2005. The percentage steadily increases through the<br />

years, and hardly hit 4% in 2007, but still remains below 5%. This indicates that we still have to wait for<br />

the co-existence of different eGovernment scientific venues to evolve into a synergy of real joint<br />

eGovernment scientific community.<br />

Table 2: Dynamics of the ECEG, EGOV and the joint community from 2005 to 2009 in terms of number<br />

of authors, percentage of returning authors, percentage of authors publishing at both<br />

conferences, number of papers, and percentage of papers with more than one author<br />

Community 2005 2005-2006 2005-2007 2005-2008 2005-2009<br />

#authors 123 192 266 353 491<br />

ECEG<br />

%returning<br />

#papers<br />

0.0<br />

68<br />

64.1<br />

118<br />

72.2<br />

175<br />

75.4<br />

231<br />

71.9<br />

314<br />

%co-authored 54.4 57.6 60.6 64.1 66.2<br />

#authors 74 136 208 262 307<br />

EGOV<br />

%returning<br />

#papers<br />

0.0<br />

30<br />

54.4<br />

59<br />

65.4<br />

95<br />

79.4<br />

127<br />

85.3<br />

161<br />

%co-authored 66.7 69 75.8 78.0 80.7<br />

#authors 194 318 456 588 765<br />

%returning 0.0 61.0 69.7 77.5 76.9<br />

ECEG+EGOV %joint 1.6 3.1 4.0 4.6 4.3<br />

#papers 98 177 270 358 475<br />

%co-authored 58.2 61.6 65.9 69.0 71.2<br />

The extent of collaboration between community members can also be measured through the percentage<br />

of co-authored papers. All three communities show stable increase in the percentage of co-authored<br />

papers, reaching the maximal value of 81% (EGOV), 66% (ECEG), and 71% (joint). In sum, there is a<br />

clear trend of growing collaboration among community members in both ECEG and EGOV. In both<br />

communities (and especially EGOV), this trend is accompanied by the process of community<br />

convergence and stabilization with researchers that regularly publish in the proceedings. On the other<br />

228


Nuša Erman and Ljupčo Todorovski<br />

hand, results indicate that the ECEG and EGOV induced two separate communities, where only a very<br />

modest number of authors publish papers at both conferences.<br />

3.2 Productivity and collaboration among community members<br />

We measure the productivity of a community member by the number of his/her published papers and the<br />

number of her/his appearances in the yearly proceedings. Table 3 presents the list of the ten most<br />

productive authors in the joint community in the period from 2005 to 2009. Five or 50% of them have<br />

published their papers at only one conference, and five of them at both conferences.<br />

Table 3: The ten most productive authors in the ECEG and EGOV conference community in the period<br />

between 2005 and 2009 measured in terms of number of published papers and number of<br />

years in which authors published their papers, the names of the authors that published at both<br />

conferences are emphasized (bold)<br />

Author #papers #ECEG-papers #years<br />

Janssen M. 9 7 5<br />

Fairchild A. 7 7 5<br />

Askounis D. 7 3 4<br />

deVuyst B., Neumann L. 6 6 4<br />

Polzonetti A., Corradini F. 6 4 4<br />

Grönlund Å. 6 0 4<br />

Lubbe S. 6 6 3<br />

Becker J. 6 0 3<br />

The list is, however, biased towards ECEG authors, since the number of papers published at ECEG is<br />

much higher. Thus, at the top of the list, Janssen M. has published nine papers, seven of them in the<br />

ECEG conference proceedings. Further down the list, we include authors that published at least six<br />

papers at any of the conferences. The list of most prolific authors in Table 3 includes a high percentage<br />

(33%) of authors that are active in both communities relative to the percentage of joint authors in the joint<br />

community (5%). This might be an early indicator of a trend of convergence towards joint community in<br />

the future.<br />

Activity of individual members is not as important to the process of community building as the degree of<br />

collaboration of an author with others. We can observe the collaboration through the degree of<br />

connectedness among nodes within a co-authorship network. In social network analysis, the degree of<br />

connectedness is expressed through measures of centrality of individual network nodes, i.e. degree,<br />

closeness, and betweenness centralities, which differ in the way the position of individual authors within<br />

the co-authorship network is referred (Nooy et al 2005). In co-authorship network, degree centrality<br />

equals the number of collaborators an author has, closeness centrality indicates the accessibility of the<br />

observed author to the others, and betweenness centrality indicates the number of shortest paths that<br />

pass through the observed node. Table 4 lists the most central authors with respect to each of these<br />

three measures.<br />

Table 4: The most central authors in joint conference community in the period between 2005 and 2009<br />

according to the degree, closeness, and betweenness centrality, emphasized (italic) names<br />

correspond to the most central authors according to three (two) centrality measures<br />

Degree centrality Closeness centrality Betweenness centrality<br />

Author % Author % Authors %<br />

1 Askounis D. 1.57 Askounis D. 1.72 van Dijk J. 0.02<br />

2 Corradini F. 1.44 Corradini F. 1.57 Henriksen H.Z. 0.02<br />

3 Polzonetti A. 1.44 Polzonetti A. 1.57 van der Geest T. 0.02<br />

4 Janssen M. 1.31 Charalabidis Y. 1.53 Tan Y.H. 0.02<br />

5 Charalabidis Y. 1.31 Janssen M. 1.44 Askounis D. 0.01<br />

6 Hahamis P. 1.18 Sourouni A.M. 1.44 Corradini F. 0.01<br />

7 van der Geest T. 1.18 van der Geest T. 1.43 Polzonetti A. 0.01<br />

8 Sourouni A.M. 1.18 Lampathaki F. 1.37 Janssen M. 0.01<br />

9 Lampathaki F. 1.05 van Dijk J. 1.36 Vintar M. 0.01<br />

10 Vintar M. 1.05 Hahamis P. 1.32 Wimmer M.A. 0.01<br />

229


Nuša Erman and Ljupčo Todorovski<br />

The lists presented in Table 4 contain 14 authors, most of them not being among the most prolific ones in<br />

Table 3. Five of them are among top 10 according to all three centrality measures: Askounis D., Corradini<br />

F., Polzonetti A., Janssen M. and van der Geest T. Further six authors are central according to two of the<br />

observed centrality measures. Most of these eleven authors come from the ECEG community, which is<br />

due the fact that ECEG authors and collaborations prevail the joint network in both number of nodes and<br />

edges (see Table 1). EGOV authors correspond mostly to the network nodes with high betweenness<br />

centrality.<br />

3.3 Community structure<br />

In this final part of the analysis, we shift our focus from the quantitative network properties to the network<br />

structure. We search for clusters of highly inter-connected nodes that might correspond to emerging<br />

eGovernment sub-communities. To this end, we apply methods for identifying components and cores in<br />

social networks.The search for components in co-authorship network enables to identify possible subgroups<br />

of authors which collaborate frequently and, presumably, share common research topic(s). On the<br />

other hand, the search for cores makes possible to identify such sub-groups of authors in which the<br />

authors are mutually linked. Hence, suchcore-sub-groups actually representsets of paper(s) in which all<br />

core members collaborated (Nooy et al. 2005).<br />

Our co-authorship joint network for the 2005-2009 period has 263 components. Out of these, 80<br />

components contain only one author; 80 authors are isolated since they never in the observed period coauthored<br />

a paper with others. On the other hand,we identified the largest component consisting of 16<br />

tightly interconnected authors. Note however, that here we can perceive the impact of papers with<br />

significantly higher number of authors compared to other papers: namely, in such a situation a single<br />

paper co-authored by many authors would induce a (non-)representative component. To overcome this<br />

problem, we augment each component with the list of corresponding papers and consider only those<br />

components that are induced by at least four joint publications. In addition, we also filter out all the<br />

components with less than five researchers.<br />

Table 5 presents the results of the component analysis by enlisting all eleven components that satisfy the<br />

four-joint-papers criterion explained above. Each community subgroup is described with the leading<br />

researcher that is a co-author of majority of the papers in the component, the geographical distribution of<br />

authors’ affiliations, and the list of thematic topics of the papers in the component.<br />

Table 5: The analysis of eleven largest components of the joint co-authorship network, we only<br />

considered components that correspond to at least four papers<br />

#authors/<br />

#papers<br />

Representative<br />

Geographical<br />

distribution<br />

16 9 Van Dijk J. Netherlands<br />

15 9<br />

Andersen K.N.<br />

Tan Y.H.<br />

Denmark,<br />

Norway,<br />

Netherlands<br />

14 8 Charalabidis Y. Greece<br />

12 10 Janssen M. Netherlands<br />

12 8 Vintar M.<br />

12 7<br />

Corradini F.<br />

Sabucedo L.A.<br />

11 8 Grönlund Å.<br />

Slovenia,<br />

Greece<br />

Thematic topics <strong>Conference</strong>s<br />

citizen-centric e-services; user profiling;<br />

delivery channels; e-services adoption<br />

and usage<br />

project evaluation; benefits of IT usage; ecustoms;<br />

super-national e-services<br />

interoperability; meta-data and (semantic)<br />

annotation of e-services<br />

service-delivery, eGovernment stage<br />

models<br />

indicators of eGovernment development;<br />

e-services adoption and usage; life events<br />

and integration of e-services<br />

Italy, Spain semantic-driven integration of e-services<br />

Sweden,<br />

Norway<br />

11 6 Ayo C. Nigeria<br />

eGovernment research analysis; misc<br />

e-voting, eGovernment progress,<br />

eGovernment and public administration<br />

reforms<br />

EGOV (9)<br />

EGOV (9)<br />

EGOV (5)<br />

ECEG(3)<br />

EGOV (3)<br />

ECEG (7)<br />

EGOV (7)<br />

ECEG (1)<br />

EGOV (3)<br />

ECEG(4)<br />

EGOV (7)<br />

ECEG (1)<br />

ECEG (6)<br />

9 7 Becker J. Germany Misc EGOV (7)<br />

8 6 Ferro E. Italy, USA digital divide and IT literacy EGOV (6)<br />

5 4 Mentzas G. Greece evaluating quality of e-services EGOV (4)<br />

230


Nuša Erman and Ljupčo Todorovski<br />

The results show that most of the components representatives (all but the representatives of the eighth<br />

and last components) were already identified as most productive or most central ones. Furthermore, most<br />

of the identified sub-groups have narrow geographical distribution: ten out of eleven components are<br />

entirely from Europe, six are even tighter, including single region or country, or, in some cases, a single<br />

institution. International or trans-Atlantic collaboration is relatively rare. Finally, there is a great variety of<br />

thematic topics addressed by the researchers in different groups. Note also, that the identified subcommunities<br />

are orthogonal in the topics they deal with; each of them develops its own (relatively narrow)<br />

expertise area that is different from the others. Most of this groups are mainly affiliated with EGOV<br />

conference. This is in line with our previous results that show the greater cohesivness of the EGOV<br />

community. Here it is reflected in a greater ability to stir groups of researchers with a commong research<br />

interest.<br />

When identifying the cores of the network, we applied the same four-joint-papers criterion. Figure 2<br />

depicts the six cores of the joint co-authorship network that follow this criterion. They confirm the findings<br />

of the component analysis: each of the six cores corresponds to one of the identified components from<br />

Table 5. Another fact can be derived from the result depicted in Figure 2: only these 15 authors (out of<br />

765; 2%) have been involved in more than three joint collaboration ventures. This is another piece of<br />

evidence that the long-term collaboration within the joint conference community is relatively rare.<br />

Figure 2: Six cores of the joint (ECEG+EGOV) community co-authorship network<br />

In sum, the structural analysis shows that a number of sub-communities have emerged, each of them<br />

dealing with topics that are orthogonal to the thematic topics of the other. Virtually almost all the subcommunities<br />

have a representative researcher that is ranked among top active or collaborative<br />

community members. Most of the sub-communities have narrow geographical distribution including a<br />

single region, country or even institution. The community members are mostly affiliated at institutions in<br />

<strong>European</strong> countries, and large-scale international collaborations are very rare. The findings virtually<br />

resembles the ones for the EGOV conference.<br />

4. Discussion<br />

There are number of studies that analyze the state-of-the-art and the dynamics of the development of the<br />

eGovernment research (EGR) field mentioned in the introduction. Our study differs from them in several<br />

ways. First, it relies on a standard scientometric method widely used to analyze other research fields. In<br />

this sense, it continues our previous studies (Erman and Todorovski 2009, 2010), where we have dealt<br />

231


Nuša Erman and Ljupčo Todorovski<br />

with the analysis of citation and co-authorship networks induced from the papers published in the EGOV<br />

conference proceedings. Here, we extend the scope of those studies to the ECEG conference.<br />

Another distinguishing property of our study is that we collect the empirical data systematically from all<br />

the papers published in the proceedings of the ECEG and EGOV conference in the five years period<br />

between 2005 and 2009. Most other studies perform analysis of a sample of data about articles and<br />

papers from various publication venues. Although this decision makes the definition and the scope of the<br />

scientific community clear, as opposed to the definition from another study of eGovernment community<br />

(Scholl 2009).<br />

The present paper offers the findings of co-authorship network analysis which is latterly used as a proxy<br />

for the study of collaboration (Bordons and Gomez 2001). We should note however, that there exist<br />

limitations related to the study of scientific collaboration through publications and to the bibliometric<br />

studies in general. The first is related to the practice of making colleagues or superiors “honorary coauthors”<br />

for purely social reasons. The second is that scientific collaboration does not necessarily lead to<br />

co-authored papers.<br />

5. Conclusion<br />

The answer to our main research question, outlined in the title of the paper, is clearly: No. The two<br />

publication venues considered in this study, proceedings of ECEG and EGOV conferences, do not<br />

converge towards a joint eGovernment scientific community. Only few authors (less than 5%) publish<br />

papers at both conferences. However, both communities do show maturity, in terms of large number of<br />

members publishing regularly, increasing collaboration between community members, and emergence of<br />

clearly profiled sub-communities. In this sense, EGOV community seems to be ahead of ECEG; the<br />

profiling and stability of the community being more evident. The high share of authors publishing at both<br />

conferences among the most prolific authors in the communities might be an early indicator of the<br />

emergence of the eGovernment community.<br />

The (non-) existence of eGovernment research community has to be further tested with extending the<br />

scope of this study. We have to include papers from other publication venues, both conference<br />

proceedings and journals, in our data set. Note also that in the present paper we focused on the coauthorship<br />

network, a study of the citation network of ECEG papers can be another line of further work.<br />

Finally, one can also look into other types of networks analysis of the citation networks that has<br />

publication venues where the referenced papers come from in the nodes. Such analysis would reveal the<br />

most influential “neighboring” scientific fields and publication venues with highest impact on the<br />

development and shape of the eGovernment research field. Ultimately, there is a challengeable issue of<br />

integrating the results of analyzing different networks of relations among scientists and/or publication<br />

venues into a unified map of the EGR field.<br />

Acknowledgments<br />

This material is based upon work supported by the Slovenian Research Agency through the funds for<br />

training and financing young researchers. Thanks also to Mitja Dečman who provided the electronic<br />

versions of the ECEG proceedings.<br />

References<br />

Bannister, F. and Connoly, R. (2010) “Researching eGovernment: A Review of ECEG in its Tenth Year” in O’Donnell<br />

D. (Ed.), Proceedings of the 10 th <strong>European</strong> <strong>Conference</strong> on eGovernment, Ireland, 17-18 June 2010, pp 53-62.<br />

Bordons, M. and Gómez, I. (2001) “Collaboration Networks in Science”, in Cronin, B. and Atkins, H.B. (Eds.), The<br />

web of knowledge: a festschrift in honor of Eugene Garfield, ASIS Monograph Series, Medford, Nj: Information<br />

Today.<br />

Borgman, C.L. (1990) “Editor’s Introduction”, in Borgman, C.L. (Ed.), Scholarly Communication and Bibliometrics,<br />

Sage Publications, Newbury Park, London, New Delhi.<br />

Busch, C., de Maret P.S., Flynn, T., Kellum, R., Le, S., Meyers, B., Saunders, M., White, R., and Palmquist, M.<br />

(2005) Content Analysis.Writing@CSU, Colorado State University, Department of English. Retrieved<br />

[20.12.2010] from http://writing.colostate.edu/guides/research/content/.<br />

Erman, N. and Todorovski, L. (2009) “Analyzing the Structure of the EGOVconference community”, in Wimmer, M.A.<br />

et al. (Eds.), EGOV 2010, LNCS vol 6228, pp 73-84, Springer, Heidelberg.<br />

Erman, N. and Todorovski, L. (2009) “Mapping the eGovernment Research with Social Network Analysis”, in<br />

Wimmer, M.A. et al. (Eds.), EGOV 2009, LNCS vol 5693, pp 13-25, Springer, Heidelberg.<br />

Grönlund, Å. (2004) “State of the Art in eGov Research – A Survey”, in Traunmüller, R. (Ed.), EGOV 2004, LNCS vol<br />

3183, pp 178-185, Springer, Heidelberg.<br />

232


Nuša Erman and Ljupčo Todorovski<br />

Grönlund, Å. and Andersson, A. (2006) “e-Gov Research Quality Improvements Since 2003: More Rigor, but<br />

Research (Perhaps) Redefined”, in Wimmer, M.A. et al. (Eds.), EGOV 2006, LNCS vol 4084, pp 1-12, Springer,<br />

Heidelberg.<br />

Heeks, R. and Bailur, S. (2007) “Analyzing eGovernment research: Perspectives, philosophies, theories, methods,<br />

and practice”, Government Information Quarterly, Vol 24, pp 243-265.<br />

Lisée, C., Larivière, V. and Archambault, É. (2008) “<strong>Conference</strong> Proceedings as a Source of Scientific Information: A<br />

Bibliometric Analysis”, Journal of the American Society for Information Science and Technology, Vol 59, No. 11,<br />

pp 1776-1784.<br />

Nooy, de W., Mrvar, A. and Batagelj, V. (2005) Exploratory social network analysis with Pajek, Cambridge University<br />

Press, New York.<br />

Scholl, H.J. (2009) “Profiling the EG Research Community and Its Core” in Wimmer, M.A. et al. (Eds.) EGOV 2009,<br />

LNCS vol 5693, pp 1-12, Springer, Heidelberg.<br />

233


E-Identity, E-Activities and E-Political Participation: How are<br />

College Students Embracing the Promise of the Internet?"<br />

Marcoux Faiia<br />

Rivier College, Nashua, U.S.A<br />

mfaiia@rivier.edu<br />

Abstract: The Internet is everywhere from the classroom to the bedroom. Online social networking sites like<br />

Facebook, have replaced the local hangouts and the mall for interacting with friends. Virtual communities and the<br />

Internet are evolving technologies that are intertwined with every aspect of society. This makes it a focus of interest<br />

for sociologists. Neither freedom nor exploitation is inherently promoted by new technologies. The Internet does<br />

harbor dangers but it also offers great promise. Those born into the Internet generation are referred to as "digital<br />

natives." Digital communication is "taken for granted" by young people who have grown up with the Internet. Political<br />

participation, books, and newspapers have evolved into digital formats that these "natives" feel comfortable using.<br />

Full participation in public life will soon require Internet access and competencies. The main domains of the Internet-<br />

1) communication, 2) information, 3) production, and 4) consumption- are significant areas of sociological<br />

investigation with regard to digital natives. This exploratory study was conducted in three phases over the academic<br />

years 2008-2011. It utilized a select sample of undergraduate students in a New England college in the U.S.A. A twoprong<br />

data gathering technique was employed: 1) questionnaires and 2) interviews. A total of 150 questionnaires<br />

were administered and 50 interviews were given. This study employed both qualitative and quantitative<br />

methodologies. It aimed at developing a descriptive "snapshot" of college students’ perceptions of safety and privacy<br />

online, of describing the creation of “self” online and of identifying participation in online activities.<br />

Keywords: e-identity, e-youth, e-activities, e-politics<br />

1. Background<br />

Sociologists are interested in what holds society together and in how society changes over time. One<br />

explanation for social change considers the impact of new technology. Major social revolutions that<br />

transformed whole societies have been identified throughout history. For example, the invention of the<br />

plow introduced the agricultural society, the invention of the steam engine helped to create the industrial<br />

society and now the invention of the micro-chip has brought us into the digital age. Today’s youth have<br />

grown up living in this digital society and are digital natives. The Internet is very much an aspect of their<br />

daily lives. According to Whit and Wyn (2008), the digital world offers an alternative space that is far more<br />

attractive to some young people than the non-digital world. Some young people spend as much time as<br />

possible in the virtual worlds.<br />

Through web pages, chat rooms, and blogs anyone can find out what others think about them. Online<br />

communication is very direct stimulating self-disclosure and anonymity. Online communication can be<br />

rude compared to face-to-face interaction. Face-to-face interactions are replaced by words and images.<br />

The nonverbal communication that is present in face-to-face encounters is missing. Cues from words and<br />

pictures are being used to form opinions of others. With the use of photo shop you can create your<br />

desired appearance. This may change the way that offline relationships are formed and structured<br />

(Andrews 2006). Meeting “dates” online, finding old friends and making new friends is a lucrative and<br />

growing business. A new form of popular culture is “cyber world cultures.” Sites like “Zine” culture allow<br />

young people to self-publish lists of text and images that present themselves to specific communities<br />

(Whit and Wyn 2008). Digital communications are giving young people a resource for expressing many<br />

different “personas.” In sites such as “Second Life” individuals can become someone else online.<br />

Creating avatars and interacting with others, as avatars, you can behave however you like (Coyne et al.<br />

2009).<br />

Social Interactionism as expressed by Erving Goffman emphasizes the interpretive, symbolic and<br />

meaning attachment aspects of human interaction. This exploratory study was informed by Social<br />

Interactionism and specifically by the work of Erving Goffman (1959, 1963, 1971). One important concept<br />

of Goffman’s (1959) thinking is the notion of “segregated audiences.” Individuals who may see us in one<br />

social role will not see us perform other social roles. This is pertinent to electronic communities where the<br />

audience who sees us on Facebook may never see us perform in any other social role. This allows<br />

individuals to create and recreate their presentation of self. Having different audiences witness different<br />

presentations of self allows inconsistent or contradictory role information to go unnoticed. There exists<br />

online a “pastiche personality” where members of the digital generation change their presentation of self<br />

in different ways for different audiences.<br />

234


Marcoux Faiia<br />

The “definition of the situation” is not clouded by these contradictory presentations of self. Also “covering<br />

up” or explaining the inconsistencies are not required in electronic communities. Online impression<br />

management is less challenging. Even for those individuals who carry “stigma” due to physical<br />

appearance or physical deformities their presentation of “self” online can be controlled (Goffman 1963).<br />

Several respondents in this study admitted to having flattering and “doctored” photos of themselves<br />

online. Goffman (1971) discusses “social identity” and “personal identity.” Social identity is expressed in<br />

broad categories like age and sex. Personal identity is more unique, expressed by names and<br />

information about personal biography and social attitudes. Each of these identities can be manipulated<br />

online. Nicknames can convey age, likes and dislikes and can be indecent, which challenges social rules.<br />

In this study several respondents admitted to lying about their age, their sex and of giving misleading<br />

data on their social attitudes. For example, “I told people on MySpace that I was a boy, I wanted to get<br />

dirt from boys on my girlfriends.” “I lied about my age, I said that I was 22 not 18 because I wanted to see<br />

if anyone would date me.” In electronic communities we can control the cues that we emit to others and<br />

manage the audience impression of us more firmly than in face to face interactions.<br />

The uncensored nature of digital communications creates opportunities for both healthy and unhealthy<br />

interactions. The Internet can provide opportunities for marginalized and isolated individuals to meet with<br />

others and to share their concerns and connect for support. Texting has been introduced as a new<br />

therapeutic technique for interventions with alienated and disturbed young people. For many of them<br />

texting is easier and more familiar than the traditional “talking cures” of psychotherapy (Haxell 2010). The<br />

Internet can encourage civic action and promote political and social responsibility. The Internet can<br />

educate and minimize workloads. The virtual network has many positive potential uses and applications.<br />

Richardson (2007) discussed the way the Seattle school system uses the Internet to improve student<br />

communications and to enhance learning. Digital communities are active participants in identity formation<br />

in very positive and helpful ways. Individuals can access important information regarding health, political<br />

positions and financial data that enables them to be better informed and to make better life decisions.<br />

Some social networks, however, are designed to foster harm and create social exclusion. Sufferers of<br />

bulimia can learn innovative ways of hiding their eating disorder. Pedophiles and other predators can<br />

communicate, share their tactics and pornographic literature and photos. Hate ideologies can be<br />

developed and spread and the net can be used to recruit new members to these hate groups.<br />

Cybercrimes, identity theft and cyber bullying are all growing concerns. In some ways it is harder to be<br />

anonymous or escape in the virtual world. Bullying online may be worse than in person (Andrews 2006).<br />

According to Ybarra and Mitchell (2004) bullying and harassment in the cyber world is a “significant”<br />

public health issue. Interestingly, while the typical off line bully is usually a boy, the online bully is just as<br />

likely to be a girl. The media has recently reported on several suicides within the USA that are linked to<br />

cyber bullying (Donaldson 2010).<br />

“Digital Addiction” is a recent mental health concern. Excessive video game playing, accessing gambling<br />

and pornography sites constantly and hour after hour spent in chat rooms, are some of the risks involved<br />

with digital addictions. Clemmitt (2006) states that social networking sites like Facebook raise many<br />

troubling issues of privacy and safety. She states that, “social networking is based on a faulty view of<br />

friendship—the premise that …if A is a friend of B, and B is a friend of C, then A must be C’s friend too…”<br />

(p.12). Chalfen (2009) gives the example of sexting (using the cell phone to send dirty pictures or nude<br />

photos) as a highly problematic behavior with serious repercussions. Some young sexters are being<br />

charged with felonies.<br />

Facebook was created for students by students but now many older adults are using it. Employers,<br />

college admissions and parents are all watching and learning about activities and behaviors that were<br />

once in the realm of “youth culture.” West, Lewis and Currie (2009) conducted an exploratory study to<br />

focus on the extent to which parents were accepted as “friends” on Facebook and what impact that had<br />

on feelings of privacy. They found that parents were not wanted as a “friend.” Worries about “mother’s”<br />

reactions and embarrassment were cited as reasons why parents were not welcome. The study also<br />

found that the line between the public and the private social worlds was blurred. Students did not seem to<br />

see these as two distinct fields. Similar findings emerged in the exploratory study presented in this paper.<br />

2. Methods<br />

Major research questions in this exploratory study included: 1) Do college students perceive the Internet<br />

as a safe and private space? What do they see as risks and dangers? 2) How do they create a<br />

“presentation of self”? Are online identities fluid? Is there a "pastiche personality"? Are there different e-<br />

235


Marcoux Faiia<br />

identities on different sites? 3) How do students use new technologies to get and share information? How<br />

do students communicate online? What social activities are engaged in online? How does the Internet<br />

foster political action?<br />

This research was conducted on the campus of a medium size New England college in the USA during<br />

the academic years of Fall 2008/Spring 2009 and Fall 2009/Spring 2010 and Fall 2010/Spring 2011. The<br />

initial impetus behind this exploratory study was a story the researcher heard about a part-time summer<br />

police officer who lost his position because photos of him partying with underage drinkers surfaced on<br />

Facebook. He was a student criminal justice major with hopes of attending the FBI academy. All that<br />

changed when he was fired for “immoral” acts. He was amazed at the “fallout” and outcome of his<br />

actions. I wondered if college students perceived risk online and had naïve notions of privacy. From this<br />

initial query this study evolved to focus on construction of identity online and participation in activities<br />

online.<br />

This research was conducted in three phases. The first phase examined student perceptions of safety<br />

and privacy online. In phase two "presentation of self" and constructing an e-identity with a focus on eactivities<br />

was studied. Phase three queried civic and political participation. Each phase considered the<br />

four domains of the Internet: 1) communication, 2) information, 3) production and 4) consumption.<br />

The sample consisted of a select sample (please see table 1 for demographics). The sample was 70%<br />

female and 30% male. The ages ranged from 18-25. Everyone who participated in this study was a<br />

college student with access and skill on the Internet. The digital divide today in the USA is about more<br />

than just access to the Internet. We must also consider differences in skills and uses that individuals have<br />

for the Internet. There are huge differences in the sophistication that people have in navigating the web<br />

(DiMaggio et al 2001). Spelling mistakes and functional literacy limit the ability of the less educated to<br />

conduct and benefit from online searches (Hargittai 2006). The result is social inequality. In this sample<br />

access to the Internet and their skill levels with the Internet were high due to social class and educational<br />

characteristics. College majors in this study included nursing, criminology, sociology and education. Over<br />

80% of the sample was single without children, 18 respondents were married and 5 had children. There<br />

were 17 respondents who identified themselves as non-white. One respondent was Hindu, seven were<br />

Protestant, two were Wiccans, five were Mormons, three stated that they were Atheists and the rest<br />

stated they were Catholic.<br />

This study utilized a two-prong data collection strategy: 1) questionnaires and 2) interviews. One hundred<br />

questionnaires (18 questions) were given out in classes in phase one and 50 questionnaires (24<br />

questions) were sent out via Surveymonkey.com in phase three. In phase two, 50 interviews were<br />

conducted by students trained to use a ten-question interview guide. The interview sample was chosen<br />

by the student researchers as a convenience sample. Most questions were open ended. There was no<br />

pilot for the data collection instruments as this was an exploratory study. Questions were developed in<br />

focus groups in various classes and pre-tested for clarity in these focus groups. Following Babbie (2008),<br />

the response categories were exhaustive and mutually exclusive giving an option for respondents to add<br />

details.<br />

Table 1: Demographics of respondents and interviewees<br />

Characteristics Number of respondents N=200<br />

Female 150<br />

Male 50<br />

Aged 18-21 188<br />

Aged 22-25 12<br />

Employed 160<br />

Married 18<br />

3. Results and discussion<br />

In each phase of this exploratory study it was found that the respondents felt very safe and secure selfdisclosing<br />

online. Most respondents relied on safety settings on their computers to control privacy. There<br />

was a perception of safety and also of privacy, even for those respondents who gave examples of being<br />

“fooled” or “fooling” others online. No one expressed a fear of a threat or of an invasion of privacy. Typical<br />

responses by students were: “People in virtual communities are not very honest. You often know the<br />

individuals that you are ‘friends” with, and are able to determine whether or not they are falsifying<br />

236


Marcoux Faiia<br />

information.” “I created a fake MySpace with friends to determine the identity of my ex-boyfriend’s new<br />

girlfriend.” “Some people lie about one thing or another for protection or malicious reasons.” “I know that I<br />

am safe because I am careful and because I always use the privacy settings.” Given that the websites<br />

warn users (EULAS) that they are not secure this was an interesting finding.<br />

In phase two this study found that in their “presentation of self” and construction of an e-identity college<br />

students do create a “pastiche” of their personalities and do as Goffman suggests, manipulate their<br />

identities on various websites. Their constructed identity on Facebook is different than the one on<br />

Linkedin. They employ various strategies (textual, nicknames or screen names, and visuals) to show<br />

different e-identities to different audiences (see table 2). According to this study digital natives are<br />

strategic manipulators with characteristics of independence and immediacy. Their self-disclosure on line<br />

depends on the web site. Their visual self-presentation strategies include photos and occasionally text.<br />

Respondents in this study stated that they never gave their social security numbers, cell phone numbers<br />

or financial information. All of the respondents in the study had photos of themselves online and many<br />

had photos in compromising or intimate settings, one girl stated “I have a photo of me topless”. Several<br />

respondents admitted to “playing jokes” and “tricking” others online. Several described creating fake<br />

MySpace accounts that fooled friends, “I was chatting for weeks before they knew it was me.”<br />

Respondents discussed having people lie about their age, their marital status and their gender. One 17<br />

year old was lying about his age to get more girl-friends. One respondent stated that she lied about her<br />

abilities online, to make others jealous. She claimed that she was a gourmet cook and that she spoke<br />

French. Another stated that she lied about being a virgin. Some respondents in this study stated that they<br />

showed their defiance and personality with their screen names. One respondent, who used a snake as a<br />

prop, stated that she used “Eve” as a screen name. She wanted to convey that she was like “Eve” in the<br />

Bible, “Eve” as the temptress and sinner. Another respondent had himself sitting on a surfboard in the<br />

middle of the ocean when he had never tried surfing.<br />

Table 2: Presentation of self<br />

Characteristics Number of respondents N=50<br />

Drawings 12<br />

Nicknames 37<br />

Screen Names 50<br />

Photos 43<br />

Text 28<br />

Costumes 18<br />

Props 06<br />

Settings 19<br />

Phase three data focused on political participation and contributes directly to the focus of this conference<br />

on E-politics. Thirty three percent of respondents used new technologies to participate in political or civil<br />

action. Examples of answers are: “I have used video and social networking posts about pro-life day and<br />

other events and my involvement.” “I have used video and social networking posts for cancer awareness<br />

and my experience.” “I have sent emails to my state representative giving my opinions on certain issues.”<br />

“I use Facebook to stay connected with a civil lawsuit.” Forty percent visited the Internet to obtain<br />

information about local, state or national election coverage. Responses included: “I used the Internet to<br />

research the candidates' views to see which one I wanted to vote for and I also used it to know the<br />

winners of the election.” “I don't usually go searching for it but if I come across something political, I will<br />

read it.” “I looked up policies, candidates, and opinions online.” Twenty percent of respondents stated that<br />

they did use the Internet to promote a candidate and twenty-six percent said that they engaged in civic<br />

activity online. One respondent stated, “on occasion I will post on my Facebook about laws that I believe<br />

should be passed.” Another, “I have used the Internet to promote for Pro-life awareness involvement. “<br />

One student signed petitions online and three stated that they wrote to their Senators urging attention to<br />

the Uganda conflict. One respondent stated “I am on the side of Libertarianism and I actively support the<br />

use of reason in politics.” Five students were working online with students at George Washington<br />

University to form a political action committee.<br />

Initial findings indicate that daily Internet use is prevalent with many students going online several times a<br />

day with every expectation of safety and privacy. This finding is consistent with the Pew Internet and<br />

American Life Project (2010) trends. The Pew Internet survey (2010) activities’ list results were also<br />

237


Marcoux Faiia<br />

mirrored in this study (see table 3). College students in this sample reported avoiding e-mail. They<br />

indicated that they only looked at e-mail to see if professors were communicating with them. Social<br />

communication was conducted via texting and Facebook. Carnevale (2006) noted similar findings and<br />

suggested that to reach college students, new technologies should be employed.<br />

During the 2010 mid-term elections in the U.S., online political activities were examined in each of the<br />

four domains. According to Calenda and Meijer (2009), the Internet does “reinvigorate the participation of<br />

youth in political process however it does not encourage a shift to new political thinking.” Young people<br />

are using the Internet within the domains of information and communication. This use of the Internet was<br />

apparent here with regard to online activities and political participation. Students gathered information on<br />

political parties, “I wanted to know what this Tea party was all about” and also on policy plans by different<br />

candidates. This sample discussed using new technologies to get information and to communicate.<br />

information on candidates' positions on specific topics and to see biographical information. The domains<br />

of communication, information and consumption were visited with very little use of the domain of<br />

production. One exception was a respondent who created an ad for her student government election<br />

campaign.<br />

College students engaged in a wide range of activities online, however civic and political activities did not<br />

rate high in this exploratory study. One interesting finding in this study was the blending of consumption<br />

with civic action. After learning about Nike shoe production online, one respondent stated “I would never<br />

buy another Nike product knowing how they are made.” Scammell (2000) discusses the “citizen<br />

consumer” who uses political power within the marketplace to make decisions about civic action.<br />

Table 3: Internet activities in the last 48 hours, phase one questionnaire (October 14 and 15, 2010)<br />

Domain One<br />

Communication<br />

e-mail<br />

Facebook<br />

Second Life<br />

online dating<br />

Twitter<br />

post comments<br />

send IM<br />

Domain Two<br />

Information<br />

Google<br />

ASK<br />

online discussion<br />

get political information<br />

research a job<br />

find health, financial information<br />

get news and weather<br />

get directions<br />

use government websites<br />

find apartment<br />

use Wikipedia<br />

watch live webcam<br />

get family history<br />

Domain Three<br />

Production<br />

Blogs<br />

Journal<br />

create webpage<br />

remix songs, images<br />

share your creations<br />

engage in hobby<br />

organize issue meeting<br />

donate to charity<br />

create an advertisement<br />

N=50<br />

Domain Four<br />

Consumption<br />

e-bay<br />

sell stocks<br />

online auction<br />

buy product<br />

play games<br />

just fun<br />

surf net<br />

buy tickets<br />

reservations<br />

bank online<br />

watch video<br />

download music<br />

This study provides a snapshot of how college students are using the Internet. It examined the creation of<br />

self online and general feelings about safety and risk. It also demonstrated some activities that students<br />

engage in online. One limitation of this study is that the sample was restricted to undergraduates<br />

attending a small Catholic liberal arts college. Utilizing a convenience sample will always limit the<br />

generalizability of the findings. The sample had far more women than men and far more whites than nonwhites.<br />

Some of the findings may actually reflect more “general” understandings of the new technologies<br />

than “personal” competencies and abilities in using new technology. The respondents in this study were<br />

not as “computer savvy” as stereotypes hold for this youth population.<br />

4. Conclusions<br />

Today’s “digital natives” have grown up living in a digital society. The Internet and the cell phone are very<br />

much an aspect of their daily lives. Technology can be understood as both the tools and the ability to use<br />

the tools created. In the past technology was what we did, for today’s youth technology is who they are. A<br />

new form of communicating, using emoticons and abbreviations, has replaced many face-to-face<br />

interactions. Old interaction rituals, like greetings, are disappearing. Miscommunication online is<br />

prevalent. In “constructed self” many now negotiate between self-description and social ascription.<br />

Students are struggling with the tensions created by technology. Tensions over “presentation of self”<br />

and expressing emotions are created. Technology provides emotional distance, e.g.: youth are being<br />

“dumped” online. Significant relations are ended without ever seeing each other. Respondents reported<br />

238


Marcoux Faiia<br />

texting to someone who was in the same room. What will be the impact of this new form of technology on<br />

communication and relationships?<br />

Overall, there exists a kind of cultural lag between technology and emotions. The cultural lag argument<br />

also suggests that concerns over technology will decrease over time as trust in new technologies<br />

increases. In this study respondents reported spending 10-15 hours a day online. What will be the impact<br />

of this new form of technology on communication and relationships? Will global citizenship be<br />

encouraged by the new technologies and the Internet? What is the role of the Internet in e-politics? Is it to<br />

promote social policy aimed at increasing youth participation in politics or is it a place where new forms of<br />

political participation are being created? What does this exploratory study suggest about “digital natives”<br />

and the promise of the Internet? Very simply, the opportunities presented by new technologies are<br />

embraced in some domains and not others. More specifically, respondents in this study used domains of<br />

communication, information and consumption more than the domain of production. Political participation<br />

was minimal and traditional. New forms of political participation were not found.<br />

Future research directions are plentiful. A larger and more diverse sample needs to be studied with<br />

greater in-depth focus on each of the domains of the Internet. The investigation about perception of<br />

privacy should look at the website disclaimers (EULAS) more closely. The literature that looks at the<br />

construction of meaning can be incorporated more fully. Recognizing how relationships impact the<br />

construction of meaning and how relationships are created online needs further study. What does a<br />

person’s online profile mean and how is it constructed?<br />

There is a task for the future here and it may require sociologists to move outside the boundaries of the<br />

traditional discipline. The task for the future is best seen as one for coordinated research by investigators<br />

drawing from many different traditions. The advances in cybernetics, computer technologies and related<br />

fields since WWII has stimulated the necessity of a new approach to the study of social action that will<br />

emphasize a systems’ framework instead of a one-way cause and effect sequence of action.<br />

5. Appendix 1: Questionnaire administered to classes during 2008/2009<br />

Title:"Virtual Social Networking: College Students' Perceptions of Privacy and Risk"<br />

Directions: This is an exploratory study of students’ perception of privacy and safety on virtual networks<br />

like MySpace and Facebook: The questionnaire takes about twenty minutes to complete. The study does<br />

not need any names, your participation in this survey is ABSOLUTELY VOLUNTARY and individual<br />

responses will be kept CONFIDENTIAL.<br />

1) Do you own a computer? Yes No<br />

2) Do you visit virtual networks? Yes No<br />

3) Do you have a web page? Yes No<br />

4) Who else should be asked to be a respondent?_______________________________<br />

Year in school_________ Major___________________<br />

Marital Status ________________ Age_____________________<br />

Number of Children______________________ Occupation_______________<br />

Religious affiliation_________________<br />

Gender___________________<br />

1) Do you have a Facebook or MySpace account? ___________________<br />

2) How often do you use the account? _____________________________<br />

3) How many contacts/friends do you have? _________________________<br />

239


Marcoux Faiia<br />

4) Do you know how to tell if a webpage is secure? _________________<br />

How? _____________________________________________________<br />

5) Are you familiar with your browser's security settings? ______________explain<br />

6) Do you put information on your account that you would share with your parents?<br />

_____________________ explain______________________________________<br />

7) Do you respond to people who want to be your virtual friends that you do not know?<br />

________________________________________________________________________<br />

If yes, how often______________ What happened?______________________________<br />

8) How did you feel about MySpace going worldwide? ___________________________<br />

9) Do you worry your activities are being broadcast without your knowledge?<br />

Explain________________________________________________________________<br />

10) Do you think about seeing images of yourself online at parties or drunken?<br />

________________________________________________________________<br />

11) Would you consider it a breach of privacy if pictures of you were posted without your knowledge?<br />

____________________________________________________________<br />

12) Do you think prospective employers look at these websites?________________<br />

13) Is your account limited to only your friends or do you use the security settings to limit those who can<br />

access your pictures and profile?________________________<br />

14) What would have to happen for you to consider your privacy had been violated?<br />

15) How do you think people would respond to the images you post of yourself?<br />

16) Would you use Facebook or MySpace to get revenge?<br />

_____________________________________________________<br />

17) Do you use Facebook or MySpace to get information about other people?<br />

_________________________________________________________________<br />

18) Is there anything about virtual networks that you know and that would be interesting for this study?<br />

Describe:______________________________________________________________<br />

6. Appendix 2: Interview guide for 2009/2010<br />

Title: “Presentation of Self in Virtual Communities”<br />

Directions to Student Interviewers: Choose five respondents for the interviews. You may choose other<br />

students, friends, staff or faculty. Please be sure that you do not interview anyone who was previously<br />

interviewed for this research. You need to choose someone who has been involved with Facebook,<br />

MySpace or some other virtual social network. Please identify yourself as a student researcher. Set up an<br />

appointment to conduct the interview. You will need at least one half hour for each interview and an<br />

additional half hour to record your responses. You will follow the interview guide provided by professor.<br />

Be prepared with pen and paper to take notes. Do NOT just hand the questions to the interviewees to fill<br />

in the answers .YOU are conducting the interviews with the questions as an interview guide. If an<br />

interviewee does not fully respond to a question then use a probe question. For example: “Please tell me<br />

more about that…” Tell your interviewees that their responses will be confidential not anonymous. Ask<br />

the questions in the order of the guide, record answers in detail. Following the interview add any other<br />

notes or observations to the data. Include plenty of direct quotes in your recording.<br />

Interview Guide:<br />

240


Identifying Data:<br />

Age:_____________<br />

Sex: Female_______Male______<br />

Occupation______________<br />

Major_____Year_________<br />

Marital Status:____________<br />

Children: yes______no____<br />

Marcoux Faiia<br />

Who else should be interviewed for this study?___________________<br />

Question One: Are you using a virtual network and if so which one/s?<br />

Question Two: How often are you on Facebook? Etc?<br />

Question Three: Do you have a photo/s online? If so, please describe<br />

Question Four: Do you have a special screen name?<br />

Question Five: Is there anything that you would not put into the virtual community?<br />

Question Six: Have you ever been “fooled” by someone in a virtual network? Please explain.<br />

Question Seven: Have you ever “fooled”someone else in a virtual network? Please explain.<br />

Question Eight: How honest are people in virtual communities?<br />

Question Nine: Have you ever been embarrassed by something you saw or placed in a virtual<br />

community? Please explain.<br />

Question Ten: Do you know of any cases where someone misrepresented themselves online and were<br />

“caught”? Please give details.<br />

7. Appendix 3: Questionnaire administered to classes during 2009/ 2010<br />

Title:"Student Online Activities and Use of Internet and New Technologies in Political and Civic<br />

Participation"<br />

Directions: This is an exploratory study of students’ online activities and use of the internet and new<br />

technologies to engage in political and civic social action. The questionnaire takes about twenty minutes<br />

to complete. The study does not need any names, your participation in this survey is ABSOLUTELY<br />

VOLUNTARY and individual responses will be kept CONFIDENTIAL.<br />

1) Do you own a computer? Yes No<br />

2) Do you visit virtual networks? Yes No<br />

3) Do you have a web page? Yes No<br />

Year in school_________ Major___________________<br />

Marital Status ________________ Age_____________________<br />

Religious affiliation_________________ Gender___________________<br />

241


Marcoux Faiia<br />

Occupation________________________ Number of Children__________<br />

Who else should be contacted for this study?______________________________<br />

1) Do you have a Facebook or MySpace account? ___________________<br />

2) How often do you use the account? _____________________________<br />

3) Do you use the Internet to get information or share information on politics?<br />

_________________________<br />

4) Have you used new technologies to participate in political or civic action?_________________<br />

How? _____________________________________________________<br />

5) Did you go online to get any information about the mid-term elections? ______________<br />

Was it biographical information?_______ Policy information?__________ Candidate’s positions on<br />

issues?________________<br />

6) Did you engage in any first time voter strategies with the help of Internet? _____________________<br />

explain______________________________________<br />

7) Have you ever used the Internet to promote a candidate or solicit for votes?<br />

________________________________________________________________________<br />

If yes, how often______________ What happened?______________________________<br />

8) Have you engaged in any civic action using new technologies ( boycotts, rallies, support for social<br />

movements) ___________________________Explain__________________<br />

9) Have you used a blog or wikis to enhance your participation in civic or political participation? Explain<br />

______________________________________________________________<br />

10) Make a list of everything that you have done on the Internet In the last 48 hours. In economic, social<br />

and political terms what did you get from these tasks? Use extra paper if needed.<br />

8. Appendix 4: Questionnaire administered to classes during fall 2010/spring<br />

2011<br />

Title:"Social Media and Civic Action: Student Online Activities and Use of Internet and New Technologies<br />

in Political and Civic Participation"<br />

http://www.surveymonkey.com/s/e-politics<br />

Directions: This is an exploratory study of students’ online activities and use of the Internet and new<br />

technologies to engage in political and civic social action. The questionnaire takes about twenty minutes<br />

to complete. The study does not need any names, your participation in this survey is ABSOLUTELY<br />

VOLUNTARY and individual responses will be kept CONFIDENTIAL.<br />

1. Do you own a computer?<br />

2. Do you visit virtual networks?<br />

3. Do you have a web page?<br />

4. Are you actively engaged in social media networks?<br />

Year in school:<br />

Major:<br />

242


Marital Status:<br />

Age:<br />

Religious Affiliation:<br />

Gender:<br />

Occupation:<br />

Number of Children:<br />

5. Who else should be contacted for this study?<br />

6. Do you have a Facebook or MySpace account?<br />

Marcoux Faiia<br />

7. If Yes, do you maintain an account on any other social networking sites?<br />

8. How often do you use the account?<br />

9. Do you use the Internet to get or share information regarding politics?<br />

10. Have you used new technologies to participate in political or civic action?<br />

11. If Yes, please describe.<br />

12. Did you visit the Internet to get information about local, state, or national election coverage?<br />

13. If Yes, what type of information were you looking for? (Circle all that apply)<br />

Biographical<br />

Policy related<br />

Candidate positions on particular issues<br />

14. Did you engage in any first time voter strategies with the help of the Internet?<br />

15. If Yes, please explain:<br />

16. Have you ever used the Internet to promote a candidate or solicit for votes?<br />

17. If Yes, how often?<br />

18. What was the outcome?<br />

19. Have you engaged in any civic action using new technologies? (Please circle all that apply)<br />

Boycotts<br />

Rallies<br />

Social movement support efforts<br />

20. If Yes, please explain.<br />

21. Have you used a blog or wikis to enhance your participation in civic or political participation?<br />

22. If Yes, please explain.<br />

243


23. Do you follow any political figures on Twitter?<br />

Marcoux Faiia<br />

24. If Yes, please list all those you consider politically relevant.<br />

References<br />

Andrews, M. (18 Sept. 2006) “Decoding MySpace”, U.S. News & World Report, Vol. 141, No. 10, pp 46-58.<br />

Babbie, E.R. (2007). The Basics of Social Research. Belmont, Calif: Wadsworth Pub. Co.<br />

Calenda, D. and Meijer, A. (2009) “Young People, the Internet and Political Participation: Findings of a web survey in<br />

Italy, Spain and the Netherlands”, Information, Communication & Society, Vol. 12, No. 6, pp 879-898.<br />

Carneval, D. (Oct. 6, 2006) “E-mail is for Old People”, Chronicle of Higher Education.<br />

Celizic, M. (2009) "Her teen committed suicide over 'sexting'", TODAY. Retrieved on 4 Feb 2010 from<br />

http://today.msnbc.msn.com/id/29546030/.<br />

Chalfen, R. (2009) “It’s only a picture: sexting ‘smutty’ snapshots and felony charges”, Visual Studies, Vol. 24, No. 3,<br />

pp 258-268.<br />

Clemmitt, M. (July 28, 2006) “Cyber Socializing: Are Internet sites like MySpace potentially dangerous?”, CQ<br />

Researcher Plus Archive, Vol. 16, No. 27, pp 1-14.<br />

Coyne, I., Chesney, T., Logan, B. and Madden, N. (2009) “Grieving in a virtual community: An exploratory survey of<br />

Second Life residents”, Journal of Psychology, Vol. 217, No. 4, pp 214-221.<br />

DiMaggio, P., Hargittai, E., Numan, W.R. and Robinson, J.P. (2001) “Social Implications of the Internet”, Annual<br />

Review of Sociology, Vol. 27, pp 307-336.<br />

Donaldson, S. (2010) “Immigrant Teen Taunted by Cyber bullies Hangs Herself”. Retrieved from<br />

www.cyberbullying411.org/what-is-cyberbullying.php<br />

Farrell, E.F. (Sept. 1, 2006) “Judging Roommates by Their Facebook Cover”, Chronicle of Higher Education, Vol. 53,<br />

No. 2.<br />

Garfinckle, S. (August 2009) “Privacy Requires Security, Not Abstinence: Protecting the Inalienable Right in the age<br />

of Facebook”, Technology Review.<br />

Goffman, E. (1959) The Presentation of Self in Everyday Life, Doubleday, New York.<br />

Goffman, E. (1963) Stigma: Notes on the Management of Spoiled Identity, Simon & Schuster, New York.<br />

Goffman, E. (1971) Relations in public:Microstudies of the public order, Harper Colophon Books, New York.<br />

Hargittai, E. (2006) “Hurdles to Information Seeking: Spelling and Typographical Mistakes During Users Online<br />

Behavior”, Journal of the Association of Information Systems.<br />

Haxell, A. (2010) “Empowerment in tight spaces; youth counseling in a text-messaging medium”, <strong>Conference</strong> paper<br />

at E-Youth, Antwerp, Belgium, June.<br />

Livingstone, S. (2008) “Taking risky opportunities in youthful content creation: teenagers’ use of social networking<br />

sites for intimacy, privacy and self-expression”, New Media and Society, Vol. 10, No. 3, pp 393-411.<br />

Pew Internet & American Life Project, 2000-2010. “The Internet Life Report”, Washington D.C. Reported in Witte and<br />

Mannon (2010) The Internet and Social Inequality, Routledge, New York.<br />

Richardson, W. (Sept. 2007) “From MySpace to SchoolSpace”, District Administration, pp 65-68.<br />

Scammell, M. (2000) “The Internet and Civic Engagement: The Age of the Citizen Consumer”, Political<br />

Communication, Vol. 17, pp 351-355.<br />

West, A., Lewis, J. and Currie, P. (Dec. 2009) “Students’ Facebook “friends”; public and private spheres”, Journal of<br />

Youth Studies, Vol. 12, No. 6, pp 615-627.<br />

White, R. and Wyn, J. (2008) Youth and Society. 2 nd edition, Oxford Press, Oxford.<br />

Ybarra, M. and Mitchell, K. (2004) “Youth engaging in online harassment: associations with caregiver-child<br />

relationships, internet use, and personal characteristics”, Journal of Adolescence, Vol. 27, pp 319-336.<br />

Young, K. (2004) “Internet Addiction: A new clinical phenomenon and its consequences”, American Behavioral<br />

Scientist, Vol. 48, No. 4, pp 402-415.<br />

244


Semantic-Driven eGovernment: Correlating Development<br />

Phases With Semantic eGovernment Specific Ontology<br />

Models<br />

Jean Vincent Fonou Dombeu 1, 2 and Magda Huisman 2<br />

1<br />

Vaal University of Technology, Vanderbijlpark, South Africa<br />

2<br />

North-West University, South Africa<br />

fonoudombeu@gmail.com<br />

Magda.Huisman@nwu.ac.za<br />

Abstract: Electronic government (eGovernment) has been one of the most active areas of ontology development<br />

during the past six years, resulting in several EGovernment Specific Ontology Models (ESOM) being developed in<br />

various researches and projects. However, the specific ontology models proposed are not aligned to any<br />

circumstance or phase of eGovernment development nor are detailed guidelines provided to facilitate their<br />

repeatability in the broader eGovernment community. This paper establishes a correlation between existing ESOM<br />

and eGovernment development phases. Firstly, ESOM developed in various eGovernment researches and projects<br />

are investigated and encoded. Thereafter, a semantic-driven eGovernment development framework based on<br />

ontology models prescribed in the ontology engineering field is proposed. Finally, an alignment scheme is drawn to<br />

correlate the encoded ESOM with the proposed eGovernment development framework phases. The aims of the<br />

study are twofold: (1) providing eGovernment developers, particularly those from the developing world with<br />

guidelines for adopting existing semantic ESOM in their eGovernment projects, and (2) strengthening the adoption of<br />

semantic technologies in eGovernment processes. The main contribution of the study is the investigation, analysis<br />

and correlation of existing ESOM with a proposed semantic-driven eGovernment development framework phases,<br />

which provides methodologies and techniques for the iterative adoption of ESOM in other eGovernment projects<br />

within the eGovernment development community.<br />

Keywords: eGovernment, ontology models, correlation, eGovernment development framework, semantic<br />

technologies<br />

1. Introduction<br />

As eGovernment evolves in maturity, heterogonous systems of government departments and agencies<br />

need to be integrated and interoperate to provide a seamless services delivery to citizens. In view of the<br />

current state of methodological approaches for eGovernment development, semantic technologies<br />

provide the best solutions for achieving seamless services delivery in eGovernment (Sanati and Lu 2007;<br />

Muthaiyah and Kerschberg 2008). These semantic-based solutions consist of describing, composing,<br />

mapping and merging eGovernment services (e-services) using ESOM (Apostolou et al. 2005a, 2005b;<br />

Sabucedo and Rifon 2006; Puustjarvi 2006; Xiao et al. 2007; Chen et al. 2008; Gugliotta et al. 2005;<br />

Sanati and Lu 2009; Sabucedo et al. 2010). The concern of this paper is the fact that these ESOM do not<br />

correlate with eGovernment development phases nor are detailed guidelines provided to facilitate their<br />

repeatability in eGovernment projects within the eGovernment development community. This paper<br />

establishes a correlation between existing ESOM and eGovernment development phases. Firstly, ESOM<br />

developed in various eGovernment researches and projects are investigated and encoded. Thereafter, a<br />

semantic-driven eGovernment development framework based on ontology models prescribed in the<br />

ontology engineering field is proposed. Finally, an alignment scheme is drawn to correlate the encoded<br />

ESOM with the proposed eGovernment development framework phases. The aims of the study are<br />

twofold: (1) providing eGovernment developers, particularly those from the developing world with<br />

guidelines for adopting existing semantic ESOM in their eGovernment projects, and (2) strengthening the<br />

adoption of semantic technologies in eGovernment processes. The main contribution of the study is the<br />

investigation, analysis and correlation of existing ESOM with a proposed semantic-driven eGovernment<br />

development framework phases, which provides methodologies and techniques for the iterative adoption<br />

of ESOM in other eGovernment projects within the eGovernment development community.<br />

The rest of the paper is organized as follows. Section 2 conducts a review of existing ESOM and the<br />

ontology models prescribed in the ontology engineering field, as well as their semantic alignment. The<br />

proposed semantic-driven eGovernment development framework is presented in section 3. Section 4<br />

describes the correlation scheme of the ESOM with eGovernment development phases. A discussion is<br />

carried out in section 5 and a conclusion is drawn in the last section.<br />

245


2. Methodology<br />

Jean Vincent Fonou Dombeu and Magda Huisman<br />

Figure 1 describes the correlation process. Firstly, a literature review is carried out in both eGovernment<br />

and ontology engineering domains to identify existing ontology models. As a result, eGovernment specific<br />

ontologies (eGovernment domain) and prescribed ontologies (ontology engineering domain) are<br />

identified. Thereafter, a semantic alignment of both categories of ontologies is established. The alignment<br />

result and a proposed eGovernment development framework are used to correlate the eGovernment<br />

specific ontologies with the development phases.<br />

Figure 1: Flowchart of the correlation process of existing ESOM with eGovernment development phases<br />

2.1 Background on existing ESOM<br />

There is no universal definition of ontology in the literature (Gomez-Perez and Benjamins 1999). The<br />

most commonly used definition was proposed by Gruber (1995). He defined ontology as an explicit<br />

specification of a conceptualization. A conceptualization is an abstract and simplified view of a domain of<br />

knowledge one wishes to represent for a certain purpose; the domain could be explicitly and formally<br />

represented using existing objects, concepts, entities and the relationship that exist between them<br />

(Gruber 1995). Ontology is widely used in disciplines such as computer science, software engineering,<br />

databases, artificial intelligence, and many more (Welty 2003; Calero et al. 2006). In these fields,<br />

developers use ontology to represent knowledge in a manner that can be automatically processed by<br />

computers. In eGovernment, ontology is being used to describe and specify e-services aiming at their<br />

easy composition, mapping, matching and merging for a seamless services delivery to citizens through<br />

one-stop portals (Wimmer 2002; Lee et al. 2009). Therefore, specialized ontologies are being developed<br />

to model government’s structures, laws and regulations, service delivery processes, interactions between<br />

government and citizens, integration and interoperability processes, and the like.<br />

Sanati and Lu (2009) use three kinds of ontologies namely: government ontology, regulatory ontology<br />

and service ontology to describe the e-services integration process. The ONTOGOV project (Apostolou<br />

et al. 2005a, 2005b) provides a platform which allows the composition, reconfiguration and evaluation of<br />

e-services using eight kinds of ontologies including legal ontology, organizational ontology, life-cycle<br />

ontology, domain ontology, service ontology, life-event ontology, profile ontology, and web service<br />

246


Jean Vincent Fonou Dombeu and Magda Huisman<br />

orchestration ontology. Other solutions for services integration based on specific ontologies are proposed<br />

in Chen et al. (2008) and Gugliotta et al. (2005). Chen et al. (2008) propose a framework for services<br />

integration based on citizen ontology, domain ontology, and generic eGovernment ontology, whereas,<br />

Gugliotta et al. (2005) establish the mapping of legacy ontology, workflow ontology, service ontology, lifeevent<br />

ontology, and eGovernment domain ontology to a predefined eGovernment system reference<br />

model, aiming at achieving services integration and interoperability for One-Stop portals. The issue of<br />

services interoperability is further addressed by Sabucedo and Rifon (2006), Xiao et al. (2007) and<br />

Sabucedo et al. (2010) with specialized ontology models. Xiao et al. (2007) model the interoperability<br />

process using the eGovernment business ontology. Sabucedo and Rifon (2006) use the life-event<br />

ontology, variable ontology, and legal document ontology, developed in a semantic-based platform, to<br />

enable the interoperability of eGovernment services. A holistic solution for services interoperability is<br />

proposed by Sabucedo et al. (2010) based on the life-event ontology and document ontology. Another<br />

relevant literature by Puustjarvi (2006) proposes a process-document ontology model for the business<br />

process modeling in eGovernment.<br />

None of the above researches and projects has established a correlation between the proposed ESOM<br />

and eGovernment development phases nor do they provide detailed guidelines to facilitate their<br />

repeatability in other eGovernment projects and strengthen the adoption of semantic technologies in<br />

eGovernment processes. This research establishes a correlation of the abovementioned ESOM with a<br />

proposed semantic-driven eGovernment development framework phases; which provides methodologies<br />

and techniques for the iterative adoption of ESOM in other eGovernment projects.<br />

Table 1 summarizes the 26 existing ESOM presented above (see the third column of Table 1), the<br />

eGovernment issues they were used to address (see the second column of Table 1), as well as a brief<br />

summary of their purposes and/or roles in the eGovernment domain (see the fourth column of Table 1).<br />

In the third column of Table 1, the ESOM are also encoded to facilitate their later reference in this paper.<br />

Each eGovernment specific ontology model in the third column of Table 1 is encoded as EGovernment<br />

Ontology x (EOx); where x is a number between 1 and 26 inclusive. It is worth noting that some ESOM in<br />

Table 1 which are sharing the same name have been assigned different codes; this is due to the fact that<br />

in certain cases, the purposes and/or roles for which these ESOM were used are different from one<br />

author to another. The ontology models prescribed by the ontology engineering field are described in the<br />

next section.<br />

2.2 Ontology models prescribed by the ontology engineering field<br />

There is no universal classification of ontologies in the ontology engineering research domain. Several<br />

classifications of ontologies are provided in the literature (Mizoguchi and Ikeda 1995; Uschold 1996;<br />

Gangemi et al. 1999; Gomez-Perez and Benjamins 1999; Beck and Pinto 2003). However, two main<br />

criteria could be used to classify ontologies: the formality used and the nature of the domain of<br />

knowledge that the ontology is characterizing. The formality refers to the level of detail employed to<br />

create the ontology’s vocabulary and specifies the meaning of terms. The domain of knowledge could be<br />

anything at all; it could refer to a domain such as medicine, geographic information system or<br />

eGovernment; it could also refer to an area of problem solving or knowledge representation language<br />

(Uschold 1996). A classification of ontologies according to the above criteria is as follows:<br />

1. Formality<br />

Informal ontology (Uschold 1996; Gangemi et al. 1999): expressed either in natural language or in<br />

a semi-structured form of natural language.<br />

Semi-formal ontology (Uschold 1996): expressed in a formally defined language.<br />

Formal ontology (Uschold 1996): terms are meticulously defined with formal semantic, theorems<br />

and proofs.<br />

2. Domain of Knowledge<br />

Domain ontology: characterizes domains such as medicine, geology, eGovernment, etc; provides<br />

vocabularies about the concepts within a domain and their relationships, the activities that take place<br />

in that domain, and theories and elementary principles governing the domain (Gomez-Perez and<br />

Benjamins 1999; Beck and Pinto 2003).<br />

247


Jean Vincent Fonou Dombeu and Magda Huisman<br />

Table 1: Existing ESOM, eGovernment issues addressed, and purposes and/or roles<br />

248


Jean Vincent Fonou Dombeu and Magda Huisman<br />

Task/Method/Problem solving ontology: terms are specific to a particular task or problem solving<br />

methods (Uschold 1996; Gomez-Perez and Benjamins 1999); describe specific tasks or activities<br />

using the vocabulary specified in the domain ontology (Gangemi et al. 1999).<br />

Representation or Meta ontology: represented in an existing ontology language (Uschold 1996);<br />

written in description logic (Beck and Pinto 2003); uses the syntax employed to formalize knowledge<br />

in knowledge representation paradigms; reusable across domains (Gomez-Perez and Benjamins<br />

1999)<br />

In the remaining sections of this work, we will refer to the above types of ontologies defined in the<br />

ontology engineering field as Prescribed Ontology Models (POM). The next section establishes the<br />

semantic alignment of ESOM in Table 1 with the POM.<br />

2.3 Semantic alignment of existing ESOM with POM<br />

To semantically align ESOM with the POM, we have formulated three propositions which broadly define<br />

the characteristics of the POM. Then, an eGovernment specific ontology model is aligned to a prescribed<br />

ontology model i.e. it belongs to the class of ontologies formed by the prescribed ontology model, if its<br />

purposes and/or roles described in Table 1 satisfy the corresponding proposition. Let’s consider an<br />

ontology O. The propositions are formulated as follows:<br />

P1: O describes the entities of a domain of knowledge and the relationships between them; these entities<br />

may have a physical, abstract or moral representation.<br />

P2: O describes the processes of a domain of knowledge; it describes specific tasks or activities needed<br />

to carry out the processes using the domain concepts.<br />

P3: O describes either the entities or processes of a domain of knowledge and it is formally written in<br />

such a way that it can be processed by a computer.<br />

Figure 2: Alignment of ESOM with POM<br />

After having defined the propositions, the semantic alignment is carried out manually by analyzing the<br />

purposes and/or roles of each eGovernment specific ontology model in Table 1 and finding out which of<br />

the above propositions is satisfied by these purposes and/or roles. The result of the semantic alignment<br />

is provided in Figure 2. The ESOM are represented using the encoding established in the third column of<br />

Table 1. Furthermore, ontology models which purposes and/or roles satisfy a common proposition are<br />

grouped into a set (see the left part of Figure 2). The proposed semantic-driven eGovernment<br />

development framework is presented in the next section.<br />

249


Jean Vincent Fonou Dombeu and Magda Huisman<br />

3. Proposed semantic-driven eGovernment development framework<br />

In Fonou-Dombeu and Huisman (2010), we have proposed a three phase semantic-driven eGovernment<br />

development methodology framework amalgamating eGovernment development methodological features<br />

from the public administration, software engineering and Semantic Web domains. Figure 3 depicts the<br />

architecture of the proposed semantic-driven eGovernment development methodology framework.<br />

Figure 3: The proposed three phase egovernment development framework aligning the united nation<br />

maturity model stages with ontologies<br />

A complete description of the specification of the proposed methodology framework in Figure 3 is out of<br />

the scope of this research; more information could be found in Fonou-Dombeu and Huisman (2010). This<br />

research provides a brief description of the framework and emphasizes on the semantic alignment of the<br />

development phases with the ESOM.<br />

In the proposed methodology framework in Figure 3 we present a new generation of eGovernment<br />

applications development methodology as a system with three layers namely: maturity model stages<br />

layer, service development layer and ontology layer. The maturity model stages layer is the domain of<br />

public administrators who provide a certain number of stages for eGovernment development as well as<br />

guidelines for the planning and implementation of eGovernment systems. The service development layer<br />

in the middle, falls under the software engineering domain and provides tools and platforms for the<br />

analysis, design and effective implementation of e-services; in particular, we are more interested at this<br />

layer by the agile software development techniques which would allow fast development of e-services,<br />

iterative and incremental development, constant review of e-services requirements as well as constant<br />

prototyping during development. The ontology layer is the semantic-based layer which prescribes the use<br />

of semantic technologies as ontologies for the modelling and specification of e-services at each stage of<br />

development to facilitate their integration, maintenance and interoperability at advanced stages of<br />

development.<br />

More importantly, the proposed methodology framework in Figure 3 provides three phases for<br />

eGovernment development namely: scope definition, identification and categorization of services, as well<br />

as Web Services development. At each phase of the framework is aligned a POM for the semantic<br />

description and specification of eGovernment services at that particular phase. The aim of this study<br />

being to correlate the ESOM with the three phases of the proposed framework in Figure 3, we present in<br />

the next section the correlation scheme of the ESOM with the framework phases.<br />

250


Jean Vincent Fonou Dombeu and Magda Huisman<br />

4. Correlating ESOM with the proposed eGovernment development framework<br />

phases<br />

We recall that the proposed eGovernment development framework in Figure 3 is based on ontology<br />

models prescribed in the ontology engineering field. It can be noticed that these prescribed ontology<br />

models represented at each phase of the framework, under its ontology layer, are the same as the POM<br />

mentioned earlier in this research. Then, correlating the ESOM with the framework phases will consist of<br />

establishing an alignment of the POM in Figure 2 with those in Figure 3. To this end, the following<br />

propositions have been formulated:<br />

P4: A prescribed ontology model is aligned to one or many phases of the proposed eGovernment<br />

development framework.<br />

P5: If a prescribed ontology model is aligned to a phase of the framework, then, the ESOM which are<br />

aligned to it are also aligned to that same phase of the framework.<br />

In light of the above propositions, the correlation of ESOM with the proposed eGovernment development<br />

framework phases in Figure 3 is provided in Figure 4. Figure 4 shows that all the ESOM classified as<br />

domain ontologies in Figure 2 are aligned to the first and second phases of the proposed framework.<br />

Similarly, all the ESOM classified as task and Meta ontologies respectively are aligned to the second and<br />

third phases of the framework respectively. More information on the structure of the framework phases is<br />

given in Figure 3.<br />

Figure 4: Correlation scheme of ESOM with proposed eGovernment development framework phases<br />

5. Discussion<br />

This research has investigated, analysed and correlated specific eGovernment ontology models that are<br />

being developed in various researches and projects, with the phases of our proposed eGovernment<br />

development framework (see Figure 3). The correlation scheme in Figure 4 has aligned thirteen ESOM to<br />

the first phase of the framework namely: scope definition; at this phase of eGovernment development, the<br />

aligned ESOM will mainly be used to describe and specify the government business domain. In<br />

particular, the ESOM at the first phase of the framework will be employed to model government structure<br />

and services ([EO1], [EO4], [EO16], [EO20], [EO21], [EO25]), describe government documents, laws and<br />

regulations that govern government services ([EO2], [EO3], [EO10], [EO14], [EO22]), describe citizens’<br />

status ([EO13]), and concepts related to the interaction of citizens with government ([EO19]). Eight<br />

ESOM as well as some of the ESOM aligned to the first phase, are aligned to the second phase of the<br />

framework namely: identification and categorization of services; at this phase of the framework, the<br />

ESOM will serve to model government processes ([EO5], [EO9], [EO11], [EO15]), describe e-services<br />

flows ([EO6], [EO17]) and transitions of citizens’ life ([EO12], [EO24]). At the third phase of the<br />

framework, five ESOM are aligned; they are formally written with Semantic Web technologies ([EO18])<br />

251


Jean Vincent Fonou Dombeu and Magda Huisman<br />

and provide mechanisms for automatic composition, mapping, matching and merging of e-services<br />

([EO7], [EO8], [EO23], [EO26]) and facilitate their integration and interoperability.<br />

As mentioned previously, the researches investigated to identify the ESOM described above do not<br />

provide detailed guidelines on how one can repeat the proposed ESOM in other eGovernment projects.<br />

This study has overcome this weakness by aligning the various ESOM to the ontology models prescribed<br />

in the ontology engineering field. This is a great opportunity to eGovernment developers as the wider<br />

range of methodologies and techniques for building ontologies (Uschold 1996; Fernandez-Lopez 1999;<br />

Beck and Pinto 2003; Calero et al. 2006) which are available in the ontology engineering domain could<br />

be exploited for a widespread use of the ESOM in future eGovernment projects. Furthermore, the<br />

correlation of the proposed ESOM with the phases of the proposed eGovernment development<br />

framework presented above, provide eGovernment developers with a stepwise based mechanism for the<br />

iterative adoption of ESOM in future eGovernment projects.<br />

6. Conclusion<br />

The study reviews researches focusing on semantic eGovernment and published between 2005 and<br />

2010 inclusive. As a result, 26 eGovernment specific ontology models were identified, analysed and<br />

correlated with a proposed semantic-driven eGovernment development framework phases; this provides<br />

methodologies, techniques and mechanisms for the iterative adoption of the proposed eGovernment<br />

specific ontology models in other eGovernment projects within the eGovernment development<br />

community.<br />

The study reveals that various authors are proposing eGovernment specific ontology models under the<br />

same name, but with different purposes/roles. Then, it would be useful to normalize the semantic<br />

ontology models characterizing the eGovernment domain in the near future, so as to prevent<br />

inconsistency and confusion in the semantic eGovernment development community.<br />

References<br />

Apostolou, D., Stojanovic, L., Lobo, T.P., Miro, J.C. and Papadakis, A. (2005a) “Configuring EGovernment Services<br />

Using Ontologies”, IFIP International Federation for Information Processing, Springer Boston, Vol. 189, pp.<br />

1571-5736.<br />

Apostolou, D., Stojanovic, L., Lobo, T.P and Thoensen, B. (2005b) “Towards a Semantically-Driven Software<br />

Engineering Environment for EGovernment”, IFIP International Federation for Information Processing, M.<br />

Bohlen (Eds), Vol. 3416, pp. 157-168.<br />

Beck, H. and Pinto, H.S. (2003) Overview of Approach, Methodologies, Standards, and Tools for Ontologies,<br />

Agricultural Ontology Service (UN FAO).<br />

Calero, C., Ruiz, F. and Piattini, M. (2006) Ontologies for Software Engineering and Software Technology,<br />

Calero.Ruiz.Piattini (Eds.), Springer-Verlag Berlin Heidelberg, 2006.<br />

Chen, D., Nie, G. and Liu, P. (2008) “Research on Knowledge Sharing of EGovernment Based on Automatic<br />

Ontology Mapping”, In Proceedings of the 6 th Wuhan International <strong>Conference</strong> on E-Business, China, pp 105-<br />

111.<br />

Fernandez-Lopez, M. (1999) “Overview of Methodologies for Building Ontologies”, In Proceedings of the IJCAI-99<br />

workshop on Ontologies and Problem-Solving Methods (KRR5), Stockholm, Sweden, 2 August.<br />

Fonou-Dombeu, J.V. and Huisman, M. (2010) "Integrating EGovernment Services: A Stepwise Ontology-Based<br />

Methodology Framework", In proceedings of the 6 th International <strong>Conference</strong> on EGovernment 2010<br />

(ICEG2010), Cape Town, South Africa, 31 September – 01 October 2010,<br />

pp. 18-29.<br />

Gangemi, A., Pisanelli, D.M. and Steve G. (1999) “An Overview of the ONIONS Project: Applying Ontologies to the<br />

Integration of Medical Terminologies”, Elsevier, Data and Knowledge Engineering, Vol. 31, No. 2, pp 183-220.<br />

Gomez-Perez, A. and Benjamins, V.R. (1999) “Overview of knowledge Sharing and Reuse Components: Ontology<br />

and Problem-Solving Methods”, In Proceedings of the IJCAI-99 workshop on Ontologies and Problem-Solving<br />

Methods (KRR5), Stockholm, Sweden, August 2.<br />

Gugliotta, A., Cabral, L., Domingue, J. and Roberto, V. (2005) “A Conceptual Model for Semantically-based<br />

EGovernment Portals”, In Proceedings of International <strong>Conference</strong> on E-Government (ICEG 2005), Ottawa,<br />

Canada.<br />

Gruber, T. R. (1995) “Toward Principles for the Design of Ontologies used for Knowledge Sharing”, International<br />

Journal Human-Computer Studies, Vol 43, No. 5-6, pp 907-928.<br />

Lee, T.,Hon, C.T. and Cheung, D. (2009) “XML Schema Design and Management for EGovernment Data<br />

Interoperability”, Electronic Journal of EGovernment, Vol. 7, No. 4, pp. 381-390.<br />

Mizoguchi, R. and Ikeda, M. (1995) “Ontology for Modeling the World from Problem Solving Perspective”, In<br />

Proceedings of the IJCAI-95.<br />

252


Jean Vincent Fonou Dombeu and Magda Huisman<br />

Muthaiyah, S. and Kerschberg, L. (2008) “Achieving Interoperability in EGovernment Services with two Modes of<br />

Semantic Bridging: SRS and SWRL”, Journal of Theoretical and Applied Electronic Commerce Research , Vol.<br />

3, No. 3, pp. 52-63, December.<br />

Puustjarvi, J. (2006) “Using Knowledge Management and Business Process in EGovernment”, In Proceedings of the<br />

Information Integration and Web-based Applications and Services 2006 (iiWas2006) <strong>Conference</strong>, Yogyakarta<br />

Indonesia, pp. 331-339, 4 - 6 December.<br />

Sabucedo, L.A. and Rifon, L.A. (2006) Semantic Service Oriented Architecture for EGovernment Platforms,<br />

American Association for Artificial Intelligence.<br />

Sabucedo, P., Rifon, L.E.A., Corradini, F., Polzonetti, A. and Re, B. (2010) “Knowledge-based Platform for<br />

EGovernment Agents: A Web-based Solution Using Semantic Technologies”, Journal of Expert Systems with<br />

Applications, Elsevier Inc., Vol. 37, No. 5, pp. 3647-3656.<br />

Sanati, F. and Lu, J. (2007) “A Methdological Framework for EGovernment Service Delivery Integration”, In<br />

EGovernment Interoperability Campus, Paris, France, 2007.<br />

Sanati, F. and Lu, J. (2009) “Multilevel Life-event Abstraction for EGovernment Service Integration”, In Proceedings<br />

of the 9 th <strong>European</strong> <strong>Conference</strong> on EGovernment 2009 (ECEG 2009), London, UK, pp. 550-558, 29-30 June.<br />

Uschold, M. (1996) “Building Ontologies: Towards a Unified Methodology”, In Proceedings of Expert Systems 96, the<br />

16 th Annual <strong>Conference</strong> of British Computer Society Specialist Group Expert Systems, Cambridge, 16-18<br />

December, UK.<br />

Welty, C.A. (2003) “Ontology Research”, AI Magazine, Vol. 24, No. 3, pp 11-12<br />

Wimmer, M. A. (2002) “Integrated Service Modelling for Online One-Stop Government”, Electronic Markets, Vol. 12,<br />

No. 3, pp.149-156.<br />

Xiao, Y., Xioa, M. and Zhao, H. (2007) “An Ontology for EGovernment Knowledge Modelling and Interoperability”,<br />

IEEE International <strong>Conference</strong> on Wireless Communications, Networking and Mobile Computing, (WiCOM<br />

2007), Shanghai, China, 21-25 September, pp. 3600-3603.<br />

253


Towards a Unified Semantic-Driven Methodology Framework<br />

for eGovernment Systems Development<br />

Jean Vincent Fonou Dombeu 1, 2 and Magda Huisman 2<br />

1<br />

Vaal University of Technology, Vanderbijlpark, South Africa<br />

2<br />

North-West University, South Africa<br />

fonoudombeu@gmail.com<br />

Magda.Huisman@nwu.ac.za<br />

Abstract: The ultimate goal of e-governance is to reach the stage of seamless service delivery in one-stop<br />

eGovernment. This raises the engineering issues of integration, reusability, maintenance and interoperability of<br />

autonomous eGovernment systems of government departments and agencies. Therefore, appropriate methodologies<br />

which consistently address the aforementioned engineering issues throughout eGovernment development phases<br />

are needed. This study presents a methodology framework which amalgamates features from maturity models,<br />

traditional software engineering and semantic knowledge representation research domains for a unified and agile<br />

semantic-driven development of eGovernment systems. Firstly, the methods and techniques currently used for the<br />

planning, design, and implementation of eGovernment systems worldwide are investigated; a critical analysis is<br />

carried out to identify their advantages and disadvantages, as well as their contribution towards addressing the<br />

aforementioned engineering issues. Secondly, the proposed methodology framework is drawn and described.<br />

Finally, a flowchart is used to specify the iterative and incremental business process model of the proposed<br />

methodology framework. The aims of the study are twofold: (1), providing direction for the semantic-driven<br />

development of future eGovernment systems which would facilitate their integration and interoperability towards onestop<br />

eGovernment, and (2), unifying the currently used methods and techniques for efficient planning and<br />

implementation of future eGovernment systems based on semantic technologies. The main contribution of the study<br />

is the investigation and amalgamation of features from the maturity models, traditional software engineering and<br />

semantic knowledge representation research domains to enable the planning and agile semantic-driven<br />

implementation of future eGovernment systems. The research would be of interest to eGovernment project teams,<br />

particularly those of developing countries where little or no progress has been made towards the development of<br />

one-stop portals for online services delivery to citizens.<br />

Keywords: eGovernment, methodology framework, one-stop portal, ontology, semantic technologies, maturity<br />

models<br />

1. Introduction<br />

In recent years, many countries worldwide have adopted e-governance, resulting in several web-based<br />

applications being developed in various government departments and agencies for online services<br />

delivery to citizens. The increasing number of these autonomous eGovernment applications (eapplications)<br />

has raised several software engineering issues such as reusability, maintenance,<br />

integration and interoperability of these applications (Choudrie and Weerrakody 2007; Muthaiyah and<br />

Kerschberg 2008; Lee et al. 2009; Saekow and Boonmee 2009), in the context of one-stop eGovernment<br />

which requires e-applications to be accessed at a single point and function as a whole for better<br />

efficiency and seamless services delivery (Wimmer 2002; Lee et al. 2009).<br />

On the other hand e--government is a broad research field with several research works being undertaken<br />

in various domains (Lofstedt 2005); aiming at addressing simultaneously political, institutional, legal,<br />

technological, cultural and societal issues for effective electronic services (e-services) delivery to citizens.<br />

However, the development and deployment of e-services in one-stop portal/shop remain a key and<br />

challenging priority in eGovernment development. In fact, (1), eGovernment strategies of various<br />

countries include e-services development as vehicle for effective online delivery to citizens and<br />

stakeholders; examples from countries with successful eGovernment implementation encompass<br />

Singapore(Devadoss et al. 2003), Australia (Teicher and Dow 2002), Taiwan (Sang et al. 2005) and UK<br />

(Beynon-Davies 2005) and (2), research studies reporting on successful eGovernment implementation<br />

show that few countries have reached the stage of one-stop portal where citizens can seamlessly access<br />

all government’s services; in fact, a United Nations survey in 2002 reported that amongst its 190 member<br />

states, only 26 out of 169 websites had one-stop portals and less than 20 offered online transactions<br />

(Chen et al. 2006). Therefore, it is important to look at appropriate methodologies for developing eapplications<br />

which provides structured guidelines for the design, implementation and deployment of<br />

various government services on the Web to citizens, while consistently addressing the aforementioned<br />

engineering issues in an incremental and iterative manner, towards one-stop eGovernment portals. A<br />

review of current literature in eGovernment implementation has allowed identifying three main methods<br />

254


Jean Vincent Fonou Dombeu and Magda Huisman<br />

and techniques that deal with the planning, design, implementation and deployment of e-services for<br />

effective online delivery to citizens; these include maturity models (MM), traditional software engineering<br />

(TSE) and semantic-based techniques (SB).<br />

Considerable research has been conducted by public administrators for eGovernment planning and<br />

implementation. They propose different stages for eGovernment development in maturity models or stage<br />

of growth models (Layne and Lee 2001; Howard 2001; Deloitte and Touche 2001; Moon 2002; United<br />

Nation 2003; West 2004; Zarei et al. 2008; Bri 2009). A maturity model or stage of growth model is<br />

designed as a sequence of stages of eGovernment growth and constitutes a guiding and benchmarking<br />

tool for eGovernment planning and development. Each maturity model stage prescribes a list of web<br />

features that are needed online or mechanisms required to create changes at that particular stage of<br />

eGovernment development. An example of eGovernment initiative that has used the Layne and Lee<br />

(2001) model is the Integrated Acquisition Environment (IAE) eGovernment project in the US (Sang et al.<br />

2005). The shortcoming of maturity models or stage of growth models is that they lack design guidelines<br />

throughout their various stages. Furthermore, maturity models emphasize eGovernment services<br />

integration at advanced stages of eGovernment growth but they do not mention how this can be done.<br />

The authors carried out a detailed review of maturity models in Fonou-Dombeu and Huisman (2010).<br />

Despite their shortcomings mentioned above, maturity models provide useful methodological features for<br />

eGovernment planning and development (Estevez et al. 2007). However, the aforementioned<br />

shortcomings could be addressed with TSE and SB techniques as described below.<br />

In the software engineering field, it is believed that an eGovernment application is a software system;<br />

existing software development methodologies (SDM) are used in eGovernment projects and existing<br />

standards are employed for services integration and interoperability (Vassilakis et al. 2002; Heeks 2006;<br />

Janowski et al. 2007; Salhofer and Ferbas 2007; Sanati and Lu 2007; Arif 2008; Lee et al. 2009). In this<br />

research, existing SDM refers to structured and object-oriented analysis and design methods, and agile<br />

methods. The advantages of TSE techniques is that they provide a large range of tools and mechanisms<br />

for analyzing and describing the requirements of the complex public administration systems (Arif 2008;<br />

Janowski et al. 2007; Lee et al. 2009), and provides platforms for implementing and deploying web-based<br />

eGovernment applications. However, traditional software development methodologies are inappropriate<br />

for the planning and benchmarking of e-services development as public administrators do with maturity<br />

models. Furthermore, the traditional software engineering techniques use existing Web services<br />

standards for e-services integration and interoperability as described in Arif (2008) and Lee et al. (2009).<br />

However, Muthaiyah and Kerschberg (2008) have demonstrated that existing Web services standards<br />

provide only syntactical interoperability and that the trend is towards semantic interoperability which is<br />

more reliable. This is in line with the work of Sanati and Lu (2007) who argued that traditional software<br />

engineering methodologies provide only limited solutions to the problem of services integration in<br />

eGovernment. They recommended that more research work be carried out to develop new<br />

methodologies approaches that provide appropriate solutions to the integration problem in eGovernment.<br />

To this end, semantic technologies have emerged as promising solutions (Muthaiyah and Kerschberg<br />

2008; Sabucedo et al. 2010).<br />

The SB techniques belongs to the semantic knowledge representation field which uses ontology to model<br />

eGovernment systems (Apostolou et al. 2005a, 2005b; Xiao et al. 2007; Muthaiyah and Kerschberg<br />

2008; Sanati and Lu 2009; Sabucedo et al. 2010), facilitating their semantic integration and<br />

interoperability. The advantage of SB techniques is that they provide efficient and reliable solutions to the<br />

engineering issues of integration, reusability, maintenance and interoperability in eGovernment (Sanati<br />

and Lu 2007; Muthaiyah and Kerschberg 2008). Further, the SB techniques share some tools and<br />

platforms with TSE techniques (Sanati and Lu 2007) for the analysis and design of e-services, and the<br />

development of web-based eGovernment applications. However, the semantic ontology models being<br />

developed in the eGovernment domain are mainly ad hoc solutions and are not aligned to any<br />

eGovernment development phases or stages as proposed by maturity models, which might makes it<br />

extremely difficult to plan and benchmark a semantic-driven eGovernment development project.<br />

Furthermore, various ontologies are being used in different research and projects for the modeling and<br />

specification of e-services, but it is unclear which kinds of ontologies were used (Muthaiyah and<br />

Kerschberg 2008; Saekow and Boonmee 2009) and when and in which circumstances of e-services<br />

development processes the proposed ontologies are required (Apostolou 2005b; Xiao et al. 2007;<br />

Muthaiyah and Kerschberg 2008; Salhofer et al. 2009; Saekow and Boonmee 2009; Sanati and Lu 2009),<br />

nor how to represent them from the complex public administration system (Apostolou 2005b; Xiao et al.<br />

2007; Muthaiyah and Kerschberg 2008; Saekow and Boonmee 2009; Sanati and Lu 2009; Sabucedo et<br />

255


Jean Vincent Fonou Dombeu and Magda Huisman<br />

al. 2010). Finally, to the best of our knowledge, none of current semantic based eGovernment solutions<br />

provides a holistic stepwise methodology for a semantic-driven planning and implementation of<br />

eGovernment systems.<br />

This study presents a methodology framework which amalgamates features from maturity models,<br />

traditional software engineering and semantic knowledge representation research domains for a unified<br />

and agile semantic-driven development of future eGovernment systems. Firstly, the proposed<br />

methodology framework is drawn and described. Secondly, the methodology of the research is<br />

presented. Finally, a flowchart is used to specify the iterative and incremental business process model of<br />

the proposed methodology framework. The aims of the study are twofold: (1), providing direction for the<br />

semantic-driven development of future eGovernment systems which would facilitate their integration and<br />

interoperability towards one-stop eGovernment portals, and (2), unifying the currently used models and<br />

techniques for efficient planning and implementation of future eGovernment systems based on semantic<br />

technologies. The main contribution of the study is the investigation and amalgamation of features from<br />

the maturity models, traditional software engineering and semantic knowledge representation research<br />

domains to enable the planning and agile semantic-driven implementation of future eGovernment<br />

systems. The research would be of interest to eGovernment project teams, particularly those of<br />

developing countries where little or no progress has been made towards the development of one-stop<br />

portals for online services delivery. The rest of the paper is organized as follows. Section 2 presents and<br />

describes the proposed methodology framework. The methodology of the research is explained in<br />

Section 3. Section 4 draws the flowchart of the business process model of the proposed methodology<br />

framework. The limitations and future trends of the research are described in Section 5 and a conclusion<br />

ends the paper.<br />

2. Proposed methodology framework for eGovernment systems development<br />

The methodology framework described here was presented in Fonou-Dombeu and Huisman (2010). It<br />

was employed to show how maturity model stages could be complemented with tools and platforms for<br />

the stepwise semantic-driven design and implementation of e-services to enable their easy integration<br />

and interoperability at advanced stages of eGovernment development towards one-stop portals. The<br />

proposed methodology framework is depicted in Figure 1; it displays and overlay of features from<br />

maturity models (top layer), traditional software engineering (middle layer) and semantic knowledge<br />

representation (bottom layer) domains as mentioned earlier. This study explains why the proposed<br />

methodology framework is useful for eGovernment systems development and emphasizes on its<br />

business process model for the iterative and incremental development of e-services towards one-stop<br />

portals. The study does not repeat the explanation of the e-services development processes at various<br />

phases of the framework. Interested readers may refer to Fonou-Dombeu and Huisman (2010) for more<br />

information.<br />

First of all, in a software engineering perspective, eGovernment systems implementation entails<br />

gathering the requirements of the government service to be delivered online to citizens, design,<br />

implement and deploy the e-service on the Web for online interaction with citizens; these processes could<br />

be carried out iteratively and incrementally with state-of-the-art software engineering techniques. In view<br />

of the complexity of the public administration system, eGovernment implementation as described above<br />

requires (1), mechanisms for the planning and implementation of e-services at various stages or phases<br />

of eGovernment development, (2), state-of-the-art software engineering techniques and platforms for the<br />

design and implementation of e-services, as well as (3), emerging technologies as the Semantic Web<br />

technologies which have potential to facilitate the integration and interoperability of e-services towards<br />

one-stop eGovernment (Muthaiyah and Kerschberg 2008). These three requirements are provided in the<br />

proposed methodology framework in Figure 1. The framework in Figure 1 is composed of three layers<br />

namely maturity model stages layer (MMSL), services development layer (SDL) and ontology layer (OL).<br />

The MMSL provides various stages for eGovernment development; each stage prescribes the web<br />

features that should be implemented and launch on the web site of the government department or<br />

agency for online interaction with citizens. The stages are complemented with software engineering and<br />

semantic-based tools and techniques at various phases of the framework to enable the effective design,<br />

implementation and deployment of the prescribed web features of maturity models. At each phase of the<br />

framework, the SDL and OL provides system analysis and design techniques as well as platforms for the<br />

implementation and deployment of the required web features at the corresponding maturity model<br />

stage(s). In particular, the SDL provides state-of-the-art software engineering techniques as objectoriented<br />

and agile methods for the design and development of e-services; these e-services can further be<br />

integrated and interoperated using existing Web services standards (Arif 2008; Lee et al. 2009) and<br />

256


Jean Vincent Fonou Dombeu and Magda Huisman<br />

promote the advancement towards one-stop portals. Furthermore, the proposed framework phases might<br />

not be followed chronologically or in a linear order in practice, then, agile methods at SDL provide<br />

mechanisms for the iterative and incremental development of e-services through a continuous review of<br />

e-services requirements and prototyping to enable the quick development of required e-services (Greg et<br />

al. 2006). The OL provides various ontology models that capture at each phase of the framework the<br />

semantic content of e-services under development; the resulting e-services ontology models are<br />

implemented in Semantic Web ontology languages such as XML, Resource Description Framework<br />

(RDF) and/or Web Ontology Language (OWL) with Semantic Web platforms to enable their easy<br />

composition, matching, mapping and merging and facilitate their integration and interoperability towards<br />

one-stop eGovernment. The next section describes the methodology that was used to carry out this<br />

study.<br />

Figure 1: The proposed three phase egovernment development framework aligning the united nation<br />

maturity model stages with ontologies<br />

3. Methodology<br />

Several journals, conferences papers, research reports and magazines on eGovernment topic published<br />

between 2000 and 2010 inclusive were reviewed. The aim was to investigate the current methods and<br />

techniques used in eGovernment systems development worldwide. Firstly, the selection of relevant<br />

papers was done by mean of keyword search in Google search engine. Keywords include "eGovernment<br />

development", "eGovernment development methodology", "eGovernment development framework", "eservice<br />

development", "semantic eGovernment", "semantic-driven eGovernment", " eGovernment in<br />

country"; where country include US, UK, Singapore, etc, which are countries with successful<br />

eGovernment implementation experiences (Chen et al. 2006). In total, 244 related research works were<br />

downloaded. Secondly, the content analysis of the downloaded research was carried out based on the<br />

title and abstract; in certain cases, the introduction and selected sections were analysed as well. As a<br />

consequence, (1), research which focuses on eGovernment development methodology or framework in<br />

general i.e. which address general issues such as adoption, strategies, etc., and (2), research which<br />

does not focus on or discuss processes for eGovernment systems development, e-services development,<br />

or semantic web integration and interoperability of e-services was discarded. 59 research works which<br />

meet the abovementioned criteria remained. These remaining research works were read one by one and<br />

analysed thoroughly; finally, journal articles and conference papers where sources were widely<br />

accessible were selected as well as research reports from specialized institutions as the United Nations.<br />

The selected papers were published in various peer reviewed journals, conferences and magazines<br />

worldwide including : Electronic Journal of EGovernment (EJEG), International Journal of Electronic<br />

257


Jean Vincent Fonou Dombeu and Magda Huisman<br />

Government Research (IJEGR), Government Information Quarterly, Public Administration Review (PAR),<br />

Journal of Theoretical and Applied Electronic Commerce Research (JTAER), Journal of Expert Systems<br />

with Applications (JESA), Electronic Markets (EM), The International Information & Library Revew,<br />

Government Finance Review, International Federation for Information Processing (IFIP), <strong>European</strong><br />

<strong>Conference</strong> on EGovernment (ECEG), International Digital Government Research <strong>Conference</strong> (IDGRC),<br />

IEEE International <strong>Conference</strong> on Wireless Communication, Networking and Mobile Computing<br />

(WiCOM), CMA Management, etc. Based on a thorough analysis of these selected research, it was<br />

discovered that, methods and techniques that are widely used for the planning, design and<br />

implementation of eGovernment systems include, (1) maturity models or stages of growth models which<br />

prescribe iterative processes of development through various stages (Layne and Lee 2001; United Nation<br />

2003; West 2004), (2) traditional software engineering techniques including structured, object-oriented,<br />

and agile methods (Vassilakis et al. 2002; Heeks 2006; Janowski et al. 2007; Salhofer and Ferbas 2007;<br />

Sanati and Lu 2007; Arif 2008; Lee et al. 2009) and (3) Semantic Web technologies (Saekow and<br />

Boonmee 2009; Sanati and Lu 2009; Sabucedo et al. 2010). Then, current eGovernment systems<br />

development methods and techniques that dealt with e-services planning, design, and implementation<br />

into three main categories namely: the Maturity Model Stages (MMS), the Traditional Software<br />

Engineering (TSE) and the Semantic-Based (SB) were classified. These three classes correspond to the<br />

three layers of the proposed methodology framework in Figure 1. Table 1 presents some selected<br />

research that we have reviewed. Furthermore, some of the works reviewed were describing practical<br />

experiences of eGovernment implementation processes; the corresponding papers are presented in<br />

Table 2.<br />

Table 1: Selected research studies reviewed<br />

258


Jean Vincent Fonou Dombeu and Magda Huisman<br />

It is worth noting that Table 2 does not refer to developed countries with successful eGovernment<br />

implementation experiences such as US, UK, Singapore, etc. because detailed studies on the software<br />

development techniques or processes of their eGovernments systems was unavailable. In fact, available<br />

research is mainly reporting or evaluating the implementation strategies of eGovernment systems of<br />

these developed countries as well as their success and/or failure factors without providing any<br />

information on the software engineering methods or techniques employed for e-services design and<br />

implementation. This situation is in part justified by the fact that in these countries, eGovernment systems<br />

implementation is mainly outsourced by private companies which are known to protect their proprietary<br />

information; examples include the implementation of the eGovernment system of the department of<br />

Inland Revenue in the UK (Beynon-Davies 2005), the Government Electronic Business (GeBIZ)<br />

procurement system in Singapore (Devadoss et al. 2003) and the e-Tax system of the National Tax<br />

Agency in Japan (Chatfield 2009). The business process model of the proposed methodology framework<br />

in Figure 1 is presented in the next section.<br />

Table 2: Research studies describing eGovernment implementation case studies<br />

4. Flowchart of the business process model of the proposed methodology<br />

framework<br />

As shown in Figure 1, the service development layer provides the names of the framework phases: scope<br />

definition, identification and categorization of services, and web services development. It represents the<br />

process of e-services development, from the requirements of a government’s business domain to the<br />

effective e-services implementation. Figure 2 depicts the flowchart of the business process model of the<br />

proposed framework in Figure 1; it describes the incremental and iterative process for realizing the web<br />

features prescribed by the maturity models stages, at each phase of eGovernment implementation. Table<br />

3 describes the variables used in the flowchart.<br />

Table 3: Variables of the business process model algorithm<br />

259


Jean Vincent Fonou Dombeu and Magda Huisman<br />

The incremental and iterative process in Figure 2 follows the agile software development paradigm (Greg<br />

et al. 2006; Clutterbuck et al. 2009); it commences with the selection of a maturity model. This means<br />

that, at the beginning of an eGovernment project, a maturity model has to be chosen. The chosen<br />

maturity model will provide the stages of development as well as guidelines for the planning and<br />

implementation of the system from a simple web presence to a one-stop portal. Further, each maturity<br />

model will provide the web features required at each stage of eGovernment growth. After having chosen<br />

the appropriate maturity model, its stages need to be aligned to the framework as described in Fonou-<br />

Dombeu and Huisman (2010). Thereafter, the iteration starts with the first phase of e-services<br />

development (see the outer loop in Figure 5). At each phase of development an iterative process is<br />

performed (see the inner loop in Figure 5) to realize and launch the web features required by the maturity<br />

model stages aligned to the corresponding phase of the methodology framework. The iterative process is<br />

performed until the required web features are realized at that particular phase, or the required web<br />

features are to be completed in the next phase of the framework as it is explained in Fonou-Dombeu and<br />

Huisman (2010).<br />

Figure 2: Flowchart of the business process model of the methodology framework<br />

260


Jean Vincent Fonou Dombeu and Magda Huisman<br />

In all the cases, after the semantic modelling of the business requirements of the eGovernment business<br />

domain during iteration, a prototype has to be developed and tested or the resulting prototype from the<br />

previous iteration has to be improved and tested. After all the web features or changes required by the<br />

maturity model stages aligned to the current methodology framework phase have been realized, the<br />

iterative process continues to the next phase of the framework. The requirements of the eGovernment<br />

business domain are revisited during iterations (See the inner loop in Figure 5) to ensure that the<br />

prototype systems developed meet the requirements of users who are the citizens and civil servants. The<br />

process is repeated until all the web features or changes prescribed by the maturity model are realized<br />

i.e. until a complete one-stop portal is implemented. The phases of the framework might not be followed<br />

in a linear order in practice; then, the business process model in Figure 2 allows a direct selection of a<br />

particular phase in order to implement and launch a desired web feature on the government web portal.<br />

5. Future trends<br />

This study has presented a conceptual model of a semantic-driven methodology framework for<br />

eGovernment applications development. However, there are certain limitations; firstly, eGovernment<br />

development is not only about technology adoption; other issues including political, institutional, societal,<br />

cultural, etc., may influence the application of the proposed framework in the eGovernment development<br />

context of a given country; secondly, the proposed model has to be empirically validated to demonstrate<br />

its feasibility. Finally, the specification of the proposed model has to be expanded to provide more<br />

insights on the semantic modelling and description of e-services during iterations. This will be the focus of<br />

the next stage of research.<br />

6. Conclusion<br />

This study has presented a methodology framework for eGovernment systems development. The<br />

proposed framework provides stages, tools and techniques for the implementation of e-applications at<br />

various phases of eGovernment development. Due to the fact that the framework phases might not<br />

always be applied chronologically or in a linear order, its business process model was developed to<br />

enable the iterative and incremental development of e-applications.<br />

The proposed framework provides directions for the software development of future eGovernment<br />

systems based on semantic web technologies which are emerging in the field of eGovernment and which<br />

have potential to facilitate the integration and interoperability of resulting eGovernment systems towards<br />

one-stop eGovernment. The technology oriented nature of the framework makes it a useful tool to be<br />

used by eGovernment project teams in conjunction with political, cultural, institutional, legal, and societal<br />

conditions of each specific country.<br />

Finally, the study would particularly be of interest to eGovernment project teams of developing countries<br />

where little or no progress has been made towards the development of one-stop portals for seamless<br />

online services delivery to citizens.<br />

References<br />

Apostolou, D., Stojanovic, L., Lobo, T.P., Miro, J.C. and Papadakis, A. (2005a) “Configuring EGovernment Services<br />

Using Ontologies”, IFIP International Federation for Information Processing, Springer Boston, Vol. 189, pp.<br />

1571-5736.<br />

Apostolou, D., Stojanovic, L., Lobo, T.P and Thoensen, B. (2005b) “Towards a Semantically-Driven Software<br />

Engineering Environment for EGovernment”, IFIP International Federation for Information Processing, M.<br />

Bohlen (Eds), Vol. 3416, pp. 157-168.<br />

Arif, M. (2008) “Customer Orientation in EGovernment Project Management: a Case Study”, The Electronic Journal<br />

of EGovernment, Vol. 6, No. 1, pp. 1-10.<br />

Beynon-Davies, P. (2005) “Constructing Electronic Government: the Case of the UK Inland Revenue”, International<br />

Journal of Information Management, Vol. 25, No. 1, pp. 3-20.<br />

Bri, F. D. (2009) “An EGovernment Stages of Growth Model Based on Research within the Irish Revenue Offices”,<br />

Electronic Journal of EGovernment, Vol. 7, No. 4, pp. 339-348.<br />

Chatfield, A.T. (2009) “Public Service Reform Through EGovernment: a Case Study of e-Tax in Japan”, Electronic<br />

Journal of EGovernment, Vol. 7, No. 2, pp. 135-134.<br />

Chen, Y.N., Chen, H.M., Huang, W. and Ching, R.K.H. (2006) “EGovernment Strategies in Developed and<br />

Developing Countries: An Implementation Framework and Case Study”, Journal of Global Information<br />

Management, Vol. 14, No. 1, pp. 23-46.<br />

Choudrie, J. and Weerrakody, V. (2007) “Horizontal Process Integration in EGovernment: The perspective of UK<br />

Local Authority”, International Journal of Electronic Government Research, Vol. 3, No. 3, pp. 22-39.<br />

261


Jean Vincent Fonou Dombeu and Magda Huisman<br />

Clutterbuck, P., Rowlands, T. and Seamons, O. (2009) “A Case Study of SME Web Application Development<br />

Effectiveness via Agile Methods”, The Electronic Journal of Information Systems Evaluation, Vol. 12, No, 1, pp.<br />

13-26.<br />

Deladoss, P.R., Pan, S.L. and Huang, J.C. (2003) “Structurational Analysis of EGovernment Initiatives: A Case Study<br />

of SCO”, Decision Support Systems, Elsevier Science, Vol. 34, No. 3, pp. 253-269.<br />

Deloitte and Touche (2001) “The Citizen as Customer”, CMA Management, Vol 74, No. 10, p 58.<br />

Estevez, E., Janowski, T. and Ojo, A. (2007) “Planning for EGovernment -A Service-oriented Agency Survey”,<br />

Research Report No. 361, Centre for Electronic Government, United Nations University-International Institute<br />

for Software Technology (UNU-IIST), Macao, China.<br />

Fonou-Dombeu, J.V. and Huisman, M. (2010) "Integrating EGovernment Services: A Stepwise Ontology-Based<br />

Methodology Framework", In proceedings of the 6 th International <strong>Conference</strong> on EGovernment 2010<br />

(ICEG2010), Cape Town, South Africa, 31 September – 01 October 2010, pp. 18-29.<br />

Grey, J., Huisman, M. and Goede, R. (2006) An Investigation of the Suitability of Agile System Development<br />

Methodologies for the Development of Data Warehouses, Msc. Dissertation, North-West University,<br />

Potchefstroom, South Africa.<br />

Heeks, R. (2006) “Implementing and Managing EGovernment”, Book Review, Journal of Scientific & Industrial<br />

Research, Vol. 65, No. 10, pp. 845-846.<br />

Howard, M. (2001) “EGovernment Across the Globe: How Will "e" Change Government?” Government Finance<br />

Review, August 2001, pp. 6-9.<br />

Janowski, T., Estevez, E. and Ojo, A. (2007) “A Project Framework for EGovernment, Research Report No. 359,<br />

Centre for Electronic Government”, United Nations University-International Institute for Software Technology<br />

(UNU-IIST), Macao, China.<br />

Layne, K. and Lee, J. (2001) “Developing Fully Functional EGovernment: A Four Stage Model”, Government<br />

Information Quarterly, Elsevier Inc., Vol. 18, No. 2, pp. 122-136.<br />

Lee, T., Hon, C.T. and Cheung, D. (2009) “XML Schema Design and Management for EGovernment Data<br />

Interoperability”, Electronic Journal of EGovernment, Vol. 7, No. 4, pp. 381-390.<br />

Lofstedt, U. (2005) “EGovernment – Assessment of Current Research and some Proposals for Future Directions”,<br />

International Journal of Public Information Systems, Vol. 1, No.1, pp. 39-52.<br />

Moon, M.J. (2002) “The Evolution of EGovernment Among Municipalities: Rhetoric or reality?” Public Administration<br />

Review, Vol. 62, No. 4, pp 424-433.<br />

Muthaiyah, S. and Kerschberg, L. (2008) “Achieving Interoperability in EGovernment Services with two Modes of<br />

Semantic Bridging: SRS and SWRL”, Journal of Theoretical and Applied Electronic Commerce Research , Vol.<br />

3, No. 3, pp. 52-63, December.<br />

Sabucedo, P., Rifon, L.E.A., Corradini, F., Polzonetti, A. and Re, B. (2010) “Knowledge-based Platform for<br />

EGovernment Agents: A Web-based Solution Using Semantic Technologies”, Journal of Expert Systems with<br />

Applications, Elsevier Inc., Vol. 37, No.5, pp. 3647-3656.<br />

Salhofer, P., Stadlhofer, B. and Tretter, G. (2009) “Ontology Driven EGovernment”, Electronic Journal of<br />

EGovernment, Vol. 7, No. 4, pp. 415-424.<br />

Salhofer, P. and Ferbas, D. (2007) “A Pragmatic Approach to the Introduction of EGovernment”, In Proceedings of<br />

the 8 th Annual International Digital Government Research <strong>Conference</strong>, Philadelphia, Pennsylvania, USA, May<br />

20-23, pp. 183-189.<br />

Saekow, A. and Boonmee, C. (2009) “A Practical Approach to Interoperability Practical Implementation Support<br />

(IPIS) for EGovernment Interoperability”, Electronic Journal of EGovernment, Vol. 7, No. 4, pp. 403-414.<br />

Sanati, F. and Lu, J. (2007) “A Methdological Framework for EGovernment Service Delivery Integration”, In<br />

EGovernment Interoperability Campus, Paris, France, 2007.<br />

Sanati, F. and Lu, J. (2009) “Multilevel Life-event Abstraction for EGovernment Service Integration”, In Proceedings<br />

of the 9 th <strong>European</strong> <strong>Conference</strong> on EGovernment 2009 (ECEG 2009), London, UK, pp. 550-558, 29-30 June.<br />

Sang, M.L., Tan, X. and Trimi, S. (2005) “Current Practices of Leading EGovernment Countries”, Communication of<br />

the ACM, Vol. 48, No. 10, pp. 99-104.<br />

Teicher, J. and Dow, N. (2002) “EGovernment in Australia: Promise and Progress”, Information polity, Vol. 7, No. 4,<br />

pp. 231-246.<br />

United Nation (2003) “UN Global EGovernment Survey 2003”, [online],<br />

http://unpan1.un.org/intradoc/groups/public/documents/un/unpan016066.pdf<br />

(Accessed 28/03/2011)<br />

Vassilakis, C., Laskaridis, G., Lepouras, G., Rouvas, S. and Georgiadis, P. (2002) “Transactional EGovernment<br />

Services: An Integrated Approach”, Lecture Notes in Computer Science, Springer Berling Heidelberg, Vol.<br />

2456, pp. 276-279.<br />

West, D.M. (2004) “EGovernment and the Transformation of Service Delivery and Citizen Attitudes”, Public<br />

Administration Review, Vol 64, No. 1, pp 15-27.<br />

Wimmer, M. A. (2002) “Integrated Service Modelling for Online One-Stop Government”, Electronic Markets, Vol. 12,<br />

No. 3, pp.149-156.<br />

Xiao, Y., Xioa, M. and Zhao, H. (2007) “An Ontology for EGovernment Knowledge Modelling and Interoperability”,<br />

IEEE International <strong>Conference</strong> on Wireless Communications, Networking and Mobile Computing, (WiCOM<br />

2007), Shanghai, China, 21-25 September, pp. 3600-3603.<br />

Zarei, B., Ghapanchi, A. and Sattary, B. (2008) “Toward National EGovernment Development Models for Developing<br />

Countries: A Nine Stage Model”, The International Information & Library Review, Vol. 40, No. 3, pp. 199-207.<br />

262


An Information System to Collect and Analyze Data From<br />

Educational Units During Epidemy Spread Periods<br />

John Garofalakis, Andreas Koskeris, Evangelia Boufardea, Theofanis Michail and<br />

Flora Oikonomou<br />

University Campus of Patras, Greece<br />

garofala@cti.gr<br />

koskeris@cti.gr<br />

mpoufard@westgate.gr<br />

michail@westgate.gr<br />

oikonom@westgate.gr<br />

Abstract: The 2009 flu pandemic was a global outbreak of a new strain of H1N1 influenza virus, often referred to as<br />

"swine flu", which infected thousands of people. In order to improve Public Service efficiency and effectiveness for<br />

the virus’s prevention, governments all over the world started collecting data and recording laboratory-confirmed<br />

cases of the flu. Due to the proliferation of the Internet and the World Wide Web applications and the increasing<br />

interaction of people with eGovernment systems, the recorded flu occurrences were available to scientists around the<br />

world in order to help them draw meaningful conclusions regarding the H1N1 spread. In Greece apart from the other<br />

measures which were taken, special interest was given to the flu high risk groups, such as young children. The<br />

presented project concerns the development and the use of a web based tool to collect and analyze students’<br />

absences on a daily basis from the educational units in Greece. Aim of this effort was to assist the epidemiology<br />

monitoring of H1N1 epidemic evolution in Greece, in the whole country and per Region, leading – in comparative<br />

analysis with other factors collected from other sources – to the extraction of important conclusions for taking<br />

precautionary measures against the flu (e.g. temporarily school closures). Such a survey system to collect and<br />

analyze the daily students’ absences from Greek schools is very useful due to the fact that it provides a precise view<br />

concerning the H1N1 spread in “real time”. The whole system has been integrated to the central Resources<br />

Management System of the Greek Ministry of Education and it operated utilizing the backbone of Greek School<br />

Network. The daily data entry was carried out in a secure hierarchical way (data entry from schools, and data<br />

monitoring from administrative offices). Several statistics were presented, providing capability for comparative<br />

analysis results.<br />

Keywords: electronic government (eGovernment), public sector, H1N1 virus, school units, information system<br />

1. Introduction<br />

The pervasive adoption of the Internet since the 1990s has stimulated business to embrace e-commerce.<br />

In the public sector, eGovernment has emerged and grown enormously as well. Indeed, the development<br />

of eGovernment has clearly mirrored the development of e-commerce. As a result, public organizations<br />

across the globe and at different governmental levels have been applying Internet technologies in<br />

innovative ways to deliver services, engage citizens, and improve performance. Many information<br />

systems have been developed in order to provide quality public services, make interactions between<br />

citizens and government agencies smoother, easier and more efficient and assist government agencies<br />

in the decision making process.<br />

The presented work, concerns an e-tool which was developed for the Greek Ministry of Education and<br />

the “Greek center of monitoring and prevention of deceases - KEELPNO”. The tool has been used to<br />

assist the daily collection and statistical analysis of students’ absences from primary and secondary<br />

educational establishment in Greece. The objectives of this application were:<br />

To support the epidemiological monitoring of H1N1 evolution in Greece (for whole country and per<br />

region), leading to the extraction of several important conclusions for taking public health measures in<br />

the country. Additionally, the extracted conclusions were combined with several additional data<br />

collected from the epidemiological monitoring system of Greece.<br />

To assist the Greek Ministries of Education and Health on their effort to monitor constantly the<br />

evolution of H1N1 virus in Greek schools.<br />

The tool which will be presented within the following sections, is collecting daily data from all Greek<br />

schools and it produces several statistics on various levels (per municipality, region etc), as long as<br />

important alerts and comparative analysis reports. It has been integrated in the existing Resources<br />

Management System of the Greek Ministry of Education (Garofalakis, et al., 2007) and it operated over<br />

the Greek school network (Greek School Network, 2010) utilizing its access / security policies. The<br />

263


John Garofalakis et al.<br />

application started on October 2009, leading to important results assisting in real time the relevant Greek<br />

Authorities responsible to deal with the H1N1 spread. Within the next sections, we present: the<br />

Background information concerning specific needs leading to the decision to implement the tool, the<br />

whole system (on user and technical level), the actual results (quantitative and qualitative) of the<br />

application and the planned further work.<br />

2. Background<br />

Since the late 1990s governments at all levels have launched electronic government (eGovernment)<br />

projects aimed at providing electronic information and services to citizens and businesses (Torres, et al.,<br />

2005). Many governments have realized the importance of using information and communication<br />

technologies (ICT) to provide efficient and transparent government (Prattipati, 2003). Government<br />

agencies around the world have embraced the digital revolution and placed a wide range of materials on<br />

the Web including publications, databases and actual online government services (West,<br />

2002).EGovernment can be broadly defined as a government’s use of ICT, particularly web based<br />

internet applications, to enhance the access to and delivery of government information and service to<br />

citizens, business partners, employees, and other agencies and entities.<br />

The construction and management of eGovernment systems are becoming an essential element of<br />

modern public administration (Torres, et al., 2005). For example, individual citizens may interact with<br />

government electronically by filing their income tax documents online. In Korea, for example, Choudrie &<br />

Lee (2004) found that the use of broadband within government departments and agencies has had a<br />

catalytic impact on the quality of public services, and encouraged previously bureaucratic organizations<br />

to re-engineer the way services are delivered to citizens. In India the online delivery of municipal services<br />

to citizens minimized the time and speed of services and made the active participation of citizens in<br />

public decision-making process possible. In Jamaica customs automated services online led to fewer<br />

errors and inconsistency and increased the speed in entry processing. In Columbia a governmental portal<br />

has been designed which contains all federal government agencies and their relative information and<br />

services in order to facilitate search and information retrieval and enhance the active participation of<br />

citizens in the decision making process. (Ndou, 2004).<br />

Governments in delivering services may do so directly or indirectly through intermediaries such as banks,<br />

postal outlets in private businesses, and by other means. Consequently, any eGovernment effort must<br />

meet the needs of a diverse set of stakeholders that operate in the political, business, or civic spheres of<br />

influence. EGovernment, however, is more than a technological phenomenon. Whether through<br />

deliberate choice or passive acceptance, it is transformative in nature, affecting the management of<br />

human, technological, and organizational resources and processes and facilitating the decision making<br />

process of national interest matters.<br />

One of these matters is the monitoring of factors related with epidemiology, which is a crucial element of<br />

the strategies used for the control of diseases. Various data sources are available to epidemiologists for<br />

routine, prospective monitoring of public health. The efficient collection and analysis of data requires<br />

specialized methods and tools (‘What is Epidemiology All About’, 1999 and Burkom, et al., 2005, ‘The<br />

changing phases of pandemic (H1N1) 2009 in Queensland: an overview of public health actions and<br />

epidemiology’, Appuhamy et al, 2010). Information and Communication Technologies (ICTs) can play a<br />

very important role to achieve this efficiently (Dialynas, et al., 2009 and Garofalakis, et al. 2007) providing<br />

efficient utilization of Geographical Information systems to provide mapping and constant analysis of<br />

correlated factors (e.g. cancers in relation with pollutants nearby a specific area (Garofalakis, et al.,<br />

2007), sexual activity and HIV spreading (Lenselink, et al., 2008)).<br />

The wide fast spread of the new H1N1 virus all over the world is a specific case where such ICTs can<br />

provide important help on relevant authorities at their effort to: take the needed measures on time (e.g.<br />

closing of public organizations) and communicate the reality effectively to the public (e.g. to avoid public<br />

panic). Automated applications can easily collect and analyze various data concerning different factors<br />

(directly or indirectly related with the epidemic) Leonardo (2009) giving information which otherwise will<br />

have to take days to assemble. Successful cases of such systems have already applied world widely<br />

(‘TheraDoc’, 2009). The presented project concerns a specific tool developed to collect and analyze data<br />

concerning factors indirectly related with H1N1 spread. That is, students’ daily absences from schools.<br />

Studies have shown that children are prone to viruses and the monitoring of this age group can provide<br />

useful information about the H1N1 spread in a country. The analysis of data collected daily from all<br />

264


John Garofalakis et al.<br />

schools in Greece, provides a useful tool for relevant public health authorities on their effort to take the<br />

needed measures to control, as much as possible, the H1N1 spread.<br />

3. The system<br />

The Absences system is a web application resembling a portal. The application is accessed after<br />

authentication through a browser and the authenticated users belong into five levels with different<br />

privileges. The authentication is made by using the Greek Schools Network Directory Service<br />

infrastructure. After the authentication the system is customized according to the user level. In the<br />

following paragraphs there is an extent description of the structure and the system’s special<br />

characteristics. In order to better understand the system, we will first depict the structure of the<br />

administration of the Educational System in Greece upon which the project has been based. Afterwards<br />

we will present the “survey system” on which the “absences system” is based for the data retrieval. At<br />

next we will analyze in detail the presented system.<br />

3.1 Multilevel system<br />

The organizational model of the Ministry of Education includes six levels of structures (Figure 1).<br />

Figure 1: Levels of educational system in Greece<br />

Starting from the top, the uppermost level of the Central Administration is the Ministry departments which<br />

supervise every managerial and school unit of the Primary and the Secondary Education. The next level<br />

includes the Educational departments in the Regional Offices, which are responsible for the Direction<br />

Offices, the Local Offices and schools that are set in the specific Regional body. The further down level is<br />

the level of Direction Offices that has under observation the Local Offices and the schools in the<br />

prefecture. The following level is the one of the local offices that is responsible only for the schools that<br />

they supervise and also have access to the data the schools register. The bottom level is the combination<br />

of the fifth and the sixth level of Figure 1. By this we mean that in the Educational level the teachers in the<br />

school fill in the data about themselves and the school unit they belong to. Every level has access to the<br />

units that supervises. Also, the above level has under observation the below level ensuring the right<br />

functioning of the project. The Local Offices monitor the data storage of their teachers and schools, the<br />

Direction Offices of their Local Offices, the Regional Offices of their Direction Offices and the Ministry of<br />

the Regional Offices. The schema that has been described is not strict and allows every higher level to<br />

have access to the data of a unit. For example the data of a school unit is available to the Ministry, to the<br />

Regional Office, to the Direction Office and to the Local Office that it belongs to.<br />

This model proposes a concrete interaction method in which each level has to collaborate only with its<br />

predecessor and its successor. Each user who belongs to an upper level can access queries, statistics<br />

and services referring to all other levels below them. For example: Central administration authorized<br />

users can have access to integrated statistical reports concerning number of schools and teachers in the<br />

whole Greece. Teachers can have access to their own information (history, hours teaching etc.).<br />

265


3.2 The “survey system”<br />

John Garofalakis et al.<br />

The Survey system (Garofalakis, et al., 2007) is used to record data about students in school units and<br />

teachers employed either in school units or in administration offices. In particular, every school unit fills in<br />

data about the unit, the students and the teachers. The data about the unit include data about the upper<br />

level which belongs to, address and contact information, information about the category, the type, the<br />

special characteristics and the working hours. Every school unit enters the number of students in every<br />

class including the additional classes for foreign languages and other parallel activities. Special classes<br />

that may exist in the unit are also stored due to Survey system. Moreover, every unit fills in information<br />

about the teachers who work there. The information entered is about their personal data, their specialty,<br />

their working hours, the classes they teach, their additional studies and their working status (permanent,<br />

replacer, time worker). There is also a recording about the amount of hours of a specialty that are missing<br />

or are in excess in a school unit. The next three levels of administration, the “Local offices”, the “Direction<br />

Offices” and the “Regional Offices” enter the same data about the teachers working there as well<br />

information about the administration unit like address, contact information etc. These users also have the<br />

responsibility to monitor the procedure of data entry at the lower levels that they are supervising.<br />

Moreover they have access to various statistics concerning data entered by all users belonging to their<br />

responsibility area.<br />

3.3 The presented “absences system”<br />

The Absences System is essentially an extension of the previous described Survey System of the Greek<br />

Ministry of Education (Garofalakis, et al., 2007) since it retrieves data from the latter and uses it properly<br />

for collecting the daily students’ absences from all the school units in Greece. It is a web application and<br />

as such requires authentication in order to access it. Every system’s user has access codes and<br />

according to them the application interface is organized appropriately, rendering only the content that the<br />

user is authenticated to deal with. In this paragraph there is a description of the way the Absences<br />

System interacts with the Survey System and the data that each user level enters.<br />

Every school unit connects to the Survey System and enters a plethora of information as mentioned in<br />

the previous section. This is usually done once at the beginning of the school year. Afterwards the units<br />

connect to the Absences System daily and enter or monitor information about the students’ and the<br />

teachers’ absences. Due to the fact that the school units connect primarily to the Survey System, the only<br />

thing they have to report is the school’s status and the number of absences. All the other information<br />

about the school’s data (like address, contact information, students’ and teachers’ number, classes) is<br />

retrieved automatically from the Survey System and thus the required effort to handle the system is<br />

minimized. After connecting to the Absences System every school unit fills in the school’s state on a daily<br />

basis, reporting if the school is open or closed. If the school is closed, the unit must declare the reason of<br />

its closure by selecting the appropriate choice from a dropdown menu. For example the 1st primary<br />

school of Athens was closed on 15th January of 2010, due to flu symptoms. Furthermore every school<br />

unit enters how many students were absent on a specific day and if the class in which they are attending<br />

is closed. If a school unit has a lot of classes closed, then the school will not function for a few days in<br />

order to prevent the spread of the flu virus. Besides students’ absences, a school unit enters the<br />

teachers’ absences on a specific day. If a mistake is made during the data entering process, the system<br />

provides the functionality of correcting the inserted data. Every school unit has one administration level to<br />

supervise it and the latter have access to the data which the school units enter and to many statistics and<br />

graphic charts which allow them to monitor the whole process. For example, the aforementioned levels of<br />

administration can see how many school units were closed and for what reason, how many students or<br />

teachers were absent and in which school and class these absences were reported. The uppermost level<br />

of the Central Administration is the Ministry departments which have the administration of the system.<br />

They supervise every managerial and school unit of the Primary and the Secondary Education and with<br />

the use of various statistics can have a precise view concerning the daily absences in schools in ‘real<br />

time’.<br />

The data entry of the information is completely converse from the way that can be accessed. By this we<br />

mean that the highest level, which is the central administration, can access the whole information in<br />

contrast with the school units which are the lowest level and the main action allowed is the data<br />

completion. By the description of the data storage in every level it is obvious that there is a strong<br />

interconnectivity among them. The flow of the data from one level to the other integrates the procedure<br />

and facilitates the decision making process since a lot of statistics and graph charts are provided to the<br />

higher administration levels. The way that every level takes an input from the lower levels is done in an<br />

266


John Garofalakis et al.<br />

automatic way releasing the Ministry of the continuous computations. At the end, the Ministry has access<br />

to statistic results and graphs concerning the teachers and students absences in the whole country and<br />

thus can extract important conclusions about viruses’ proliferation. These conclusions are important for<br />

the implementation of public health measures in the country.<br />

3.4 Functionalities<br />

Account Management. This is the first important functionality and this technique enhances the security so<br />

as the access is forbidden in malicious users. Every user in every level has to be authenticated so as to<br />

enter for filling in, extracting or manipulating with the data, giving the opportunity of a control to the users<br />

that use and react with the system. The account management is also used for the specification of the<br />

interface to the users of every level.<br />

Data entry. In this functionality most of the data have been retrieved from the Survey System. In the form<br />

which contains the general status of the school the only thing the user has to do daily is to select if the<br />

school is open or closed as seen in the following figure.<br />

Figure 2: Data entry<br />

The System also contains more detailed forms about the students’ absences in every course and the<br />

teachers’ absences on a daily basis (Figure 3 and Figure 4). Apart from the absences the user reports if a<br />

specific course is open or closed. The depicted data are based on the data the school has entered at the<br />

Survey system.<br />

Statistics. The main goal of this eGovernment project is the monitoring of H1N1 virus spread at the<br />

school units in Greece, by inspecting the daily teachers’ and students’ absences. One of the most<br />

important functionalities of the system is the provision of statistics to the higher levels of Administration.<br />

The system was implemented to give the government the ability to have a general view of the number of<br />

closed school units and the total number of teachers’ and students’ absences in Greece at every<br />

moment. The system provides its administrative users with this information through the statistics which<br />

are extracted from the application. The statistics provided by the system daily, are as follows: Report of<br />

the number of schools which used the system, Closed schools and for what reason they are closed (flu,<br />

holiday, etc), Number of closed school classes in open schools, Daily analysis of students’ and teachers’<br />

absences, Daily analysis of students’ absences above a specific threshold level. For all these statistics<br />

results, weekly graphic charts are available (see Figure 6) in order to enhance the readability of the given<br />

results.<br />

Figure 3: State of courses (open or closed) during a period<br />

267


John Garofalakis et al.<br />

Figure 4: Number of teachers’ absences week period<br />

The system is connected with a central database server and every moment the user can enter the<br />

system and extract information relevant to the data entered. The statistics can extract information about<br />

the whole country (see Figure 5). Moreover, with the filters used, the user can select a specific region or<br />

type of school to extract only the data he needs eliminating the work load for the server and taking a<br />

more readable format of information.<br />

Figure 5: Students‘ absences in whole Greece on a specific date<br />

It, also, gives the ability to monitor the status of every school in the country. That is to view how many<br />

students and teachers were absent, how many school classes were not operating and if the school was<br />

closed and for what reason, in a specific date. The Ministry, which is the highest level of the Educational<br />

System, uses the statistics of the Absences System as a consulting tool. From the data entered the<br />

Ministry is lead to the extraction of important conclusions for the implementation of public health<br />

measures in the country. For example, if in a specific region a peek of students’ absences is recorded<br />

within a week period the Ministry will examine if there is a virus spread in this region and take needed<br />

precautionary public health measures.<br />

Figure 6: Graph chart of students' absences for a week period<br />

268


4. Results obtained<br />

John Garofalakis et al.<br />

The system which is presented here is an eGovernment system and as such is used for facilitating Greek<br />

Ministry of Public Education to assess the spread of virus H1N1 in Greece. It is well known that this virus<br />

has widespread trends in crowded places. Schools are such crowded places, so, through this Absences<br />

system, Greek Community has the ability to know almost exactly how widespread the flu in the country is.<br />

Furthermore, with this system it was easy for the Ministry of Education, Life Long Learning and Religious<br />

Affairs to have an overview of how many schools are closed in a daily basis. Moreover, the Absences<br />

system provides valuable information for the Center of Disease Control and Prevention, which monitors<br />

the evolution of the epidemic and provides several statistics for comparative analysis results. The site of<br />

Center of Disease Control and Prevention presents weekly results especially for the school absences. It<br />

informs people how many schools are updated from the total number of the Greek schools and shows the<br />

total absences. Below you can see the periodical analysis of some statistics from the Absence system,<br />

which are very useful for all the above mentioned considerations.<br />

In Figure 7 we can see the rate of the schools which update the system for two months. Secondary and<br />

High Schools had better percentage of update for this period. This happened because of the fact that<br />

most of primary and nurseries schools have not informed the survey system. Another important statistic<br />

refers to the closed schools all over the country and in every region separately. You can see above<br />

Figure 8 the closed schools all over the territory a specific period. Other important statistics which are<br />

produced from the system are the students’ and teachers’ absences for every level of Greek education<br />

system. Figure 9 and Figure 10 correspond to these statistics. An obvious clue from these results is that<br />

students of first levels of education were more vulnerable to the virus than the older ones. In contrast to<br />

this, teachers have the same rate of absences. As a concluding remark it has to be mentioned that the<br />

above presented statistics from system utilization provided two important results for relevant authorities<br />

dealing with H1N1 outbreak in Greece: a) The Greek Center of Disease Control and Prevention used the<br />

data to proceed on important comparative scientific analysis of the correlation of absences with data<br />

collected from the Greek Health system. This analysis made possible to properly design needed actions<br />

towards the dealing with the H1N1 crisis. b) The Greek regional offices responsible for Schools operation,<br />

utilized the results from the system in correlation with info on H1N1 instances to decide on daily basis, on<br />

which schools had to be closed to prevent the further H1N2 spread.<br />

Figure 7: Schools’ update rate over a two month period<br />

5. Further work<br />

A planned and under development upgrade to the system is the integration of a web GIS adaptive<br />

interface for better visualization of absences in the whole country and per Region. This GIS interface will<br />

not only be platform independent but also context aware, since system’s data have to be updated<br />

frequently and in a distributed way. The context aware interface will be adapted to the delivery of<br />

information and the spatial representation according to the user’s objects of interest. For example, if a<br />

user wants to see the number of absences in the whole country fewer details will be depicted in the map<br />

whereas if a user wants to see specifically which school units are closed in a town more details<br />

concerning the school unit and the exact location of that unit will be represented. Another further upgrade<br />

will be the enhancement of provided statistics with various types of graphs, more complex from those<br />

which are already provided, which would assist to the more effective visualization of the extracted results.<br />

269


John Garofalakis et al.<br />

Pie charts, bar charts and line graphs will be produced automatically and presented online to enhance<br />

the already provided statistical reports.<br />

Figure 8: Rate of closed schools<br />

Figure 9: Students’ absences<br />

Figure 10: Teachers’ absences<br />

270


6. In conclusion<br />

John Garofalakis et al.<br />

In this paper we presented an EGovernment application, which is a web based tool, in order to assist the<br />

epidemiology monitoring of H1N1 epidemic evolution in Greece, in the whole country and per Region,<br />

leading to the extraction of important conclusions for the implementation of public health measures in the<br />

country. One of those measures would be the development of vaccination plans based on the virus’s<br />

spread in order to protect the most vulnerable age groups in the country. Another measure would be the<br />

preventive closure of school units at areas where high percentages of students’ absences due to the<br />

virus are recorded. This would assist in minimizing the virus’ spread at facilities where high concentration<br />

of students is observed. In the clinical domain, focus can be given on preparing for the expected surge in<br />

admissions and requirement for intensive care services. Due to the fact that the created system provides<br />

real time information about the virus’s spread, the public health officials are able to keeping up with the<br />

stream of changing information and take priorities for public health action.<br />

References<br />

Appuhamy Ranil, Beard Frank, Phung Hai, Selvey Christine, Birrell Frances, Culleton Terry, (2010) “The changing<br />

phaces of pandemic (H1N1) 2009 in Queensland: an overview of public health actions and epidemiology”, MJA,<br />

Volume 192, Number 2, pp 94-97<br />

Burkom, Murphy, Coberly, Hurt-Mullen (2005) “Analytic Methods, Public Health Monitoring Tools for Multiple Data<br />

Streams, Morbidity and Mortality Weekly Report”, [online]<br />

http://www.cdc.gov/Mmwr/preview/mmwrhtml/su5401a11.htm<br />

Choudrie, J. and Lee, H. (2004) “Broadband development in South Korea: institutional and cultural factors.”,<br />

<strong>European</strong> Journal of Information Systems, Vol 13, pp. 103–114.<br />

Dialynas, Topalis, Vontas, Louis (2009) “MIRO and Irbase: IT Tools for the Epidemiological Monitoring of Insecticide<br />

Resistance in Mosquito Disease Vectors”, [online], PLoS Negl Trop Dis.,<br />

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2694272/<br />

Garofalakis J., Koskeris A., Michalopoulos S. et al (2007) “Environmental Health Surveillance System in Urban areas<br />

near incinerators and industrial premises”, 13th Annual Sustainable Development Research <strong>Conference</strong>.<br />

Mälardalen University in Västerås, SWEDEN, 2007. [online] www.eki.mdh.se/sdconf07<br />

Garofalakis J., Koskeris A., Vopi A. (2007) “An EGovernment Application for Integrated, Multi-level Management of<br />

Large Scale resources of the Greek Primary and Secondary Education”, 7th <strong>European</strong> <strong>Conference</strong> on<br />

EGovernment, Hague, 2007<br />

Greek School Network (2010) http://www.sch.gr<br />

Lenselink C.H., Melchers W.J.G., Quint W.G.V. et al (2008) “Sexual Behaviour and HPV Infections in 18 to 29 Year<br />

Old Women in the Pre-Vaccine Era in the Netherlands”, [online], PLoS ONE<br />

http://www.ncbi.nlm.nih.gov/pmc/articles/PMC2581437/<br />

Leonardo J. (2009) Public Health Informatics and the H1N1, Online Journal OF Public Health Informatics, Vol 1, No<br />

1, [online] http://journals.uic.edu<br />

Ndou V. (2004) EGovernment for Developing Countries., The Electronic Journal of Information Systems in<br />

Developing Countries. Vol 18, No 1, pp. 1-24., [online] http://www.ejisdc.org<br />

Prattipati, S. N. (2003) Adoption of eGovernment: Differences between countries in the use of online government<br />

service., Journal of American Academy of Business, Vol 3, No 1/2, pp. 386−391.<br />

TheraDoc Surveillance Technology Helps Hospitals Identify, Monitor & Report H1N1 Influenza Cases, (2009) [online]<br />

http://www.businesswire.com/portal/site/home/permalink/?ndmViewId=news_view&newsId=20090930005051&<br />

newsLang=en<br />

Torres, L., Pina, V., & Acerete, B. (2005) “EGovernment developments on delivering public services among EU<br />

cities”, Government Information Quarterly Vol 22, No 2, pp. 217−238<br />

‘What is Epidemiology All About’ (1999) American Journal of Public Health Devotes August Issue to Epidemiology<br />

and Statistics, [online] http://www.epimonitor.net/EpiWitWisdom/EpiWitWisdom/newsbulletins/news48.htm<br />

West, D. M. (2002) Global eGovernment, [online] http://www.insidepolitics.org/egovt02int.html<br />

271


Interoperability in the Justice Field: Variables That Affect<br />

Implementation<br />

Mila Gascó 1 and Carlos Jiménez 2<br />

1 Institute of Public Governance and Management (ESADE), Barcelona, Spain<br />

2 Information Systems Service, Justice Department of the Autonomous<br />

Government of Catalonia, Barcelona, Spain<br />

mila.gasco@esade.edu<br />

carlosjimenez@ieee.org<br />

Abstract: Several public institutions and agencies around the world have designed and implemented important<br />

electronic government strategies and plans. This has not been the case in the justice field. However, in the last very<br />

few years, the growing demand for efficient judicial systems has sped up the adoption of information and<br />

communication technologies (ICT) aimed at improving access to justice, increasing cooperation between legal<br />

authorities and strengthening the justice system itself. As in other areas, the new technologies are becoming a key<br />

tool in order to achieve these goals. That is so because information systems contribute to homogenize tasks and<br />

activities, to obtain management indicators and to make telematic connections with other public administrations and<br />

registers, with professionals and judicial institutions and with citizens. One of the more important aspects of this<br />

technological modernization has to do with interoperability since it guarantees the harmonic and cohesive functioning<br />

of different existing systems, processes, and applications that, in the justice field, are many as a result of the big<br />

variety of actors that are involved: judicial institutions but, also, different public administrations, such as those<br />

responsible of police forces, and law professionals. Taken this context into account, this paper is the result of an<br />

empirical research that was conducted during 2010 in the Generalitat de Catalunya (Autonomous Government of<br />

Catalonia) with regard to the e-government project “e-Justícia.cat”, an electronic justice initiative. In particular, the<br />

research was aimed at finding what factors conditioned the implementation of the interoperability modules of the<br />

project. In this respect, the paper presents the experience of GRP (management of police requests) and analyzes<br />

those variables that have been key in the implementation process in order to identify common patterns that may<br />

guide future interventions and projects in a field that is characterized by specific attributes that hinder technology<br />

adoption.<br />

Keywords: electronic justice, interoperability, back office integration, implementation<br />

1. Introduction<br />

Several countries around the world are attempting to revitalize their public administrations and make<br />

them more proactive, efficient, transparent and especially more service oriented. More and more, these<br />

countries’ leaders realize that information and communication technologies (ICT) are an important ally<br />

when it comes to modernize the public sector. In this context, e-government has become a powerful tool<br />

in the process of transforming government itself.<br />

Several public institutions and agencies have designed and implemented important e-government<br />

strategies and plans. This has not been the case in the justice field. However, in the last few years, the<br />

explicit recognition of the administration of justice both as a key component of the State of Law (it is one<br />

of the three powers) and as a public service has made evident the need to attain efficacy and efficiency in<br />

order to improve access to justice and to increase society’s trust towards the administration of justice. As<br />

a result, structures and organizational rules and procedures have had to adapt to the new situation.<br />

Investment in information and communication technologies can be considered one of the key elements to<br />

significantly improve the administration of justice. Velicogna (2007) gives a few examples of the potential<br />

of ICT in this field: “the availability of web services, the possibility of consulting on-line legislation and<br />

case law, the use of electronic filing, the electronic exchange of legal documents, are only some<br />

examples that are spurring the judicial administrations around the world to rethink their current functions<br />

and activities. ICT can be used to enhance efficiency, access, timeliness, transparency and<br />

accountability, helping the judiciaries to provide adequate services. New possibilities are emerging for the<br />

integration and automation of court procedures and practices. In addition, the use of the internet, can<br />

offer the chance to open the judiciary to the public, providing both general and specific information on its<br />

activities, thereby also increasing legitimacy” (p. 129). Other authors, such as Cerrillo and Fabra (2009),<br />

confirm his words and maintain that since the very organization of judicial systems is based on the<br />

exchange of information, the potential to be attained by the introduction of ICT is even higher in this area<br />

than in other fields.<br />

272


Mila Gascó and Carlos Jiménez<br />

The growing attention to ICT as a means to reduce delay and to improve economy, efficiency and<br />

effectiveness as well as to promote confidence in the justice system has given rise to a new term, now<br />

generally accepted: e(lectronic)-justice.<br />

According to the <strong>European</strong> Commission (2008), e-justice is a specific field under the more general<br />

umbrella of e-government. In particular, it refers to the use of ICT aimed at improving access to justice,<br />

increasing cooperation between legal authorities and strengthening the justice system itself. Its main<br />

benefits, as listed by Cerrillo and Fabra (2009), are: 1) a more efficient judicial system (ICT increase<br />

productivity and diminish costs of transaction within a system that is highly information intensive), 2) a<br />

more effective judicial system (ICT reduce the duration of procedures –thus saving both time and money-<br />

and put systems for document resources administration within the reach of judges and courts), 3) a<br />

greater access to justice (ICT provide the best information available and a better understanding of both<br />

the way the courts work and the legal instruments citizens have to ensure recognition of their rights), 4)<br />

more transparency (ICT make possible an improved control of cases and allow a better qualitative<br />

evaluation of outputs), 5) an increase of beneficiaries’ confidence, and 6) a greater legitimacy of the<br />

judicial power.<br />

One of the more important aspects of this technological modernization and of the implementation of ejustice<br />

initiatives has to do with interoperability since it guarantees the harmonic and cohesive functioning<br />

of different existing systems, processes, and applications that, in the justice field, are many as a result of<br />

the big variety of actors that are involved: judicial institutions but, also, different public administrations,<br />

such as those responsible of police forces, and law professionals.<br />

Taken this context into account, this paper is the result of an empirical research that was conducted<br />

during 2010 in the Generalitat de Catalunya (Autonomous Government of Catalonia) with regard to the egovernment<br />

project “e-Justícia.cat”, an electronic justice initiative. In particular, the research was aimed<br />

at finding what factors conditioned the implementation of the interoperability modules of the project. In<br />

this respect, the paper presents the experience of GRP (management of police requests) and analyzes<br />

those variables that have been key in the implementation process in order to identify common patterns<br />

that may guide future interventions and projects in a field that is characterized by specific attributes that<br />

hinder technology adoption.<br />

2. About interoperability<br />

According to the <strong>European</strong> Commission (2010), interoperability is “the ability of disparate and diverse<br />

organizations to interact towards mutually beneficial and agreed common goals, involving the sharing of<br />

information and knowledge between the organizations, through the business processes they support, by<br />

means of the exchange of data between their respective ICT systems” (p. 2). Generally speaking, three<br />

levels of interoperability are recognized: the technical level (planning of technical issues involved in<br />

linking computer systems and services), the semantic level (precise meaning of exchanged information<br />

which is preserved and understood by all parties), and the organizational level (coordinated processes in<br />

which different organizations achieve a previously agreed and mutually beneficial goal).<br />

To achieve interoperability at any of these levels, it is important to establish a governance process that,<br />

according to Abramowicz et al. (2008), is concerned with the definition of 1) rules, processes, and<br />

procedures guiding strategic decisions, 2) roles, relationships and responsibilities of people/organizations<br />

involved, and 3) objective evaluation metrics of performance.<br />

The benefits of interoperability might be identified in terms of the defining purposes of digital government.<br />

In Gottschalk and Solli-Saether words (2009): “high-ranking issues among the defining purposes of egovernment<br />

are highly agile, citizen-centric, accountable, transparent, effective, and efficient government<br />

operations and services (…). For reaching such goals, the integration of government information<br />

resources and processes, and thus the interoperation of interdependent information systems are<br />

essential” (p. 10).<br />

However, interoperability initiatives are not easy to implement and current research has identified several<br />

factors that affect government efforts to improve data exchange and information sharing. The challenges<br />

that the academic literature has addressed first and most practitioners begin to tackle when a problem<br />

arises are those requiring technical know-how and a high degree of attention to details. In this respect,<br />

several authors have referred to technical and technological difficulties such as ownership and<br />

stewardship of data, security and privacy, data redundancy, data inconsistency, timeliness of data flows,<br />

273


Mila Gascó and Carlos Jiménez<br />

legacy computer systems, or the complexity of setting and adhering to a common set of standards<br />

(Criado, Gascó and Jiménez 2010; Fedorowicz et al. 2006).<br />

Contrary to what it may seem, these variables are relatively easy to undertake. Actually, beyond<br />

technological challenges, there exists a set of political, cultural and organizational variables that may<br />

hinder success of interoperability projects. Due to their intricacy, they have not always been addressed<br />

by the scientific literature on interoperability neither have practitioners known how to deal with them.<br />

What’s more, these are unstructured problems in that little consensus exists about how to define them,<br />

cause and effect are unclear, and attempts to solve them often cause them to morph into different<br />

problems (Pardo and Burke 2008).<br />

Some of these challenges have been identified by Archman and Kudlacek (2008) who, in a study of the<br />

<strong>European</strong> Union, found problems related to cultural differences between agencies, unsatisfactory<br />

workflows, convincing stakeholders of the importance of the system, legal issues, political support, and<br />

funding. In different works, Scholl and Klischewski (2007) and Eynon and Margetts (2007) referred to<br />

interoperability limitations such as leadership failures, financial inhibitors, differences in motivations and<br />

competences, poor coordination across jurisdictional, administrative, and geographic boundaries,<br />

workplace and organizational inflexibility, or legal barriers. Similarly, Gascó (2010), after analyzing<br />

different experiences all over the world, concluded that an interoperability initiative usually fails as a result<br />

of a mix of circumstances that may include the absence of a wide collaboration culture among public<br />

administrations, the lack of a public information management policy, the shortage of personnel trained<br />

according to the capacities and attitudes that interoperability projects require, the nonexistence of a<br />

transversal governing body in charge of leading and promoting (technological) innovation initiatives, and<br />

the lack of a legal framework specifically referred to interoperability.<br />

Other authors have focused on specific issues. Thus, Pardo et al. (2009) carried an in-depth research on<br />

the clarity of roles and responsibilities (CRR). According to the authors, three are the most important<br />

determinants of CRR: the exercise of authority, diversity of the participating organizations and their goals,<br />

and past experiences. They all influence the effectiveness and performance of both organizational and<br />

inter-organizational or cross-boundary group efforts. In the same way, Bekker (2007), as a result of a<br />

comparative study in which four projects in the Netherlands were studied, referred to the political nature<br />

of back office integration and pointed out several issues such as the emerging dependency patterns, the<br />

strategic behavior of back office, or the existence of different rationalities that mix conflict and<br />

cooperation.<br />

In the specific field of electronic justice, Jiménez (2010) draws attention to some of the factors, previously<br />

identified by the literature, that play a particularly important role regarding the implementation of<br />

interoperability projects. Beyond technological and security variables, the author refers to: 1) a lack of<br />

strategy, which he links to a weak political commitment, 2) normative barriers that have to do either with<br />

insufficient or with contradictory legislation when it comes to regulate the new situations, 3) poor<br />

processes of collaboration and coordination among the many public administrations and governing<br />

bodies of the judicial power in the administration of justice and therefore in electronic justice initiatives, 4)<br />

resistance to change, particularly experienced by those actors with plenty of power (for example, judges)<br />

or with a lot to lose (such as intermediary bodies, like procurators in Spain), and 5) a deficient<br />

governance or institutional framework.<br />

3. The research<br />

Given this context, in order to identify new issues and confirm some ideas already presented by<br />

academicians and practitioners in relation to interoperability and e-justice initiatives, during 2010, an<br />

empirical research was conducted within the Generalitat de Catalunya (Autonomous Government of<br />

Catalonia) with regard to the e-government project “e-Justícia.cat”. In particular, the GRP module<br />

(“gestión de requerimientos policiales” - management of police requests) was studied.<br />

The research aimed at analyzing those variables that had been key in the implementation process in<br />

order to identify common patterns that might guide future interventions and projects in a field that is<br />

characterized by specific attributes that hinder technology adoption. Therefore, the main research<br />

question was: what are the factors/variables that condition the implementation process of interoperability<br />

projects in the e-justice field?<br />

Together, the specific research questions were:<br />

274


Mila Gascó and Carlos Jiménez<br />

How did the GRP implementation process develop?<br />

Was it a successful implementation process? Why?<br />

What are the lessons that can be drawn from this experience in order to start new interoperability<br />

projects in the e-justice field?<br />

Who were the key actors in the GRP implementation process and what type of leadership did they<br />

exert?<br />

Accordingly, the main hypothesis was: interoperability projects in electronic justice initiatives are less<br />

conditioned by technological variables than by strategic, political, management, institutional or legal ones.<br />

Field work was conducted during the second semester of 2010. Two qualitative methods were used<br />

during the field work in order to collect the needed information. First, several documents and web pages<br />

were observed and examined. Conceptual papers about e-government, e-justice and interoperability,<br />

case studies, plans, legal measures, project presentations, indicators, and performance reports were<br />

detailed studied.<br />

Second, seven in-depth interviews were conducted: four with different people from the Department of<br />

Justice and three with police officers from the Catalan police force, Mossos d’Esquadra. In the main, the<br />

interviewees were selected according to three criteria: 1) their level of involvement in e-Justícia.cat, 2)<br />

their seniority, and 3) the degree to which they had been affected by the implementation of the GRP<br />

module. Different interview guides were prepared to make sure that all relevant topics were covered and<br />

to keep the interaction focused. However, individual perspectives and experiences also emerged during<br />

the conversations.<br />

Finally, in order to collect more information and to be able to get the insights of other actors involved, a<br />

survey was administer to 17 additional individuals who included civil servants from the Justice<br />

Administration, one person from the Information and Communication Technologies Department, two<br />

individuals from the training centre of the Department of Justice and two more from the communication<br />

team and one person from the change management unit.<br />

4. Results<br />

The Spanish Constitution forces the police to assist the Justice Administration. Since the limits of this<br />

collaboration are not clear, the Justice Administration uses police forces to carry out many different tasks<br />

and the police forces have to accomplish the orders. Given this context, before the GRP module was<br />

implemented, paper and fax were used in order to communicate the orders. This was very bureaucratic:<br />

not only tasks were repeated (the Justice Administration faxed the requirement and, after getting it, the<br />

police had to type the data in their system again) but information was also lost. There was also the need<br />

to make the communication between the Mossos d’Esquadra and the Justice Administration more agile<br />

and effective. In this respect, the project was a need for the Justice Administration and a claim for the<br />

Mossos d’Esquadra police force.<br />

The GRP module started back in 2006. It was initiated by the Information System Service of the<br />

Department of Justice of the Autonomous Government of Catalonia in the framework of the e-Justícia.cat<br />

project. However, the design of the application was done jointly with the Mossos d’Esquadra. In this<br />

respect, a functional analysis was carried out both from a technical and an operational perspective.<br />

The last version of the module was finished in 2009 and a pilot was carried out between July and October<br />

of that same year. In October 2009, it was the court of first instance number 11 of the city of Barcelona<br />

the first one to send requests by means of the new system.<br />

The project has been gradually implemented throughout the territory (by administrative areas) because<br />

the Justice Administration needs to implement it progressively. Currently, the system is already working<br />

in Barcelona and 80% of the South metropolitan area. This process is expected to end by mid 2012. By<br />

that date, the civil servants of all the Catalonian penal courts will be trained and therefore the new system<br />

will be put into service all around Catalonia.<br />

275


Mila Gascó and Carlos Jiménez<br />

Generally speaking, field work shows that the implementation of the GRP module is thought to have been<br />

successful. In this respect, 87,5% of the survey respondents stated that the process had been positive or<br />

very positive 1 . The following reasons were given to justify such perception:<br />

The coordination between the Information Systems Service of the Department of Justice and the<br />

Mossos d’Esquadra police force was very good.<br />

The participation of other actors made the implementation process easier.<br />

The users were very involved.<br />

Dead-lines were respected and actions were carried out in time.<br />

Training activities were simple and easy to follow.<br />

Communication was efficient.<br />

Regarding areas of improvement, only two issues were significantly underlined: the existence of technical<br />

problems that could have been avoided (27,03% of the survey respondents) and the scarce political<br />

leadership and commitment (15,39%).<br />

Next, some explanations are given regarding the above topics.<br />

4.1 Technology<br />

Both survey respondents and interviewees referred to the importance of technical and technological<br />

obstacles. For them, these problems made implementation more difficult, particularly, because they gave<br />

rise to a greater resistance to adopt the new system. Thus, they were important issues to take into<br />

account. However, the people consulted also stated that, despite their existence, technology was not the<br />

main difficulty to address and, in any case, it did not make the project fail.<br />

4.2 Actors<br />

As has been stated, although the Information Systems Service of the Department of Justice was the<br />

leader of the initiative, the design of the application was done jointly with the Mossos d’Esquadra police<br />

force but also with several other actors, such as expert users, members of the provider private company<br />

or technical staff of the Information and Communication Technologies Department. Therefore, since the<br />

beginning of the project, there was a need to set up coordination rules that included periodical meetings,<br />

working protocols, joint pilots, or transversal contingency plans.<br />

According to the interviewees, the will to collaborate proved key, both at a strategic and at operational<br />

level. In this respect, although consensus was not always reached easily, the existence of a common<br />

goal (the search for efficiency) redounded to a higher level of cooperation and collaboration. This was so<br />

despite the fact that, according to 43,75% of the survey respondents, it was the Mossos d’Esquadra<br />

police force the most important beneficiary of this project 2 .<br />

4.3 Strategy and political commitment<br />

e-Justícia.cat is an electronic justice initiative aimed at making the Justice Administration in Catalonia<br />

more effective and more efficient. The main goals of e-Justícia.cat are to homogenize the tasks of the<br />

new judicial office and to electronically connect several public administrations and registries, citizens, and<br />

law professionals.<br />

Simultaneously, e-Justícia.cat is the result of the need to modernize the Justice Administration. In this<br />

respect, its conception dates back to 2006, a little after the Green Book on Justice Administration was<br />

launched (July 2005). The strategic plan 2007-2010 of the Department of Justice of the Autonomous<br />

Government of Catalonia emphasized the adoption of ICT and stressed the need for innovation and<br />

interoperability and decided on e-Justícia.cat to be the tool in order to do so.<br />

1 A 5-point scale was used (1 - very negative, 2 - negative, 3 - neutral, 4 - positive, 5 - very positive).<br />

2 Although the outcome of the project has not been assessed yet, it is already known that 1) the information Mossos d’Esquadra get<br />

is of more quality than before; therefore, the number of orders that are returned is lower than it used to be, 2) police officers can<br />

monitor the requirement, something they were not able to do before, and this supervision increases the quality of performance, 3)<br />

there have been savings in paper and people (with less people, the task is carried out faster and with more quality), 4) the time it<br />

took to transfer/delegate the requirement has decreased (currently, in five minutes, one can do it).<br />

276


Mila Gascó and Carlos Jiménez<br />

E-Justícia.cat is structured into several management modules that facilitate adaptation to different<br />

organization models. The GRP module is only one of them. Each module, and also GRP, has therefore,<br />

been designed and implemented following the main philosophy of e-Justícia.cat: to have a paperless<br />

judicial office.<br />

A clear strategy is only possible when there is political support. This has been the case in e-Justícia.cat.<br />

Mainly, the last Councilor of the Department of Justice. Mrs. Montserrat Tura, noticeably promoted this<br />

electronic justice initiative to such an extent that several agreements, rules, and laws were approved (that<br />

is, there were important changes in the legal framework). But other political actors, such as the General<br />

Council of the Judiciary’s (“Consejo General del Poder Judicial”) or the Superior Court of Justice of<br />

Catalonia (“Tribunal Superior de Justicia de Cataluña”), also backed the project. In the particular case of<br />

the GRP module, political commitment was even more obvious since Mrs. Tura had previously been the<br />

Councilor of the Department of the Interior, which is in charge of the Mossos d’Esquadra police force.<br />

Therefore, she knew the problems both Departments experienced when they had to work together.<br />

Although high level political commitment seems to be a fact, several interviewees referred to a lack of<br />

political support at a lower level and in specific situations (which explains the survey results). In this<br />

respect, operational and technical leadership was perceived to be very valuable but also exhausting,<br />

particularly, in critical circumstances when a stronger support would have been very motivating to keep<br />

going.<br />

4.4 Planning<br />

The existence of a plan to implement GRP proved decisive for its success because it made clear the<br />

steps to follow as well as the roles and responsibilities each of the actors had. Therefore, it was quite<br />

easy to comply with dead-lines and tasks to carry out.<br />

More important was the decision to carry out a pilot. Pilots are especially positive when there is no<br />

previous experience. Phased introductions help not only to inform implementation but also to identify and<br />

prevent unintended consequences. A pilot is an important first stage of regular, longer-term project<br />

monitoring and evaluation. In the case of the GRP module, 92,31% of the survey respondents maintained<br />

that conducting a pilot had been useful or very useful. Particularly, the pilot was important because it<br />

helped identify resistance to change, technological problems as well as impacts on workflows.<br />

4.5 Change management<br />

Institutional adaptation to innovation in the Spanish justice field has always been a slow process because<br />

of the poor constitutional and legal designs included in the rules and because of the huge weight carried<br />

by an organizational structure anchored in nineteenth century criteria and a very strong corporate<br />

presence. E-Justícia.cat has not been an exception. In this respect, with the implementation of the GRP<br />

module (but also, of other modules), civil servants from the Justice Administration had to change their<br />

way of working and this was not easy. Thus, there was a need to show them the benefits of the new<br />

system, to train them and to engage them in the project.<br />

Several activities were carried out to manage resistance to change. In particular, the training and the<br />

communication strategies were perceived to be successful and to endorse the implementation process<br />

(86,67% of the survey respondents thought training had been useful or very useful; also, 78,57% of them<br />

stated that communication had been positive or very positive).<br />

Particularly interesting was the training strategy, led by the Information Systems Service and sponsored<br />

by the Training Centre of the Department of Justice: the former trained several civil servants (the socalled<br />

super-users) and these trained the rest of the employees (the users). This way of working gave<br />

rise to a high level of users’ involvement which, in return, reduced reluctance to use the new system (the<br />

users were being trained by their own colleagues who were also users of the module and therefore could<br />

encounter the same types of problems and difficulties).<br />

5. Conclusions<br />

Generally speaking, field work shows that the implementation of the GRP module was successful.<br />

Further, it can be more specifically concluded that:<br />

277


Mila Gascó and Carlos Jiménez<br />

The GRP module is part of a wider project: e-Justícia.cat. Therefore, e-Justícia.cat’s strategy guided<br />

its implementation and gave meaning to the actions that were carried out. Also, the existence of a<br />

plan regarding GRP let address implementation setbacks.<br />

The start of GRP took into consideration the existing legal framework. However, its completion led to<br />

the need to adopt new norms and agreements.<br />

The implementation of GRP required a high level of collaboration between the Mossos essentially<br />

d’Esquadra (the Catalan police force) and the Department of Justice of the Autonomous Government<br />

of Catalonia. However, the participation of other actors proved also key.<br />

Despite the natural resistance to change, training and communication were decisive elements of the<br />

change management strategy, which led to a successful implementation of the GRP module.<br />

Conducting a pilot gave rise to the possibility of detecting errors in time and therefore led to a<br />

successful implementation.<br />

The above issues can, therefore, be regarded as factors that positively conditioned the implementation of<br />

the project. The aforementioned variables are not related to technology or to technical topics. In fact, field<br />

work showed that these types of difficulties took place throughout the implementation process and,<br />

sometimes, even delayed it. Nevertheless, despite these situations, the GRP module was successfully<br />

put into service. This statement seems to confirm the main hypothesis of this research 3 : interoperability<br />

projects in electronic justice initiatives are less conditioned by technological variables than by strategic,<br />

political, management, institutional or legal ones. It also supports what other scientific works, such as<br />

those of Gascó (2010), Pardo et al. (2009), Archman and Kudlacek (2008), Scholl and Klischewski<br />

(2007), Eynon and Margetts (2007), or Bekker (2007), showed in the past.<br />

But research on electronic justice and on e-government interoperability is in its infancy and further work is<br />

needed in order to keep building a strong theoretical and conceptual body and to identify good practices.<br />

In this respect, in the light of the previous results, future studies could analyze the influence of the<br />

identified variables on the implementation of other modules of e-Justícia.cat or even on different<br />

electronic justice projects. Further, they could assess the outputs and the outcomes of this type of<br />

developments. Doing so would provide a holistic picture and understanding of electronic justice initiatives<br />

that necessarily involve interoperability.<br />

References<br />

Abramowicz, W., Bassara, A., Wisniewski, M. and Zebrowski, P. (2008) “Interoperability governance for egovernment”,<br />

Information Systems and E-Business Technologies, Vol. 5, part 2, pp 14-24.<br />

Archman, S. and Kudlacek, I. (2008) “Interoperability and the exchange of good practice cases”, <strong>European</strong> Journal of<br />

ePractice, Vol. 2 (February), pp 3-12.<br />

Bekker, V. (2007) “The governance of back office integration. Organizing co-operation between information<br />

domains”, Public Management Review, Vol. 9, Issue 3, pp 377-400.<br />

Cerrillo, A. & Fabra, P. (2009) E-Justice: Using Information Communication Technologies in the Court System, IGI<br />

Global, Hershey, PA.<br />

Criado, I., Gascó, M. and Jiménez, C. E. (2010) Marco Iberoamericano de Interoperabilidad, CLAD, Caracas,<br />

Venezuela.<br />

<strong>European</strong> Commission (2010) <strong>European</strong> Interoperability Framework for <strong>European</strong> public services, [online].<br />

Commission of <strong>European</strong> Communities, Brussels, http://ec.europa.eu/isa/strategy/doc/annex_ii_eif_en.pdf.<br />

<strong>European</strong> Commission (2008) Communication from the Commission to the Council, the <strong>European</strong> Parliament and<br />

the <strong>European</strong> Economic and Social Committee. Towards a <strong>European</strong> e-Justice Strategy, [online]. Commission<br />

of <strong>European</strong> Communities, Brussels, http://ec.europa.eu/civiljustice/docs/com_2008_329_en.pdf.<br />

Eynon, R. and Margetts, H. (2007) “Organizational solutions for overcoming barriers to eGovernment”, <strong>European</strong><br />

Journal of ePractice, Vol. 1 (November), pp 73-85.<br />

Fedorowicz, J., Gogan, J. L. and Williams, C. B. (2006) The e-government collaboration challenge: Lessons from five<br />

case studies, IBM Center for the Business of Government, Washington DC.<br />

Gascó, M. (2010) “Los retos de la colaboración. ¿A qué, si no a eso, pretendemos hacer frente con la<br />

interoperabilidad?, Paper read at XV CLAD <strong>Conference</strong>, Santo Domingo, Dominican Republic, November.<br />

Gottschalk, P. and Solli-Saether, H. (2009) E-government interoperability and information resource integration.<br />

Frameworks for aligned development, Information Science Reference, Hershey, PA.<br />

Jiménez, C. E. (2010) “Interoperabilidad en la administración de justicia: Experiencias y buenas prácticas en un<br />

ámbito complejo”, Paper read at XV CLAD <strong>Conference</strong>, Santo Domingo, Dominican Republic, November.<br />

3 It is important to take precautions when confirming the main hypothesis since this was, mainly, a qualitative study and, therefore, it<br />

has limitations (for example, the views of the people consulted are not representative or the findings cannot be extended to wider<br />

populations with the same degree of certainty that quantitative analyses can).<br />

278


Mila Gascó and Carlos Jiménez<br />

Pardo, T., Burke, B., Gil-García, R. and Guler, A. (2009) “Clarity of roles and responsibilities in government crossboundary<br />

information sharing initiatives: Identifying the determinants”, Paper read at the 5 th International<br />

<strong>Conference</strong> on E-Government, Boston, October.<br />

Pardo, T. and Burke, B. (2008), Improving government interoperability: A capability framework for government<br />

managers, [online], Center for Technology in Government, Albany, NY,<br />

http://www.ctg.albany.edu/publications/reports/improving_government_interoperability/improving_government_i<br />

nteroperability.pdf.<br />

Scholl, H. J. and Klischewski, R. (2007) “E-government integration and interoperability: Framing the research<br />

agenda”, International Journal of Public Administration, Vol. 30, No. 8, pp 889-920.<br />

Velicogna, M. (2007) “Justice systems and ICT. What can be learned form Europe?”, Utrecht Law Review, Vol. 3,<br />

issue 1 (June), pp 129-147.<br />

279


eGovernment and Service Delivery at the Local Level: A<br />

Comparative Analysis of Three Canadian Municipalities<br />

John Grant 1 , Frank Ohemeng 2 and Roberto Leone 3<br />

1<br />

McMaster University, Hamilton, Ontario, Canada<br />

2<br />

University of Ottawa, Ontario, Canada<br />

3<br />

Wilfrid Laurier University, Waterloo, Ontario, Canada<br />

grantkj@mcmaster.ca<br />

fohemeng@uOttawa.ca<br />

rleone@wlu.ca<br />

Abstract: The emergence of the Internet and information and communications technologies (ICTs) has, to varying<br />

degrees, transformed how governments deliver public services. However, while the role of ICTs in the provision of<br />

public services is well documented, contemporary literature, particularly North American, tends to neglect the impact<br />

of ICTs at the local level, focussing instead on the federal and state/provincial levels of government. This<br />

demonstrates a problematic void in the literature, especially when one considers the relationship between citizens<br />

and local government – it is, in many instances, the first point of contact for public service delivery. This paper<br />

examines the development, implementation and current state of eGovernment at the local level using three<br />

municipalities of similar size in the province of Ontario, Canada. In all three cases, the impetus for the adoption of<br />

eGovernment stemmed primarily from a province-wide push for municipal amalgamation, as well as the desire by<br />

local bureaucrats to realize the potential cost savings associated with enhanced service delivery options. The study<br />

also identifies some of the challenges associated with the implementation of local eGovernment and outlines what<br />

has and can be done to overcome those challenges. One of the key problems, for example, deals with efforts to<br />

reduce overlap and fragmentation through the creation of so-called one-stop-shops. This has proved difficult to coordinate<br />

at best, as there are myriad stakeholders involved, including entrenched and oft-times competing<br />

bureaucracies. The real question, however, is the extent to which ICTs have actually impacted or transformed<br />

service delivery at the municipal level, and what the prospects are for the acceptance and adoption of contemporary<br />

concepts such as eDemocracy.<br />

Keywords: ICTs, service delivery, eGovernment, eDemocracy<br />

1. Introduction<br />

The emergence of the Internet and information and communications technologies (ICTs) has, to varying<br />

degrees, transformed how governments deliver public services. However, while the role of ICTs in the<br />

provision of public services is well documented, contemporary literature, particularly North American,<br />

tends to neglect the impact of ICTs at the local level. Very few studies have addressed the impact of ICTs<br />

at the municipal or local government level (see, for example, Bontis, in Borins, Kernaghan, Brown, Bontis,<br />

and Thompson, 2007: 137-154; Lenihan and Hanna, 2002; Reddick and Frank, 2007; and Roy, 2006).<br />

This demonstrates a problematic void in the literature especially when one considers the relationship<br />

between citizens and local government – it is, in many instances, the first point of contact for public<br />

service delivery.<br />

This paper examines the development, implementation and current state of eGovernment at the local<br />

level using three municipalities in the province of Ontario, Canada: Ottawa, Hamilton and Kitchener. In all<br />

three cases, the impetus for the adoption of eGovernment stemmed primarily from a province-wide push<br />

for municipal amalgamation, as well as the desire by local bureaucrats to realize the potential cost<br />

savings associated with enhanced service delivery options.<br />

The paper is in five parts. The first describes the concept of eGovernment and the benefits alluded to in<br />

the literature on the subject. The second provides a brief outline of the study’s methodology. Part three<br />

presents an overview of the emergence and development of eGovernment in each of the three case<br />

studies. Part four compares the cases and outlines some of the challenges facing municipalities with<br />

respect to eGovernment implementation. We conclude with some general observations and proffer some<br />

suggestions as to what can be done to overcome identified challenges.<br />

2. Examining the concept of eGovernment<br />

The notion of eGovernment emerged in the 1990s as many governments attempted to find alternative<br />

ways of delivering improved services to the public. This followed the private sector adoption of e-business<br />

and e-commerce (Moon, 2002: 425). According to Bekkers and Zouridis (1999: 185), the idea was<br />

280


John Grant et al.<br />

premised on the assumption that improved public service delivery and a more efficient organization of<br />

public administration would restore citizens’ trust in politics, especially local politics. Politicians and public<br />

managers, therefore, saw ICTs as a means of achieving this objective. The outcome was the<br />

overwhelming adoption of ICTs for service delivery and, hence, the emergence and implementation of the<br />

eGovernment concept.<br />

Currently, there is significant discussion in the academic literature on the importance of eGovernment to<br />

public administration and, for that matter, service delivery. Despite this, there appears to be little<br />

consensus among scholars as to the term’s actual meaning. The definitional quagmire has arisen as a<br />

result of the incorporation of many different concepts into the mix (Chadwick, 2006; Grant and Chau,<br />

2008; Jaeger, 2003; Norris, 2001). Thus, the term “eGovernment” now encompasses the many<br />

dimensions of government’s presence online, including “the state’s economic and social programs; its<br />

relationships with the citizen and the rule of law (eDemocracy); its internal operations and its relationship<br />

with the international environment” (Brown, 2005: 241).<br />

Some scholars have defined eGovernment in a rather broad manner to include all the activities of<br />

government online, while others have tended to focus more on specific aspect of government activities<br />

such as service delivery. Jeffrey Roy, who has written extensively on eGovernment in Canada, refers to<br />

the concept as “the continuous innovation in the delivery of services, citizens’ participation, and<br />

governance through the transformation of external and internal relationships by the use of information<br />

technology, especially the Internet” (2006: 307).<br />

Other scholars have defined the concept from a narrower perspective. According to Jaeger (2003),<br />

eGovernment is the use of “technology, particularly the Internet, to enhance the access to and delivery of<br />

government information and services to citizens, business, government employees, and other agencies”<br />

(323). Therefore, from a technical standpoint, eGovernment involves several types of electronic and<br />

information systems, including databases, networking, discussion support, multimedia, automation,<br />

tracking and tracing, and personal identification technologies (323). The problem with these narrower<br />

definitions, however, is that they fail to “capture the more complex aspects of transforming government or<br />

acknowledge the roles of the information and information technology elements” (Grant and Chau, 2008:<br />

4). Thus, we have somewhat of a definitional dilemma: too broad on one hand, and too unrefined on the<br />

other. However, in order to avoid becoming obsessed with finding a concise, yet all-encompassing<br />

definition of eGovernment, we agree that it simply involves, to various extents, the many facets of<br />

government online.<br />

3. Methodology<br />

This comparative case study involves a qualitative examination of the development, implementation, and<br />

current state of eGovernment at the local level in three municipalities in the province of Ontario, Canada:<br />

Ottawa, Hamilton, and Kitchener. The three municipalities are similar in that they are roughly equal in<br />

size (between 500,000 and 800,000 people) and are located in the same province, which means that<br />

they are subject to the same provincial legislation that governs municipalities in Ontario. In addition, they<br />

possess similar timelines in terms of the eGovernment implementation process and thus experienced the<br />

same broader political dynamics (provincial and national) throughout. The municipalities differ, however,<br />

with respect to national prominence, economic activity and affluence. Ottawa, apart from being the capital<br />

of Canada, was until recently, Canada’s equivalent of the Silicon Valley. The economic activity in<br />

Hamilton is largely dominated by the steel and manufacturing sectors, while Kitchener is transforming its<br />

economy from a manufacturing base to one that is technology-driven.<br />

The research was designed to determine two things: the key actors and their relative impacts with<br />

respect to the implementation of eGovernment in each of the three municipalities; and, if and how the<br />

developmental processes differed from case to case. Ultimately, the objective was to compare the<br />

trajectory of eGovernment in the three municipalities and the prospects for the development of related<br />

activities such as e-governance, i.e., the movement from online service delivery to other areas such as<br />

eDemocracy.<br />

Data collection was undertaken using three methods: analysis of primary documents, review of relevant<br />

academic sources, and informal meetings and interviews. Primary documents included those generated<br />

by various governments and agencies (e.g., legislation, guidelines), <strong>Academic</strong> sources included relevant<br />

publications by political scientists, social scientists and those engaged in public administration. Meetings<br />

281


John Grant et al.<br />

and interviews were conducted on an ad hoc basis with key municipal bureaucrats, politicians, and<br />

stakeholders.<br />

4. The case studies<br />

In the early 1990s, the citizens of the City of Hamilton, together with councillors and City staff, articulated<br />

a vision for the development of the Hamilton community to the year 2020. Vision 2020: Strategies for a<br />

Sustainable Community identified several key priorities or goals which included, among others, “full<br />

participation by all citizens” in the City’s governance, and “building upon existing community information<br />

services to best organize the content and make it available in a user-friendly, needs-driven manner” (City<br />

of Hamilton, ND). It was not until 2001, however, that the vision began to be realized.<br />

On January 1 st 2001, six local municipalities, which had comprised the Regional Municipality of Hamilton-<br />

Wentworth, amalgamated to become the new City of Hamilton (for more information on the amalgamation<br />

process see, for example, Vojnovic and Poel, 2000). At the time, smart services were being provided in a<br />

piecemeal fashion through a variety of community networks, local organizations, and several partnership<br />

initiatives. Accordingly, the greatest smart service that needed to be realized was “to bring together a<br />

number of [those] systems and database applications via a single mechanism or suite of technologies,<br />

offering users a single point of entry” (City of Hamilton, 2001: 11), i.e., one-stop-shopping. In order to<br />

address this issue, the Connect Hamilton-Create Community project was implemented to develop a next<br />

generation community portal – the Hamilton WEB (Where Everything Begins).<br />

The Hamilton WEB was to be “a comprehensive integrated system” based on three components: “1) The<br />

integration of existing community information using meta data 2) Geo-Hamilton [a Geographic Information<br />

System for locating services] and 3) eGovernment/e-Service” (City of Hamilton, 2001: 11). The<br />

eGovernment/e-service component of the project was to utilize technology to provide an efficient,<br />

convenient and cost-effective service delivery channel for the municipal government.<br />

After amalgamation, and concurrent with its involvement in the Connect Hamilton-Create Community<br />

initiative, the City of Hamilton began to design a new IT strategy. A three-year Hamilton Information<br />

Technology Strategy (HITS) plan was unveiled in January of 2003, which concentrated on optimizing and<br />

enhancing the City’s support services to improve service delivery (City of Hamilton, 2003: 7-8). The City<br />

had long realized that transformation was necessary in order to move from a fragmented approach to<br />

service delivery to one that provided value through integration, agility and flexibility (9). After a two-year<br />

implementation period, the myhamilton.ca community portal was launched in September of 2005. Billed<br />

as a “supersite”, the portal represented an investment of almost $4 million in cash and in-kind<br />

contributions from over 40 community partners (McKay, 2005: 21-22).<br />

The Hamilton experience with the development of eGovernment was much like that of many other<br />

municipalities in that it was a logical step in the evolution of service delivery. However, although the<br />

priorities and goals for the implementation of eGovernment were articulated in the early 1990s by way of<br />

Vision 2020, much of the impetus resulted from the amalgamation process at the turn of the 21 st century.<br />

Nevertheless, according to Ken Roberts, the myhamilton.ca project co-director, what made the Hamilton<br />

experience truly unique was that it highlights “one of Hamilton’s greatest strengths – a willingness of<br />

organizations to work together” (2005: A17). Community partnership and collaboration effectively resulted<br />

in the project being delivered under time and under budget (McKay, 2007a).<br />

The City of Kitchener is an interesting case study because, unlike Hamilton and Ottawa, it resisted the<br />

movement toward single-tier government through the amalgamation process undertaken by many<br />

Ontario municipalities around the turn of the century. The City of Kitchener is a “lower tier” government<br />

within the Region of Waterloo, which acts as an “upper tier.” Thus, some of the services are split between<br />

the municipal and regional governments. Even with this institutional reality, however, the City of Kitchener<br />

still has a significant need for eGovernment services.<br />

The rationale for municipal amalgamation provided the original momentum for implementing<br />

eGovernment in Kitchener. Local Service Realignment (LSR) was the provincial government program in<br />

the late 1990s that sought to alter the state of municipalities in Ontario. LSR aimed to improve efficiency<br />

in local government service delivery. In Ottawa and Hamilton, this included municipal amalgamation. In<br />

Kitchener, however, it meant that many services, which were previously the domain of local<br />

municipalities, were now transferred to the upper-tier regional government. The whole goal of this<br />

realignment of services related to the desire to improve efficiency in service delivery.<br />

282


John Grant et al.<br />

LSR became the policy of the provincial government in 1997. It was around the same time that the City of<br />

Kitchener was attempting to broaden the use of ICTs in the provision of public services. Because of the<br />

discussions that were taking place within Waterloo Region and its constituent cities and townships, it was<br />

natural that the City of Kitchener’s development of eGovernment was largely in conjunction with the other<br />

local governments. There are three reasons for this collaboration. First, the mayors of all constituent<br />

lower-tier municipalities sit on regional council. Prior to the restructuring in the 1990s, even more<br />

municipal leaders sat on both city and regional councils. This linkage still remains even though it is<br />

somewhat diminished. Second, there is collaboration among bureaucrats of all governments in the<br />

region. For example, the Chief Administrative Officers of all the local governments frequently meet to<br />

share information about best practices. Third, everybody was doing it. Not only was this something that<br />

was occurring across Ontario, but the vision of the Government of Canada was for the country to be the<br />

most wired and connected in the world.<br />

The significant hype that surrounded eGovernment in Kitchener led to the speedy implementation of a<br />

corporate web site. The emphasis appeared to be on getting as much as possible onto the web site at an<br />

expedited rate. What this policy lacked, however, was a comprehensive outlook as to a coordinated web<br />

portal that would be easy to access for both citizens and industry. The web site existed, but there was no<br />

real articulation of its purpose or goals. In addition to this, the City took quite some time to actually come<br />

up with meaningful performance measures to benchmark the success of its eGovernment program. It<br />

was not until the middle of the decade that Kitchener got around to fixing these problems.<br />

The City of Kitchener 2007-2010 Strategic Plan highlights some of the initiatives that were planned to<br />

improve the coordination and comprehensiveness of eGovernment service delivery. Under the theme of<br />

providing effective and efficient government, the document outlines three ways in which the City can<br />

utilize information technology in an innovative way: (a) to maximize technology to support timely, relevant<br />

and accurate information; (b) to optimize technology solutions that will enhance the ability to interact and<br />

communicate more effectively with internal and external clients; and (c) to develop an enabled and<br />

knowledgeable workforce (City of Kitchener, 2008: 6). These now represent a set of values that guide the<br />

City in implementing its eGovernment strategy.<br />

The historical development of eGovernment in the current City of Ottawa can be traced back to the early<br />

1990s when the Regional Municipality of Ottawa-Carleton (RMOC) and the City of Ottawa accepted a<br />

proposal from the newly established Ottawa-based non profit community network, National Capital<br />

Freenet (NCF) to establish a presence on its network (Gattinger, in Graham and Phillips 1998: 200-240).<br />

The NCF had been incorporated to link the people and organizations of the region, provide useful<br />

information, and enable an open exchange of ideas with the world (Patrick, 1997).<br />

This invitation received a strong reception from administrators rather than politicians from the two levels<br />

of government. These administrators attended various meetings with FreeNet officials and were<br />

convinced about the need to move online. Their convictions enabled them to vigorously campaign in<br />

favour of their local governments’ participation in the NCF, not only by sharing their passion with other<br />

colleagues, but by investing time and effort in research to persuade regional and municipal councils to<br />

accept the idea (Gattinger, in Graham and Phillips 1998: 201-202).<br />

On January 1 st 2001, the Regional Municipality of Ottawa-Carleton, the City of Ottawa, and eleven other<br />

area municipalities amalgamated to form the new City of Ottawa. In creating the new city and to help<br />

facilitate smooth administrative transition, the provincial government established the Ottawa Transition<br />

Board (OTB). The OTB enjoyed tremendous powers to oversee, review, and restrain (if necessary) the<br />

action of the various municipal councils as well as implement the model for the introduction and function<br />

of the single municipality (Government of Ontario, 1999; Roy, 2003).<br />

The OTB recognized the importance of technology to enhance service delivery, and took every<br />

opportunity to ensure the integration of technology in the City’s service delivery model. The newly<br />

amalgamated City was thus forced to make on-line service delivery a key priority through a portal-led<br />

infrastructure designed and operated by the private sector (Roy, 2003: 391)<br />

The City created its first IM/IT Strategic Plan in 2002. The plan contained a set of priorities for a newly<br />

established Information Technology Services (ITS) organization and included the expectations for IT<br />

service delivery and governance. In addition to this, the City developed a new eServices Plan, which was<br />

developed in conjunction with two partners: Deloitte Consulting and the National Information Consortium<br />

283


John Grant et al.<br />

(NIC). The consortium was expected to provide services and infrastructure required to develop and<br />

maintain the eGovernment portal, while the new City of Ottawa retained ownership of, and control over,<br />

all data and portal operations.<br />

For two years, beginning in 2001, the consortium worked on the creation of an eGovernment enterprise<br />

portal (www.ottawa.city.on.ca), a “one-door” web-based gateway. In short, the City’s eGovernment portal<br />

was to enable it to meet the higher expectations of citizens and businesses in the Internet economy. It<br />

was also expected that through this investment, the City would save sufficient money in operating costs<br />

in the following years. Thus, it would be in a position to re-invest these savings to improve municipal<br />

services or to provide further tax relief to its residents (OTB, 2001: 39)<br />

After two years, the City and the consortium parted company and this allowed the City to assume full<br />

control of its portal. Currently, Ottawa is in the second phase of its eGovernment development, which<br />

began in 2006. This phase has been necessitated by the fact that, although the City made a great deal of<br />

progress under its original eService Plan including migrating many services online, a major site redesign<br />

in 2003, and a fivefold increase in the number of weekly visits to the site, there have been a number of<br />

concerns expressed by citizens (City of Ottawa, 2007). For example, the City currently supports several<br />

independent Internet sites including ottawa.ca, octanspo.com, bibioottawalibrary.ca,<br />

centrpointetheatre.com, ottawapolice.ca, ottawa.com, landsdownpark.ca, and teamottawagatineau.com.<br />

The problem associated with this is that there are too many inconsistencies across sites as well as<br />

dilution of brand. Hence, many citizens find it confusing in terms of obtaining information or services from<br />

the City. It is imperative, then, that the City integrates its family of web sites to provide uniformity, as well<br />

as reduce duplication of efforts such as multiple web metric tools.<br />

5. Comparative analysis of eGovernment in the three municipalities<br />

At the outset, it is clear that there are many similarities between the municipalities. First, bureaucrats<br />

initiated the push for eGovernment. This is not surprising since, at the municipal level, bureaucrats hold<br />

more sway in terms of policy development due to their knowledge and expertise, and the fact that<br />

Individual local politicians do not attend meetings with political party officials or advisers in tow, as do<br />

those at the provincial or federal levels. Thus, bureaucrats were able to get politicians onside and to<br />

garner continuing support for key strategies and programs.<br />

Second, the focus has centred on service delivery rather than on governance (e.g., eDemocracy). This<br />

follows the pattern noted by Bekkers and Zouridis (1999), whereby politicians and public managers saw<br />

ICTs as a means to improve service delivery and to manage the administrative apparatus more<br />

efficiently, which in turn would restore citizens’ trust in local politics. While eDemocracy is mentioned in<br />

most of the literature relating to the development of eGovernment in each of the municipalities we<br />

analyzed, the focus was clearly on service delivery. The Hamilton Information Technology Strategy<br />

(2003), for example, related to management expectations for efficiency and savings, and citizens’<br />

expectations for service. In the Ottawa case, the OTB’s recommendations were aimed at achieving<br />

greater efficiencies in service delivery through the introduction of new technologies. The City of<br />

Kitchener, although successfully resisting the amalgamation process, nevertheless cooperated closely<br />

with other municipalities in the desire to improve efficiency in service delivery. Only recently, however,<br />

with the establishment of an Accountability and Transparency Committee, do we see any serious<br />

implications for eDemocracy.<br />

Third, the amalgamation process facilitated the push for eGovernment considerably. Politicians and<br />

bureaucrats alike realized the need to integrate and standardize fledgling e-services. In the Hamilton<br />

case, the Province of Ontario provided much-needed funding, while the City of Ottawa received its<br />

impetus from the provincially established Ottawa Transition Board. Many other amalgamating<br />

municipalities received similar support from the province, although it may be argued that this was part of<br />

a downloading strategy undertaken by the province, which began immediately prior to the turn of the<br />

century. The City of Kitchener is unique in that it successfully resisted amalgamation; however, the<br />

underlying rationale for amalgamation (efficiency in service delivery) still provided the impetus for the<br />

implementation of eGovernment.<br />

In all the cases, there have been attempts to clean up the number of fragmented and/or overlapping<br />

websites with the delivery of municipal services. Such fragmentation and overlap makes it difficult for<br />

citizens in the search for services associated with their municipality’s website. The three municipalities<br />

under study have created, or are endeavouring to create, one-stop-shops through the integration of their<br />

284


John Grant et al.<br />

own sites and those of organizations that deliver services for the municipal government themselves. This<br />

has presented an important challenge: coordination. In Hamilton, for example the task of coordination has<br />

been onerous at best as a result of the fact that there were varied and numerous stakeholders, which the<br />

city had to deal with. This was complicated by the necessity of working around the established<br />

bureaucratic culture.<br />

In the case of Kitchener, even though it appears to be on the right track with regard to its eGovernment<br />

initiatives, coordinating of information among the various city organizations still presents a significant<br />

challenge. The City has a corporate web site for clients to access, it has an intranet that staff access, and<br />

it is creating a contact call centre that will be fielding phone calls from the public on behalf of the City. The<br />

major challenge that will unfold here is the extent to which the information available to one of these<br />

mediums is shared by them all.<br />

In Ottawa, there have been concerns relating to issues of inconsistencies across web sites and dilution of<br />

brand. Consequently, the municipality has initiated a number of steps including a standardized web<br />

design, consistent navigational element, and common feel to enhance the overall web-user experience.<br />

Further, it is coordinating and reducing organizational duplications as well as creating web standards<br />

across organizations. In Kitchener, the City would like to maintain uniformity of identity related to cityowned<br />

organizations and facilities that currently operate different corporate websites because municipal<br />

tax dollars are supporting these functions. At the same time, however, municipal organizations like golf<br />

courses are competing for clients with other similar private organizations, and this necessitates branding<br />

that promotes an identity that is different from that of the City. This becomes a very tricky game between<br />

brand marketing and civic identity with no obvious winner. To overcome these obstacles requires<br />

exceptional leadership and management skills, as well as extensive training of all personnel involved in<br />

municipal eGovernment initiatives.<br />

Overall, in terms of the development of fully functional eGovernment, it would appear that the three<br />

municipalities are on the cusp of horizontal integration, i.e., “integrating government services across<br />

different functional walls (Layne and Lee, 2001: 132). However, while this poses somewhat of a technical<br />

challenge, the greater difficulty lies in transforming the entrenched bureaucratic culture. Certainly,<br />

functional specialization has resulted in a tendency to silo information and processes within different<br />

departments, at different levels of government.<br />

Notably, one of the greatest challenges faced by the municipalities, in terms of eGovernment, relates to<br />

measuring value. In Hamilton, McKay (2007a) has observed that, while continuous data gathering and<br />

analysis must be undertaken in order to measure value, it is difficult to determine accurate indicators. For<br />

example, is it increased revenue, or a reduction in the number of telephone calls to municipal<br />

departments? The City of Kitchener uses the number of web hits to benchmark use of eGovernment<br />

services. It can thus track the perceived increase in demand for services and measure how many more<br />

citizens visit a site with more services added. Again, however, the statistics fail to measure precisely what<br />

is being assessed. Are citizens simply information seeking, or are they actually accessing a service?<br />

Ottawa uses an approach similar to the City of Kitchener to track and measure the use of its online<br />

services. It also uses mail-in forms and telephone surveys to determine who is using its online services,<br />

and any other information that may help make its homepage more user-friendly.<br />

6. Conclusions<br />

This paper set out to examine the development and implementation of eGovernment, which has become<br />

a global phenomenon, as a way of enhancing service delivery. The evidence indicates that the adoption<br />

and implementation of eGovernment in Ontario emerged from two main sources: the provincial<br />

government, through its amalgamation policy; and, the influence of municipal bureaucrats. Currently, the<br />

focus of the municipalities has been on how to adequately expand web services with the development of<br />

various service initiatives. This is not surprising since municipalities are the first point of contact for<br />

citizens in terms of service delivery. However, municipalities still face enormous challenges in this regard<br />

as they possess fewer financial resources as compared to the federal and provincial levels. In short, the<br />

power to tax is far less than at the higher levels of government.<br />

A related problem is the challenge of finding the needed resources to preserve the “one-door” or “onestop-shop”<br />

concept, which requires continuous updating of information from the various contributing<br />

organizations. While it may seem that integrating the numerous websites may be efficient in term of costs<br />

and accessibility, the cost of gathering the information and the timing of the release of this information for<br />

285


John Grant et al.<br />

uploading may outweigh the benefits. One potential fix to the one-stop-shop is to apply a decentralized<br />

environment for the uploading of information. However, under this scenario, there is the potential for<br />

some business units to upload information more frequently than others.<br />

Another important issue is the use of consultants to provide expert advice with respect to web-based<br />

service strategy. Despite the fact that these municipalities have well trained bureaucrats, there has been<br />

a shortage of in-house specialists necessary for the development of new websites. Thus, municipalities<br />

continue to rely on outside expertise for their technological needs. Nevertheless, the benefit to this is the<br />

sharing of ideas, not only between experts and the municipalities they serve, but also among all members<br />

of the community at large. Indeed, there has been the recognition by municipalities of the essential role of<br />

citizens in eGovernment development and implementation.<br />

The three municipalities studied have also attempted to reduce the digital divide (see, Norris, 2001; and<br />

Powell and Shade, 2005) that exists in their respective communities. For example, significant attempts<br />

are being made to provide accessibility for on-line service delivery to disabled persons. The City of<br />

Ottawa has initiated a project called Mobile Web Access Strategy, which is expected to provide service<br />

delivery to the public anywhere and anytime. Similarly, the City of Kitchener has developed an access<br />

plan to enable residents with vision impairment to use online tools to enhance service. In this respect, the<br />

City has also increased the font size on the corporate web site. However, not all services can or should<br />

be offered exclusively online because of the inherent technological barriers that some people face. This is<br />

demonstrated by the continuing use of traditional service channels. There are still a number of services<br />

that cannot currently be delivered without some form of face-to-face or verbal interaction. Applications for<br />

building permits, for example, which involve the submission of plans and detailed information, are more<br />

likely to require the assistance of a real person. Thus, as well as service delivery, there is also a need to<br />

focus on service transformation (McKay, 2007a).<br />

Finally, it is also important to examine the overall impact ICTs are having at the municipal level in terms<br />

of attempts to include citizens in the policy making process. Here lies the true untapped potential of<br />

eGovernment: eDemocracy. In terms of eGovernment maturity models, this represents the final stage of<br />

development (Siau and Long, 2005). However, only the City of Kitchener has come close in this regard,<br />

through its Accountability and Transparency Committee, which has sought to utilize the City’s web site as<br />

an electronic means to disseminate information, not sensitive to City business, to the public. Thus,<br />

although there have been attempts to incorporate democratic ideals/values such as transparency and<br />

accountability into the model, the original thrust of eGovernment remains on efficiency in service delivery.<br />

This demonstrates where the political will still resides. Addressing such issues may help to enhance<br />

public trust in government.<br />

References<br />

Bekkers, Victor J. J. M and Zouridis, Stavros (1999) “Electronic service delivery in public administration: Some trends<br />

and issues”, International Journal of Administrative Sciences, Vol. 65, No. 2, pp. 183-195.<br />

Borins, S., Kernaghan, K., Brown, D., Bontis, N. and Thompson, F. (eds.) (2007) Digital state at the leading edge,<br />

University of Toronto Press, Toronto.<br />

Chadwick, Andrew (2006) Internet politics: states, citizens, and new communication technologies, Oxford University<br />

Press, New York.<br />

City of Hamilton (ND), Connect Hamilton – Create community (CHCC) is an important step in the evolution of<br />

Hamilton, [online], Available: http://town.flamborough.on.ca/executive-summary.htm [10 December, 2007].<br />

City of Hamilton (2003). Hamilton information technology strategy 3-Year Plan 2003 – 2005 (Summary Report),<br />

Information Technology Steering Committee, Hamilton.<br />

City of Hamilton (2001). Connect Hamilton – Create community: Notice of intent to proceed with request for business<br />

plan funding Connect Ontario/GeoSmart program, [online], Available:<br />

http://town.flamborough.on.ca/pdf/CHCC_NOI.pdf [10 December, 2007].<br />

City of Kitchener (2008). City of Kitchener Business plans, Kitchener ON: Finance and Corporate Services<br />

Committee, [online], Available: http://www.kitchener.ca/default.aspx?tabid=3), [9 February, 2008].<br />

City of Kitchener (2007a) Accountability and transparency policy (Draft), Kitchener ON:<br />

Accountability and Transparency Committee.<br />

City of Kitchener (2007b) Performance measurement status update and 2006 results, Audit Committee, Kitchener.<br />

City of Kitchener (2007c) Strategic plan – Condensed version, [online], Available:<br />

http://www.kitchener.ca/Files/Item/item12606_cok_strategic_plan_-_effect___effic_govt.pdf. [4 February, 2008].<br />

City of Kitchener (2006) City of Kitchener 2006 annual report to citizens, Chief Administrative Office and the Office of<br />

the Mayor and Council, Kitchener.<br />

City of Ottawa (2007) Web Based Service Strategy, Draft Report, Version 1.3, City of Ottawa: Ottawa.<br />

286


John Grant et al.<br />

Graham, K.A., and Phillips, S.D. (eds.) (1998) Citizen Engagement: Lessons in Participation from Local Government,<br />

IPAC, Toronto.<br />

Grant, Gerald and Chau, Derek (2008) “Developing a generic framework for eGovernment”, Journal of Global<br />

Information Management, Vol. 13, No. 1, pp. 1-30.<br />

Government of Ontario (1999) City of Ottawa Act, 1999: Powers and duties of Transition Board, Queen’s Printer,<br />

Toronto.<br />

Jaeger, Paul T. (2003) “The endless wire: eGovernment as global phenomenon”, Government Information Quarterly,<br />

Vol. 20, No. 4, pp. 323-331.<br />

Layne, Karen and Lee, Jungwoo (2001) “Developing fully functional EGovernment: A four stage model”, Government<br />

Information Quarterly, Vol. 18, pp. 122-136.<br />

Lenihan, Donald and Hanna, Abla (2002) EGovernment: the municipal experience, Centre for Collaborative<br />

Government, Ottawa.<br />

McKay, Shannon (2007a) Senior Project Manager, my.hamilton.ca Community Portal and eGovernment Coordinator,<br />

City of Hamilton, Interview, 29 November.<br />

McKay, Shannon (2007b) “The art of balance, the science of business and the City of Hamilton’s continued journey<br />

towards success”, Presentation for the Municipal Information Systems Association 2007 Annual <strong>Conference</strong>.<br />

McKay, Shannon (2006) myhamilton.ca: life made easy – Final report for Ministry of Economic Development and<br />

Trade (19 May, 2006).<br />

McKay, Shannon (2005) “Application of leadership principles builds success for Hamilton portal”, Municipal Interface,<br />

November, pp. 21-24.<br />

Moon, Jae M. (2002) “The evolution of EGovernment among municipalities: Rhetoric or reality?”, Public<br />

Administration Review, Vol. 62, No. 4, pp. 424-433.<br />

Norris, Pippa (2001) Digital divide: Civic engagement, information poverty and the Internet Worldwide, Cambridge<br />

University Press, Cambridge.<br />

Ottawa Transition Board (2001) The new City of Ottawa: Fulfilling its potential, final report and recommendations,<br />

Ottawa Transition Board, Ottawa.<br />

Patrick, Andrew S. (1997) “Media lessons from the National Capital FreeNet”, Communications of the ACM, Vol. 40,<br />

No. 7, pp. 74-80.<br />

Powell, Allison and Leslie R. Shade (2005) “Going Wi-Fi in Canada: Municipal, and community initiatives”, CRACIN<br />

Working Paper No. 6, Canadian Research Alliance For Community Innovation And Networking, Toronto<br />

Reddick, Christopher G., and Frank, Howard, A. (2007) “The perceived impacts of eGovernment on U.S. cities: A<br />

survey of Florida and Texas City managers”, Government Information Quarterly, Vol. 24, No. 3, pp. 576–594.<br />

Roberts, Ken (2005). “myhamilton.ca is your city”. Hamilton Spectator, 3 October, p. A17.<br />

Roy, Jeffrey (2006) EGovernment in Canada: Transformation for the digital age, University of Ottawa Press, Ottawa.<br />

Roy, Jeffery (2003) “The relational dynamics of e-governance: A case study of the City of Ottawa”, Public<br />

Performance and Management Review, Vol. 26, No. 4, pp. 391-403.<br />

Siau, Keng, and Long, Yuan (2005) “Synthesizing eGovernment stage models – a meta-synthesis based on metaethnography<br />

approach”, Industrial Management & Data Systems, Vol. 105, No. 4, pp. 443-458.<br />

Vojnovic, Igor and Poel, Dale (2000) “Provincial and municipal restructuring in Canada: Assessing expectations and<br />

outcomes, Canadian Journal of Regional Science, Vol. 23, No. 1, pp. 1-6.<br />

287


Crowd-Sourcing Techniques: Participation, Transparency<br />

and the Factors Determining the Co-Production of Policy<br />

Mary Griffiths<br />

University of Adelaide, South Australia, Australia<br />

mary.griffiths@adelaide.edu.au<br />

Abstract: The establishment of trust in the transparency of government and the commitment to collaboration with<br />

citizens, through engagement initiatives, remain strong priorities for Australian governments. The paper discusses<br />

the Gov 2.0 Taskforce recommendations within the context of Australian uptake of social media, and the Web 2.0<br />

features of government initiatives. It compares the relative success of two engagement projects: Community<br />

Cabinets at the federal level; and SAPLAN consultation processes at state level. Comparative analysis suggests that<br />

participatory initiatives depend for their success on expanding the role of public servants; and on realistic<br />

assessments of citizen expertise and expectations of collaboration, which take account of the online capacities being<br />

formed by social media protocols in civil society sectors.<br />

Keywords: public servants, social media, community cabinets, SAPLAN consultations; citizen experts; dotmocracy<br />

1. Introduction<br />

The success of Australian state and federal government initiatives in citizen engagement depends on the<br />

recognition given to significant changes in citizens’ motivations and preferred methods of connecting<br />

since the social media revolution. New online means of connecting, in which collaborative work is made<br />

possible through crowd-sourcing and blended techniques, can be put to work in the engagement and<br />

policy formation areas.<br />

The creativity of large numbers of people who give their labour freely can result in stronger citizengovernment<br />

relations. In a commitment to the co-production of policy, Australian governments are using<br />

blended citizen forums and online means to crowd-source ideas, and to form and test policy proposals<br />

with the public. For example, nation-wide Prime Ministerial Community Cabinets (CC) ran on the initiative<br />

of the 2007-2010 Australian Labor Government, under the ex-PM, Kevin Rudd. CCs were designed as<br />

participatory engagement exercises for regional and district communities, to encourage deeper trust in<br />

democratic transparency and more citizen involvement in governmental processes. The calls for<br />

participation were open, but formal, resembling a scaled-up version of town hall discussions. In contrast<br />

to the theatricality and political focus of the federal CCs, the South Australian government’s strategic<br />

planning process (SAPLAN) was designed as a long, focussed period of broad consultation. Its<br />

engagement tactics demonstrated a greater knowledge of the viral communications techniques being<br />

used in civil society to mobilise, persuade, reassure and influence people. SAPLAN involved themed<br />

expert and citizen face-to-face community conversations, and used Web 2.0, social networking,<br />

community ambassadors, and dotmocracy protocols at face-to-face round-table consultations.<br />

By comparing the two main instances of government-citizen engagement, the paper prioritises the more<br />

sustainable and productive approaches to reinvigorating the citizen-government relationship.<br />

1.1 Engaged government and information culture<br />

eGovernment in Australia has a history of rapidly developing transparency and inclusiveness in its<br />

approach to multicultural citizen engagement and education. Complex, informative websites are provided<br />

at all three levels of government: federal, state and local. Citizens have gradually become more<br />

autonomous both as ‘consumers,’ by accessing government services and making informed decisions on<br />

available information; and as participants, in the co-production of policy. Broad federal engagement<br />

policies, allied to high national connectivity levels and a general willingness to adopt new technologies on<br />

the part of citizens, ensure that Australia has a growing number of Gov 2.0 projects.<br />

In fact, an open version of Internet culture and a radical re-visioning of public service traditions drove the<br />

considerations of the Gov 2.0 Taskforce, established in June 2009 and comprised of a group of ‘policy<br />

and technical experts and entrepreneurs from government, business, academia, and cultural institutions’.<br />

‘Engage’ was the Taskforce’s key theme, defined through three main trajectories of change. Firstly, it<br />

recommended that public agencies and the Australian Public Service (APS) should be encouraged to use<br />

the ‘collaborative web’ to join up existing communities of interest, and help deliver a more ‘informed,<br />

288


Mary Griffiths<br />

responsive, innovative and citizen-centric democracy.’ Secondly, public sector information should be<br />

‘liberated as a national asset’ to encourage people to create new public value. Lastly, the hierarchical<br />

public service culture must change in order to reward engagement while staying true to the values of<br />

‘impartiality, propriety and professionalism.’<br />

The Report itself demonstrated the openness and ‘gift culture’ which are hallmarks of much everyday<br />

online participation. Compiled by global experts and peers, and an example itself of crowd-sourcing<br />

protocols, it was published under a Creative Commons license. The three pillars of the thirteen<br />

recommendations are leadership, engagement and open-access Public Service information. The central<br />

recommendation is a ‘declaration of open government by the Australian government.’ This would require<br />

whole of government commitment to government 2.0, to the provision of all possible access to data, and<br />

to the facilitation of Australian citizens’ participation in their own governance. In order to make that<br />

happen, Web 2.0 collaborative tools would be applied to the processes of government, causing a culture<br />

of collaboration at all levels of government. The overarching tenet is radical enough, but of special note is<br />

Recommendation 4: ‘encourage public servants to engage online.’ The Taskforce argued that over time,<br />

public servants become experts in their fields, and can therefore make a more useful contribution to<br />

public debate by speaking out online on issues of public interest and concern; and also by contributing to<br />

cross-agency policy discussions. They could thus model engagement to other citizens. Info-philanthropy,<br />

if treated as an eligible activity for tax reduction, could help Government 2.0 flourish. There was an inbuilt<br />

contradiction in what the Taskforce proposed, and APS culture. The APS is governed by strictly enforced<br />

professional guidelines, which limit public comment by public servants in order to protect officials from<br />

accusations of political interference (see below).<br />

Among many innovative recommendations, Recommendation 6 suggested that Public Sector Information<br />

(PSI) should be open and re-usable by citizens, and released under a Creative Commons license, after<br />

de-identification of personal citizen information. Overall, the sixteen members of the taskforce were<br />

recommending a major information culture change in Australian government, which would first match and<br />

then overtake what was already happening in Australian society. Taskforce members were asking<br />

government to exert control, to influence, and to lead by example.<br />

The Report’s final appendix notes thirteen OECD principles for the access and use of PSI, which are<br />

couched in terms of use and reuse, and the education of users and re-users, to promote innovation,<br />

entrepreneurship, economic growth and social effects. Reception of the Report has been welcoming in<br />

some sections, although there are critics (Grubb, 2010).<br />

The radical nature of the report illustrates that the government’s crowd-sourcing approach begins with<br />

asking for expert commentary about distributed information and networks. The advice from the Taskforce<br />

chair was forthright:<br />

The use of the internet as a platform for collaboration is already transforming the economy.<br />

Whole industries and sectors are being refashioned by adoption of the social web. Citizens<br />

are being empowered to express themselves, organise and collaborate in myriad new ways.<br />

2.0 communicative tools include blogs, wikis, and social networking platforms. These tools<br />

enable communities of interest to develop rapidly to find people with local knowledge or<br />

technical expertise to build understanding of issues and solve problems as they emerge.<br />

They enable communities to filter the torrent of information on the internet and identify the<br />

most useful parts of it…These new tools and the culture of open collaboration which<br />

distinguishes the culture of Web 2.0 present important new challenges and possibilities for<br />

government.<br />

(Gruen, AGIMO, 2009, p.xi)<br />

Citizens are already familiar with, and ready to use Web 2.0 in multiple aspects of their daily lives.<br />

Crowd-sourcing approaches need to recognise that Australia has a strong internet connectivity profile,<br />

set to improve after the high-speed broadband network is completed. According to ‘The Australian<br />

Internet and Technology Report 2009-2010’ (Nielsen, 2010), internet participation in Australia is already<br />

high (84% in 2009). Participation has also matured, placing Australia almost as high on the global scale<br />

as North America (p.15). In terms of household technology ownership, 93% of users 16 + have home<br />

internet; but 13% now also have the new consumer item, BluRay players, and 4% registered their<br />

ownership of portable reading devices (p.25), demonstrating the country’s fast adoption of new<br />

technologies. Other indicators include the mobile market, which has almost reached saturation, with most<br />

future growth expected in online services, such as ticket bookings (see also Worthington, 2009).<br />

289


Mary Griffiths<br />

Australian Internet users spend about 17.6 hours online, the Internet being the preferred source of news.<br />

Usage patterns recorded by Nielsen reveal that most frequently conducted activities are email, banking<br />

and bill-paying. 45% of Internet users participate more in social networking in 2009, up from 28% since<br />

2007. Of the Nielsen survey’s 38 categories of online activity, online social networking is ranked at<br />

number 6 (45% ‘use regularly’) and the percentage who ‘use but not regularly’ are 23%. Nielsen trend<br />

indicators indicate that internet use is driven by socialising, customisation, user-friendliness, time saving<br />

and support of lifestyle activities.<br />

1.2 Government-citizen online interactions<br />

However, in contrast, Nielsen tables show that the first government-citizen interaction online is ranked<br />

number twelve, and is at the transaction level activity of ‘submitting forms/info to govt websites.’ Here<br />

31% regularly submit and 34% use the facility but not regularly. Ranked number fourteen and fifteen are<br />

‘local/community information’ - 29% and 27% respectively; and ‘make payments for govt services’ 28%<br />

and 27% respectively (Nielsen, p. 133).<br />

Thus, governments wanting to engage citizens through ICTs have strong online competition and big<br />

challenges to overcome. Nielsen is predicting growth of only 2% in the interactions with government.<br />

Governments aiming to promote active citizenship need to do more than provide online customer servicestyle<br />

transactions. New media theorists describe Internet culture as inhabited by online participants who<br />

see themselves as peers engaged in business, work or leisure activities and transactions, in usually<br />

horizontally-structured communities and organizations, frequently defined by mutual interests. The codes<br />

of organizational and personal interaction evolve through peer development work, and community<br />

acceptance (Tapscot and Williams, 2006; 2010). The phenomenon of gift culture and collaboration is now<br />

being embedded in new legal practices of sharing information, thus replacing long-established traditions<br />

for dealing with published material and intellectual property rights (Lessig, 2002, 2008). Alternative points<br />

of view and creative commons practices in the digital world exist, flourish, and can set the agenda for<br />

future change simply by being practised. Non-professionals may become co-creative ‘produsers’, rather<br />

than the consumers of others’ production content (Bruns, 2008). Creativity, innovation and participation<br />

can be seen as Internet norms.<br />

Citizens may see themselves as necessarily owing allegiance to communities and nations, but single<br />

online actors have no need to stay in any group or community failing to meet the personal needs of its<br />

members; or where disagreements occur over roles or practices of interaction. These characteristics of<br />

the social web were brutally illustrated in the overall lack of interest generated by the government-themed<br />

blog threads in the Australian E-Gov Blog in 2008. In the social media world, another example is provided<br />

by the desertion of the site by MySpace users when new protocols of user engagement were instituted<br />

without consultation. The site, which relies on freely given user time and content rapidly dropped in<br />

popularity, causing financial losses to its owner, NewsCorp. Citizens, as consumers and online peers, are<br />

developing familiarity with their own preferred online modes of interaction and have expectations of<br />

customised access and control.<br />

1.3 Citizen-driven interactions<br />

A striking example of successful political activism based on crowd-sourcing is GetUp!Australia, a<br />

mobilized, networked activist group of 437, 892 members (March, 2011) in a population of 22 million.<br />

GetUp!Australia campaigned successfully to change Australian Election Office rules to allow late<br />

subscribers to the 2010 electoral roll by auspicing a teenager’s High Court challenge; handed out issuebased<br />

scorecards on the 2010 national election day ranking the parties according to their policies; acted<br />

as a mediator between independents and rival parties during the 2010 federal ‘hung election’; tried with<br />

some success to change government policy on the mandatory filter through email and ad campaigns;<br />

and displayed a Pollute-O-Meter to track party policies on carbon emissions on its website, courtesy of<br />

the Climate Institute (GetUp!, 2010). Its avowed intention is to change democratic practice in Australia<br />

and create a new democracy (Sheikh and Marsh, 2010). It is swift to canvass its members through email,<br />

and then to use Web 2.0 tools to influence others, and action its ideas. It quickly garnered funding for the<br />

New York Times one-page advertisement supporting Wikileaks’ founder, Julian Assange. Given the<br />

requisite information, issues, and technology platforms, many Australian citizens engage in a variety of<br />

lobby and protest activities.That willingness to engage across a range of issues cannot be further<br />

discussed here, but suffice it to say that GetUp!Australia is successful, and the APS could copy its<br />

techniques.<br />

290


1.4 OECD advice: Citizens as partners<br />

Mary Griffiths<br />

How can government improve its own performance in co-producing policy alongside citizens?<br />

Governments have to place higher levels of importance on ensuring equity, risk-management,<br />

accountability, transparency, openness, good governance, and building trust than is required of a social<br />

networking site. Governments promoting the active citizenship recommended by the OECD and<br />

democratic theorists of co-production (e.g., Roberts, 2008) need to consider the 2.0 context and existing<br />

competencies before participatory consultative design takes place. Earlier OECD advice handbook<br />

(2001; Vergez, 2002) gives practical assistance to government workers planning strategies for<br />

strengthening democratic and business practices. It identifies guiding principles such as commitment,<br />

rights, clarity, time, objectivity, resources, co-ordination, accountability, evaluation, and active citizenship.<br />

Written before the five year old explosion in social media, its ten tips for engagement strategies are still<br />

good principles, but seem naïve now: ‘take it seriously; start from the citizens’ perspective; deliver what<br />

you promise; watch timing; be creative; balance different interests; be prepared for criticism; involve your<br />

staff; develop a coherent strategy; and act now!’ Communication practices have since developed in<br />

complexity, as sectors copy and recopy successful techniques of information distribution and the<br />

establishment of online communities of interest, practice and consumption. However, in contrast to nongovernment<br />

groups, the Taskforce Report identified the Australian Public Service (APS) as falling behind<br />

in engagement, missing the opportunities to unlock the ‘invention, creativity, and hard work of citizens,<br />

business and community organizations; and to ‘create public value’ (iii).<br />

Companies use social media and networked information distribution to develop new relationships with<br />

their customers and the communities where they operate. Business interest is growing in online brand<br />

communities and in the idea of developing customer competence so that sustainable networks can be<br />

established which include customers, employees, and the wider community. Importantly, Schau et al<br />

(2009) argue that value can be co-created. Using consumer culture literature, they argue that all<br />

collectives ‘exhibit community-like qualities, as understood by sociology, and address identity-, meaning-<br />

and status-related concerns for their participants’, continuing, ‘Moreover, this work suggests that such<br />

collectives provide value to their members through emergent participatory actions of multiple kinds and<br />

that consumer collectives are the site of much value creation.’ Values are changed by participation and<br />

co-creation in business practices (Benkler, 2006; Bauwens, 2007). Ten years ago, Web 1.0 government<br />

websites provided information with unintuitive navigation, and website design which was so text-based as<br />

to differ little from a government print brochure. Web page design has since improved and interactive<br />

features are being incorporated on a daily basis, and at more sophisticated levels of complexity on many<br />

government sites. This is a technology design change and a social one.<br />

2. Building new relationships with citizens<br />

The following examples are representative of the trend to change information culture and enable<br />

meaningful interactions between citizens and government workers through portals with a high<br />

interoperability. They demonstrate government’s commitment to engagement in key areas of citizen<br />

concern, tax and benefits.<br />

2.1 Australian Tax Office<br />

Transparency in taxation collection is an important feature of the relationship of trust between citizens<br />

and government. The Australian Tax Office (ATO) homepage offers citizens a clear step-by-step process<br />

for lodgement of tax returns, an online lodgement facility, tools and calculators, and FAQs. It offers a<br />

Twitter subscription, from which it sends a subscriber ‘no more than five tweets a day’ of the tax-related<br />

content which appears on news platforms, in publications, publicity campaigns, and ministerial speeches.<br />

Interactivity in terms of ATO responses to individual tweets is low. Return tweets are monitored weekly.<br />

The ATO promises not to ‘follow’ its subscribers (numbered 1842 in August, 2010). Project Wickenby, set<br />

up in 2006 and with operations’ leadership from the Australia Crimes Commission, represents its work as<br />

‘protecting the community’ on a related ATO website which documents the success of crime-prevention<br />

in tracking tax crime. These initiatives show the educational aspects and approachability of one of the<br />

main agencies through which citizens interact personally, and regularly, with government.<br />

2.2 Centrelink<br />

An important statuary government agency, Centrelink delivers a range of services in employment, tax,<br />

family and sickness and benefits. It reported six billion transactions annually in 2008 (Wadeson, 2008).<br />

291


Mary Griffiths<br />

Centrelink’s purpose is ‘serving Australia by assisting people to become self-sufficient and supporting<br />

those in need.’ Citizens are provided with choices from which they manage their own interactions with the<br />

agency. The growth of the Centrelink website demonstrates a neo-liberal approach as whether right or<br />

left-wing governments are in power, the focus is on information provision and the expectation that<br />

citizens will take up their own responsibility for conduct in the areas which the agency governs.<br />

Centrelink’s website developed a simple information provider online (in 1998, one year after its launch),<br />

to a dynamic portal with a range of potential interactions and feedback channels in 2011. Like the ATO,<br />

and most federal government sites, sixty-four community languages make it inclusive of multicultural<br />

Australia. Weblinks help citizens to link the homepage to their favourite social media sites, for example,<br />

Delicious, Facebook, StumbleUpon, LinkedIn and Twitter. Centrelink frequently adds new webpages and<br />

service information. For example, the Basics Card, a new service, is a PIN protected card, which assists<br />

subscribers to manage their own income, and any risky behaviour patterns. It permits all essential<br />

purchases such as food, clothes, health items and basic household products, but not alcohol,<br />

pornography, tobacco, gambling products or home brewing kits. Once a member of the Basics’ ‘brandcommunity’,<br />

a citizen is treated as a loyalty-card customer with special needs and rights. The adoption of<br />

viral advertising and social media marketing techniques works from a benefit, not deficit, model in the<br />

behaviour modification of citizens at risk. This approach helps citizens maintain a measure of control and<br />

self-respect, as recipients of government support.<br />

2.3 Victoria Online<br />

At state level, Victoria Online - ‘the fastest way to find local, state and federal government information<br />

and services’ - has developed from its 2008 minimalist approach, through including consultations on, for<br />

example, GIS data. The proof of concept trial on VisualPlace, even when ‘closed’ as a formal<br />

consultation, remains ‘open’ for comment, education and information. VictoriaOnline also supplies<br />

information about Australian government connections to social media: Twitter, (109 entries), Facebook<br />

(86 entries), MySpace (5 entries), Flickr (25), RSS (76 entries), Podcasts (20 entries), Video (60 entries),<br />

and YouTube (39 entries). This state example demonstrates the aggregator power of government<br />

portals. Through website descriptions of social media specifics, and notations of best practice use of<br />

social media, this site educates citizens in online risk management.<br />

The three examples above, ATO, Centrelink, and Victoria Online illustrate a policy framework aimed at<br />

developing co-ownership of national governance: citizens and governments working for mutual benefit in<br />

an integrated fashion. The two examples below show that ideas can be harnessed from the polity to<br />

improve the value chain in developing software applications.<br />

2.4 AppMyState<br />

AppMyState illustrates grassroots-citizen participation in Victorian state governance in the technology<br />

area. An innovative outreach competition in which citizens were invited to submit an idea for the design of<br />

a web or mobile application of benefit to Victorians, AppMyState ran for twelve weeks from April, 2010.<br />

Of the seven application winners, first prize was awarded for a phone application with a barcode scanner<br />

to assist people to recycle the right items, called ‘Which Bin?’ Other applications recognised included<br />

‘Transportle’ which tracked the best route from A to B in the city of Melbourne, and MymarketsVic, which<br />

used location tracking and user rankings to promote the pleasure and convenience of shopping in<br />

Victorian markets. AppMyState, an example of the crowd sourcing of good governance ideas, is a rich<br />

vein of citizen thinking about how public goods can be produced. Copied, it can build community capital<br />

elsewhere. It illustrates crowd-sourcing techniques.<br />

3. Raised expectations about inclusion<br />

As well as consultations and advice on the digital economy, social inclusion and sweeping change to the<br />

APS were strong messages after the 2007 election, as the Taskforce commentary above illustrates.<br />

When launching the Social Inclusion Toolkit on 20 th August 2009, Julia Gillard, then Minister for Social<br />

Inclusion, saw the social inclusion agenda as, ‘a whole of government effort, indeed an effort by all<br />

governments in this country, to bear down on both the causes and the consequences of long term<br />

disadvantage (Gillard, 2009).<br />

Falzon, a member of the Australian Social Inclusion Board (ASIB), explained the concept behind policy<br />

formation this way: ‘What it means is that this is really about ‘us’ not about some kind of imaginary ‘them’.<br />

It’s about all of us recognising that we have so much in common.’ He went on,<br />

292


Mary Griffiths<br />

First of all I would simply say that we’ve got to reclaim that sense of being in this together,<br />

this sense of the social, this sense that it’s not all about private interests, private gains; it’s<br />

about being in this together… So first of all there’s got to be that really strong change of<br />

consciousness, that sense of awareness. Secondly, we’ve got to act on it, we’ve got to<br />

embrace that sense of being in it together, of not leaving people out, not talking about ‘us’<br />

and ‘them’, but just we ourselves together. And thirdly, we need strong government<br />

leadership backed by strong public opinion to address those causes. (Falzon in ASIB, 2009)<br />

Australia was to be imagined as a strengthened, healthy democracy, with strong and reciprocal relations<br />

forged between citizens and government. To win in the so-called ‘YouTube’ election, the Australian Labor<br />

Party (ALP) had deployed the persuasive help of social media like My Space, YouTube and Facebook,<br />

creating new political commitment amongst the young (see also Macnamara, 2008). Kevin Rudd, the<br />

ALP leader, ran a presidential-style electoral campaign making sophisticated use of social media. Thus, a<br />

high level of ‘Obama-style’ expectancy was evident among political elites and the citizenry at large in late<br />

2007. On the part of government, there existed a commitment to technocratic means of providing<br />

solutions, which prioritized expertise and a speedier public service delivery of policy drafts and<br />

implementation. Why then implement the face-to-face Community Cabinets?<br />

4. Community Cabinets – a return to face-to-face<br />

‘it’s personal’<br />

‘..it’s really important that government does come to the people…’<br />

‘…it’s nice to see someone in the flesh rather than on the news…’<br />

‘…I think it’s a good sign of democracy.’ (Community Cabinet website 2008.)<br />

The Community Cabinets were designed because of Rudd’s published ‘commitment ensure consultation<br />

with the Australian people on the things which concern them whether they be national or local matters.’<br />

(Community Cabinet website, 2008) They were also a return to presidential ‘meet the people’ politics.<br />

Rudd chaired 24 ‘Community Cabinets’ (CC) to which most members of the Cabinet accompanied him.<br />

The events were community endorsement of a prime minister who was under attack within his own party.<br />

A recent biography of the former PM outlines the reasons for the personal difficulties that Rudd<br />

experienced blaming them on his leadership style (Sturt, 2010).<br />

The CCs were conceived of at the celebrated 2020 Summit and began in January 2008 in Canning Vale,<br />

Western Australia (WA). The last was held on June 9 th , 2010 in Perth WA, In between these dates<br />

Federal Cabinet crossed the Australian continent monthly. CCs were held in city suburbs, provincial<br />

towns and districts. Organising the online and offline features of such Cabinets was costly in terms of<br />

time and resources, not only because of the lengthy internal cross-Australia flights, but because of the<br />

security and numbers of staff involved. Online registrations were required by all citizens hoping to attend<br />

a CC. Background and police checks were conducted on those who wanted to meet government<br />

ministers for an individual meeting. Citizen applicants needed to provide advance notice online of the<br />

theme of their ministerial discussion, and a staffer would ring to check the details. Kevin Rudd chaired<br />

each CC and took randomly chosen questions from the floor. These he occasionally relayed to an<br />

appropriate minister. Staffers took notes on suggestions made.<br />

As feel-good government-community engagement they were on the whole mutually respectful events,<br />

and non-controversial enough - in their content - to draw little or only bemused media attention. The<br />

coverage by newspapers and television offered little detailed analysis, or much understanding of the<br />

opportunities offered by CCs.<br />

Rudd dominated the CCs, which were well attended. Policy areas such as Veterans’ Affairs, visas, or<br />

aboriginal health were discussed at a typical CC in South Australia. Follow-up to a citizen’s personal<br />

concerns was instantaneous, if possible, and included an answer, advice, or meetings with ministers.<br />

Crowd-sourcing ideas on policy was minimal. A question on the benefits of euthanasia and a query<br />

about whether relevant legislation would be introduced in future drew forth a personal memory fro the<br />

PM.<br />

They were resource-hungry. The expenses associated with CCs became a target of Coalition Opposition<br />

party attacks. Public servants from the Office of the Prime Minister and Cabinet, on the other hand, cite<br />

the numbers of citizens applying for attendance at the evening events, and point to the regular number of<br />

293


Mary Griffiths<br />

one-to-one conversations held with Ministers. Anna Bligh, the Queensland Premier copied the CC<br />

approach, running a number of CCs in regional towns.<br />

Overall the public effect achieved was of a government, in control, yet accessible at a personal level -<br />

without too much difficulty - to citizens. Despite the promising nomenclature, the Community Cabinet<br />

could be thought of as a sounding of citizen concerns, a gauging of popular opinion, rather than the<br />

through-going commitment to co-production of policy with citizens.<br />

5. Re-visioning the SA strategic Plan: A bi-annual consultation<br />

As engagement exercises, the 2010 South Australian community consultations were policy-focussed and<br />

peer events. Citizens’ ideas were collected, voted on, archived and would then have a direct impact on<br />

the words of themed planning documents. A transparent process involved the public servants as peers<br />

and partners in the open call to work on the South Australian plan.<br />

Participants were self-selecting: there was no vetting process, police checks or prior requests to register<br />

topics. The consultation themes were published online, well in advance of consultation events. Prior<br />

online discussion was invited, with moderators provided. YouTube-style videos by prominent SA figures<br />

and then, later, the videoed quotations of participants were used to encourage broad participation. At the<br />

‘Creativity and Innovation’ consultation, citizens (including public servants) were guided through an<br />

exercise in re-visioning the state by a professional consultant, an ‘honest broker’, before being asked to<br />

look at existing state targets, and the outcomes so far achieved in the SAPLAN documents.<br />

Using dotmocracy protocols, tables of citizen-peers drafted, discussed, eliminated and refined state<br />

targets, and identified potential metrics until the top three concepts emerged. By a process of displaying<br />

results, and voting with dots on paper, top-level group aspirations were identified, for publication online,<br />

further discussion, and implementation.<br />

At one panel, 100+ citizens worked on a set of targets over a morning session. There was time for<br />

individual reflection and small group deliberation. Later, online discussion boards continue on all themes<br />

and targets. The full set of ideas has been archived online, on an attractive social networking-style<br />

website. This facilitated an effect which social media expert Hopkins calls ‘brand evangelism’ (Hopkins,<br />

2009, 54), this time, it is citizen evangelism for a state.<br />

In comparison with the select groups attending CCs, the philosophy, tools used and organisational<br />

differences in SA are clear: collective motivation and participation seemed high; common broad goals<br />

were achieved; a de-politicised process took place; public servants assisted the process as citizen peers<br />

and sometimes experts; and a citizenry versed in democratic practices demonstrated its proficiency in the<br />

‘give and take’ of free discussion offline and online.<br />

6. Conclusion<br />

Australian governments have designed numerous projects to adapt to citizen expectations of information<br />

culture, with varied success. ICT uses include online management of face-to-face Community Cabinet<br />

consultations; the archiving of visual evidence of processes of policy consultations and the raw materials<br />

of discussions; the development of sophisticated test-beds and portals; the tentative use of social media<br />

to educate and network citizens; the adoption of viral marketing and social media techniques in managing<br />

risk; and the futures-oriented proposals of the Gov 2.0 Taskforce.<br />

Of all the projects discussed, the recent SAPLAN experimentation demonstrates many elements of viral<br />

online information culture, collaboration, and value creation (Rosen, 2007): transparency in the open call<br />

for contributions and ideas; a crowd-sourcing emphasis on treating participants, including public servants,<br />

as peers; an external moderator for multiple and inclusive public consultations; the visual display of<br />

participants’ ideas; and transparent voting on the value and ranking of proposals, using dotmocracy. In<br />

two years’ time, the exercise will occur again. Then, citizens will be able to judge how much of a<br />

difference their creative contribution has made.<br />

References<br />

Australia 2020 (2008) Summit Response on<br />

Governance.[online]http://www.australia2020.gov.au/docs/government_response/2020_summit_response_9_g<br />

overnance.pdf<br />

294


Mary Griffiths<br />

Australian Government (2009) Department of Innovation, Industry, Science and Research. Powering Ideas: An<br />

Innovation Agenda for the 21 st Century.<br />

http://www.innovation.gov.au/innovation/policy/pages/PoweringIdeas.aspx<br />

Australian Government Information Management Office (AGIMO) Policy Consultation [online]<br />

http://webpublishing.agimo.gov.au/Policy_Consultation.html<br />

-----, (2009) Engage: Getting on with Gov 2.0.<br />

[online]http://www.finance.gov.au/publications/gov20taskforcereport/doc/Government20TaskforceReport.pdf<br />

Bauwens, M. (2007). ‘The Political Economy of Peer Production’ [online] http://www.ctheory.net/articles.aspx?id=499<br />

Benkler, Y., (2006), The Wealth of Networks: How Social Production Transforms Markets and Freedom, Yale<br />

University Press.<br />

City of Campbelltown (2010) Online Citizens Panel.[online]<br />

http://www.campbelltown.sa.gov.au/site/page.cfm?u=1594.<br />

City of Ipswich (2010).Your Tutor.[online] http://library.ipswich.qld.gov.au/kids/yourtutor.htm<br />

Conroy, Stephen. (2010) Australia’s Digital Economy: Future Directions-Final Report [online]<br />

http://www.dbcde.gov.au/digital_economy/future_directions_of_the_digital_economy/australias_digital_econom<br />

y_future_directions/final_report<br />

Department of Broadband, Communications, and the Digital Economy, Australian Government Digital Economy Blog<br />

[online]http://www.dbcde.gov.au/communications_for_business/digital_economy/digital_economy_consultation/f<br />

uture_directions_blog<br />

____________. Future Directions for the Digital Economy.<br />

[online]http://www.dbcde.gov.au/digital_economy/future_directions_of_the_digital_economy/australias_digital_e<br />

conomy_future_directions<br />

Department of the Prime Minister and Cabinet. Community Cabinet. Australian Government.<br />

[online]http://www.dpmc.gov.au/community_cabinet/index.cfm.<br />

Gillard, Julia (2009) Social Inclusion.<br />

[online]http://www.socialinclusion.gov.au/Videos/SIToolkit/Pages/ToolKitP2.aspx).<br />

Grubb, B. (2010) ‘Govt 2.0 Report ‘Lacks Purpose and Aim’ ZDNet.com.au http://www.zdnet.com.au/govt-2-0-reportlacks-purpose-and-aim-339300788.htm<br />

Hopkins, L. (2009) Social Media: The New Business Communication Landscape. ARK, Sydney.<br />

Lessig, L., (2002), The future of ideas: The fate of the commons in a connected world, Vintage, New York.<br />

_________, (2008), Remix: Making art and commerce thrive in the hybrid economy, Penguin, NY and London<br />

McNamara, J (2009) ‘Australian Federal Government Online Public Consultation Trials: Local Learnings in e-<br />

Democracy’. ANZCAA09 Communication, Creativity and Global Citizenship: Refereed Proceedings. [online]<br />

http:anzacaao9.org<br />

NewsCorp.(2010)[online]http://www.newscorp.com/operations/newspapers.html<br />

Nielsen. (February 2010) The Australian Internet and Technology Report,2009-2010[online]<br />

http://www.agl.com.au/Downloads/Nielsen%20Internet%20and%20Technology%20Report%202009-<br />

2010%20FINAL.pdf<br />

OECD (2001) ‘Citizens as partners: OECD handbook on information, consultation, and public participation in policy<br />

making’.http://213.253.134.43/oecd/pdfs/browseit/4201131E.PDF<br />

Roberts, N. (2008) (ed) The Age of Direct Citizen Participation. Armonk ,NY &London: ME SHARPE, American<br />

Society of Public Administration Classics.<br />

Rosen, E. (2007) The Culture of Collaboration: Maximising Time, Talent and Tools to Create Value in the Global<br />

Economy. Red Ape Publishing: SF.<br />

SAPlan (2010) [online] www.saplan.org.au<br />

Shau, Hope J, Albert M. Miuniz Jr, & Eric J Arnould. ‘How Brand Community Practices Create Value.’ Journal of<br />

Marketing, Vol 5, No 5, 2009.<br />

Sheikh, Simon with Ian Marsh. (nd) A Blueprint for Australian Democracy: This Moment and the Renewal of<br />

Parliament, Government and Elections. GetUp! NewDemocracy.[online]<br />

http://cpd.org.au/wpcontent/uploads/2010/08/ablueprintforaustraliademocracy_small.pdf<br />

Sturt, Nicholas (2010) Rudd’s way: November 2007- June 2010, Scribe Publishing, Carlton North, Vic. Australia.<br />

Wadeson, John (2008) Seminar Presentation on Centrelink’s Interoperability, August 24. Access, Research,<br />

Knowledge (ARK) Seminars, Brisbane.<br />

Worthington Tom (2009) Mobile Government 2.0. Public Sphere #2- Government 2.0: Policy and Practice.<br />

[Online]http://www.katelundy.com.au/2009/05/29/public-sphere-2-open-government-policy-and-practice/<br />

295


Implementation of a Contact Centre in a Swedish<br />

Municipality<br />

Kerstin Grundén<br />

University West, Sweden<br />

kerstin.grunden@hv.se<br />

Abstract: Implementation of a contact centre (CC) in a Swedish municipality was analysed and discussed.<br />

Interviews were made with 16 respondents in different organizational units and positions. The implementation of CC<br />

was successful so far, but it will be a challenge to have continuous learning possibilities for the municipality guides, in<br />

order to avoid future monotonous work situations. There was an alternation between a top down and bottom up<br />

approach in the implementation work. There was even a need for increased focus on back-office and social aspects<br />

in the further implementation work. There was also a need to communicate personnel strategies related to the<br />

transfer of work tasks from the administrations and CC, in order to reduce anxiety and concerns about change of<br />

work situations for the handling officers. There were some problems with different mental images among the handling<br />

officers and the project management regarding the vision for the implementation. There was also a need for more<br />

co-operation between the project team and the handling officers in order to have a more homogenous<br />

implementation process at the different units. Furthermore, there was a need for increased competence development<br />

education of the handling officers. ELearning combined with group discussions could be relevant educational forms.<br />

Keywords: contact centre, eGovernment, implementation, municipality, evaluation, eLearning<br />

1. Introduction<br />

In this article we will analyze and discuss the implementation work of a contact centre (CC) in a Swedish<br />

municipality. The case study is part of a three-year research project Innoveta financed by Vinnova, and<br />

intends to support and evaluate the efforts of the municipalities to implement CC and e-services. The<br />

motivation for the project stems from the background aspects of access problems with very long waiting<br />

times for citizens needing to get in contact with a relevant handling officer for solving their personal<br />

matters. The long waiting hours could even lead to a drop of the call. Such drops of calls have been<br />

reduced from 15-20% to less than 10% due to the implementation of CC. The traditional bureaucratic<br />

structure of the municipal organization also had hampered the citizens’ understanding of the relationship<br />

between their needs and the organizational functions, a fact that had complicated contact even more. In a<br />

process-oriented organization the needs of the citizens are more focused. The customers should only<br />

need to make one contact with the municipality, in order to get their matters solved, instead of being<br />

juggled between different handling officers.<br />

The implementation of CCs in Swedish municipalities is inspired by the concept of a call centre. A call<br />

centre is a place where you deal with phone calls completely dependent on the use of IT. A call centre<br />

can be an internal function of an organization or an outsourced detached function. The use of the concept<br />

“contact centre” is more and more common indicating an extended function, not only focussing phone<br />

calls, but also other contiguous work tasks (Andersson, Bäck 2008). Office work is more and more<br />

decentralized and outsourced in the private sector to geographical areas with low salaries and real estate<br />

costs. It is not as easy to outsource activities within the public sector. The development of call centres in<br />

public sectors is especially influenced by aspects such as increased service and availability from a<br />

citizen’s perspective and internal efficiency.<br />

Implementation of eGovernment is often associated with increased customer availability to public eservices,<br />

but means also a fundamental organizational change of public organizations (Grönlund 2001).<br />

Implementation of CC is strongly related to implantation of eGovernment and contributes to increase<br />

customer availability to municipality services. There is, however, also a need for reorganization of the<br />

back-office routines in order to optimize the efficiency and quality aspects of the implementation of CC.<br />

The theories of New Public Management (NPM) have inspired some changes of organization and<br />

administration when eGovernment is implemented. According to NPM the use of lean and highly<br />

decentralized structures is stressed in public service, resulting in the breaking down of the former unitary<br />

bureaucracies (Homburg 2008). There is also emphasis on contract-like relationships and attention to<br />

management strategies, performance indicators and the service produced. The use of information and<br />

communication technology (ICT) is essential for this organizational transformation. In a virtual<br />

organization ICT mediates the communication among different units at different geographical locations.<br />

296


Kerstin Grundén<br />

The implementation of CC in the public sector is influenced by national policies and regulations. In a<br />

recent action plan the Swedish government stresses the importance of using ICT in order to effectively<br />

develop public administration (Regeringskansliet 2008). This could be done by combining organizational<br />

changes and new skills within the municipalities leading to improved accessibility and understanding. The<br />

278 municipalities in Sweden make up 70% of the total public administration and they are considered to<br />

be the closest to the citizens’ needs in terms of public service. They are governed by elected regional<br />

politicians and have a high degree of autonomy. The internal context of each municipality could be very<br />

different due to different geographical locations, different numbers and social structures of the inhabitants<br />

and different economic conditions. The service to the inhabitants concerns e.g. building permits,<br />

environmental permissions, matters regarding social services and schools, healthcare, day-care and<br />

welfare and booking of public halls.<br />

Swedish municipalities do not have a regulated obligation to set up offices or similar service places for<br />

their inhabitants. However, it is regulated by Swedish law that all Swedish municipalities should provide<br />

individual service, e.g. to meet visitors and to answer telephone calls from citizens. Such service should<br />

have as high a quality as possible from an economic resources perspective in the municipality. The<br />

development of eGovernment also varies to a great extent among municipalities.<br />

The main challenges for implementation of eGovernment seem to be the integration of front-end services<br />

with back end processes. According to a study of more than twenty governments in different countries<br />

Accenture (2007) found many governments at important crossroads. The main focus for public service<br />

organisations has been on improvements of front end services to the citizens, neglecting the importance<br />

of also aligning back end aspects.<br />

The main aim of this article is to analyze the implementation of CC in municipalities with focus on social<br />

implementation aspects such as strategies, participation, changes of work situations, competence<br />

development, attitudes and motivation.<br />

2. Research method<br />

The research method used in the case study were semi-structured interviews. The CC was launched in<br />

late 2010 and the interviews were made during the spring of 2010 with 16 managers, employees and<br />

trade union representatives at the CC, the technical and the social administrations of the municipality.<br />

The interviews were semi-structured and lasted about an hour. All interviews were recorded and written<br />

word-by-word. The analysis of the interviews was made by contents analysis.<br />

3. The municipality<br />

The studied municipality had a population of more than 100 000 inhabitants and was rapidly expanding.<br />

The municipality was situated in the middle of Sweden. Trade and industry were well diversified and<br />

represented many industries. The municipality was organized in nine operative administrations and<br />

departments. Most of these organizational units were led by a board or committee of political<br />

representatives. The departments and administrations carried out a wide range of operations such as<br />

childcare and care of the elderly, town planning, property management, traffic projects, street and road<br />

maintenance, water and sewage services, fire and rescue services, etc.<br />

4. The implementation process<br />

Some background aspects for the implementation were access problems with very long waiting times for<br />

citizens needing to get in contact with a relevant handling officer for solving their personal matters. The<br />

bureaucratic structure of the municipal organizations had also hampered the citizens’ understanding of<br />

the relationship between their needs and the organizational functions, a fact that further complicated the<br />

contacts. Another driving force behind the implementation was directives from the Swedish government.<br />

In the program formulated by the municipality a vision for the implementation was described. The image<br />

of the municipality should be profiled: service, meeting behavior towards the citizens, and availability. The<br />

use of IT should contribute to service production improvements.<br />

The discussions of consistent customer services were initiated in 2006 at the IS/IT department of the<br />

municipality during the procurement of a new telephone system. The concept of a “call center” was used<br />

in the initial discussions, but was later replaced with the concept of a “contact centre”. A pre-study was<br />

made with about 800 handling officers at the technical and social authorities. All incoming issues from<br />

citizens were classified by the handling officers according to the complexity of each matter. About 80% of<br />

297


Kerstin Grundén<br />

all matters (2.300) were classified as “simple matters”. The result from the pre-study was used as a basis<br />

for launching the implementation work of the CC. The project management was also inspired by the<br />

successful implementation of a contact centre in another municipality in Sweden.<br />

4.1 The implementation of the contact centre<br />

A qualified external manager was recruited for the implementation and management of the contact<br />

centre. The co-workers at the CC were recruited internally from the biggest administrations of the<br />

municipality. They were “handpicked” by the manager, and their most important qualifications were<br />

described as ”service minded”. About ten co-workers were recruited, mostly women. The recruited coworkers<br />

were called “municipality guides”. About six of the previous switchboard operators were also<br />

included in the organization of CC, but did not change their work roles. The municipality guides sat<br />

together in an open office. Their work tasks were mainly to answer simple phone questions from the<br />

citizens. They were given some initial internal training and after a few weeks the current work of the CC<br />

began. Employees from the different administrations informed and explained tasks that the municipality<br />

guides needed to know in order to answer the questions from the citizens correctly. The municipality<br />

guides could search in relevant home pages, in paper files and folders at their office, in order to answer<br />

the questions from the citizens.<br />

If handling of issues was required, the call was connected to a handling officer at the appropriate<br />

administration. It was still possible for the citizens to be connected directly to the handling officers at the<br />

different administrations, but there was a push to minimize such direct contact. The municipality guides<br />

were defined as generalists, according to the competence needs.<br />

The implementation of the CC was not externally marketed in the beginning. The only formal information<br />

about the CC was given by an automated telephone service when citizens called the municipality. There<br />

were separate dial tones for the switchboard and the CC. The phone calls to the municipality had<br />

decreased since the establishment of CC. The reason for the decrease of phone calls was interpreted as<br />

being due to fewer incorrect connections being made, and that the customers did not have to phone as<br />

many times as before. There were also fewer “lost calls”, according to the statistics. It was not possible<br />

for the citizens to visit the CC, but within a year the CC will be moved to the centre of the town, and then<br />

it will open for “face-to-face” visits by the citizens. The CC will then also be externally marketed.<br />

In order to initiate the co-operation among CC and the administrations, there was a need for anchoring<br />

the establishment of the CC with the different administrations, according to the manager of the CC. There<br />

was a need for a cultural change among the handling officers at the municipality administration, because<br />

of their traditional focus on internal processing instead of the needs of the citizens. The general culture of<br />

the municipality was to use few resources but with good cooperation considering the available resource<br />

and these ideas also influenced the implementation work, according to a respondent.<br />

An information system for registration of citizen’s questions and matters was developed using open<br />

source software as part of the Innoveta project. The system was not completed when the CC was<br />

launched, a fact that contributed to some user difficulties. The development work was made using agile<br />

work methods. Sometimes there were difficulties to co-ordinate the systems development work with the<br />

organizational development work, and resources had to be transferred from the development work to the<br />

work of the switchboard operators.<br />

The manager of CC was very appreciated by the municipality guides, and he described himself as an<br />

attentive, listening and guiding manager. He also supported a high degree of empowerment for the<br />

municipality guides at the CC. He was striving for a balance between formal and informal work routines,<br />

in order to produce high quality service for the citizens.<br />

The municipality guides at the CC seemed to like their work, according to the interviews. However, they<br />

still met new challenges and there were new questions to be answered in their work. Their work was<br />

individually oriented but the municipality guides tried to solve problems together, and help each other.<br />

Every municipality guide had an individual field of responsibility and a department that they had more<br />

close contact with than others. The departments had contact persons who participated in meetings with<br />

the municipality guides. The co-operation between the CC and the department could be discussed at<br />

such meetings. Work tasks that could be transferred from the department to the CC could be discussed<br />

and specified. The municipality guide then transmitted the information from the meeting to the other<br />

guides at the CC.<br />

298


Kerstin Grundén<br />

The municipality guides did not generally receive any feed-back from the handling officers at the<br />

administrations, when a matter was solved. Citizens could however ask the municipality guides about<br />

matters that not had been solved in time. It could be somewhat frustrating for the municipality guides to<br />

depend on other’s work in this way, when they not could affect the work of the handling officers.<br />

4.2 The implementation at the administrations<br />

4.2.1 The implementation at the technical department<br />

The implementation at the technical department was initiated with information from the project<br />

management and discussions with the top management of the technical administration. Then the local<br />

managers at the administration were supposed to pass the information on to their employees in the<br />

organisation. According to the initial information given, the handling officers at the administration should<br />

receive fewer phone calls when the CC was implemented. The municipality guides were supposed to<br />

inform the citizens about information that already existed on the home page of the municipality. There<br />

were no pressures on the administration to transfer work tasks to the CC. Instead the administrations<br />

were supposed to analyse such issues themselves, and suggest suitable work tasks to transfer.<br />

The amount of work tasks transferred from the administration to the CC varied among the different<br />

administration units. The administration unit dealing with land and utilization had transferred more work<br />

tasks compared with the unit dealing with property management. For example, this unit had also started<br />

to develop e-services. The unit that not had transferred many services stressed the fact that many<br />

questions from the citizens were about contracts and required a high level of expert-knowledge to be<br />

answered correctly.<br />

Initially, there were some concerns among the employees about what would happen with their jobs when<br />

the CC was implemented. Their fears were however reduced, when they realized that they could<br />

influence which work tasks were to be transferred and that their own work still seemed to be needed.<br />

Most of the respondents at the unit had a positive attitude towards the CC, but initially one unit did not<br />

want to co-operate very much. They were used to having a very independent work situation and were not<br />

available for the citizens during coffee breaks, for example.<br />

There were varied opinions as to whether the implementation of the CC had led to a reduction of calls for<br />

the handling officers at the unit. Some respondents meant that there was no need to transfer more work<br />

tasks to the CC, and meant that the work division already was optimal, although there was processmapping<br />

of more complex work tasks going on. Others showed more optimistic attitudes.<br />

4.2.2 The implementation at the social department<br />

The political decision about launching a CC in the municipality was already taken, when the top<br />

management was informed. It did not make sense then to argue against the decision, a respondent<br />

pointed out. Instead of first launching a CC and then trying to find motives to defend the decision, the<br />

reverse order would have been better, according to the respondent. There was not any intrinsic<br />

resistance among the employees towards the decision, but the researchers had difficulties getting<br />

interview respondents at the unit. Four proposed respondents declined interviews or were otherwise<br />

unavailable.<br />

The amount that the administrations should contribute for financing the CC was based on the results from<br />

the initial pre-study. The relevance of the study was however discussed, especially at the social authority.<br />

Some employees questioned whether all respondents had used the same basis for the classifying of<br />

different matters, for example. However, they had not found any relevant model at the department for<br />

specifying work tasks that could be transferred to the CC. The work at the unit was characterized by a<br />

high level of exercising public authority, legal security, and integrity for the clients. The matters of the<br />

clients required professional judgement and therefore it could be difficult to transfer such matters to the<br />

CC. “There are no simple solutions”, a respondent stressed.<br />

According to a respondent many employees at the unit were anxious and feared that their work tasks<br />

would “disappear”. In the long run, the saving requirements could lead to a reduction of reception clerks<br />

at the unit, according to a respondent. But the local receptions at the unit need to be manned even if the<br />

work of the local receptionists was reduced.<br />

299


Kerstin Grundén<br />

The knowledge about the implementation of the CC varied a lot among the respondents at the unit. One<br />

respondent stressed that there are many employees working as assistant nurses at local work units that<br />

did not even now about the CC yet. The involvement by the contact persons from the unit in the<br />

implementation work seemed to have been rather low.<br />

5. Discussion<br />

5.1 The implementation work<br />

The implementation strategy of the municipality seemed to be inspired by the general culture of the<br />

organization. The ambition was to use few resources but with good cooperation considering the available<br />

resources. The establishment of the CC was made in a very smooth way. There were no initial external<br />

marketing of the CC for example. Transfer of work tasks from administrations to the CC usually start with<br />

the technical department, due to the formal character of much information and work tasks related to their<br />

field. It is more difficult to transfer work tasks from social services, related to issues of integrity,<br />

regulations and law. But the social department seemed to be forced to transfer work tasks because of the<br />

amount that the administration should contribute with to the work of CC.<br />

The management strategy of the implementation work in the case study seems to alternate between top<br />

down and bottom up strategies. The decision making regarding the establishment of the CC was made at<br />

the political and top management level, but the realization of the transfer of work tasks from the<br />

administrations to the CC was left for the administrations to judge (bottom-up). A combination of a topdown<br />

and bottom-up strategy could have been an alternative strategy.<br />

The implementation strategy chosen is often a consequence of the prevailing organisational culture and<br />

decision-making processes in the organisation. Changes in municipality organisations are often<br />

influenced by established tradition (Bergström 2002). The implementation strategy at the municipality<br />

could have both advantages and disadvantages. The top-down strategy could be relevant in order to<br />

“make the change happen”, but a lack of participation could contribute to a sense that “the<br />

implementation has nothing to do with my work” and affect the willingness to contribute to the change.<br />

The management strategy of the implementation could thus affect the employees’ competencies and<br />

motivation. Participation in implementation work could instead increase motivation and reduce resistance<br />

towards change (Angelöw 1991). Participatory design has a long tradition (Kensing & Blomberg 1998),<br />

especially in Scandinavia (Scandinavian Journal of Information systems 1994). Participation of all users<br />

is however difficult to put into practice in large organisations. Representative participation could be used<br />

in such organisations when many users are affected by a new system or changes to systems (Ranerup<br />

1996). The organisation and forms of participation and change work could probably be developed and<br />

extended with relevant group discussions and competence development in order to include all users in<br />

new ways. Participation in the implementation process could be a way to learn and develop competence<br />

for the users. If the implementation work also focuses on organisational and competence issues then the<br />

mutual understanding of the different responsibility fields and changed work roles increase during the<br />

analysis work. Such an analysis of the work process could be a relevant basis for learning in the<br />

implementation work (Svensson & Åberg 2001).<br />

5.2 Increased focus on back-office and social aspects<br />

There is a need for increased focus on back-office and social aspects in the further implementation work<br />

at the municipality. Implementation of eGovernment has earlier been criticised for focussing too much on<br />

technical aspects (Grönlund 2001, Schedler and Summermatter 2003, Kifle and Low Kim Cheng 2009),<br />

thereby ignoring the importance of social aspects. According to a study of Accenture (2007) many<br />

governments face great challenges in order to integrate back-office aspects in the eGovernment<br />

development. According to the study of Accenture (ibid.) many governments have tended to<br />

underestimate the importance of attitudes and change of the work for employees, when eGovernment is<br />

implemented.<br />

Many handling officers seemed to react with initial anxiety and fear of the effects on their jobs, when work<br />

tasks were transferred to the CC. Their worries seemed to have been reduced when the handling officers<br />

realized that their jobs were still needed. There seemed not to have been clear strategies from the project<br />

management as to how to handle such issues. Such worries could probably have been reduced at an<br />

earlier stage, if clearer personnel strategies were formulated and communicated from the project<br />

management. It is not unusual however, that project management makes a stand by not emphasizing<br />

300


Kerstin Grundén<br />

such aspects, in order to eliminate potential conflict aspects in the implementation work of eGovernment.<br />

There is a tendency for “problematic silences” of such issues in implementation of eGovernment,<br />

according to Seyfyrin and Mortberg (2009). The project management seemed to be afraid that such<br />

aspects could contribute to increased anxiety and fear among the employees concerned. Instead such a<br />

strategy could have reverse effects. Important aspects that are not clearly formulated in the<br />

implementation work could contribute to uncertainty and lack of motivation. If all expected consequences<br />

of the implementation were more clearly formulated and discussed in a dialogue with the employees<br />

concerned, the sense of uncertainty could be reduced and affect motivation. Such a dialogue could be<br />

the basis for a strategy formulated for how to deal with the issues. Usually there are many employees<br />

retiring in the coming years in public organisations, and some strategies could be to not refill their<br />

positions changes of the current work division for example to enrich work situations with new work tasks<br />

or work rotations for the handling officers affected.<br />

5.3 The work situations for the municipality guides<br />

There are documented common risks with work in call centers as being monotonous, stressful and<br />

lacking variation (Tengblad et al 2002). The employees are generally women sitting in open offices,<br />

bounded to their work most of the day answering a lot of phone calls. The municipality guides were<br />

however, very satisfied with their work situations hitherto, and motivated to produce efficient service with<br />

high quality to the citizens, according to the interviews. There were still new questions to be answered<br />

and new competence challenges in the work. According to an evaluation study of the implementation of<br />

the CC in other municipalities (Grundén 2010a), there had been fears of increasing monotony and a lack<br />

of variation in the work situations when the “honey moon” was over. A lot of attention is generally given to<br />

the work of the municipality guides when a CC is launched, but it is a challenge to have continuous<br />

learning possibilities. The initial strong focus on the work of the municipality guides could contribute to the<br />

so-called Hawthorne-effect (Mayo, 1949), and increase the initial motivation of the work.<br />

5.4 Information and education<br />

The respondents in the study had very different views of the ambition and vision for the implementation<br />

work compared with the vision formulated by respondents from the project management. A common<br />

mental image facilitates the communication and dialogue in the implementation work. There is also a<br />

need for an understanding of connections between the internal implementation of eGovernment in the CC<br />

and external tendencies within the field. Lack of relevant competence and knowledge could contribute to<br />

misunderstandings, fears, lack of motivation and negative attitudes towards the implementation.<br />

There seemed to be a need for more information and education of the handling officers at the<br />

municipality in order to increase their competencies about implementation of the CC and eGovernment<br />

both from an internal and external perspective. ELearning could be a relevant educational form for such<br />

competence development in combination with group discussions. When eLearning courses are<br />

developed they could easily be spread to many users located at different geographical locations of the<br />

organization, and the studies could be made at different points in time. In-house development of<br />

eLearning education becomes more and more common, especially for larger organizations that can<br />

afford the development and production costs (Nunes et al 2009). A development strategy of such courses<br />

could be to co-operate with other municipalities in the same situation.<br />

According to an earlier study by Grundén (2010b) an eLearning course for competence development of<br />

handling officers at the County Administration of Sweden was developed and evaluated. The focus of the<br />

course was both internal and external aspects regarding the implementation of eGovernment. The<br />

pedagogy approach of the course was inspired by study circles. Study circles have a long tradition within<br />

the Swedish popular movement and have frequently been used by educational associations. Study<br />

circles have also been used in working life, most often as a complement to other change activities<br />

(Erikson & Holmer 1991). A study circle usually consists of a smaller group with a study leader, who is<br />

more of a co-ordinator than a teacher. The study circle often has a generally formulated subject for study,<br />

but the participants can decide what aspects of the subject they will study more thoroughly. Study circles<br />

could be a relevant pedagogical approach for learning together in a community of practice (Lave &<br />

Wenger 1991). Study circles could support productive reflection at work emphasizing the social collective<br />

aspects of reflection; people reflecting together in the workplace (Boud et al 2006).<br />

301


6. Conclusions<br />

Kerstin Grundén<br />

There was a need for increased focus on the back-office and social aspects in the further implementation<br />

work at the municipality. The implementation of the CC was successful so far, but it will be a challenge to<br />

have continuous learning possibilities, in order to avoid a future monotonous work situation for the<br />

municipality guides. There is also a need for the project management to articulate and communicate<br />

personnel strategies related to the transfer of work tasks from the administrations and the CC, in order to<br />

reduce anxiety and concerns about the change of work situations for the handling officers.<br />

The implementation strategy of the CC alternated between top down and bottom up strategies. There<br />

seems to be a need for more co-operation and dialogue among the project team and the administrations,<br />

in order to have a more homogenous implementation process at the different units. There were some<br />

problems with different mental images of the vision for the implementation among the handling officers at<br />

the administrations and the project management. There was also a need for competence development of<br />

the handling officers in order to develop their competencies about implementation of the CC and<br />

eGovernment. ELearning combined with group discussions could be relevant educational forms for such<br />

competence development.<br />

References<br />

Accenture (2007) Leadership in Customer Service: Delivering the Promise. [Electronic source]: www.accenture.com<br />

[2010-02-01]<br />

Andersson, Bäck, M. (2008) Conceptions, conflicts and contradictions at the introduction of a Swedish Health Care<br />

Centre. <strong>Academic</strong> thesis. University of Gothenburg, Department of Work Sciences.<br />

Angelöw, B. (1991) Det goda förändringsarbetet. Om individ och organisation i förändring. Studentlitteratur, Lund.<br />

Bergström, T. (2002) Organisationskultur och communal förnyelse. Förändring i gamla hjulspår? Liber AB, Malmö.<br />

Boud, D., Cressey, P., Docherty, P. (2006) Productive Reflection at Work. Learning for changing organizations.<br />

Routledge, London,<br />

Erikson, K., Holmer, J. (1991) Studiecirklar som stöd för förändring i arbetslivet, report No. 9, University of<br />

Gothenburg, Institution for Pedagogik.<br />

Grundén, K. (2010a) “Evaluation of contact centre implementation in a Swedish municipality with focus on social<br />

aspects”. O’Donnell, D. (ed.) Proceedings of the 10 th <strong>European</strong> <strong>Conference</strong> on eGovernment, National Centre<br />

for Taxation Studies, University of Limerick, Ireland, 17-18 June, Intellectual Capital Research, Limerick,<br />

Ireland: <strong>Academic</strong> Publishing International.<br />

Grundén, K. (2010b), “A Study Circle Approach for Competence Development of EGovernment”. EGOV2010, 29 th<br />

Aug. – 2 nd Sept. Chappelet, J-L., Glassey, O., Janssen, M. Macintosh, A., Scholl, J., Tambouris, E. and<br />

Wimmer, Maria, A. (eds.) Electronic Government and Electronic Participation. Joint Proceedings of Ongoing<br />

Research and Projects of IFIP EGOV2010 and ePart 2010, Lausanne, Schweiz.<br />

Grönlund, Å. (2001) “En introduktion till electronic government”. In Grönlund, Å. and Ranerup, A. (eds.) Elektronisk<br />

förvaltning, elektronisk demokrati. Visioner, verklighet, vidareutveckling. Studentlitteratur, Lund.<br />

Homburg, V. (2008) Understanding eGovernment. Information systems in public administration. Abingdon, Oxon,<br />

Routledge.<br />

Kensing, F. and Blomberg, J. (1998) “Participatory Design: Issues and Concerns”. In Computer Supported<br />

Cooperative Work, Vol. 7, No. 3-4, pp 167-185.<br />

Kifle, H., and Low Kim Cheng, P. (2009) “eGovernment Implementation and Leadership – the Brunei Case Study”. In<br />

Electronic Journal of eGovernment (EJEG), Vol. 7, Issue 3, pp. 271 – 282.<br />

Lave, J. And Wenger, E. (1991) Situated learning: Legitimate Peripheral participation, Cambridge University Press,<br />

Cambridge, United Kingdom<br />

Mayo, E. (1949) Hawthorne and the Western Electric Company, The Social Problems of an Industrial Civilisation,<br />

Routledge.<br />

Nunes, M., McPherson, M., Annansingh, F., Bashir, I. and Patterson, D. (2009) “The use of eLearning in the<br />

workplace: a systematic literature view”. In Impact: Journal of Applied Research in Workplace ELearning, Vol ,<br />

No. 1, pp 97-112.<br />

Ranerup, A. (1996) Användarmedverkan med representanter. Ak. doktorsavhandling. Göteborgs Universitet.<br />

Gothenburg studies in informatics, 1400-741X;9<br />

Regeringskansliet (2008) Handlingsplan för eFörvaltning. Nya grunder för IT-baserad verksamhetsutveckling.<br />

Available 2010-11-23: www.regeringen.se.<br />

Schedler, K. and Summermatter, L. (2003) ”eGovernment: What Countries Do and Why: A <strong>European</strong> Perspective”. In<br />

The World of eGovernment. Curtin, G.C., Sommer, M.H. and Vis.-Sommer, V. The Haworth Political Press.<br />

Sefyrin, J. and Mortberg, C. (2009) ”We do not Talk about this: Problematic silences in eGovernment”. In Electronic<br />

Journal of eGovernment (EJEG), Vol. 7, Issue 3, pp. 259 – 270.<br />

Svensson, L. and Åberg, C. (2001) ELearning och arbetsplatslärande. Bilda Förlag, Stockholm.<br />

Scandinavian Journal of Information Systems (1994)<br />

Tengblad, P., Wiberg, A., Herrman, L. and Backström, M. (2002) ”Hållbart arbete i informationssamhället. Call centre<br />

i utveckling”. In Call centre i utveckling – långsiktigt hållbart arbete med kunder på distans. Vinnova report VR<br />

2002:7.<br />

302


An Outline of the Technical Requirements on<br />

Governmental Electronic Record Systems Derived from the<br />

<strong>European</strong> Legal Environment<br />

Bernhard Horn, Gerald Fischer, Roman Trabitsch and Thomas Grechenig<br />

(INSO), Vienna University of Technology, Vienna, Austria<br />

bernhard.horn@inso.tuwien.ac.at<br />

gerald.fischer@inso.tuwien.ac.at<br />

roman.trabitsch@inso.tuwien.ac.at<br />

thomas.grechenig@inso.tuwien.ac.at<br />

Abstract: In modern e-government administrations, regulatory documents are not only drafted using computer<br />

tools but are increasingly managed using Electronic Record Systems (ERS). Such tools mean that coordination<br />

and administrative procedures do not only have to occur via e-mail or similar technologies. To execute the next<br />

administrational step using traditional methods, each officer has to know the inner organisational workflow and<br />

therefore those clerks responsible for performing the next administrational step to be able to forward the record to<br />

the correct person. Though till now this way of working has been quite common in many official organisations,<br />

there are a considerable number of software products available, which implement ERS, to assist performing<br />

administrative procedures electronically. When an officer has finished his respective process step, such a system<br />

automatically forwards the documents to the next responsible person. Moreover if several clerks have to perform<br />

a step in parallel, it is not necessary to copy the whole file several times but only to grant appropriate access<br />

permissions to the documents. Thus at any moment, everyone has the record in its latest version. Furthermore<br />

the whole administrative act can be tracked and monitored. It is important to remember however that within the<br />

<strong>European</strong> Union a couple of regulatory rules have to be obeyed when implementing and using such ERS. The<br />

providers of such systems as well as the authority using them are responsible for ensuring legal conformity. The<br />

aim of this paper is to give a brief overview of the applicable <strong>European</strong> regulations concerning ERS for<br />

responsible stakeholders, such as IT-system designers and providers, administration chiefs, or researchers in the<br />

field of e-government.<br />

Keywords: <strong>European</strong> legal framework, public administration, governmental electronic record systems, data<br />

protection directive<br />

1. Basics of the <strong>European</strong> legal system<br />

The <strong>European</strong> Union’s legal order differentiates between Primary Law and Secondary Law. Primary<br />

Law represents all the contracts signed by the Member States concerning the <strong>European</strong> Communities<br />

and the <strong>European</strong> Union. Since the commencement of the Treaty of Lisbon on December 1, 2009, in<br />

practice the most relevant of these contracts are the consolidated versions of the Treaty on the<br />

<strong>European</strong> Union, the Treaty on the Functioning of the <strong>European</strong> Union (2010/C 83/01) as well as the<br />

Charter of Fundamental Rights of the <strong>European</strong> Union on behalf of Article 6 of the Treaty on the EU<br />

(Westphal in Bauer and Reimer, 2009: 63-68).<br />

However, Secondary Law is based on Primary Law and is established by the organs of the <strong>European</strong><br />

Union within an accurately defined process constituted by Primary Law. The fundamental instruments<br />

of Secondary Law are the <strong>European</strong> regulations and directives. Regulations are applicable in each<br />

Member State directly and without any legislative transformation process. In contrast to regulations,<br />

directives only set regulatory objectives, which have to be accomplished by the Member States by<br />

legislating corresponding national law and regulations. Thus directives have to be transformed by<br />

each national legislator into national law (Streinz, 2008: 145-153).<br />

Three directives were identified as being applicable to administrative procedures supported by<br />

governmental ERS: the Data Protection Directive (95/46/EC), the <strong>European</strong> Directive on Electronic<br />

Signatures (1999/93/EC) and for some cases even the Electronic Commerce Directive (2000/31/EC).<br />

But as described above, these directives are not applicable directly and must be transformed into<br />

corresponding national legislation. Nevertheless by looking at these directives, legislative minimum<br />

standards can be discerned and the relevant national regulations to be found and obeyed can be<br />

identified (Streinz, 2008: 150-153).<br />

303


2. The data protection directive<br />

Bernhard Horn et al.<br />

The EU Data Protection Directive (DPD, 95/46/EC) contains the most relevant regulations.<br />

Summarized, this directive governs the processing of personal data irrespective of the way and<br />

method of processing (electronically or manually) (Recital 27), the purpose, area and industry, public<br />

or private sector (Recital 5 and 30) as well as whether this happens by a natural or juridical person.<br />

Thus the directive lays down general rules for processing personal data independent from the area of<br />

life or special circumstances. Because personal data processed within an ERS are to be seen as a<br />

structured set of personal data accessible according to specific criteria, such systems are to be seen<br />

as a “personal data filing system” in the sense of Article 2 subparagraph c DPD. As a consequence<br />

the DPD is relevant for the implementation and operation of ERS (Ehmann and Helfrich, 1999: 76-79).<br />

2.1 Applicability and implementation of the DPD<br />

Article 2 subparagraph a defines “personal data” as ‘any information relating to an identified or<br />

identifiable natural person ('data subject')’, irrespective of whether the person can be identified directly<br />

or only indirectly 'by reference to an identification number (e.g., passport, driving license, student<br />

number, national insurance number, etc.)'. The correlation’s intensity may vary case-by-case, but if<br />

the appropriate individual can be identified from the data, the DPD regulations are applicable. The<br />

legal term “processing of personal data” means ‘any operation or set of operations which is performed<br />

upon personal data, whether or not by automatic means, such as collection, recording, organization,<br />

storage, adaptation or alteration, retrieval, consultation, use, disclosure by transmission,<br />

dissemination or otherwise making available, alignment or combination, blocking, erasure or<br />

destruction’ (Article 2 subparagraph b).<br />

Thus the DPD is also applicable to the processing of personal data in (ERS-supported) administrative<br />

procedures, because in such procedures usually data that can refer to a definite individual as a data<br />

subject (e.g., party, national, litigant, etc.) are processed. But the directive is not applicable to any<br />

processing in the course of an activity which falls outside the scope of (EC-) Community law like<br />

public security, defence and State security. Nevertheless the DPD’s regulations can be relevant for<br />

data processing within authorities, if such a processing does not concern one of the mentioned<br />

governmental core tasks.<br />

2.2 Definition of actors and roles<br />

After analysing the applicability of the DPD, the participating actors and their roles in the entire<br />

processing have to be identified and assigned in a second step. Certain rights and obligations arise,<br />

dependent on the role of the actors (Jahnel, 2010: 96).<br />

The Data Controller is that actor for whose purposes and advantages the processing of personal data<br />

occurs. This could be ‘a natural or legal person, public authority, agency or any other body which<br />

alone or jointly with others determines the purposes and means of the processing of personal data’<br />

(Article 2 subparagraph d). In the case of processing personal data within a (ERS-supported)<br />

governmental procedure, the Controller is the concerned authority. So this authority is responsible<br />

that the processing of personal data is conducted according to the applicable regulations.<br />

Nevertheless the Controller is legally allowed to outsource the processing to another third party. Such<br />

a third party is termed Processor by legal definition (Article 2 subparagraph e) and could be either a<br />

private company or another authority. The Processor is only allowed to process the disclosed<br />

personal data according to the contract to be concluded between Controller and Processor (or any<br />

other legal act like a decree) and therefore acts like the Controller’s “elongated arm” (BSI, 2002: 21-<br />

22). However the responsibility for the legal conformity, reliability and security of the data processing<br />

remains with the Controller. (Ehmann and Helfrich, 1999: 242-243; Graf, 2010: 46)<br />

(Natural) persons, whose data are processed by or on behalf of the Controller, are termed Data<br />

Subjects.<br />

2.3 Legal requirements for the legitimacy of processing personal data<br />

The fundamental principle of processing personal data is that such processing is basically prohibited<br />

unless a legal exception is applicable. (Knyrim, 2003: 8)<br />

304


Bernhard Horn et al.<br />

Such legal exceptions can be found in Article 7 of the DPD and are to be transformed into national<br />

law. In the environment of (ERS-supported) governmental procedures such exceptions could be: a)<br />

the data subject's informed consent, c) ‘processing is necessary for compliance with a legal obligation<br />

to which the controller is subject’ or e) ‘the processing is necessary for the performance of a task<br />

carried out in the public interest or in the exercise of official authority vested in the controller or in a<br />

third party to whom the data are disclosed’ (Article 7). Because of the principle of mandatory<br />

prosecution, in most cases exceptions to this prohibition will be found in national legal regulation.<br />

2.4 The principles relating to data quality<br />

In addition to observing the above-mentioned legal requirements, regulatory regulations concerning<br />

data quality have to be obeyed. To do this, Article 6 defines five fundamental principles (Dammann<br />

and Simitis, 1997: 139-143; Ehmann and Helfrich, 1999: 111-117):<br />

Fair and lawful processing: If none of the other principles is applicable, this principle ensures a<br />

lawful processing of personal data as a general rule. For instance, this prevents the secret<br />

collection of personal data using special technical tools without the Data Subject’s notice.<br />

Principle of legitimate purposes: This principle lays down that personal data may only be<br />

‘collected for specified, explicit and legitimate purposes and not further processed in a way<br />

incompatible with those purposes’. Therefore it is illegitimate to collect any personal data in<br />

advance or for indefinite purposes. Thus before the recording of personal data is started, the<br />

purposes, (legitimate) objectives and scope of the processing have to be defined (BSI, 2002: 37).<br />

Principle of proportionality: This principle restricts the extent to which personal data can be<br />

collected legitimately and recorded to serve the defined purpose as mentioned above. Excessive<br />

collecting of personal data therefore is prohibited and shall protect data subjects from sprawling<br />

data recording.<br />

Principle of factual validity and actuality: Not only data provide information, but also the context in<br />

and extent to which data are processed. So in several cases data may not provide accurate<br />

information if the recording of certain details is omitted. A relevant factor in this context<br />

concerning the accuracy of personal data is time, because the background of processed data<br />

may have changed since they had been recorded. So in such cases personal data must always<br />

be updated, as necessary, to meet the purposes for which the data are to be processed.<br />

Principle of mandatory deletion: The last principle of Article 6 is the obligation to delete personal<br />

data irretrievably, if the purpose for which the data have been recorded is accomplished (e.g., the<br />

legal time span for mandatory archiving has expired). Therefore personal data may only be ‘kept<br />

in a form which permits identification of data subjects for no longer than is necessary for the<br />

purposes for which the data were collected or for which they are further processed’. So for that<br />

reason an anonymisation of such data would be conform to this principle as well (Ehmann and<br />

Helfrich, 1999: 75, 117).<br />

If no ERS is used, practice has shown that in many cases such mandatory deletions do not occur. If<br />

the personal effort necessary for doing this is taken into account, it is much cheaper to procure<br />

extended disk space instead of searching the whole stock of electronic files for those files to be<br />

deleted. To support an authority in complying with the last mentioned principle, an ERS could provide<br />

the functionality of an automated deletion at a definite date, such as if the period of time for which the<br />

data archiving is required by law has passed (This may also occur after an acknowledgement.). To do<br />

this, the records could be classified according to their mandatory period for archiving and would be<br />

deleted if this period expires.<br />

2.5 The gap between legal regulation and feasibility<br />

As mentioned above, in certain cases there is an obligation to delete files or specific documents/data<br />

within such files. At first glance such a legal regulation seems to be simple and plausible, but on<br />

closer examination certain difficulties become manifest concerning its technical implementation.<br />

Article 2 subparagraph b also legally defines the processing of personal data as the blocking, erasure<br />

or destruction of such data. Now in this context the question arises: Which action has to be performed<br />

so that the “processing” of personal data is terminated?<br />

The German Data Protection Act (BDSG) defines “blocking” as an action which denotes the<br />

appropriate data as blocked. As a result such data can no longer be accessed, used or processed by<br />

305


Bernhard Horn et al.<br />

the users (e.g., within an ERS). But such data are still stored in the database or similar data storages<br />

and as a consequence available to the Controller, though direct access is no longer possible. In<br />

effect, only blocking personal data does not lead to the termination of processing (Simitis, 2003: 267-<br />

268).<br />

Afterwards the question has to be discussed, whether it is sufficient to delete personal data logically<br />

(e.g., using the operation system’s standard deletion functionality) or whether an irretrievable deletion<br />

(destruction) is necessary. Recently this question was resolved by a judgement in the Austrian<br />

Supreme Court (April 15, 2010, 6 Ob 41/10p): The processing of personal data terminates only then if<br />

the data are destructed irretrievably. If such data are deleted by using the operating system’s function,<br />

such data will only be interpreted as being deleted, but in fact not destroyed. According to the first<br />

method of deletion there is no recognizable difference from “blocking” the data, because the<br />

Controller still (in most cases) is able to recover such data by using special recovery software.<br />

Therefore only blocking direct access does not fulfil the requirement of an irreversible deletion<br />

(Jahnel, 2010: 159).<br />

Furthermore the implementation of backup strategies can lead to considerable problems concerning<br />

the irreversible deletion of data. Article 17 requires the Controller to implement any technical solution<br />

to avoid accidental or unlawful destructions or accidental losses of personal data. To fulfil this<br />

obligation, in many cases the whole data stock is copied and saved to backup volumes. Now if certain<br />

data have to be deleted, it is not adequate to oblige the Controller to process such a deletion in all<br />

backup volumes in addition to the regular data store. In such cases, it is therefore only necessary to<br />

delete such data in the regularly used database, but those data also have to be deleted in backup<br />

volumes as soon as possible (Simitis, 2003: 270-271). If there is only a limited number of backup<br />

volumes used, this could be done by letting the data to be deleted be “outgrown” out of the backup<br />

data stock. Using this procedure, restore cases have to be considered to avoid data to be deleted<br />

from being restored into the regular data stock.<br />

Though considering all these cases and circumstances, many situations still remain in which a<br />

permanent and entire deletion of personal data is nearly not feasible. Nowadays data storage is not<br />

only performed on central hosts, but also decentralised on ambiguous storage media like local copies<br />

on employees’ PCs, online-drives, online-storage, network components, caches, flash drives,<br />

mobile/smart phones, temporary files and so on.<br />

2.6 Publicity and monitoring of the processing of personal data<br />

To ensure the legitimate processing of personal data and the Data Subject’s fundamental right of<br />

privacy, the DPD provides two different instruments:<br />

2.6.1 Publicity and monitoring by the supervisory authority<br />

Pursuant to Article 28 each Member State has established an independent supervisory authority to<br />

monitor the legal conformity of the processing of personal data generally. For this reason ‘the<br />

controller or his representative, if any, must notify the supervisory authority referred to in Article 28<br />

before carrying out any wholly or partly automatic processing operation or set of such operations<br />

intended to serve a single purpose or several related purposes’ (Article 18 paragraph 1). Responsible<br />

for this notification is the Controller, therefore in this context the authority processing personal data.<br />

Article 19 lists the information, which must be provided to the supervisory authority. If only nonsensitive<br />

data are to be processed, the processing can be initiated immediately after the notification. If<br />

a processing presents specific risks for the Data Subject (e.g., medical data, offences, criminal<br />

convictions), such a processing has to be examined by the supervisory authority before starting and<br />

may only be initiated, if the authority approves (Article 20).<br />

2.6.2 Publicity and monitoring by individual Data Subjects<br />

The second instrument provided by the directive to ensure a legitimate processing of personal data is<br />

the granting of comprehensive rights to Data Subjects. Such rights enable Data Subjects to control<br />

the processing of their own personal data by exercising these rights.<br />

Articles 10 and 11 grant Data Subjects the right to be informed about any processing of their personal<br />

data. Before initiating any processing, the Controller is obliged to inform the concerned data subjects<br />

306


Bernhard Horn et al.<br />

about the Controller’s identity, the purpose of the processing, the data to be processed, if such data<br />

will be transmitted to any third parties and, if any, their identity as well as the existence of the Data<br />

Subject’s right to access the personal data. This obligation ensures that Data Subjects are informed<br />

about any processing and, as a consequence, to have the ability to exercise their rights. Pursuant<br />

Article 12 concerned Data Subjects have the right of access to their data and to receive certain<br />

information about the processing to be obtained from the Controller.<br />

Data Subjects have the right to have inaccurate data corrected so that processed data are completed,<br />

corrected or deleted if the information represented by them is not accurate or is not accurate any<br />

more. Such a correction need not be performed only then, if the accuracy is not relevant for meeting<br />

the designated purposes of the data processing (e.g., files of closed proceedings need not be<br />

accurate unless the proceeding is resumed). If personal data are processed by any Controller not<br />

complying with the DPD, the Data Subject has the right to have such data deleted. Concerning the<br />

process of deletion, see the remarks discussed above. If an entitled rectification or deletion of<br />

personal data has been processed and such data had been disclosed to any third party before, such<br />

parties have to be notified to process the rectification or deletion as well, unless such a notification is<br />

impossible or undue. To do this, an ERS could provide appropriate support.<br />

But note that especially for the governmental sector Article 13 contains several exceptions for specific<br />

fields of processing for which these rights are not granted.<br />

2.7 The legitimacy of automated individual decisions<br />

Concerning an electronically supported file administration, Article 15 contains a quite relevant<br />

regulation: This affects automated decisions by IT-systems which concern an individual in a way<br />

‘which produces legal effects concerning him or significantly affects him and which is based solely on<br />

automated processing of data intended to evaluate certain personal aspects relating to him, such as<br />

his performance at work, creditworthiness, reliability, conduct, etc.’ (Article 15 paragraph 1). As Jahnel<br />

(2010: 471-480) outlines this regulation does not concern IT-supported decisions where a human<br />

being makes the final decision based on information provided by the IT-system, but decisions which<br />

are fully made by the IT-system. In the context of governmental IT-Systems, automated individual<br />

decisions are only legitimate if they are executed according to national law providing suitable<br />

measures to safeguard the Data Subjects’ legitimate interests or do not concern a Data Subject<br />

significantly.<br />

2.8 Legal requirements concerning the ERS’s technical implementation<br />

The previous sections dealt with the question: Under which legal premises and circumstances is the<br />

processing of personal data legitimate? Article 17 establishes regulations about technical measures to<br />

be adopted for such a (legitimate) processing of personal data: ‘Member States shall provide that the<br />

controller must implement appropriate technical and organizational measures to protect personal data<br />

against accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or<br />

access, in particular where the processing involves the transmission of data over a network, and<br />

against all other unlawful forms of processing. Having regard to the state of the art and the cost of<br />

their implementation, such measures shall ensure a level of security appropriate to the risks<br />

represented by the processing and the nature of the data to be protected.’<br />

As can be seen, concrete technical measures or security standards to be implemented cannot be<br />

found in this article. The core element of Article 17 is the Controller’s obligation to implement<br />

organisational as well as technical measures and standards, which—as a whole—prevent ‘an<br />

accidental or unlawful destruction or accidental loss, alteration, unauthorized disclosure or access, in<br />

particular where the processing involves the transmission of data over a network, and against all other<br />

unlawful forms of processing’ (Subparagraph 1). How these objectives can be achieved by the<br />

Controller is not addressed in this regulation. Therefore the Controller is responsible and has to fulfil<br />

these requirements by any means. Relevant is only the success of those measures.<br />

But on the other hand, not every effort has to be made to achieve this objective. Such measures need<br />

not to be implemented are those which are undue in relation to and dependent on the processed<br />

data’s sensitivity, the current technical state of the art and the economical effort. Therefore the more<br />

sensitive processed data are, the more effort has to be made to ensure the confidentiality, integrity<br />

and availability of processed data. Such security measures have to be safeguarded throughout the<br />

307


Bernhard Horn et al.<br />

entire period of processing and not only at the very beginning. Such measures can be of a structural<br />

(restricted access to server rooms, fire protection, alert systems), organisational (strict access rules to<br />

rooms, technical infrastructure and systems, staff trainings, staff sensitisation to critical dangers and<br />

threats) or technical (data protection mechanisms, backups [also to external locations], mirroring,<br />

encryption of data volumes as well as data transmitted via the internet, implementation of a<br />

comprehensive logging concept so that the access, addition, alteration or deletion of data and the<br />

performing person can be tracked, regular performance of system and software updates or the<br />

pseudonymisation of data) nature (Dammann and Simitis, 1997: 227-229).<br />

Moreover such measures not only concern the confidentiality of data with regard to external parties,<br />

but also with regard to internal actors. To avoid potential data misuse by employees and to ensure<br />

data privacy with respect to Data Subjects, processed data may only be accessible to such persons,<br />

for whom these data are necessary to perform their job. For this reason illegitimate access to<br />

personal data or the extraction of information out of the ERS by persons external to the administration<br />

as well as to those internal to the administration must be prohibited. As a consequence the ERS must<br />

implement an authorisation concept which ensures that access to files and personal data will only be<br />

granted to those persons who need access for their work (Hof, 2005: 50). But even in this case, it<br />

must be ensured that information obtained via search functions cannot be retrieved illegitimately. The<br />

simple existence of a file (shown as the result of a search query) can provide comprehensive<br />

information about certain circumstances.<br />

3. Data processing using third parties<br />

Besides security measures, Article 17 also regulates the situation in which personal data are not<br />

processed by the Controller himself but by a third party on behalf of the Controller (e.g., an external<br />

data centre, a private company or another authority). In this case, the Controller remains responsible<br />

for the legitimacy of the data processing and has to ensure that appropriate organisational and<br />

technical security measures pursuant to Article 17 are implemented by the Processor. The<br />

implementation of these measures can be examined by the Controller, by external specialists or by a<br />

certification authority. The concrete details of this external data processing have to be regulated in a<br />

written contract or other legal act (Jahnel, 2010: 117-123). For the assignment of external processors<br />

the national regulations based on Article 17 paragraphs 2–4 have to be obtained and the Processor<br />

may process the disclosed data exclusively on behalf of the Controller.<br />

On the other hand, it is not necessary for an external processor to observe all of his customers’<br />

national legal orders, but only those regulations as defined by the law of that Member State in which<br />

the Processor is established (Article 17 paragraph 3).<br />

4. An ERS as an information society service<br />

The functionality of an ERS can also be provided by an external service provider via the internet as a<br />

cloud-service (Software as a Service, SaaS). Such a service is to be qualified as an “Information<br />

Society service” according to Article 2 of the Directive on Electronic Commerce (2000/31/EC). Hence,<br />

this directive is applicable to the provision of SaaS services, even if they are provided for<br />

governmental authorities. The directive defines “services”, for which the regulations of the directive<br />

are applicable, as ‘any Information Society service, that is to say, any service normally provided for<br />

remuneration, at a distance, by electronic means and at the individual request of a recipient of<br />

services’ (Article 1 Directive 98/34/EC), which also includes the provision of ERS as a service.<br />

Articles 3 and 4 oblige the Member States to ensure that the taking up and pursuit of the activity of an<br />

Information Society service provider may not be made subject to prior authorisation, and prohibit the<br />

establishment of any legal regulation restricting the provision of Information Society services from<br />

another Member State—if the provider obeys the legal regulations concerning taking up and pursuit of<br />

the activity laid down in the Member State in which it is established (Laga, Sehrschoen and Ciresa,<br />

2007, 8-23). Therefore a Provider can offer its services to any authority in any Member State as long<br />

as it is in compliance with the legal regulations of its Member State. But Member States can lay down<br />

exceptions to these principles for reasons of public security, including the safeguarding of national<br />

security and defence as well as public policy.<br />

308


5. Electronic signatures<br />

Bernhard Horn et al.<br />

Usually paperwork to and from an authority has to be signed manually either by the applicant or the<br />

officer establishing the governmental decision. By signing such documents, the identity of the<br />

signatory as well as the authenticity of the document can be proven (BSI, 2002: 24-25). As an<br />

alternative to manual signatures, the directive 1999/93/EC establishes a legal <strong>European</strong> Community<br />

framework for electronic signatures, which standardises the technical and organisational requirements<br />

for such signatures to have equal legal standing as manual signatures (Brenn, 1999: 23-28). Such<br />

electronic signatures can also be used to send electronic documents to an authority by an applicant or<br />

to be delivered by an authority to an addressee as a subject of a governmental act (Recital 19). But<br />

only national law governs the legal spheres in which electronic documents and electronic signatures<br />

may be used (Recital 19 and 21). Therefore the directive does not provide any regulations, for which<br />

cases and legal affairs signatures are necessary in general or which legal effects are caused by such<br />

signatures. Only the premises are standardized, under which an electronic signature causes legal<br />

effects equal to a manual signature (Recital 17). Pursuant Article 5, such signatures have to be<br />

advanced electronic signatures (Article 2 paragraph 2) based on a qualified certificate and created by<br />

a secure-signature-creation device (e.g., smartcards, SIM-cards). A qualified certificate must provide<br />

specific minimum information and be (digitally) signed by a certification service provider. Because of<br />

such a harmonisation of electronic signatures, techniques for the digital identification of citizens can<br />

be developed (e.g., eID cards) to be used across EU.<br />

6. Conclusion<br />

It can be stated that most of the relevant legal requirements concerning the implementation and the<br />

operation of an ERS can be found in the DPD. If an ERS is provided or utilized as a cloud-service, the<br />

E-Commerce-Directive is also applicable, because such a service has to be qualified as an<br />

Information Society service. The third directive which, if any, could be applicable is the Directive on<br />

Electronic Signatures. This directive provides harmonized standards to be transformed into national<br />

law by which—fulfilling special organisational and technical requirements—electronic signatures are<br />

to be treated equally to manual signatures. But as mentioned in the very beginning, these directives<br />

are—as directives are in general—intended to be transformed into national law by the Member<br />

States. Nevertheless these directives provide indications to each party (like software producers,<br />

service providers and authority members) as to which regulations can be found and must be obeyed<br />

in every Member State’s laws.<br />

To sum up, detailed technical or organisational implications for the operation or utilization of an ERS<br />

could not be derived from any of these directives. Only Article 17 of the DPD obliges the Controller to<br />

implement effective and reliable technical or organisational measures, which ensure the<br />

confidentiality, integrity and availability of processed personal data, concerning both external and<br />

internal parties. Using ERS has considerable advantages for modern governmental administrations<br />

like simultaneous and transparent processes, standardised and comprehensible workflows, full<br />

provision of necessary information to clerks, online access to records and digital preservation of<br />

records (Centner (ed.), 2006: 102). Moreover ERS enable consistent electronic administrative<br />

workflows from the petition to the service of regulatory documents and can provide comprehensive<br />

assistance in complying with the legal requirements.<br />

References<br />

Brenn, C. (1999) Signaturgesetz, Wien: Manz Verlag.<br />

Bundesamt für Sicherheit in der Informationstechnik (BSI) (2002) Datenschutzgerechtes E-Government, Exeter:<br />

Thomas Knaak.<br />

Centner, M. (ed.) (2006) Administraion on the Net, Wien: Federal Chancellery.<br />

Dammann, U. and Simitis, S. (1997) EG-Datenschutzrichtlinie, Baden-Baden: Nomos Verlagsgesellschaft.<br />

Graf, W. (2010) Datenschutzrecht im Überblick, 2 nd edition, Wien: facultas.wuv.<br />

Hof, S. (2005) Alternative Security Approaches in E-Government, Linz: Trauner Verlag.<br />

Jahnel, D. (2010) Handbuch Datenschutzrecht, Wien: Sramek Verlag.<br />

Knyrim, R. (2003) Datenschutzrecht, Wien: Manz Verlag.<br />

Laga, G., Sehrschoen, U. and Ciresa M. (2007) E-Commerce Gesetz, 2 nd edition, Wien: LexisNexis Verlag.<br />

Simitis, S. (2003) Kommentar zum Bundesdatenschutzgesetz, 5 th edition, Baden-Baden: Nomos<br />

Verlagsgesellschaft.<br />

Streinz, R. (2008) Europarecht, 8 th edition, Heidelberg: C. F. Müller Verlag.<br />

Westphal, D. (2009) ‘Grundlagen und Bausteine des europäischen Datenschutzrechts’, in Bauer, L. and Reimer,<br />

S. (ed.) Handbuch Datenschutzrecht, Wien: facultas.wuv, pp. 53 - 94.<br />

309


Examining Influences on eGovernment Growth in the<br />

Transition Economies of Central and Eastern Europe:<br />

Evidence from Panel Data<br />

Princely Ifinedo<br />

Cape Breton University, Sydney, Nova Scotia, Canada<br />

princely_ifinedo@cbu.ca<br />

Abstract: This research examines the impact or influence of six (6) relevant factors on E-gov growth in Transition<br />

Economies of Central and Eastern Europe (TECEE). A 5-year panel data of sixteen (16) TECEE categorized as<br />

Leaders and Followers was used for data analysis in conjunction with the Ordinary Least Squares (OLS) technique.<br />

To test the influence of the selected factors on E-gov growth in the region, six hypotheses were developed<br />

accordingly. The results supported four (4) hypotheses indicating that E-gov growth in TECEE is positively influenced<br />

by such factors as national wealth i.e. GDP per capita, democratic/political rights, quality human capital resources,<br />

and government efficiency. The data did not confirm the significance of technological infrastructure and rule of law on<br />

the growth of E-gov in the region. The implications of the findings for research and policy making are discussed.<br />

Keywords: Transition Economies of Central and Eastern Europe (TECEE), eGovernment, new growth theory,<br />

regional development theory, regional eGovernment divide, contextual factors<br />

1. Introduction<br />

Electronic government (E-gov) is described by the World Bank as the use of information and<br />

communication technologies (ICT) including the Internet to transform governance (InfoDev, 2004).<br />

Essentially, E-gov allows government’s services to be more effective and accessible to citizens<br />

(Fountain, 2001; Moon, 2002; West, 2004). Empirical data from international agencies, consulting<br />

organizations, and research shows that E-gov has become a global phenomenon with nearly all<br />

governments around the world adopting it to promote citizen engagement and empowerment (Accenture<br />

2001, West, 2007; UN Public Administration Programme, 2010). Although E-gov is popular around the<br />

globe, there are parts of the world where slow progress have been reported (Norris, 2001, Gascó, 2005;<br />

Siau & Long, 2006; Singh et al., 2007; Azad et al., 2010). In fact, evidence indicates that more<br />

economically endowed countries occupy the upper echelons of innovators or adopters of advanced E-gov<br />

initiatives (West, 2007; Azad et al., 2010; UN Public Administration Programme, 2010).<br />

Norris (2001) asserted that the emerging digital divide (in this case, E-gov divide) has three distinct<br />

aspects: the social digital divide, the democratic digital divide, and the global digital divide. Gascó (2005)<br />

noted that the regional digital divide is a variation of the global digital divide in the sense that it signifies<br />

the differences that exist in E-gov initiatives between countries from the same geographical region. For<br />

instance, while the E-gov index (i.e. an indicator of a country’s EGovernment adoption) for Eastern<br />

<strong>European</strong> countries averaged 0.5449 in 2010, Hungary and Belarus had 0.6315 and 0.4900 respectively<br />

(UN Public Administration Programme, 2010) to indicate the existence of regional differences. In view of<br />

the disparities that exist at regional levels, it is argued that more attention needs to be paid to<br />

understanding E-gov issues at the regional level to enrich insight.<br />

Very little has been written about the factors impacting the growth or development of E-gov in Transition<br />

Economies of Central and Eastern Europe (TECEE). Two considerations informed the choice of TECEE<br />

for examination in this study. First, TECEE share a common political and cultural history (Ifinedo &<br />

Davidrajuh, 2005) as most countries in the region only recently metamorphosed from centrally planned<br />

systems to free market democracies. Thus, it is pertinent to continue monitoring progress in TECEE<br />

especially with regard to ICT use for development and governance (Levada, 2004; Alexander, 2004; EU<br />

Regional Policy; 2009). Second, researchers such as Roztocki and Weistroffer (2008) indicated a lack of<br />

adequate research related to information systems and technologies (IS/IT) issues in TECEE; they called<br />

on researchers to focus on such issues in that part of Europe. As E-gov initiatives aim at reforming and<br />

improving administrative services and citizen empowerment, research such as this current one could<br />

provide a lens through which efficiency in governance through IS/IT use is viewed.<br />

The academic literature on cross-national E-gov growth in TECEE is sparse, perhaps due to the relative<br />

novelty of the subject (Katchanovski & La Porte, 2005). Moreover, research done in this area has used<br />

global E-gov data rather than focus on particular regions on the world (Azad et al., 2010; Kovačić, 2005;<br />

310


Princely Ifinedo<br />

Katchanovski & La Porte, 2005; Singh et al., 2007; Siau & Long, 2006; Moon et al., 2005). By not<br />

focusing on specific regions of the world, it is possible that a deeper understanding of the factors<br />

impacting E-gov growth in differing parts of the world is underreported. To that end, this current research<br />

effort is designed to investigate factors that influence E-gov growth in TECEE. This study draws from the<br />

new growth and regional development theories. Published data from reliable sources such as the United<br />

Nations (UN) and the World Bank for selected TECEE over a 5-year period is used for analysis.<br />

2. Background information<br />

2.1 eGovernment: Focus<br />

The research’s focus is on the aspect of E-gov measures dealing with the extent to which each TECEE<br />

has advanced with respect to using ICT in governance, over the years. The UN indicator for this aspect of<br />

E-gov measurement is captured by the Web measure/online service index, which consists of a four-stage<br />

growth model (UN Public Administration Programme, 2010) that compares with similar frameworks in the<br />

literature (e.g. Layne & Lee, 2001; Srivastava & Teo, 2004a). Figure 1 and Table 1 illustrate each stage<br />

in the UN model. In brief, the UN's model indicates that countries that have advanced to higher levels of<br />

the model are the ones with relatively high Web measure/online service index scores.<br />

2.2 Transition economies: Definition and categorizations<br />

Transition economy (TE) refers to an economy that is changing from a centrally planned economy to a<br />

market economy (IMF, 2000; Samoilenko & Osei-Bryson; 2008). The characteristics of TEs include rapid<br />

economic liberalization, legal and institutional reforms, restructuring and privatization, and<br />

macroeconomic stabilization (IMF, 2000). Two groups of TECEE can be found in Europe. The group of<br />

eight countries that joined the EU on 1 May 2004 (i.e. Czech Republic, Estonia, Hungary, Latvia,<br />

Lithuania, Poland, Slovakia, and Slovenia) is in fact considered as having completed the transition<br />

process. The second group comprises such countries as Romania, Russia, Moldova, Croatia, Bulgaria,<br />

Belarus, Ukraine, and Georgia that are still transiting. The latter eight were selected from the list of<br />

TECEE in IMF (2000) for illustration purposes. It is suggested that the former and latter groups can be<br />

categorized Leaders and Followers, respectively (Samoilenko & Osei-Bryson, 2008; EU Legislation,<br />

2010; World Bank, 2010). Both groups differ significantly with respect to economic prosperity and ICT use<br />

for development (Samoilenko & Osei-Bryson; 2008; WEF, 2010). For instance, a Levene's test for<br />

equality of variances between the 16 TECEE in this research showed that the two groups’ E-gov (Web<br />

measure/online services index) differ significantly (F = 3.82, p < 0.000, df = 70.4). Thus, this result<br />

showed that the level of advancement regarding the use of ICT in governance differ significantly between<br />

Leaders and Followers TECEE. Table 2 highlights the national wealth and E-gov indicators for the<br />

selected TECEE.<br />

Figure 1: The UN's four stages of online services growth<br />

3. Theoretical foundation and hypotheses<br />

This research drew from the new growth theory and the regional development theory. The new growth<br />

theory is an economic theory that seeks to provide reasons for technological progress, creativity and<br />

diffusion of knowledge (Romer, 1994); its basic proposition is that continuous technological progress and<br />

advancement results when the combined effects of relevant exogenous factors are relatively high. On the<br />

other hand, the regional development theory seeks to explain differing growth rates across regions; the<br />

role of “space” in shaping regional development is underscored (Richardson, 1973; Dawkins, 2003). In<br />

311


Princely Ifinedo<br />

other words, the “space” in which a country exists in or occupies is a determining factor with regard to its<br />

capability to utilize technological innovations such as E-gov initiatives or tools for advancement.<br />

Table 1: The description of the UN's online services stages<br />

Table 2: Selected indicators for countries in the TECEE region<br />

312


3.1 Hypotheses formulation<br />

3.1.1 Economic factor<br />

Princely Ifinedo<br />

A study of the diffusion of technological innovations such as the Internet, e-commerce, and E-gov found<br />

that economic wealth strongly predicts the adoption of such innovations across countries (Norris, 2001;<br />

Moon et al., 2005; Singh et al., 2007). This is because more affluent countries have financial resources to<br />

invest in the implementation of such innovations while countries lacking in such resources usually<br />

experience greater difficulties in allocating needed resources for such initiatives, perhaps because of<br />

other pressing priorities. While studies by Azad at al. (2010) did not find support for a relationship<br />

between wealth and E-gov diffusion; several other researchers including Moon et al. (2005), Singh et al.<br />

(2007), and West (2007) confirmed that national wealth (GDP per capita) and E-gov diffusion are<br />

correlated. Thus, it is predicted that:<br />

H1: National wealth (GDP per capita) levels will positively influence E-gov growth in TECEE<br />

3.1.2 Technological factor<br />

Moon et al. (2005) showed that the more technologically advanced (i.e. a higher level of technological<br />

infrastructure) a country is, the more likely it is for the country to advance its E-gov agenda. Prior studies<br />

have shown that the spread of technological innovations across countries is contingent upon the<br />

availability of enabling ICT infrastructure (e.g. Norris, 2001; West, 2007; Shirazi et al., 2009). Likewise,<br />

Singh et al. (2007) and Azad et al. (2010) showed that the availability of ICT infrastructure positively<br />

influences E-gov maturity across nations. Thus, it is predicted that:<br />

H2: Technological infrastructure will positively influence E-gov growth in TECEE<br />

3.1.3 Social factor<br />

It has been suggested that one of the reasons why digital divide exists around the world is that some<br />

countries suffer from illiteracy and poor educational attainment (Kiiski & Pohjola, 2002; Moon et al., 2005;<br />

Shirazi et al., 2009). Illiteracy tends to hinder the growth of an information society at a fundamental level<br />

(Norris, 2001; WEF, 2010). The UN human capital index, which encompasses average years of schooling<br />

(across the three main levels) in populations, as well as literacy rates, captures this social measure<br />

across countries. Moon et al. (2005) and Singh et al. (2007) found the human capital index is positively<br />

related to E-gov growth and maturity across countries. Thus, it is predicted that:<br />

H3: Human capital index will positively influence E-gov growth in TECEE<br />

3.1.4 Political/democratic factor<br />

E-gov aims at fundamentally improving the efficiency of public administration (Fountain, 2001; Moon,<br />

2002; West, 2004; InfoDev, 2004). Thus, E-gov projects are being adopted by governments to increase<br />

productivity, improve decision-making, reduce costs, increase revenues and integrate services (e.g.<br />

Grönlund, 2001; Srivastava & Teo, 2004b). While some researchers (Davis, 1999; West, 2004; Fountain,<br />

2001) predicted that the utilization of ICT tools will revolutionize the efficiency of governance in the long<br />

run. Others (e.g. Kraemer & Dedrick, 1997) however do not share this viewpoint. The latter researchers<br />

asserted that ICT often improves technical efficiency and not organizational efficiency. Arguments have<br />

also been put forward noting that an ineffective government is not likely to use E-gov beyond basic<br />

information publishing, i.e. mainly for propaganda purposes (Alexander, 2004; Singh et al., 2007).<br />

Indeed, Srivastava and Teo (2004b) revealed that there is a significant association between E-gov<br />

development and government efficiency. Thus, it is predicted that:<br />

H4a: Government efficiency will positively influence E-gov growth in TECEE<br />

Another political issue that influences the diffusion of innovations such as e-commerce and E-gov is a<br />

country’s “rule of law” (Shih et al., 2005; Oxley & Yeung, 2001). Rule of law is developed in the context of<br />

the institutional environment that establishes the basis for exchanges. According to Shih et al. (2005,<br />

p.58), “it includes sound political institutions, an impartial court system, legal protection of property rights”,<br />

as well as the extent to which citizens have confidence in the legitimacy of these institutions and accept<br />

their authority. Shih et al. (2005) found that the relationship between the technological readiness of a<br />

313


Princely Ifinedo<br />

country and its e-commerce activities is moderated by “rule of law”. Accordingly, it is expected that E-gov<br />

growth in a country will be influenced by the prevailing rule of law in its context. Thus, it is predicted that:<br />

H4b: Rule of law will positively influence E-gov growth in TECEE<br />

Political rights are simply rights and freedoms protecting an individual from the state (Freedom House,<br />

2010); such rights are pertinent for good governance. Martin and Feldman (1998) argued that countries<br />

with favorable political climates are better served with respect to enhancing democratic values and<br />

promoting the dissemination of information. Research has shown that countries with higher levels of<br />

political rights often reap the benefits of technological innovations such as E-gov as opposed countries<br />

lagging behind in such values (Katchanovski & La Porte, 2005; Shirazi et al., 2009; Kovačić, 2005; Azad<br />

et al. 2010). In particular, Katchanovski & La Porte (2005) found that political rights have significant effect<br />

on E-gov development. Thus, it is predicted that:<br />

H4c: Political rights will positively influence E-gov growth in TECEE<br />

4. Research method<br />

4.1 Data sources<br />

As noted above, this study’s dependent variable (E-gov) was represented by the Web measures/online<br />

services index, which was obtained from the UN's Global EGovernment Reports (UN Public<br />

Administration Programme, 2010). The UN EGovernment Reports have been widely used by other<br />

researchers investigating similar issues (e.g. Moon et al., 2005; Kovačić, 2005; Azad et al., 2010). In<br />

deriving the index score, the UN agency aggregated scores for the online services, in each country, on<br />

the model’s stages presented in Figure 1 and Table 1.<br />

Each country’s technological infrastructure level was assessed using a weighted index comprised of<br />

Internet users/1000 persons, PCs/1000 persons, telephone lines/1000 persons, online populations,<br />

mobile phones/100 persons, and TVs/1000 persons (UN Public Administration Programme, 2010). Other<br />

researchers have represented technological infrastructure with these items (e.g. Singh et al., 2007). The<br />

human capital index was obtained from the UN Public Administration Programme (2010); it is derived<br />

from measures related to the educational attainment and literacy levels across countries. The variables of<br />

Rule of Law and Government Efficiency were obtained from Kauffman et al. (2009). The scores for<br />

Political Rights were taken from Freedom House (2010). The rating scale developed by Freedom House<br />

ranged from 1 to 7 with 1 representing the maximum value for the measure. This item was rescaled for<br />

this study to indicate 7 as the maximum value for rights or liberties. The GDP per capita was obtained<br />

from the World Bank’s Development Index (World Bank, 2010).<br />

4.2 Analytic procedures and the estimation model<br />

This current study used a 5-year data for periods: 2003-5, 2008, and 2010 for both Leaders and<br />

Followers TECEE that was collected over 8 years. As such, the research used panel data (also known as<br />

longitudinal time-series data) to capture E-gov growth, over time. The advantage of using a panel data is<br />

that greater variations with respect to changes in variables are captured; a single year study may not<br />

reflect such changes. For the data set of 16 countries, 80 points or observations were obtained. The<br />

ordinary least squares (OLS) regression multivariate technique was used to test the model.<br />

Multicollinearity was assessed and this does not appear to present any major problems for the study.<br />

Problems with homoskedasticity could arise from distributions that are not normal; to that end, effort was<br />

made to transform variables requiring normalization. Thus, the GDP per capita variable was transformed<br />

and normalized with a logarithmic function, i.e. In. The regression model for the study is represented as<br />

follows:<br />

Yit= α +β1log(Ait)+β2Bit+β3Cit+β4Dit+β5Dit+β6Dit + eit<br />

Where the subscript “i” is the country, “t” is the year, α is the unknown intercept, e is the error term, A1 =<br />

GDP per capita; B = Technological infrastructure; C = Human capital index; D1 = Government efficiency;<br />

D2 = Rule of law; D3= Political rights<br />

314


4.3 Results<br />

Princely Ifinedo<br />

The regression results of the research conceptualization are provided in Table 3. As predicted, the result<br />

showed that national wealth (GDP per capita) significantly influences E-gov growth in TECEE, over time<br />

(β = 1.84). The hypothesis indicating that human capital index positively influences E-gov growth was<br />

supported as well (β = 1.55). The data analysis confirmed the positive association between government<br />

efficiency and E-gov growth (β = 0.092). Support is provided for the prediction suggesting that Political<br />

Rights is positively related to E-gov growth in TECEE (β = 0.023). The theorized model did not provide<br />

evidence in support of the positive influences of Technological infrastructure and Rule of law on E-gov<br />

growth in TECEE.<br />

Table 3: The regression results for the research model<br />

5. Discussions and conclusion<br />

This study focuses on E-gov growth in TECEE. The literature on E-gov issues with perspectives from the<br />

TECEE is rare. This current research used relevant theoretical frameworks to investigate the influence of<br />

social, political, economic, and technological factors on E-gov growth in TECEE. The data analysis,<br />

facilitated by a panel data over a five-period for 16 countries categorized into two main groups, permitted<br />

greater insight. All the research’ variables accounted for 72% of the variation in the research model to<br />

indicate that conceptualization is of interest. The analysis showed that National wealth positively<br />

influences E-gov growth. This is not surprising as the deployment of E-gov initiatives require the<br />

availability of substantial financial capital (Singh et al., 2007; UN Public Administration Programme,<br />

2010). The data is suggesting that wealthier TECEE with higher financial resource levels might have<br />

allocated adequate financial resources to their E-gov schemes, which relatively poorer countries in the<br />

region cannot afford to make. The relevance of wealth for E-gov growth is consistent with results in Siau<br />

and Long (2006), Katchanovski and La Porte (2005), Norris (2001), Gascó (2005) and Kovačić (2005);<br />

however, it is unsupported by Azad et al. (2010) who found no association between wealth and E-gov<br />

diffusion.<br />

As predicted, the data confirmed that a country’s human capital resources strongly influence its ability or<br />

inability to benefit from innovations such as E-gov. Over the years, countries with higher human capital<br />

315


Princely Ifinedo<br />

development indexes (Leaders TECEE) tend to do better than counterparts (Followers TECEE) with<br />

respect to instituting higher levels of E-gov initiatives. Consistent with the new growth theory, countries<br />

with greater pools of knowledge are more likely to appreciate the ways in which E-gov can be used to<br />

serve their well being. Put differently, low levels of skills and knowledge may not augur well for E-gov<br />

growth. Educated and knowledgeable individuals easily adjust to the diffusion of new ideas as such<br />

enlightened people tend to have reduced opposition to social changes associated with adoption of<br />

innovation (Romer, 1994; Robinson & Crenshaw, 2002). The finding underscoring the importance of<br />

quality human capital resources in the diffusion of ICT-enabled initiatives supports results in prior studies<br />

(e.g. Kiiski & Pohjola, 2002). This finding lends credence to the viewpoint indicating that human capital<br />

resources is pertinent to E-gov growth across countries (Moon et al., 2005; Singh et al., 2007). The data<br />

analysis confirmed that E-gov growth in TECEE is strongly impacted where overall government efficiency<br />

is available. In this regard, higher levels of E-gov growth over the years in Leaders TECEE might have<br />

resulted from such governments realizing how E-gov could be used to enhance their overall efficiency.<br />

The fact that countries in the region with better government efficiencies were the ones with more<br />

favorable E-gov outcomes bears out the foregoing statement. This study’s finding in this aspect lends<br />

support to the result in Srivastava and Teo (2004b) indicating that there is an association between<br />

government efficiency and E-gov development across nations.<br />

The current research found that the Political rights dimension was significantly related to E-gov growth,<br />

thus supporting the view espoused by Kovačić (2005, p. 29) who asserted that “the government of a<br />

more democratic country appears to be more enthusiastic to pursue an eGovernment initiative than an<br />

authoritarian government” (See also Wong & Welch, 2004; Alexander, 2004). In the context of this<br />

study’s data, Leaders TECEE with relatively better Political rights for their citizens had higher E-gov<br />

development ratings than Followers TECEE lagging behind on this item. With respect to the unconfirmed<br />

hypotheses, the results were unexpected as they seem to highlight counter-intuitive reasoning.<br />

Regarding Technological infrastructure, the data could be indicating that ICT infrastructure across the<br />

region might have converged to the point where no marked differences exist between Leaders and<br />

Followers TECEE. Growth theories tend to point toward convergence in the long run (Mankiw et al.,<br />

1992). Similarly, Rule of law across TECEE was not found to have a significant association with the<br />

dependent variable. Prior studies have shown that political or democratic factors tend to have less<br />

influence on E-gov maturity or growth. For example, West (2007), Azad et al. (2010), and Moon et al.<br />

(2005) also reported weak association between selected political or democratic measures and E-gov<br />

diffusion and growth.<br />

5.1 Implications, limitations, and future research<br />

This research has implications for both research and policy making. To some degree, this study has<br />

answered the call for research to focus on IS/IT issues in Central and Eastern Europe. The scan of the<br />

extant literature shows that no previous E-gov study has examined the influence of relevant contextual<br />

factors on E-gov growth in TECEE. This study’s findings and conclusion add to the body of knowledge on<br />

E-gov studies with a perspective from emerging economies given that progress in such parts of the world<br />

have been reported to be slow in comparison to achievements in advanced countries. As this current<br />

study provides preliminary insight from Central and Eastern Europe, its findings could be compared with<br />

similar studies from other comparable regions of the world. In that regard, it would be interesting to know<br />

whether the same four (4) factors identified here as being relevant to E-gov growth in TECEE compare<br />

with insights from elsewhere. Theory development stands to benefit from such comparative analysis.<br />

Unlike previous studies that used case studies, literature reviews, and conceptual methodologies to<br />

discuss E-gov issues across the world, this current research utilized cross-country empirical data to<br />

enrich knowledge. Moreover, empirical studies readily lend themselves to validation. Further to this, the<br />

use of longitudinal or time-series data to discuss E-gov growth in TECEE is welcoming to the literature as<br />

it permits a rich understanding of issue under focus. Other IS researchers investigating similar issues<br />

could be enticed to use an approach similar to the one used here or build upon this study’s research<br />

framework.<br />

The attention of policy makers in the region is drawn to factors that could help them understand why<br />

some countries appear to be outperforming others with respect to E-gov growth. To that end, this present<br />

study is suggesting that enhancements to E-gov activities would benefit if more attention was paid to<br />

issues related to the availability of financial resources, government efficiency, political rights, and<br />

educational attainment in lagging TECEE. Additionally, the information provided herein could benefit<br />

administrators and policy makers that might have expended time and energies on a vast array of<br />

contextual factors in understanding factors influencing or hindering E-gov growth in TECEE and in<br />

316


Princely Ifinedo<br />

comparable regions. It is safe to suggest that E-gov policies, initiatives, and directives in Leaders TECEE<br />

could be used, to some degree, as benchmarks for efforts in Followers TECEE as attempts are made to<br />

narrow the gap between both groups. This research has its share of limitations. First, the study relied on<br />

secondary data sources; as such, it is difficult to ascertain with certainty the reliability and validity of items<br />

used in composing the various measures. Second, some of the items obtained were not consistent over<br />

years; this might have negatively impacted the data analysis. Third, in choosing the 8 Followers TECEE,<br />

the UN Public Administration Programme's (2010) E-gov scores were used to guide the selection. To that<br />

end, care was exercised in selecting countries with scores at all levels, i.e. above and below scores for<br />

the region’s average, as well as scores close to the average. Notwithstanding, selection bias cannot be<br />

ruled out. Other relevant factors such as cultural norms and values, political actors' actions, citizens’<br />

awareness were not included in this study; this might be limiting to insight.<br />

Future studies should endeavor to work with a more comprehensive framework to include national culture<br />

and other contextual factors not considered in this study. If possible, all Followers TECEE should be<br />

included in future analysis. Case studies should be considered to permit the emergence of rich qualitative<br />

data to compliment secondary data measures. This study was limited to a five-year observation period; it<br />

is advised that as more data become available, a much longer observation period should be considered<br />

to enhance insight.<br />

6. Appendix 1: The correlation matrix (N=80)<br />

**. Correlation is significant at the 0.01 level (2-tailed). *. Correlation is significant at the 0.05 level (2tailed).<br />

317


Princely Ifinedo<br />

Legend: Goveff = Government effeciency; Rule = Rule of law; Web = Web measures/online services<br />

index (dependent variable); Tech = Technological infrastructure; Human = Human development index;<br />

GDP = GDP per capita; PR = Political rights<br />

References<br />

Alexander, M. (2004). The Internet and Democratization: The Development of Russian Internet Policy.<br />

Demokratizatsiya, 12, 4, 607-627.<br />

Accenture (2001). eGovernment Leadership Rhetoric vs Reality - Closing the Gap. Retrieved May 2, 2009 from<br />

http://www.epractice.eu/files/media/media_846.pdf<br />

Azad, B., Faraj, S. & Goh J. F. (2010). What Shapes Global Diffusion of eGovernment: Comparing the Influence of<br />

National Governance Institutions. Journal of Global Information Management, 18, 2, 85-104.<br />

Ifinedo, P. & Davidrajuh, R. (2005). Digital Divide in Europe: Assessing and Comparing the E-readiness of a<br />

Developed and an Emerging Economy in the Nordic Region. Electronic Government: An International Journal,<br />

2, 2, 111-133.<br />

Dawkins, C. J. (2003). Regional Development Theory: Conceptual Foundations, Classic Works, and Recent<br />

Developments. Journal of Planning Literature, 18, 2, 131-172.<br />

EU Legislation (2010). Enlargement 2004 and 2007. Retrieved October 4, 2010 from<br />

http://europa.eu/legislation_summaries/enlargement/2004_and_2007_enlargement/index_en.htm<br />

EU Regional Policy (2009). Working towards a New Europe: The Role and Achievements of Europe's Regional<br />

Policy, 2004-2009. Retrieved October 4, 2010 from ASDFTUIOP<br />

Fountain, J. E. 2001. Building the Virtual State: Information Technology and Institutional Change. Washington, D.C.:<br />

The Brookings Institution.<br />

Freedom House (2010). Freedom in the World. Retrieved September 14, 2010 from<br />

http://www.freedomhouse.org/template.cfm?page=15<br />

Gascó, M. (2005). Exploring the EGovernment Gap in South America. Intl Journal of Public Administration, 28(7&8),<br />

683–701.<br />

Grönlund, Å. (2001). Electronic Government: Design, Applications, and Management. Hershey, PA: IDEA Group<br />

Publishing.<br />

InfoDev (Information for Development Programme) (2004). EGovernment handbook for developing countries.<br />

Retrieved May 6, 2006 from http://www.infodev.org<br />

IMF (2000). Transition Economies: An IMF Perspective on Progress and Prospects. Retrieved July 27, 2010 from<br />

http://www.imf.org/external/np/exr/ib/2000/110300.htm#I.<br />

Islam, R. (2008). Does more Transparency go along with Better Governance? Economics and Politics, 18, 2, 121-<br />

167.<br />

Katchanovski, I. & La Porte, T. (2005). Cyberdemocracy or Potemkin E-Villages? Electronic Governments in OECD<br />

and Post-Communist Countries. International Journal of Public Administration, 28, 7 & 8, 665-681.<br />

Kaufmann, D., Kraay, A. & Mastruzzi, M. (2009).Governance Matters VIII. Aggregate and Individual Governance<br />

Indicators1996–2008. Policy Research Working Paper (The World Bank). Retrieved Sept 30, 2010 from<br />

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1424591<br />

Kiiski, S. & Pohjola, M. (2002). Cross Country Diffusion of the Internet. Information Economics and Policy, 14, 2, 297-<br />

310.<br />

Kovačić, Z. (2005). A Brave New eWorld? An Exploratory Analysis of Worldwide eGovernment Readiness, Level of<br />

Democracy, Corruption and Globalization. International Journal of Electronic Government Research, 1, 3, 15-<br />

32.<br />

Kraemer, K. & Dedrick, J. (1997). Computing and Public Organizations. Journal of Public Administration Research<br />

and Theory, 7, 89–112.<br />

Layne, K. & Lee, J. (2001). Developing Fully Functional eGovernment: A Four Stage Model. Government Information<br />

Quarterly, 18, 2, 122-136.<br />

Levada, Y. (2004). What The Polls Tell Us? Journal of Democracy, 15, 3, 43-52.<br />

Martin, R. & Feldman, E. (1998). Access to Information in Developing Countries. Transparency International Working<br />

Paper. Retrieved March 26, 2010 from http://www.transparency.org/publications/<br />

Mankiw, N. G., Romer, D. & Weil, D.N. (1992). A Contribution to the Empirics of Economic Growth. Quarterly Journal<br />

of Economics, 107, 2, 407–437.<br />

Moon, J. M. (2002). The Evolution of EGovernment among Municipalities: Rhetoric or Reality? Public Administration<br />

Review, 62(4), 424-433.<br />

Moon, M. J., Welch, E. W. & Wong, W. (2005). What Drives Global E-governance? An Exploratory Study at a Macro<br />

level. In Proceedings of the 38 th . Hawaii International <strong>Conference</strong> on System Sciences.<br />

Norris, P. (2001). Digital Divide: Civic Engagement, Information Poverty, and the Internet Worldwide. New York:<br />

Cambridge University Press.<br />

Oxley, J. E. and Yeung, B. (2001). E-commerce Readiness: Institutional Environment and International<br />

Competitiveness. Journal of International Business Studies, 32, 4, 705-723.<br />

Robison, K. K. & Crenshaw, E.M. (2002). Post-industrial Transformations and Cyber-space: A Cross-national<br />

Analysis of Internet Development. Social Science Research , 31, 334–363.<br />

Romer, R. M. (1994). The Origins of Endogenous Growth. Journal of Economic Perspectives, 8, 1, 3–22.<br />

Roztocki, N. & Weistroffer, H. R. (2008). Information Technology in Transition Economies, Journal of Global<br />

Information Technology Management, 11, 4, 2-9.<br />

318


Princely Ifinedo<br />

Samoilenko, S. & Osei-Bryson, K.M. (2008). Determining Strategies for Telecoms to Improve Efficiency in the<br />

Production of Revenues: An Empirical Investigation in the Context of Transition Economies. Journal of Global<br />

Information Technology Management, 11, 7, 56-75.<br />

Shih, C-F., Dedrick, J. & Kraemer, K. L. (2005). Rule of Law and the International Diffusion of E-commerce.<br />

Communications of the ACM, 48, 11, 57-62.<br />

Shirazi, F., Gholami, R. & Higon, D. A. (2009). The Impact of Information and Communication Technology (ICT),<br />

Education and Regulation on Economic Freedom in Islamic Middle Eastern Countries. Information &<br />

Management, 46, 8, 426–433.<br />

Siau, K. & Long, Y. (2006). Using Social Development Lenses to Understand EGovernment Development. Journal of<br />

Global Information Management, 14, 1, 47-62.<br />

Singh, H., Das, A. & Joseph, D. (2007). Country-Level Determinants of EGovernment Maturity. Communications of<br />

the Association for Information Systems, 40, 632-648.<br />

Srivastava, S. C., & Teo, T. S. H. (2004a). A Framework for Electronic Government: Evolution, Enablers and<br />

Resource Drainers. In Proceedings the 8 th . Pacific Asia <strong>Conference</strong> on Information Systems (PACIS2004),<br />

Shanghai, China.<br />

Srivastava, S. C., & Teo, T. S. H. (2004b). EGovernment Payoffs: Evidence from Cross-Country Data. Journal of<br />

Global Information Management, 15, 4, 20-40.<br />

The Heritage Foundation (2010). Index of Economic Freedom. Retrieved October 2, 2010 from<br />

http://www.heritage.org/<br />

Transparency International (2010). Corruption Perceptions index (CPI). Retrieved October 15, 2010 from<br />

http://www.transparency.org/policy_research/surveys_indices/cpi/2009.<br />

UN Public Administration Programme (2010). United Nations EGovernment Global Reports. Retrieved August 12,<br />

2010 from http://www2.unpan.org/egovkb/global_reports/10report.htm.<br />

WEF (World Economic Forum) (2010). The Global Information Technology Report 2009-2010. Retrieved October 6,<br />

2010 from<br />

http://www.weforum.org/en/initiatives/gcp/Global%20Information%20Technology%20Report/index.htm.<br />

West, D. M. (2004). EGovernment and The Transformation of Service Delivery and Citizen Attitudes. Public<br />

Administration Review, 64, 1, 15-27.<br />

West, D. (2007). Global Perspectives on EGovernment. Retrieved September 2, 2010 from<br />

http://www.umass.edu/digitalcenter/events/pdfs/West_GlobalPerspectives.pdf<br />

Wong, W. & Welch, E. (2004). Does EGovernment Promote Accountability? A Comparative Analysis of Website<br />

Openness and Government Accountability. Governance: An International Journal of Policy, Administration, and<br />

Institutions, 17, 2, 275-297.<br />

World Bank (2010). Countries & Regions. Retrieved October 3, 2010 from http://web.worldbank.org/.<br />

319


Management of Latvian Government Communications<br />

During an Economic Crisis: The Role of Information<br />

Strategies in the Public Sector<br />

Aleksis Jarockis<br />

University of Latvia, Latvia<br />

aleksis.jarockis@gmail.com<br />

Abstract: The focus on this paper is on an analysis of the management of Latvian government and public sector<br />

communications, offering a more detailed review of the importance of communications policies and practices in the<br />

process of overcoming an economic crisis. Effective crisis communications, indeed, are one of the most important<br />

components in overcoming a crisis. During a crisis, an open and empathetic style of communication – one which<br />

engenders public trust – is most effective when officials try to galvanise the population in terms of doing something<br />

positive or refraining from doing something that is harmful. Although trust is imperative in a crisis, public suspicions<br />

about scientific and government experts have increased for a variety of reasons. These include the increased<br />

availability of sources of conflicting information, a reduction in the use of scientific reasoning in decision making, as<br />

well as political infighting. Trust and credibility, when demonstrated through empathy and caring, competence and<br />

expertise, honesty and openness, and dedication and commitment – these are truly essential elements of persuasive<br />

communication.<br />

Keywords: crisis communication, economic crisis, government communication, public sector, Latvia<br />

1. Introduction<br />

There were very rapid changes in Latvia's economic situation in mid-2008. These led to changes in the<br />

political and media agenda. Political parties and the government were forced to change the logic of their<br />

agenda, moving from symbolic elements to fundamentally important processes such as budget<br />

consolidation, changes in laws, etc.<br />

Rapid economic growth in Latvia up until 2008 led to improved standards of living, but the growth was<br />

mostly based on private consumption, as well as on investments in real estate and other sectors of nonexportable<br />

goods and services.<br />

Late in 2008, the Latvian Finance Ministry announced that the 2008 national budget would have to be<br />

amended so as to ensure a subsidy. At the same time, however, the global economic crisis and domestic<br />

financial difficulties in Latvia led to a situation in which the government was forced to take over one of the<br />

privately owned systemic banks of the country – the Parex Bank, so as to save it from bankruptcy. In<br />

December, the government announced that it was seeking loans from the International Monetary Fund,<br />

the <strong>European</strong> Commission, and the World Bank for a total of EUR 7.5 billion.<br />

In parallel to the economic crisis, there was increasing distrust among the public at large in terms of what<br />

Parliament (the Saeima) and the government were doing. In July 2008, only 18% of respondents in one<br />

survey said that the country was moving in the right direction. In September 2009, only 5% said so.<br />

Eurobarometer results in 2008 and 2009 showed that there was a great level of distrust in Latvia in terms<br />

of the government and the national parliament. It is important to note that this level of distrust was higher<br />

in Latvia than anywhere else among the <strong>European</strong> Union’s 27 member states. The vast majority of<br />

respondents in Latvia (92%) expressed full distrust in the Saeima, and only 6% said that they trusted it<br />

(EC, Eurobarometer 72).<br />

It was during the 9 th session of the Saeima that public trust in Parliament’s work diminished quite<br />

convincingly. Immediately after the 2006 election of the 9 th Saeima, 33% of respondents in a survey<br />

expressed trust in the legislature, while, as noted, four years later the same was said only by 6% of<br />

respondents (Diena.lv, 26 Sept 2009).<br />

The overall situation in Latvia is that people have had to deal with very rapid changes in the economy, in<br />

politics, and in everyday life. The fact is that over the course of two years, the government took a number<br />

of decisions which had a very direct effect on every member of society. This meant that citizens were<br />

forced to adapt very quickly to entirely new circumstances. This also applied to the agenda and<br />

operations of the mass media, because the media focus a great deal of attention to crises while providing<br />

information to the public and defending public views about these matters.<br />

320


Aleksis Jarockis<br />

It is of key importance for the media to shape their agendas independently, correlating these with the<br />

many different agendas which exist in society, as opposed to reframing frames which emerge from the<br />

context of the political agenda.<br />

2. The importance of communications under crisis conditions<br />

Even though there has been a vast amount of research in the area of communications, management<br />

crisis communications are an area in which there has been comparatively little scholarly examination.<br />

Crises are unique events which shake up the ordinary activities of countries or organisations. They<br />

involve an element of surprise, because crises tend to be unexpected. In some cases, a crisis can be<br />

forecast, but very seldom is it the case that the prognosis can be so precise that information about the<br />

threat of a crisis makes it possible to avoid it completely. At the foundation of crises are the threats which<br />

they create. These are dependent on the intensity, type and scope of the relevant crisis.<br />

Crises create serious threats against fundamental structures and values, as well as norms in the social<br />

system which are subject to the effects of time. Because this creates pressures and an inability to<br />

forecast events, prerequisites emerge for the taking of critically important decisions. Crises, in other<br />

words, as seen as sets of events which lead to the taking of urgent and, frequently, unpopular decisions.<br />

From the perspective of decision making, there is no other alternative but for (formal or informal) leaders<br />

to make sure that the relevant system (organisation, government) returns to normalcy (Boin and Overdijk,<br />

2004: 26).<br />

For that reason, the concept of a crisis speaks to a situation in which decisions must be taken quickly,<br />

during a limited time frame, and with a level of information that is either minimal or, quite oppositely,<br />

excessive. There must be assumptions in this process for which there is not enough time to examine or<br />

analyse them with any detail. The lack of time will also have an effect on communications and on the<br />

quality of what the relevant organisation (government) does in response to the crisis.<br />

The concept of a crisis is brought to bear in various spheres of psychological, social, economic and<br />

political complications in the lives of individuals and in societies at large. The concept of a crisis was<br />

studied in much depth in the 1930s as a part of cultural theory. During crises, the need for and<br />

effectiveness of communications will be related to psychological processes that are faced by individuals<br />

during a time of crisis. Crises create a lack of clarity, and that breaks down the individual’s ideas about<br />

the existing period in time. The individual must face changes in realities in terms of values, as well as the<br />

fears which the threats create in relation to the individual’s expectations: “When an individual finds that<br />

expectations are not satisfied or traumatic events occur, it is increasingly complicated to implement<br />

effective communications” (Ulmer, 2007: 21).<br />

A financial crisis is the result of inadequate policies related to monetary policy and management of<br />

unclear financial resources. It has to do with the flow of money and means that the distribution and<br />

availability of money, as well as other issues related to finances, can no longer function effectively, thus<br />

endangering the relevant financial system. If there are unsuccessful attempts to address the problems,<br />

the financial crisis can turn into a sectoral (economic) crisis (Eichengreen and Portes, 1995: 12).<br />

An economic crisis can lead to a political crisis – one in which the system of governance becomes<br />

ineffective in addressing issues related to the national economy which is, after all, its responsibility. There<br />

can also be a social crisis – one in which a government can no longer control the situation under which<br />

the economic crisis has eliminated the ability of the relevant society to function adequately whilst at the<br />

same time, endangering education, medicine, and the fundamental rights of individuals (Eichengreen and<br />

Portes, 1995: 15).<br />

When the origins of an economic crisis are at a foreseeable distance from the specific system that is to<br />

be studied, the origins of the crisis can be explained via attribution theory, which says that people make<br />

judgments about the causes of events. The theory is usually applied to unexpected events with<br />

unexpected consequences. “Attribution is the perception of causality or of the perceived causes of a<br />

specific event. Individuals attribute a concrete cause to an event in which they themselves have taken<br />

part, as well as to events in which they have simply been observers. The attribution of the cause of a<br />

specific aspect of the existing situation describes the attitudes of individuals (i.e., whether the individuals<br />

who were involved in a specific event in the past could have been able to control the causes)” (Coombs,<br />

2009: 265).<br />

321


Aleksis Jarockis<br />

The maintenance of the trustworthiness and legitimacy of a democratic system in the eyes of the public<br />

will be the main prerequisite for a government’s ability to handle a crisis successfully. Crisis managers<br />

begin to address the situation at different levels of trust which can increase or decrease during the crisis<br />

itself. That is why an exchange of information between crisis managers and their target audiences is very<br />

important. Channels for information exchange and communications often are subject to great risk during<br />

a crisis period. Evaluations of the existing situation and of strategies that are adequate in response to the<br />

situation can have a deleterious effect in terms of changing the flow of information. A mandatory<br />

prerequisite for responses to a crisis will be an adequate exchange of information among the major<br />

actors in the situation – decision makers, advisors, the mass media, and the public at large. From a<br />

strategic perspective, that will depend on the main actors, their areas of responsibility, and their identified<br />

roles (Stern and Hansen, 2001: 233).<br />

One of the most important components in crisis management is the management and strategy of crisis<br />

communications. This is an area of corporate communications in the field of public relations, and the job<br />

is to establish contacts with groups that are affected by the crisis and with the public at large. The goals<br />

in this are:<br />

To overcome the crisis as effectively as possible and with the involvement of the affected groups;<br />

To minimise the harm which the crisis causes on the reputation and future activities of the<br />

organisation (government);<br />

To ensure, therefore, public opinion in the wake of the crisis which is as positive as possible for the<br />

organisation (government).<br />

In other words, one goal in crisis management is “damage control,” which is aimed at protecting the<br />

organisation (government) from drastically negative changes in terms of the components of the<br />

environment in which it exists. The fact is, however, that if all of the relevant activities are focused<br />

exclusively on damage control, that may not be enough to ensure that the organisation (government) can<br />

preserve positive relations in important areas (Coombs, 2007: 124).<br />

Theoretical approaches toward crisis communications are analysed so as to explain what happens during<br />

crises, what decisions should be taken in response, what should be done in response, and how various<br />

aspects of a crisis are interrelated. Marra (1992), for instance, proposes that organisations (governments)<br />

use relevant theories to draft a public relations model for crisis events that would allow crisis managers to<br />

identify the changing variables which are appropriate for a crisis communications plan, as well as those<br />

which would cause failures if they are not included in such a plan. The scholar argues that such<br />

knowledge would allow public relations people to know in advance of a crisis what would be effective and<br />

what would not be effective.<br />

Crises are also a very decisive test for the sustainability of political governments in countries. They<br />

challenge the governing elite or the upper reaches of the relevant country’s Civil Service in terms of<br />

overcoming acute threats against the legitimacy of the political system. Accordingly, crises are often of<br />

critical importance in terms of the reputation of the relevant decision makers (heads of government,<br />

government ministers) in terms of their future career or, even, their political interests. Decision makers<br />

are concerned about the government’s reputation and existence, and so the things that they do are often<br />

dependent on their ability to overcome the crisis. In the government sector, a failure to deal with a crisis<br />

typically leads to a reassessment of power relations, and that endangers the future of the power elite.<br />

Furthermore, the emergence of a crisis can cause doubts about the quality of governance, because<br />

crises raise questions about the effectiveness or lack thereof in terms of how government institutions and<br />

bureaucrats have tried to prevent the things that are happening (Horsley and Baker, 2002: 413-415).<br />

For these reasons, political considerations vis-a-vis the management of a crisis and the relevant<br />

communications can take priority over technical considerations or the advice of professionals. Best<br />

practice in the taking of decisions which are linked to objective rationality and which relate to decision<br />

makers who have as much information and time as possible and who are completely convinced that they<br />

are doing the right thing – such best practice is not possible in a crisis situation. Indeed, crises are the<br />

direct opposite of objective rationality, because they typically involve threats, a lack of clarity, hurriedness<br />

and, often enough, surprises.<br />

Horsley and Baker have proposed a synthesis model for crisis communications in the public sector. They<br />

argue that crisis communications relate to the internal and external environment of the relevant<br />

organisation. For that reason, crisis communications plans are based on an analysis of the origins of<br />

322


Aleksis Jarockis<br />

crises. If the identified goals are to be achieved and the activities of the process are to be successful,<br />

there must be a proactive approach to determining the public agenda. When it comes to overcoming a<br />

crisis, the actors which seek to ensure strategic communication of their messages will use the media in<br />

pursuit of their own political goals. In order to achieve those goals and to enhance their popularity,<br />

political actors – governments, political parties, parliamentary factions, interest groups, and social<br />

movements – will fight for favourable attention from the mass media. Governments are privileged in this<br />

regard, because they are the leading decision makers with a role that has been legitimised during the<br />

most recent election. The government’s advantages in public communications are also based on the<br />

human and financial resources that are available to it.<br />

The mass media have a very important role during a crisis, because they provide information to the public<br />

and seek to defend it. Thus the media warn and inform the public about what is happening, focusing<br />

public attention on processes that could endanger individual groups or the public at large. When<br />

informing the public about a crisis and its development, the media also encounter a complete lack of<br />

information and many different questions.<br />

The things which the mass media do in terms of crisis communications processes will have both positive<br />

and negative consequences. The media need to inform the public quickly about that which is happening<br />

in the relevant organisation or country. This allows people to know that an emergency situation has<br />

emerged. If the information, however, is incomplete, the work of the media can have negative effects.<br />

When the media disseminate negative information, people may feel more threatened than the actual<br />

situation would otherwise ensure. This can create public panic and provoke inadequate reactions to what<br />

is happening. In those cases, in turn, where crisis managers avoid the dissemination of more extensive<br />

public information about what’s happening, the effects of media operations are different – the media<br />

focus public attention on that which is happening, also serving as “watchdogs” on behalf of the public<br />

(Horsley and Baker, 2002: 26).<br />

3. The Latvian government’s communications strategies within the public<br />

sector: A case study<br />

An important prerequisite for the development of any system of national governance is the ability of the<br />

government and the governing system to work effectively with society. The planning, co-ordination and<br />

implementation of communications and public participation are inviolable components in policy planning.<br />

It is the duty of governing systems, therefore, to listen to the views of the public and of the nongovernmental<br />

sector, also providing timely public information about policy planning documents, legal acts<br />

and services. Dialogue with the public must be ongoing, open, understandable and trustworthy.<br />

Until April 14, 2010, the Latvian government’s communications processes were defined in a document<br />

that was called “Basic Aspects of the Government’s Communications Policies, 2008-2013.” The<br />

document states that government communications are based on administrative or national governance<br />

communications (CMofLV, 2008: 4). Communications, in turn, are defined as an inviolable component of<br />

government policy planning, dialogue with society, efforts to promote public participation, and<br />

implementation of the culture of client services at all levels of governance.<br />

The aforementioned document on policy positions for 2008-2013 has been repealed. In April 2010, the<br />

Cabinet of Ministers declared that it, along with several other documents, were out of date, instructing<br />

ministries to look at ways of optimising the document and drafting a new one (Latvijas Vēstnesis, 2010:<br />

61).<br />

The government’s strategic policy planning document, moreover, states that the government must ensure<br />

public support and participation in efforts to overcome the crisis. This is to be done by working together<br />

with the government’s social partners and by providing public information about the decisions that are<br />

taken (CMofLV, 2010).<br />

In an effort to prevent the country’s insolvency, the government had to draft and approve decisions<br />

beginning in 2008 which had a very serious effect on the public. Because of a lack of time, there was<br />

insufficient public involvement and information in this regard. Decisions about the availability of health<br />

care, education, social supports and pensions, about changes in taxes and employment opportunities,<br />

etc., affected the everyday lives of all of Latvia’s residents, but the system of public governance proved<br />

unable to offer clear and unequivocal information about the government’s decisions and their effects.<br />

323


Aleksis Jarockis<br />

In order to carry out a more wholesome analysis of public administration (government) communication<br />

management in economic crisis conditions, I propose an analysis of announcements of government<br />

leaders (from late 2008 till late 2010). Rapid changes in the economic and financial situation in the state<br />

forced the government and parliament to change communication messages ensuring overcoming<br />

economic difficulties and their communication.<br />

From a qualitative analysis of government’s official announcements (press releases) during the said<br />

period it can be concluded that in 68% of cases the following frames of basic factors which caused the<br />

economic crisis and changes in the economy have been mentioned: complicated global development,<br />

imbalances on global financial markets, global economic processes, global banking crisis, global financial<br />

crisis, consequences of the global economic crisis.<br />

The above mentioned frames show that responsible officials shift responsibility for the existing situation to<br />

others rather that recognize their own faults thus causing uncertainty. All these interacting and nonlinearly<br />

related factor frames show lack of political responsibility for recognizing unperformed tasks. The<br />

frame of run from political responsibility was given in official announcements which can be explained as a<br />

contextual frame of the economic crisis in the state.<br />

Having analysed communication messages of government leaders, framing economic crisis<br />

management, it can be concluded that they are linked with the decisions made by the government.<br />

Having summarized the frames of adopted decisions, it can be concluded that politicians and Latvian<br />

government did not have a decision-making strategy according to which actions had to be made in order<br />

to avoid changes in the economy in general. Politicians fumbled about and reacted with their decisions to<br />

the consequences of the irritant, rather than tried to avoid escalation of the changes. Thus the<br />

government was forced to react often to the media agenda subordinating its own agenda.<br />

Unfortunately frames of government decisions did not respond to the changes caused by the crisis in the<br />

public administration in order to transfer from an optimal “rest time” model to a deliberative model for the<br />

crisis period. Actions or even inactivity of the government were oriented only towards minimal or<br />

secondary changes which in order to maintain normal administration had to be done irrespective of how<br />

“rich time” came.<br />

Frames of government decisions were very general which cause mistrust in the society which was also<br />

greatly intensified by the media by framing government’s decisions. Media frames were oriented towards<br />

sensations thus maintaining tension in the society. The media tried to avoid evaluation of the wording,<br />

however it was indirectly achieved by the frames imposed by experts focusing on more detailed outline.<br />

The main shortcoming of government leaders in framing their decisions was the lack of explanations of<br />

actual facts. Frames of government changes were targeted towards a very narrow audience – often it<br />

was the public administration itself and the media. The public administration paid its attention to the facts<br />

that influenced most directly changes in the public administration and its existence, however they lacked<br />

orientation towards all taxpayers which were affected most directly by the economic crisis and changes.<br />

Frames focused on increasing self-sufficiency syndrome, because mainly taxpayers were not to be<br />

blamed for ineffectiveness of the bureaucratic public administration and it had to be reduced.<br />

Absence of detailed change frames or their lack does not provide the society with a wholesome view on<br />

the economic crisis, because the public communication lacks an important element to explain changes<br />

objectively or in an understandable way. Without such framing the view on interconnections in the<br />

economy is completely destroyed in the public space.<br />

Active and regular discussions on the crisis-related topics in the public space started in the second half of<br />

June 2008 and were actively maintained till the end of 2010. The crisis topics were also included in the<br />

media agenda. Economic crisis frames of the government have been hypertrophied which causes worries<br />

and feeling of danger in the society thus opening a new discourse of situation evaluation which<br />

dramatically overwhelms the rational discourse.<br />

It is also important in this regard that in his annual report to the Saeima about the achievements and<br />

plans of the Cabinet of Ministers, Prime Minister stated that “dialogue with the public and social partners,<br />

information about the country’s economic situation and relevant government decisions, as well as<br />

324


Aleksis Jarockis<br />

explanations about planned and approved decisions are one of the most important prerequisites for<br />

overcoming the crisis.” (CMofLV, 2010).<br />

Data about the way in which public government communications policies were co-ordinated in 2009 show<br />

that only five of the country’s government ministries (five of them) had sectoral communications<br />

strategies, while 72% (12) did not. At the same time, however, ten of the ministries had plans to draft and<br />

confirm communications strategies in accordance with the aforementioned policy document for 2008-<br />

2013.<br />

The most dramatic situation existed in other institutions of public governance, not ministries. Only 33% of<br />

them had communications strategies, while 67% did not. Most of the public governance institutions (34)<br />

had planned to prepare a communications strategy in 2010. Another 14 had no plans in this regard at all,<br />

while a few others planned to prepare their strategies only after the relevant government ministry had<br />

drafted and approved a communications strategy. At this writing, more up-to-date information about the<br />

implementation of communications policies in public governance in 2010 is not available.<br />

Because of reforms in the system of national governance and the cutting of costs in this regard, the<br />

resources that are available for the communications processes of institutions of national governance<br />

have shrunk substantially. Several sectors have centralised their communications functions at the<br />

ministerial level, as opposed to individual functions for the various institutions that are subordinated to<br />

them. This means that the communications units of government ministries ensure communications about<br />

entire sectors. Several ministries have communications units which also ensure the functions of the<br />

relevant ministry’s press secretary. A survey conducted by the National Chancery found that the number<br />

of people involved in ministerial communications declined by one-third. As of April 14, 2010, ministries<br />

employed 67 communications specialists, as opposed to 96 specialists who did the work in 2007.<br />

Another key aspect in analysing the importance of communications in the public sector is public trust in<br />

the government and Parliament. Several scholars have looked at the foundations of public trust. The<br />

Swedish researcher Ylva Noren, for instance, has concluded that trust in a government is based on<br />

public satisfaction about the relevant country’s financial situation and legal system, as well as open and<br />

thorough communications between the government (parliament) and the country’s residents (2000: 11).<br />

Communications are of decisive importance in overcoming a crisis and increasing political trust. Trust, in<br />

turn, is closely related to the establishment of different kinds of links among a country’s residents. Trust is<br />

needed if there are to be positive linkages between the needs of residents on the one hand and the<br />

responsiveness of the political elite on the other.<br />

Studies in Latvia show that when it comes to budget cuts during the economic crisis, most people in<br />

Latvia support limited government. This desire is not based on liberal beliefs. Instead, the issue has to do<br />

with universal distrust in government institutions. As soon as the question is about government financing<br />

in specific areas such as the economy, health care, education, etc., approximately the same majority<br />

says that there is a need for even greater spending.<br />

The level of responsibility in national governance (or the lack thereof) can be clearly seen in the area of<br />

public trust in government. Ever since the restoration of independent statehood, it has to be said, trust in<br />

the system of governance in Latvia has been low, and at this writing, it has sunk to a critical level.<br />

Statistics show that people in Latvia distrust the governing system more than people in any other country<br />

of the <strong>European</strong> Union – 88% distrust the Cabinet of Ministers, 92% distrust the Saeima, and fully 95%<br />

distrust the country’s political parties (EC, Eurobarometer, 2009).<br />

These data confirm public opinion about the work of the Cabinet of Ministers, the Civil Service and the<br />

country’s local government in terms of overcoming the economic crisis, among other issues. As far as<br />

people are concerned, this work is not in line with public expectations or with public understanding about<br />

the responsible handling of the relevant duties. The trust which people have or do not have in the<br />

executive branch of the government also has to do with the attitudes which politicians have demonstrated<br />

vis-a-vis the system of public governance. Politicians blame the system for failures and the inability to<br />

implement specific policies, and this enhances distrust in the system of governance, as well as in<br />

politicians (Rozenvalds and Ijabs, 2009: 81). As is seen in this paper, the government has not even<br />

prepared strategic documents related to communications policies.<br />

325


4. Conclusions<br />

Aleksis Jarockis<br />

In summarising the importance of communications for systems of national governance, we can conclude<br />

that communications are among the most important elements of the overall system. A prerequisite for the<br />

successful development of a governance system will always be effective co-operation between the<br />

government and the system of governance with the public at large. The planning, co-ordination and<br />

implementation of communications and public participation are an inviolable component of policy<br />

planning in any country. For that reason, it is the duty of the system of national governance to listen to<br />

what members of the public and the interest groups which represent them have to say. The system must<br />

also ensure timely public information about those issues that are current, thus promoting the<br />

establishment of a constant, open, understandable and trustworthy dialogue.<br />

The data of this survey show that the system of governance in Latvia understands the importance of<br />

communications, but ever since the beginning of the economic crisis, the government has not done<br />

anything to prepare a crisis communications strategy or plan. Even more, the government has no<br />

communications policy documents to regulate this sphere. Certain institutions of public governance, too,<br />

have no crisis communications strategies. During the economic crisis, the communications units of<br />

governance institutions have been shrunk, and the system of national governance has rejected the<br />

principle of long-term strategic planning in favour of a situative, ad hoc approach to communications. In<br />

other words, the economic crisis has laid bare the problems which the public sector has in terms of longterm<br />

policy planning.<br />

Governmental communications and the media have constructed incomplete frames related to the<br />

economic situation. They tend to be contradictory, and this makes public agenda-setting more difficult.<br />

The frames related to government decisions and activities have been unclear and generalised in the<br />

public arena, even though people expect clear (albeit perhaps negative) prognoses and concrete<br />

information about what the government will do if any of the possible crisis scenarios come to pass. This<br />

problem has been criticised harshly in the media, but the communications between the government and<br />

state administration and the people of Latvia have not improved. Besides, the media base their<br />

characterisations and analysis of the situation largely on the governmental resources which they<br />

themselves have criticised, reframing the proposed frames and often hypertrophying them, too. Thus the<br />

people of Latvia increasingly feel concerned and scared about the future.<br />

Analysis of the frames of the government during the 2008 – 2010 financial and economic crisis shows<br />

several risks and problems in terms of setting agendas. The media focus on governmental resources<br />

and sources of information do not make it possible to create an agenda that is in line with the public<br />

agenda, even though the frames do simulate reflection of the public opinion.<br />

The absence of a crisis communications policy and the situative approach which exists in this regard<br />

could, in fact, lead to another crisis in Latvia – even lower trust in the government, Parliament and the<br />

entire system of public governance. This will certainly make it more difficult to overcome the economic<br />

crisis.<br />

Here we are looking at an unusual and very dangerous tendency – enormous distrust in the executive<br />

branch of government and the increasingly common view that the system of public governance is<br />

ineffective and incompetent. This dangerous tendency can seriously endanger the implementation of<br />

policies irrespective of their level of quality and the things which are done in regard to the policies. If<br />

people refuse to accept the policies and the relevant obligations, that will mean the need for greater<br />

controls on the part of the system of public governance. This creates greater distrust and an out-ofcontrol<br />

spiral of greater and ever greater controls in the system, and the system of public governance and<br />

the politicians who are a part of it must take the first step in breaking this system down.<br />

The low level of trust indirectly points to the belief among residents that they cannot trust politicians. The<br />

things which have happened in Latvia’s political system, true, have done very little to encourage<br />

government officials and bureaucrats to act in a responsible way.<br />

Because trust in government institutions in Latvia is at a very low level at this time, more open debates<br />

about the country’s further developmental goals might help in enhancing public understanding and<br />

326


Aleksis Jarockis<br />

support in this process. The most important first step in this regard is to set priorities and to link them to<br />

documents of a strategic nature.<br />

References<br />

‘9 th Saeima Has Lowest Public Trust’, Diena.lv (26 Sept 2009), [Online], Available: http://diena.lv/lat/politics/hot/defacto-9-saeimai-vismazaka-sabiedribas-uzticiba<br />

[24 Nov 2010].<br />

Boin, A. and Overdijk, W. (2004) Crisis simulations: exploring tomorrow’s vulnerabilities and threats, [Online],<br />

Available: http://sag.sagepub.com/cgi/reprint/35/3/378 [20 Dec 2010].<br />

Cabinet of Ministers of the Republic of Latvia, (2010) Instruction No. 209, ‘On policy planning documents and Cabinet<br />

of Ministers instructions that are out-of-date’, Latvijas Vēstnesis, 16 April, p. 61.<br />

Cabinet of Ministers of the Republic of Latvia (CMofLV), (2010) Prime Minister Valdis Dombrovskis’ annual report to<br />

the Saeima on the achievements and plans of the Cabinet of Ministers, [Online], Available:<br />

http://titania.saeima.lv/LIVS/SaeimaLIVS_LmP.nsf/0/959e61e9f7420735c22576d900482c8a/$FILE/MP%20atsk<br />

aite%20Saeimai%202009-2010.doc, 1 March, [27 Dec 2010].<br />

Coombs, W. (2007) Ongoing crisis communication: Planning, managing, and responding, London: Sage<br />

Publications.<br />

Coombs, W. (2009) Impact of past crises on current crises: Communication insights from situational crisis<br />

communications theory, [Online], Available: http://job.sagepub.com/cgi/reprint/41/3/265 [24 Nov 2010].<br />

Eichengreen, B. and Portes, R. (1995) Crisis? What crisis? Orderly workouts for sovereign debtors, London: Centre<br />

for Economic Policy Research.<br />

<strong>European</strong> Commission (EC), (2009) Eurobarometer 72, [Online], Available:<br />

http://ec.europa.eu/public_opinion/archives/eb/eb72/eb72_lv_lv_nat.pdf [24 Nov 2010].<br />

Horsley, J. and Baker, R. (2002) ‘Toward a synthesis model for crisis communication in the public sector’, Journal of<br />

Business and Technical Communication, vol. 16, no. 4, August, pp. 413-415.<br />

Noren, Y. (2000) Explaining variations in political trust in Sweden: Lessons learned through theories and data,<br />

Denmark: University of Copenhagen.<br />

Rozenvalds, J. and Ijabs, I. (eds.) (2009) Latvia. Human development report, 2008/2009: Accountability and<br />

responsibility. Rīga: Institute for Advanced and Political Research.<br />

Stern, E. and Hansen, D. (2001) Crisis management in Estonia: Case studies and comparative perspectives,<br />

Stockholm: Försvarshögskolan.<br />

Ulmer, R. (2007) Effective communication: Moving from crisis to opportunity, London: Sage Publications.<br />

327


Business/IT Alignment as Enabler for eGovernment in Syria<br />

Raed Kanaan and Kamal Atieh<br />

Arab Academy for Banking and Financial Sciences, Jordan<br />

raedkk@yahoo.com<br />

K-atieh@scs-net.org<br />

Abstract: Critical success/failure factors (CSFs) to eGovernment implementation and the reasons behind such<br />

failure or success, have been the focus of research in many developed countries and some developing countries.<br />

The Syrian Arab Republic has not, until now, been the context for such studies. The purpose of this paper is to<br />

investigate the effect of Business/IT (BIT) alignment on the success of eGovernment implementation in developing<br />

countries and the pertinent factors that affecting this alignment. This paper, therefore, studies the multiple factors on<br />

BIT alignment such as people process and organizational factors. The authors will discuss all possible factors that<br />

affect the BIT alignment in developing countries in general and in Syria in particular. Knowing that eGovernment<br />

project needs all government existed resources (IT, financial and human) in order to be able to take benefits from all<br />

resources to improve an organization work, this infer the existence of BIT alignment. However, in order to build and<br />

implement the best eGovernment strategy the gap between business and IT teams seems to be one of the most<br />

important factors in the eGovernment implementation. Therefore, bridging this gap may help in avoiding the failure of<br />

eGovernment project in developing countries in general and in Syria in particular. This paper draws upon qualitative<br />

research that was undertaken by the authors to investigate the effect of technical and non-technical alignment on<br />

eGovernment success in Syria and all factors affecting this alignment. The data, primarily collected via 20 semistructured<br />

interviews with representatives of major Syrian eGovernment implementation stakeholder groups, was<br />

analyzed. This paper enunciates the significance and the need of BIT alignment as the most important factor to<br />

eGovernment success, especially in the first phase in eGovernment project.<br />

Keywords: information technology, eGovernment, critical success/failure factors, business and IT alignment<br />

1. Research motivation and objectives<br />

Information and communication technology (ICT) revolution increases day by day. This revolution offers<br />

new opportunities for organizations’ decision makers to take benefits from new forms of their resources.<br />

And their success or failure depends not only on one factor but also on reaching objectives within the<br />

planned time and cost.<br />

Ndou (2004) confirms that ”recognizing the power of ICTs, many developing countries, assisted by<br />

international organizations for development, have started building and encouraging e-strategies and<br />

initiatives to address a wide range of economic, social, technological, infrastructural, legal and<br />

educational issues”. It is true that the use of ICTs in the developing countries is at its infant stage. UN<br />

(2008) confirms that all countries try to build their strategy toward EGovernment by increasing their<br />

readiness in different domains in order to provide better public services knowing that the majority of<br />

eGovernment projects failed (Kumar, 2007).<br />

The eGovernment system needs all types of resources such as financial, human, and technical resources<br />

from different departments and different organizations in different forms regardless the computerization<br />

process in each department.<br />

Eid (2009) states that, any eGovernment project depends on ICT in general. The relation with ICT was<br />

understood in most developing countries as spreading more computers in their organizations (Ndou,<br />

2004). If the organizations departments understood the relationship with ICT well, they can provide the<br />

right information to the right people at the right time to both government organizations and citizens.<br />

Many governments try to offer services to their citizens by developing eGovernment projects, but they fail<br />

in their objectives especially in developing countries regardless high spending on eGovernment projects<br />

(Kumar, 2003). The problem is the lack of accepted and satisfactory services to citizens because of<br />

several factors.<br />

The gap between business and IT strategies/people appears as one of the eGovernment challenges in<br />

order to get success. Therefore, BIT alignment assessment is one of the most interesting topics in the IS<br />

research fields, many unlimited efforts in both practical and academic domains. Practical people in<br />

EGovernment project try to do the alignment to improve their success with help from researchers to<br />

introduce new models and frameworks to achieve alignment in general and some specific domains<br />

(Chan, 2007).<br />

328


Raed Kanaan and Kamal Atieh<br />

In spite of the existence of many IS literatures discussing the eGovernment critical success factors<br />

(CSFs) (Prananto, 2007), there are a few empirical researches discussing the CSF/CFF of eGovernment<br />

projects implementation in developing countries. This was reflected in low contributions to international<br />

conferences and journals. Therefore, academic and practical researches are very important in<br />

eGovernment field, noting that the research in eGovernment systems is a relatively new area driven by<br />

the IT and business industries and affected by the BIT alignment.<br />

While carrying out the research, we discussed the following points:<br />

eGovernment projects and their success and failure factors,<br />

The role of BIT alignment in eGovernment project success,<br />

And, the factors affecting this alignment and their effect on eGovernment project.<br />

This research is based on qualitative research taking the eGovernment project in Syria as a case study.<br />

The researchers know from their experience the important role of BIT alignment on the success of<br />

eGovernment.<br />

In this research, the next section presents a background about the research then discusses the research<br />

methodology which was used to have a comprehensive framework and details all the framework parts. In<br />

the last section, the researchers state the conclusion, research contribution and future study.<br />

2. Background<br />

The letter “E” is very common these days; the researcher deals with e-commerce, e-business,<br />

eGovernment, eGovernance…etc. it was known because of the important use of information technology<br />

and especially the widespread use of internet (Eid, 2009).<br />

In studying the relationship between the eGovernment and information technology, the researcher finds<br />

two points of view. The first shows the importance of information technology in order to implement<br />

eGovernment project, while the second considers that eGovernment as new wave of information age<br />

(West, 2004). Regardless the two points of view, the eGovernment is the second form of the government<br />

in any country, which tends to offer qualified secure services to its all citizens trying to build the trust in<br />

these services. Therefore, the “E” form of government must respect this rule in the same time with cost<br />

and effort reduction, efficiency, transparency and simplicity increasing via electronic channels in any time<br />

and place (Reffat, 2006).<br />

Therefore, any country in the world needs the new form of government because of its benefits, in both<br />

developed and developing countries, at least because it tends to have cost reduction (Abuali, 2010).<br />

Regardless eGovernment definition, strategy and its relationship with information system from both<br />

technological and management sides is not the same in all countries but, on the contrary, the researcher<br />

cannot find it the same in any two countries since it has cultural aspects.<br />

Regardless the objectives of any eGovernment project, it has a percentage of success and failure<br />

depending on its objective and the measuring method. There are several studies for measuring the<br />

eGovernment in-group of countries or discussing the eGovernment project in a specific country.<br />

Some eGovernment teams concentrate on a part of eGovernment project, such as the relationship with<br />

citizens, other government organizations, business enterprise and government employees which form the<br />

four categories of eGovernment in general; and in some projects they mix between eGovernment and ecommerce.<br />

Noting that the general mission of eGovernment is to facilitate the complementary use of information<br />

systems in government, it comprises both operational and strategic use (Kim, 2006). The researcher<br />

finds four categories of eGovernment stated in majority of literatures, such as G2E, G2B, G2C and G2G.<br />

This research focuses on G2G directly as it could be considered as the backbone of any eGovernment<br />

project. G2G concerns the interactions between government agencies at different levels in different<br />

locations as well as governments of other countries (Ndou, 2004). G2G task is to do the communication<br />

and cooperation among the government agencies to share resources, skills and capabilities in order to<br />

enhance the efficiency and effectiveness of the processes in the government (Valentina, 2004). The G2G<br />

relationship includes the government internal systems and functions. This relationship is most complex<br />

between the eGovernment categories relationship because it depends on data sharing and interaction<br />

329


Raed Kanaan and Kamal Atieh<br />

between government organizations, employees, departments, agencies, ministries, and even other<br />

governments.<br />

Realini (2004) sees that G2G is an emerging area of research. This might be responsible for the lack of<br />

models concerning the adoption of eGovernment G2G in general and those convenient to developing<br />

countries in specific, knowing that existing models are designed without consideration for the peculiar<br />

nature of the public sector (Ezz, 2005). In addition, none of the existing models is designed to suit the<br />

Middle East countries such as Syria, which raise the importance of having a model or framework for Syria<br />

or for Middle East countries.<br />

Eid (2009) focuses on the role of information technologies as enablers of eGovernment project which any<br />

government creates to take more benefits in multiple areas, and that the government must study all<br />

success and failure factors affecting the eGovernment project from different sides: social, organizational<br />

and political.<br />

The success of eGovernment could be seen from three perspectives: citizens, business and government<br />

(Wang, 2010); and every eGovernment project requires five kinds of skills to success: analytical skills,<br />

information management skills, technical skills, communication and presentation skills and project<br />

management skills (Kumar , 2003). Knowing that there are no fix lists of critical success factors for all<br />

eGovernment projects in all countries; especially from social and political point of view.<br />

eGovernment leaders must play dual roles, technical and process engineering, since the government<br />

consists of political, legal, public policy, organizational, technological, and human capital factors, and<br />

knowing that citizens, the end users, are very diverse in their ability to understand government services<br />

and their desire and ability to use self-service computer systems. Therefore, the eGovernment team must<br />

be ready to deal with apparent challenges from previous factors as with other factors from the political,<br />

economical and social environment (ITU, 2008).<br />

OECD (2004), WEST (2004), Ndou (2004), UN (2008), Abuali (2010) and ITU (2008) developed many<br />

challenges and sources of failures facing eGovernment projects in developing countries, like technical,<br />

Social, national and organizational. The direct dependence on ICT makes it play the main role of<br />

eGovernment success or failure; the success or failure not only on the technical side but also on all other<br />

sides.<br />

The existed gap between IT and business teams will prevent the planners and decision makers from<br />

building a comprehensive strategy of eGovernment project. The eGovernment team needs the<br />

information at the right time in order to be useful in their plan and operation, which means the need to the<br />

right access to multiple forms of data, information and knowledge in convenient forms. This is not the<br />

case of many developing countries where the IT is needed but seems as a barrier for business people.<br />

Therefore, bridging the gap between business and IT people is more than a need, which will lead to<br />

organizations outcomes and performance improvement (Tallon, 1999).<br />

According to Pollalis (2003), the integration between organization business and IT strategies is very<br />

important which imply bridging the gap between business and IT people. The alignment is not a simple<br />

procedure, but it needs to define alignment mechanisms, which will help in facing the alignment<br />

challenges (Venkatraman et al., 1993).<br />

Thus, the BIT alignment is fundamental to eGovernment teams. Bridging the gap between business and<br />

IT teams seems to be the main task of the eGovernment project leader, and in order to achieve that, it is<br />

very important to have a framework, which help in BIT alignment in all phases of eGovernment project.<br />

However, in this research we propose the BIT alignment which helps in analyzing and selecting the right<br />

answer (means in the right form and in the right time for the right people), for eGovernment applications<br />

in Government-to-Government (G2G) category of eGovernment environment.<br />

3. Research methodology<br />

Taking in consideration the research objectives, we followed a qualitative research methodology.<br />

Qualitative research is used to answer questions with a “how” or a “what” (Yin, 2003). Our research role<br />

tries to answer questions about the eGovernment success/failure factors especially the role of BIT<br />

alignment on multiple factors affecting this alignment. Taking the case study of Syria, we studied many<br />

330


Raed Kanaan and Kamal Atieh<br />

related documents and did double round interviews with many participants from different sectors like<br />

public sector organizations, eGovernment developers, employees, citizens, etc.<br />

Table (1) lists information about the participants of this research. The participants have enough<br />

experience, C-level with experience of ten years at least, and the age average is 39 year.<br />

Table 1: Participant’s information<br />

No Organization Name Classification No of participants<br />

A EGovernment Team Public sector 5<br />

B Ministry of Communication Public sector 2<br />

C Ministry of Interior Public sector 3<br />

D Banking sector Public sector 2<br />

E GSM provider Private sector 2<br />

F Universities <strong>Academic</strong> field 3<br />

G Focus Group Multi field 3<br />

Total 20<br />

We adopted a methodology with the following steps:<br />

Defining the purpose and objectives of the research and discovering the obstacles, benefits,<br />

suggestions and recommendations.<br />

Doing a literature review.<br />

Adopting the case study of Syria.<br />

Studying many documents about Syrian eGovernment strategy and related documents (14<br />

documents such as strategies, plans, newspaper clippings, schedules, presentations and reports)<br />

besides browsing articles and websites, and visited so many organizations that have good<br />

experience in information system and have successful projects on the organizational level.<br />

Doing semi structured interviews with different participants. Two rounds of interview sessions in order<br />

to gather data and information, asked a set of interview questions resulting in more flexibility and<br />

ability to extract detailed information from the participants<br />

Analyzing data such as data examination, categorization and tabulation.<br />

The focus of the questions and analysis was the role of BIT alignment and its effects on EGovernment<br />

success and the factors affecting this alignment.<br />

4. eGovernment success/failure factors<br />

The building of eGovernment depends on the ICT as main enabler of eGovernment, which needs an<br />

important improvement regarding all related requirements with good relationship with private sector in<br />

both strategically and operational sides. One of the IT managers in a ministry commented on these<br />

issues: "With some experiences in public sector to move in working from traditional ways to automated<br />

ways, taking benefits from ICT as enabler of those projects as steps towards eGovernment.”.<br />

Accordingly to a respondent: "eGovernment will enhance the use of ICT within organizations; employees<br />

will learn new skills to deal with this technology. In addition, the citizens by that time will be familiar<br />

enough to use this technology”, of course, this will need a strong support from the government from<br />

financial point of view.<br />

In Syria, there is a big interest from political leaders in the development of an eGovernment system for<br />

multiple reasons like to reform the public sector, to reduce costs, and to provide high quality services to<br />

citizens making the resistance for change more negligible. Moreover, the success in the eGovernment<br />

project needs a study of all eGovernment barriers which are not the same in all countries. One of the<br />

independent experts commented: “In spite of the existence of political support, so many projects start but<br />

without being finished since there is no projects management or follow up, and this is the case of<br />

eGovernment project."<br />

The main problem in the strategy is the focus on the technological side more than others, which is clear<br />

in the related documents since the eGovernment team write the strategy from technical background.<br />

Many interviewees mentioned this problem, one expert said, “The main problem in Syrian government<br />

331


Raed Kanaan and Kamal Atieh<br />

organizations is that they see their projects as technical projects, without any mention to other sides<br />

which lead to failure, but with eGovernment project the alignment between technical and other sides is<br />

very important to success”. However, it differs from one to another, especially for eGovernment team<br />

members, one of them said: “In Syrian environment, the IT sector is more advanced than other sectors,<br />

like this, the IT sector must go ahead without waiting the others and must lead them”.<br />

The action plan will include many projects that help to prove the eGovernment plan success in providing<br />

some urgent services with all services requirement, which must planned from technical and non-technical<br />

points of view, confirming that the eGovernment project is based on ICT. One IT manager stated, “You<br />

can’t offer any service without ICT, and to proof the new services the eGovernment team must select the<br />

most appropriate services to offer.”<br />

The participants agree on the positive role of BIT alignment on the eGovernment project success in Syria,<br />

one senior manager said, “Since the eGovernment project is based on ICT, we must group the business<br />

and IT people in work groups to success”.<br />

5. Business/IT alignment<br />

All participants agree on the main role of IT in eGovernment success with mentioning the need to BIT<br />

alignment, but some of them focus on the need to way that measure the alignment level and its benefits.<br />

One senior manager states, “We know the need to IT strategy in our organization, but we don’t know how<br />

we can control it, since we aren’t IT”, like that the CEOs will not know the benefits of IT directly as<br />

tangible benefits. This narrow point of view was clearer by an independent expert, who considers the BIT<br />

alignment as more than necessary to solve this problem and will help all people to know the benefits of<br />

the others and the IT department will be seen as profit center. One senior manager explained the benefits<br />

from the BIT alignment process saying: “the B IT strategy alignment benefits are the differentiation, cost,<br />

innovation, growth and alliance advantage”.<br />

In spite of that, all people agree with the alignment, but in practice they work to, so, it is very important to<br />

know multiple behaviors related to the alignment process. There are many behaviors forms of alignment<br />

process. One expert justifies: “People declaration about alignment is not enough, we need to have it to<br />

appear in their behavior in practice”. The alignment process starts from the beginning of the project when<br />

the eGovernment team defines the strategy and put the plan, so BIT integrated planning is important<br />

which must be as result of the alignment. One eGovernment team said, “In order to get the BIT<br />

alignment, we must plan to have high BIT collaboration as factor of success”, which must be planned<br />

before the beginning of the project to have the desired results.<br />

The BIT alignment is important to eGovernment project success, but it is not an entertainment. One<br />

expert focuses on BIT alignment challenges by saying:”we must be on the right way, our objective is the<br />

eGovernment success and not the alignments itself, there are many challenges facing the alignment such<br />

as the IT enablement of business through collaboration, communication and involvement in strategy<br />

development”.<br />

6. Business/IT alignment factors<br />

Almost, all participants agree on people, process and organization role in building successful BIT strategy<br />

in non-ended eGovernment project. The integration of BIT strategies requires effective BIT teams’<br />

communication. One eGovernment team members focused on this point “the key factor of the BIT<br />

alignment is the effective communication”, the effective communication will result in continuous<br />

improvement of active relationship management from BIT teams appearing as a culture in the<br />

organizations.<br />

Many participants discuss the BIT alignment enablers. One of them said, “The alignment is between BIT<br />

teams, therefore the main element of its success is the business and IT teams “. The BIT teams will<br />

understand the alignment between them as way to cooperate in order to have on objective, it is the<br />

project success. The success or the failure is related to all teams and not to IT or business team. The BIT<br />

alignment requires the full understanding of other teams by any team and considers the project as a<br />

shared project between all. One participant said, “The alignment could be happened without the support<br />

of top management to BIT teams”. The alignment will lead IT involvement in eGovernment strategy<br />

development since the ICT is the backbone of the eGovernment project and in the same time, its success<br />

depends on IT understanding of business requirements. According to one participant, “the problem of<br />

eGovernment project in developing countries like Syria is that we need everything to be done in one<br />

332


Raed Kanaan and Kamal Atieh<br />

project and to plan everything from the beginning, therefore we do not start, never”. The nature of<br />

eGovernment project differs from other projects, the strategy must adopt a plan based on dividing the<br />

project to sub projects and prioritize them in way that ensures their success.<br />

Process, people and organizational factors were seen from many experts as enablers and barriers<br />

depending on their role played by the BIT teams.<br />

The role of people is more than clear since they are the main elements of such alignment. One expert<br />

focuses on the decision makers’ capabilities and behaviors, he said “the alignment procedures start by<br />

decisions makers, we could consider that, BIT decisions makers’ capabilities and management skills as<br />

our first interest, besides meeting of the minds between them and continuous communication”. So many<br />

participants see the role of people in the strategy building, one of them said, “The alignment is very<br />

important in eGovernment strategy building, which need the involvement of BIT decision makers in the<br />

strategy formulation”. The people tasks differ in eGovernment project from different project, since this<br />

project is agile and need continuous follow up and evaluation, similarly, it depends on the cooperation<br />

between all government organizations. The communication skills of people who are in the EGovernment<br />

differ from other projects like those that they must communicate with people from outside the<br />

organization.<br />

The role of organizational factors was seen as they help in facilitating the BIT alignment. Before starting<br />

the eGovernment project, the government must do some preparations, such as changing the<br />

organizational structure of government organization and build a new culture of cooperation between all<br />

organization department and inter-organizations. One participant mentioned, “The cooperation between<br />

organizations is not a decision to be taken only, we must work for it”. Restricting the organizations include<br />

many steps such as having the CIOs in all organizations, move the technology departments in the<br />

organizations in order to have information system departments which have development and<br />

management sections and not only computerization and networking. The new form of IT department will<br />

change it to be as profit center and not cost center in the organization. One senior manager said, “The<br />

good structuring of IT department internally and in the organization will lead to good understanding from<br />

the business people, especially from top management who will support the IT department “, some<br />

organizations found new ways to increase profits by the use of IT.<br />

The process role was ignored in Syrian organizations, in spite of the confirmation from all participants on<br />

its importance. The process consistency and clarity is very important and they must ensure the<br />

integration to achieve the BIT strategies, consequently the eGovernment strategy. One senior manager<br />

clarified the specifications of the process, he said, “Since the project is continuous, the process design<br />

must agile and long term focusing and help the BIT alignment“. The process must relate to eGovernment<br />

strategy and ensure the BIT alignment in the simplest way.<br />

The BIT alignment in eGovernment project differs from other projects. It takes many aspects from the<br />

project itself. It is a long time operation on all levels (strategically, tactical and operational). One<br />

participant said, “The BIT alignment level reflects the success of eGovernment project and measure the<br />

value added by the cooperation between BIT teams”.<br />

7. Conclusion<br />

This research focuses on G2G category of eGovernment, and the factors affect eGovernment adoption in<br />

this area. This research presents the BIT alignment role in eGovernment project and the multiple factors<br />

affecting this alignment, based on qualitative research methodology.<br />

The research results showed that eGovernment is based on ICT but not only an IT project. In general, in<br />

countries like Syria, there is a gap between IT and business strategies/people which could be considered<br />

one of the challenges facing the eGovernment project. Therefore, studying the BIT alignment and its<br />

dependent factors is very important in order to bridge the gap between them. Many factors affect the<br />

alignment such as people, process and organizational groups of factors including so many sub-factors,<br />

which differ from country to others. The eGovernment adoption is long and hard project which needs all<br />

government resources. BIT alignment between IT and business strategies/teams must be considered and<br />

planned from the beginning.<br />

Future researches are very important to find multiple other factors in order to bridge the gap between<br />

business and IT strategies and teams of eGovernment project. Validating the effect of those factors in<br />

333


Raed Kanaan and Kamal Atieh<br />

many countries is very important to enhance the research results and suit them in all levels of<br />

eGovernment project.<br />

References<br />

Abuali A. (2010). Factors and Rules Effecting in eGovernment, © EuroJournals Publishing,<br />

http://www.eurojournals.com/ejsr.htm.<br />

Chan, E. and Reich, Y. (2007). IT alignment: what have we learned? Journal of Information Technology. 22, 297—<br />

315.<br />

Eid, E and Abd El-Razek , M (2009). eGovernment Theory & Implementation Case Study Egyptian EGovernment<br />

Model. The International <strong>Conference</strong> on Administration and Business. ICEA - FAA 2009, University of<br />

Bucharest.<br />

Ezz, I. and Themistocleous, M.(2005). Investigating the Barriers to G2G Adoption. eGovernment Workshop ’05<br />

(eGOV05), September 13 2005, Brunel University, West London UB8 3PH, UK.<br />

ITU (2008). Electronic Government for Developing Countries.<br />

Kim, V.A. (2006). eGovernment: Five Key Challenges for Management, Electronic Journal of EGovernment, Volume<br />

4 Issue 1.<br />

Kumar , R (2007). Making eGovernment Projects in Developing Countries More Successful and Sustainable: Some<br />

Case Studies from India. CPRsouth 2007: Research for Improving ICT governance in the Asia-Pacific.<br />

Philippines.<br />

Ndou, V. (2004). eGovernment for Developing Countries: Opportunities and Challenges, The Electronic Journal on<br />

Information Systems in Developing Countries.<br />

OECD (2004). The eGovernment Imperative, France.<br />

Pollalis, Y. A., (2003). Patterns of co-alignment in information-intensive organizations: business<br />

performance through integration strategies, International Journal of Information Management, pp. 469-492.<br />

Prananto, A. and McKemmish, S. (2007). Critical Success Factors for the Establishment of eGovernment: A Critical<br />

Analysis of the Indonesian Cabinet Secretariat’s Legal Document Retrieval System (LDRS) Project. Swinburne<br />

University of Technology, Australia.<br />

Realini, A. F. (2004). G2G EGovernment: The Big Challenge for Europe, Master Thesis, Department of Informatics,<br />

University of Zurich, 15 September 2004.<br />

Reffat, R. (2006). Developing a Successful eGovernment, NSW 2006 University of Sydney, Australia.<br />

Tallon, P. and Kraemer, K. L., (1999). A Process-oriented Assessment of the Alignment of Information Systems and<br />

Business Strategy: Implications for IT Business Value, University of California, Irvine, Center for Research on<br />

Information Technology and Organizations.<br />

UN (2008). eGovernment Survey. New York , USA.<br />

Valentina, N. (2004). E – Government for Developing Countries: Opportunities and Challenges, The Electrical<br />

Journal on Information Systems in Developing Countries, EJISDC.<br />

Venkatraman, N, Henderson, J. C., and Oldach, S. (1993). Continuous Strategic Alignment: Exploiting Information<br />

Technology Capabilities for Competitive Success, <strong>European</strong> Management Journal, 1993, pp. 139-149.<br />

Wagner, C., Cheung, K., Fion, L., and Rachael, P. (2003). Enhancing eGovernment in Developing Countries:<br />

Managing Knowledge through Virtual Communities.<br />

Wang, H. (2010). Perspectives, skills and challenges for developing a successful eGovernment . IEEE, ISBN 978-1-<br />

4244-6931-4.<br />

West, D.M. (2004). eGovernment and the transformation of service delivery and citizen attitudes, public<br />

administration review.<br />

Yin, R.K., (2003). A Case study research: design and methods. 3rd edition, Thousand Oaks, Calif.: Sage<br />

Publications.<br />

334


Does eTaxation Reduce Taxation Compliance Costs<br />

Maja Klun<br />

University of Ljubljana, Slovenia<br />

maja.klun@fu.uni-lj.si<br />

Abstract: Improving government performance is one of the key elements of public sector reform. Introducing<br />

eGovernment is one element in improving performance. There are several discussions about the issue of cost<br />

effectiveness of eGovernment. The paper discusses whether eTaxation decreases taxation compliance costs. It was<br />

found that different research comes to different conclusions and therefore one could not conclude that that eTaxation<br />

reduces compliance costs. Nevertheless some other non-financial positive effects have been observed by different<br />

researchers, such as accuracy, logic controls, and better compliance.<br />

Keywords: compliance costs of taxation, eTaxation, Slovenia<br />

1. Definition of compliance costs<br />

According to Sandford et al. (1989), tax compliance costs are generally defined as costs incurred by<br />

taxpayers in meeting the tax requirements imposed on them by the law and revenue authorities, over and<br />

above the actual payment of taxes, and over and above any distortion costs inherent in the nature of the<br />

taxes. The measurement of tax compliance costs became an important research subject in the most<br />

developed countries more than twenty years ago (e.g. Australia, Canada, the Netherlands, United<br />

Kingdom, United States), in countries in transition at the beginning of 2000 (Slovenia, Croatia, Czech<br />

Republic), and also in other countries in Asia (Singapore, Malaysia, Hong Kong, India), Africa (Tanzania,<br />

Ethiopia) and South America (Brazil)(see Evans, 2003). The research results on tax compliance costs<br />

(i.e. Sandford et al., 1989; Allers, 1994; Evans et al., 1998; Tran-Nam et al., 2000; Ariff, 2001; Chittenden<br />

et al., 2003, Vitek et al., 2003; Klun and Blažić, 2005, Das-Gupta, 2003; OECD, 2001; and others)<br />

indicate that tax compliance costs are regressive (the larger burden is on smaller taxpayers) and<br />

substantial (up to 2.5% of GDP) (see Evans, 2003) and therefore a significant part of tax-related costs.<br />

The simplification of legislation and tax procedures has become an important element in policies to<br />

reduce administrative burdens and costs. One common tool is offering electronic services and one-stop<br />

shop services. According to OECD (2007) a tool should decrease compliance and administrative costs.<br />

According to the <strong>European</strong> Commission’s eGovernment portal, new technology can radically improve the<br />

efficiency and effectiveness of public services. Initiatives in the i2010 eGovernment action plan are<br />

intended to expand e-services, cut back on red tape and increase the satisfaction of all users. Increased<br />

ICT investment is also used as a tool to achieve greater efficiency and effectiveness. It is interesting that<br />

empirical studies have not persuasively established a correlation between ICT investments and<br />

corresponding improvements in organizational performance and productivity in general. Some studies<br />

report no relationship, some provide evidence that a correlation does exist, and in a few studies a<br />

negative relationship between enterprise performance and ICT investment was observed. ICT makes<br />

compliance costs ‘lower’ in regard to time consumption and monetary expenses, but ICT itself is not<br />

cheap. The use of ICT for some services and compliance procedures needs a high level of resources and<br />

not only initially, since support costs are also high. Moreover, ICT investment cannot be treated as a<br />

long-term once-only investment since constant changes in the information technology world demand<br />

constant upgrading, adaptation and development.<br />

Throughout eGovernment development, taxation services have been one of the most popular areas for<br />

change, since they are an important financial source for the government, are often already computerized<br />

in the back-office and therefore easier to implement online on the front-office side. With the current<br />

widespread availability of IT they were also instantly available to the users. At the same time online<br />

personal income tax services gained much of the publicity. It is also one of the more frequently used<br />

government services by citizens (most of the services are used only a few times in a lifetime, such as a<br />

building permit, change of address, a marriage certificate, etc.). Even the eEurope measurement reports<br />

indicate that year-by-year the services included in the income generating cluster (income and corporate<br />

tax, social contributions for employees, VAT, customs declaration) were and remained the most<br />

developed. Coverage on the supply side in the area of online personal income tax is therefore now quite<br />

good.<br />

The personal income tax online service was one of the first online services fully available online to<br />

Slovenian citizens. It was the result of developments that began in 2003 with the implementation of the<br />

335


Maja Klun<br />

eTaxation portal, soon after the main eGovernment portal. The tax administration estimated that 10% of<br />

taxpayers would file personal income tax returns online. The estimates have not been realized, since only<br />

2.8% of personal income taxpayers filed their tax returns electronically in 2006, while in 2008 a pre-filled<br />

tax return was introduced with the online service only used for special cases. The proportion of<br />

businesses and self-employed taxpayers was higher and become the only way of tax filling from 2009<br />

according to law change in 2007, when it become obligatory.<br />

The use of electronic filling or use of different software increased in several countries (i.e. in U.S. the<br />

proportion of self-prepared tax returns without software is dropped between 1993 and 2003 from about<br />

41% to 13% (Guyton et al., 2005); in Germany the number of electronic declarations increased to 8.2<br />

million, which is over 300 times more than ten years ago (Bavarian State Office for Taxation 2009)). The<br />

research question is whether the use of IT really decreases costs of compliance. According to Schaupp<br />

and Carter (2009), effort expectancy, performance expectancy, social influence, perceived risk, and<br />

optimism bias all have a significant impact on the intention to e-file.<br />

2. Overview of the research about compliance costs and eTaxation<br />

2.1 Slovenia<br />

The research into compliance costs for personal income taxpayers was carried out during 2007. The<br />

sample of 600 potential personal taxpayers was selected at random from the telephone directory. The<br />

letter enclosed with the questionnaires sent by mail includes information that the questionnaire could be<br />

completed online, since they are prepared electronically. A total of 481 taxpayers completed the<br />

questionnaire. We compared estimated compliance costs for personal income taxpayers that use online<br />

filling-in with those who use the traditional method. The share of taxpayers that returned the<br />

questionnaire and used e-filing of tax return was 26.9%. Using the chi-square test one can assume that<br />

there are statistically significant differences in the decision to use e-filing, depending on age, income<br />

level, education level and sex. The answers indicated that taxpayers aged 25 to 45 (30.7%) were the<br />

most common users of e-filing. If one compares the use of e-filing among taxpayers with different<br />

incomes, results showed that the higher proportion was for those with the highest income (34.1%). Men<br />

(35.6%) used online filing more often than woman. Online filing was more frequent among taxpayers with<br />

higher education qualifications (33.2%). It was found that average compliance costs per taxpayer did not<br />

differ significantly. Taxpayers that did not use online service had compliance costs that were on average<br />

€ 0.087 higher than for others. The Pearson correlation coefficient was also low (0.002) with high risk (2tailed<br />

significance=0.975). When all compliance costs parameters were compared (time spent by<br />

taxpayers, their family and their friends, consultancy costs and other expenditures) there were differences<br />

between both groups. It is interesting that the two groups of taxpayers on average needed practically the<br />

same time to file their tax returns (the difference could be measured only in seconds). The time spent by<br />

family and friends was higher for taxpayers who used e-filing, on average by 10 minutes. Correlation<br />

tests also showed that e-filing influenced the time spent by family members. In both groups only a very<br />

small portion of taxpayers used help from tax advisers and the costs spent on advisers are equal. The<br />

main difference appeared when other cash expenditure was compared. All taxpayers using e-filing stated<br />

that they did not have any monetary expenses. On the other hand 74.2% of taxpayers that used<br />

traditional methods had additional expenses. On average they spent € 7.00, mostly for copying and<br />

sending tax returns. The correlation between the decision to use online filing of tax return and cash<br />

expenditure was relatively high (Pearson’s correlation=0.620, p


2.2 Other countries<br />

Maja Klun<br />

In U.S.A. the IRS budget was nearly $10 billion (€ 7.3 billion) in the 2002 fiscal year, but the compliance<br />

costs of citizens far exceed the budget of the IRS. In 1993, 41 percent of taxpayers prepared their own<br />

tax returns without software and only 8 percent prepared their own returns on a computer. The tax<br />

software share tripled in a decade to 25 percent in 2003, while paid preparer use – the most common<br />

preparation method – rose to 62 percent. Paid preparers in most cases used computers (97%), while the<br />

percentage was lower for taxpayers (66%). Returns filed electronically quadrupled over ten years from<br />

12% to 48% in 2003. The proportion of individual tax returns filed electronically for the 2004 tax year was<br />

about 54% (Toder, 2005). In the research by Guyton et al. (2003) the average time burden is higher<br />

among taxpayers who use software (40.1 hours) or a paid professional (26.1 hours) than it is among<br />

taxpayers who prepare their return independently (18.2 hours). These results are likely due to differences<br />

in the average complexity of tax returns. Compliance costs of personal income taxpayers are the highest<br />

for taxpayers who use a paid professional ($244 or €178) than software users or self-preparers ($47 and<br />

$20 (€34 and €15), respectively). The research also stresses that average return complexity prepared by<br />

a paid professional or with tax software tended to be greater. A further explanation provided is that<br />

software users spend more time because of other benefits from software (i.e. better ability to do tax<br />

planning). Further research by Guyton et al. (2005) found out that “each group of taxpayers on average<br />

selects the preparation method that costs the least for them. For example, software costs more than selfpreparation<br />

for current self preparers, but costs less than self-preparation for current software users”.<br />

Taxpayers want to minimize their costs taking into account the value of their time.<br />

Research into compliance costs of taxation in Canada (Vaillancourt & Clemens, 2008) in 2005 estimated<br />

the costs between $16.2 billion and $25.0 billion (€12 billion and €18 billion) for personal income taxes,<br />

business taxes, and property taxes. Estimates for personal income tax were divided into the time<br />

required ($2.4 billion, which is app. €1.7 billion), the costs associated with tax preparers ($400.2 million to<br />

$1.3 billion - €293.2 million to €0.95 billion), and the costs of tax preparation software ($68.2 million to<br />

$163.6 million - €50 million to €119.9 million). Using IT in tax preparation therefore increased compliance<br />

costs for taxpayers. At the same time it was stressed that some advantages of software use were not<br />

included (i.e. increased accuracy of tax returns). The relationship between compliance costs and<br />

software usage has already been analyzed in previous research by Vaillancourt (1989), who found no<br />

significant evidence for a cost reduction resulting from the use of electronic tools. No significant<br />

relationship between the business compliance burden and an electronic data interchange with the tax or<br />

social insurance authorities was confirmed in Germany (Eichfelder & Schorn, 2011). In the research by<br />

Hansford et al. (2003) in the UK, estimates showed that businesses using a computer system for tax<br />

administration bore higher compliance costs.<br />

Some other research indicated positive effects of IT use on compliance costs. In 2004-05, Australians<br />

spent over 1.2 million Australian dollars (€0.9 million) managing their tax affairs, mainly because 74% of<br />

taxpayers need professional help. Estimates indicated that pre-filled electronic individual tax returns<br />

would reduce these costs for the 9 million Australians using e-tax or filing electronically via a tax agent<br />

(Sampson, 2007). According to Verwaal and Donkers (2001) international firms in the EU use IT for<br />

customs procedures. They stressed that the “integration of the information system can reduce the labour<br />

time needed to produce the required information. Furthermore, external integration by electronic data<br />

interchange between buyers, suppliers and customs authorities may reduce customs-related transaction<br />

costs”. They also pointed out the advantage of the reduced probability of mistakes.<br />

Fu et al. (2006) stated that “electronic filing of personal income taxes has the potential of improving the<br />

overall process of tax filing for the individual filer while at the same time reducing the cost to both<br />

taxpayers and tax collection agencies”. Kopczuk and Pop-Eleches (2007) found that electronic filing<br />

stimulates non-filers since participation in the Earned Income Tax Credit in the US is significantly<br />

correlated with e-filing and potentially reduces compliance costs.<br />

3. Conclusion<br />

ETaxation is one of the first and most commonly used electronic services by governments. Performance<br />

issues are often given as the main reason for implementing e-services. ETaxation offers several<br />

advantages, such as better data collection, better control, logic control of the system, quicker processing<br />

of data, better accuracy etc. The overview of research in the field indicates that a decrease in the<br />

compliance costs or even administrative costs of taxation is not a definite positive effect of eTaxation.<br />

Since different research has provided different results, from positive to negative and with no effect of<br />

337


Maja Klun<br />

eTaxation on compliance costs, it is difficult to confirm any of the presented effects. The research is in<br />

most cases partial and focused on separate issues of compliance costs. There is no research testing the<br />

positive and negative effects of eTaxation at the same time, and this is one of the limitations of the<br />

present research. Even if this were investigated, it would be difficult to compare the financial and nonfinancial<br />

pro and cons of eTaxation in arriving at a definite result.<br />

References<br />

Allers, A. (1994) Administrative and Compliance Costs of Taxation and Public Transfers in the Netherlands.<br />

Gronningen: Rijksuniversiteit.<br />

Ariff, M. (2001) Compliance Cost Research in Selected Asian Economies. V C. Evans, J. Pope, & J. Hasseldine, Tax<br />

Compliance Costs: A Festschrift for Cedric Sandford (str. 249-268). Sydney.<br />

Bavarian State Office for Taxation (eds.), (2009) Statistische Auswertungen zur elektronischen Steuererklärung.<br />

Munich: Bavarian State Office for Taxation.<br />

Chittenden, F., Kauser, S., & Poutziouris, P. (2003) »Tax Regulation and Small Business in teh USA, UK, Australia<br />

and New Zealand«, International Small Business Journal, Vol. 21, No.1, pp 93-115.<br />

Das-Gupta, A. (2003) The Income Tax Compliance Cost of Corporations in India, 2000-01. (online)<br />

http://papers.ssrn.com/sol3/papers.cfm?abstract_id=466041.<br />

Eichfelder, S., & Schorn, M. (2011) Tax compliance costs: A business administration perspective. FinanzArchiv .<br />

<strong>European</strong> Commission (2006) First progress report on the strategy for the simplification of the regulatory<br />

environment. Brussels: COM 690.<br />

Evans, C. (2003) » Studying the Studies: An overview of recent research into taxation operating costs«, eJournal of<br />

Tax research , Vol. 1, pp. 64-92.<br />

Evans, C., Ritchie, K., Tran-Nam, B., & Walpole, M. (1998) »Taxation Compliance Costs: Some Recent Empirical<br />

Work and International Comparisons«, Australian Tax Forum , Vol. 14, pp 93-122.<br />

Fu, J., Farn, C., & Chao, W. (2006) »Acceptance of electronic tax filing«, Information & Management, Vol.43, pp 109-<br />

126.<br />

Guyton, J. L., Korobow, A. K., Lee, P. S., & Toder, E. J. (2005) »The effects of tax software and paid preparers on<br />

compliance costs«, National Tax Journal , Vol. 58, No. 3, pp 439-449.<br />

Guyton, J. L., O'Hare, J. F., Stavrianos, M. P., & Toder, E. J. (2003) Estimating the Compliance Cost of the U.S.<br />

Individual Income Tax, National Tax Association Spring Symposium (str. 1-29). Washington: NTA.<br />

Hansford, A., Hasseldine, J., & Howorth, C. (2003) »Factors affecting the costs of UK VAT compliance costs of UK<br />

VAT compliance costs for small and medium-sized enterprises«, Government and Policy , Vol. 21, No. 4, pp<br />

479-492.<br />

Klun, M. (2009) »Pre-filled Income Tax Returns: Reducing Compliance Costs for Personal Income Taxpayers«,<br />

Financial Theory nad Practice , Vol. 33, No. 2, pp 219-233.<br />

Klun, M., & Blažić, H. (2005) »Tax compliance costs for companies in Slovenia and Croatia«, Finanzarchiv , Vol. 61,<br />

No. 3, pp 418-437.<br />

Kopczuk, W., & Pop-Eleches, C. (2005) Electronic Filing, Tax Preparers, and Participation in the Earned Income Tax<br />

Credit. Cambridge: NBER.<br />

Lešič, T. (2010) The impact of eTax system on the operation of the Tax Administration of the Republic of Slovenia .<br />

Maribor: University of Maribor.<br />

OECD. (2001) Business’ Views on Red Tape, Administrative and Regulatory Burdens on Small and Medium Sized<br />

Enterprises . Paris: OECD.<br />

OECD. (January 2007) Cutting Red Tape: National Strategies. Policy Brief.<br />

Sampson, A. (12. May 2007) Pre-filled tax returns still need checking. Business Day.<br />

Sandford, C. T., Godwin, M., & Hardwick, P. (1989) Administrative and Compliance Costs of Taxation. Bath: Fiscal<br />

Publications.<br />

Schaupp, L. C., & Carter, L. D. (2009) »Antecedents to e-File Adoption: The U.S. Citizen's Perspective«, eJournal of<br />

Tax Research ,Vol. 7, No. 2, pp 158-170.<br />

Tax Administration of teh Republic of Slovenia (eds.). (2010) Annual report. Ljubljana: Tax Administration of teh<br />

Republic of Slovenia.<br />

Toder, E. J. (9. May 2005) Changes in Tax Preparation methods, 1993-2003. Tax Notes .<br />

Tran-Nam, B., Evans, C., Ritchie, K., & Walpole, M. (2000) »Tax Compliance Costs:Research Methodology and<br />

Empirical Evidence from Australia«, National Tax Journal , Vol. 3, pp 229-252.<br />

Vaillancourt, F. (1989) The administrative and compliance costs of the personal income tax and payroll tax system in<br />

Canada. Toronto: Canadian Tax Foundation.<br />

Vaillancourt, F., & Clemens, J. (2008) Compliance and Administrative Costs of Taxation in Canada. V J. Clemens<br />

(ed), The Impact and Cost of Taxation in Canada: The Case for a Flat Tax Reform (pp 55-102). Fraisr Institute.<br />

Verwaal, E., & Donkers, B. (2001) Customs-related Transaction Costs, Firm Size and International Trade Intensity.<br />

Rotterdam: ERIM.<br />

Vitek, L., Pavel, J., & Pubal, K. (2003) Effectiveness of the Czech Tax System – Administrative and Compliance<br />

Costs Measurement. Prague: IIPF Congress.<br />

338


International Assistance Relationship to eGovernment<br />

Development and Benchmarking<br />

Endrit Kromidha<br />

Royal Holloway University of London, UK<br />

Endrit.Kromidha.2009@live.rhul.ac.uk<br />

Abstract: Purpose – The changes that happen as a result of international interventions in eGovernment initiatives<br />

present not only a number of challenges but also an interesting area of study. In this context, this paper analyzes the<br />

relationship between eGovernment and international assistance in a group of developing countries. International<br />

organisations could have multiple involvements as donors, implementers and evaluators of eGovernment. This leads<br />

to complex eGovernment mechanisms and situations, when international assistance is related to public<br />

administration reforms. The aim in this paper is also to critically analyze benchmarking as an evaluation tool in<br />

international eGovernment assistance. Research approach and design – This is a comparative and longitudinal<br />

study of eGovernment development processes in Albania, Bosnia and Herzegovina, Croatia, Former Yugoslav<br />

Republic of Macedonia, Montenegro and Serbia. In this context, the simple eGovernment strategy- implementation -<br />

evaluation cycle is used from a neoinstitutionalist perspective as a framework for the analysis. Quantitative data such<br />

as the eGovernment benchmarking index and the amount of international assistance are combined with qualitative<br />

information from reports and legal documents to analyze the relationship between international assistance and<br />

eGovernment development. Findings – This study shows a positive relationship between international eGovernment<br />

assistance and eGovernment development reflected on benchmarking indexes in the event when the same donor<br />

(the United Nations in this case), is involved in both processes. The research also suggests that the effect of<br />

international assistance on eGovernment is generally positive in less developed countries. The discussion on<br />

benchmarking reveals some important issues related to the role of international organisations as both eGovernment<br />

assistance donors and performance evaluators. Limitations – The study is focusing on international assistance from<br />

only one donor in only one area, that of eGovernment strategy making. A comparison of other factors and actors<br />

could contribute to analyze not only the correlation but also the effectiveness of international assistance on<br />

eGovernment. A comparative analysis of different eGovernment benchmarking methods and actors could be the<br />

subject of future studies related to international eGovernment assistance. Original value – This is an original effort to<br />

identify the relationships that exist between international assistance and eGovernment development. Taking a<br />

neoinstitutionalist approach this study shares some theoretical insights on the evolution of internationally assisted<br />

eGovernment initiatives and benchmarking into institutions. A converging point between the two is the donorbenchmarker<br />

institutional duality. The critical analysis of eGovernment benchmarking is based more on the<br />

involvement of actors rather than on its methodology as in many other studies. Finally, this research points out the<br />

complexity of internationally assisted eGovernment reforms in developing countries and gives some suggestions for<br />

future studies in this field.<br />

Keywords: eGovernment, international assistance, benchmarking, neoinstitutionalism, donor-benchmarker duality<br />

1. Internationally assisted eGovernment initiatives as institutions<br />

Significant work is done recently in the context of companies to analyse how people interact with<br />

technology (Geels, Schot 2007, Orlikowski 2008, Harrison, Koppel & Bar-Lev 2007, Orlikowski 1992,<br />

Walsham, Waema 1994, Poel 2003). There is an ongoing debate whether action and structure need to<br />

be considered separately or together (Kallinikos 2004). The debates and fast developments in this field<br />

evidence a persisting problem with the theoretical framing of socio-technical dynamics as evidenced very<br />

early on (Archer 1982, Orlikowski, Robey 1991). Although many conceptual implications can be derived<br />

from these studies about the use of technology in the public sector, even in eGovernment studies the lack<br />

of theoretical frameworks remain a persistent problem (Heeks, Bailur 2007). Because of their complexity,<br />

the choice of research approaches and methods becomes of great importance at this point.<br />

Starting with international assistance, eGovernment, and benchmarking, a theoretical framework or<br />

model should be able to describe the dynamics between the different types of organisations involved.<br />

The focus in this study is not only on the human-technology micro interactions, but more on the macro<br />

development of systems, policies, organisational changes and their environment. In early new<br />

institutionalist research it is noted that ‘organisations are structured by phenomena in their environments’<br />

as well as ‘by technical and exchange interdependencies’ (Meyer, Rowan 1977) resorting to isomorphism<br />

or in other words ‘becoming similar’ explanation. This initial idea of organisational institutionalisation of<br />

technology was not new (Hawley 1950, Thompson 1967, Aiken, Hage 1968). However is was DiMaggio<br />

and Powel (1983) who tried to explain isomorphism in the new institutionalism by three types of forces:<br />

coercive based on pressures, normative based on rules and mimetic based on similarities. In this early<br />

context, the new institutionalism deals with the idea of rules that influence the way organisations are<br />

339


Endrit Kromidha<br />

transformed and become similar to each-other, even when they develop in different ways (Meyer, Rowan<br />

1977, DiMaggio, Powell 1983, March, Olsen 1989, North 1990, Zucker 1977, Scott 1995). The theory<br />

tries to explain how institutions evolve thus influencing organisations and society as a whole. More recent<br />

studies on technology and institutions (Orlikowski, Barley 2001, Baptista (John), Newell & Currie 2010,<br />

Colyvas 2007) and specifically on eGovernment institutionalisation (Fountain 2001, Madon et al. 2009)<br />

increasingly take an system approach, suggesting a balanced view of socio-technical or techno-social<br />

relationships. In this context, this paper follows the route suggested by Orlikowski and Barley (2001) for<br />

developing more powerful explanations of how technological systems and institutions evolve in an<br />

environment of political and human factors. Therefore, in this study, international eGovernment<br />

assistance is considered not only as an instrument, but also as an institutional actor.<br />

Like a long term business contract and its outcomes can lead to the development of institutions between<br />

companies doing business together, so are considered internationally assisted eGovernment initiatives<br />

for donors and governments in this study. By default assistance is given and received based on certain<br />

needs (Burnside, Dollar 2000, Alesina, Dollar 2000, Collier, Dollar 2002), aiming at some positive results<br />

for both the donor and recipient (Crawford 2001). In this context it is argued that ‘there is no intrinsic<br />

difference between behavioural regularities and institutions’ (Diermeier, Krehbiel 2003). When<br />

international assistance as well as its benchmarking is routinised, standardised and formalised by<br />

international organisations and recipients, they become institutions that influence all parties involved.<br />

International assistance on eGovernment is not sufficiently covered by the literature and this paper<br />

contributes to filling this gap. The evidence in the following part highlights some similarities in the<br />

development of national eGovernment and ICT (Information and Communication Technology) strategies<br />

from international assistance in different countries. Even more interesting is the eGovernment evaluation<br />

and its relationship to international assistance from a single benchmarking report’s perspective. Analysing<br />

and some comparative evidence and a providing critical analysis, this study tries to share some light on<br />

the complexity of this field of study.<br />

2. Methodology and findings from a neoinstitutionalist perspective<br />

Following the previous part on the theoretical conceptualisation of internationally assisted eGovernment<br />

initiatives as institutions and looking at the policy development framework (Stone, Maxwell & Keating<br />

2001), it is possible to assume that their development happens in stages. The Strategy-Implementation-<br />

Evaluation eGovernment cycle can be used to “qualify” and lead the analysis of quantified eGovernment<br />

development given by benchmarking.<br />

Figure 1: Strategy - implementation - evaluation cycle<br />

340


Endrit Kromidha<br />

In the case of international assistance on national eGovernment and ICT strategies, it is assumed that<br />

some international ideas, experiences and practices including benchmarking itself are combined with<br />

national policies and characteristics. The connected ‘institutional’ mechanisms of assistance and<br />

benchmarking are related to both the donor and the recipient country. This study attempts to give a<br />

simple quantified view and a critical analysis of this institutionalising relationship. Rather than simply<br />

defining a relationship between international assistance and eGovernment, the use of the strategyimplementation-evaluation<br />

cycle in this study suggests a shift of focus towards these three different<br />

stages of institutional expansion.<br />

This study starts with an empirical analysis of data and benchmarking to then dynamically move towards<br />

an interpretivist perspective, often used in information systems research (Walsham 1995, 2006). This<br />

approach tries to capture some of the institutional dynamics of international eGovernment assistance<br />

based on the strategy-implementation-evaluation cycle. International assistance on eGovernment and<br />

ICT strategies is often an evolving process of change. Designing strategies is only the first step towards<br />

fully functional and sustainable eGovernment solutions in the following six Western Balkan countries<br />

considered in this study:<br />

AL - Albania<br />

BH - Bosnia and Herzegovina<br />

CR - Croatia<br />

MN - Montenegro<br />

MC - Former Yugoslav Republic of Macedonia<br />

SR - Serbia<br />

Most of the countries are considered as developing transition economies (UNCTAD 2010). The purpose<br />

of the international public sector involvement in these countries is to develop democratic governance<br />

systems (UNDP Europe and CIS 2010). In order to understand the role international assistance on<br />

eGovernment and ICT national strategies, implementation and evaluation, first it is necessary to compare<br />

the six countries based on the Global UN eGovernment Survey benchmarking index (UNPAN 2003-<br />

2010). The survey is a consistent benchmarking database on eGovernment, allowing comparisons for the<br />

period 2003-2010, based on three main index components: Web Measurement, Telecommunications and<br />

Human Capital with 1/3 weight each. United Nations’ organisations are the source of both international<br />

assistance (UNDP) and benchmarking (UNPAN). In this study this situation is assumed to increase the<br />

credibility of findings and analysis by means of data consistency and triangulation of information focus on<br />

a single international organisation to have a sound basis for comparison. The results for the six western<br />

Balkan countries based on the United Nations eGovernment Development Knowledge Base (UNPAN<br />

2003-2010) are given in the following table:<br />

Table 1: eGovernment Index 2003-2010 for six Western Balkan countries<br />

Change Change 2004<br />

Country 2003 2004 2005 2008 2010 2004 -2010 – 2010 in %<br />

AL 0.3110 0.3400 0.3732 0.4670 0.4519 0.1119 0.3291<br />

BH 0.3090 0.3790 0.4019 0.4509 0.4698 0.0908 0.2396<br />

CR 0.5310 0.5227 0.5480 0.5650 0.5858 0.0631 0.1207<br />

MC 0.3620 0.3699 0.4633 0.4866 0.5261 0.1562 0.4223<br />

MN N/A 0.4282 0.4282 0.4282 0.5101 0.0819 0.1913<br />

SR 0.3710 0.3871 0.1960 0.4828 0.4585 0.0714 0.1844<br />

Source: UNPAN<br />

The information summarised in this table shows that the countries with the lowest level of eGovernment<br />

index in 2003, BH, AL and to a certain extent MC experienced the highest increase until 2010, with MC<br />

and then AL being first with 42% and 33% increase respectively. Countries like CR that started at a high<br />

level of eGovernment index in 2003 experienced a low increase until 2010 of only 12%. The object of this<br />

study however is to analyze how international assistance on ICT and eGovernment strategies is related<br />

to the eGovernment index change for the period from 2004 when most of this assistance was given to<br />

2010. The amounts of international assistance given for this purpose, summarised in the table below,<br />

were adjusted according to the population in each country. A standard unit for the comparison of all<br />

countries in this case is ‘USD assistance / capita’ in total for the period:<br />

341


Endrit Kromidha<br />

Table 2: International assistance on national eGovernment and ICT strategies<br />

Country Donor Period Amount Population in<br />

2004<br />

USD assistance<br />

/ capita<br />

AL UNDP AL From 2003 $217,654 3,100,000 0.0702<br />

BH UNDP BH From 2004 $250,000 3,780,000 0.0661<br />

MC UNDP MK From 2005 $138,928 2,030,000 0.0684<br />

SR UNDP SR From 2005 $10,000 7,460,000 0.0013<br />

Source: UNDP, World Bank<br />

The population figures in 2004 (World Bank 2010) were used because this is the year in which most of<br />

this assistance for the development of strategies was given/received. Croatia and Montenegro are not<br />

included in the table because they didn’t receive any international assistance from UNDP or any other<br />

donor for their eGovernment and ICT national strategies. Their USD assistance / capita index is obviously<br />

It is clear from the table that the countries with the lowest level of eGovernment index in 2003-2005<br />

received most of the support, Albania being in the first place with 0.0702 USD assistance / capita. The<br />

chart represents the relationship between the international assistance for the development of national ICT<br />

strategies and the UN eGovernment index change in 2004-2010:<br />

Figure 2: International assistance and eGovernment index change<br />

Looking at the chart, it is clear that the improvement in the ICT sectors and eGovernment for the period<br />

2004-2010 has been bigger for the three countries, AL, BH and MC that received the highest international<br />

assistance per capita for their national strategies. According to the data and the trend-line in this chart,<br />

there is a positive relationship between international assistance per capita given in 2004 and change in<br />

percentage on eGovernment index until 2010. Reports on respective countries reveal that assistance on<br />

ICT and eGovernment strategies in these three countries was supported by other projects as well<br />

(UNDP). This shows a pattern in the donors’ behaviour to support and follow-up previous projects,<br />

especially those focused on strategies, with other ones to help their implementation. It is during this<br />

process of continuous support, long-term joint interest and isomorphic sustainable development where<br />

internationally assisted eGovernment initiatives are transformed from instruments into institutions.<br />

Although a positive change might be a very good indicator for the donor to show the effectiveness of its<br />

assistance, the receiving country is interested on the final result of that assistance compared to other<br />

countries. This is related to the implementation stage in the institutional evolution of internationally<br />

342


Endrit Kromidha<br />

assisted eGovernment initiatives. In this context, comparing the eGovernment indexes for 2010 for the six<br />

countries in the Western Balkans, we get a different picture, as shown in the following chart:<br />

Figure 3: International assistance in 2004 and the eGovernment index in 2010<br />

In this chart the fixed 2010 eGovernment index values are considered and not the change as in the<br />

previous one. The results presented here are to some extent controversial to the previous one. It is clear<br />

that the countries that received very little (SR) or no international assistance at all (CR and MN) to<br />

develop and implement eGovernment and ICT strategies, are in similar or higher position (CR) than those<br />

that received most of it (AL, BH and MC). The eGovernment index development between 2004-2010 for<br />

each of the countries in the following chart gives a better picture of this situation.<br />

Figure 4: Comparison of countries based on the EGovernment index level 2004 - 2010<br />

By simply looking at this chart it is evident that all countries that received international assistance to<br />

develop their national eGovernment and ICT strategies around 2004 experienced a quicker growth in<br />

their eGovernment index around 2005, but after that, their incremental increase was smaller compared to<br />

the countries that didn’t receive any assistance. It is easy to notice on the other hand that CR or MN have<br />

343


Endrit Kromidha<br />

a steady or increasing marginal change in their eGovernment indexes up to 2010, although they didn’t<br />

receive any assistance for their strategies. These results suggest that in the context of ICT and<br />

eGovernment, development is easier with a higher involvement of the recipient countries. However, it can<br />

be noticed that almost all countries (maybe except Serbia due to political instability and issues with<br />

Kosovo in the meantime) present a very similar increasing trend, regardless of receiving international<br />

assistance on eGovernment and ICT strategies or not. This could suggest that international assistance<br />

has a week influence in this sector. Furthermore the institution of international partnership between the<br />

donor and the recipient of eGovernment assistance is not strongly related to the amount and scope of<br />

this assistance.<br />

The critical approach of the quantitative data analysed here could suggests that benchmarking as the<br />

evaluation stage of eGovernment could be a self assessment tool for the evaluating organisation itself if<br />

involved in the two previous stages of strategy and implementation. In this process when benchmarking<br />

becomes a trend, creates continuity and introduces some isomorphic characteristics, it turns from an<br />

evaluation instrument into an institution. The advance of this institution influences both the donor and the<br />

recipient, potentially leading to the consequent stage of strategic reformulation.<br />

3. A critical analysis of eGovernment assistance and benchmarking<br />

An important element at this point is to understand the “Why?” of the situation shown by the data.<br />

According to a constructivist approach of institutionalisation, the strategy-implementation-evaluation cycle<br />

is assumed to be a normal process intended to benefit both the donor and the receiving party suggesting<br />

‘institutionalisation as the normalisation of policy paradigms’ (Hay 2006). EGovernment benchmarking as<br />

a developing institution has become an increasing trend from the late 90s, sometime considered also as<br />

‘a booming business’ (Bannister 2007). However, as Bannister (2007) points out, due to its problems with<br />

standardisation, purpose and the distortion effects, ‘benchmarks are not a reliable tool for measuring real<br />

eGovernment progress’. Contributing to this discussion and following the previous session with the data,<br />

there are some important issues that should be considered carefully before deriving any conclusion in<br />

this study.<br />

The starting point: Comparing countries with each other requires having a standard or common starting<br />

point. While the international assistance was adjusted according to the population in each country, the<br />

eGovernment index was not modified. For different reasons, countries like Croatia for example had a<br />

starting point far above all other region countries compared here. Assuming that Croatia is not developing<br />

fast enough now compared to the other countries is not entirely correct, since we don’t know what will be<br />

the development of the other countries when they reach the starting level of Croatia in 2004.<br />

The marginal change: The simple difference between the eGovernment index in 2010 and the one in<br />

2004 shows that the change is marginal, meaning that the more developed a country is, the smaller its<br />

incremental development (AL, BH, MC in Figure 6). Already developed countries that have reached a<br />

high development level do no experience the same growth compared to more developing countries.<br />

Because of this reason, it could be not entirely correct to assume that the least developed countries<br />

considered here in terms of ICT and eGovernment development are doing better than more developed<br />

countries when receiving international assistance.<br />

Donor-benchmarker duality: The scope of this study was not only to compare some countries, but also<br />

to analyse the role of that one actor, the United Nations, that is directly involved in the strategy,<br />

implementation and evaluation/benchmarking stages. Careful consideration is needed when the same<br />

organisation that is evaluating eGovernment is also supporting it for some countries through international<br />

assistance while leaving other countries to use their own resources. This situation could have an<br />

important role on the strategic implications and planning of national policies. Normally a country would be<br />

inclined to accept international assistance on strategic sectors such as ICT and eGovernment from such<br />

organisations. In the context of this study, it was not possible to find any case of such international<br />

assistance from donors being refused. The reason could be simply the fact that the donor has a strong<br />

international position also as the evaluator. Who would know better what is needed to rate higher in the<br />

next evaluation if not the evaluator itself? In the worst case a government might have to pay for this<br />

assistance. Again, the same private companies such as Capgemini or Ernst and Young that prepare the<br />

benchmarking (Bannister 2007) could be among the first to contact for premium expertise. It is necessary<br />

to highlight however that the interest and motives of UN and other international organisations giving<br />

assistance are different from those of the companies that benefit directly from the benchmarkingconsultancy<br />

combination.<br />

344


Endrit Kromidha<br />

Regardless of the criticism on international eGovernment assistance and its evaluation, this study has<br />

shown that improvements are being made. International donors are realizing the importance of evaluation<br />

and assessment on assistance, especially on democracy and government assistance (Crawford, Kearton<br />

2002), however they need to be careful on their involvement. As a final remark, regardless of its<br />

challenges, international assistance given for the development and implementation of eGovernment and<br />

ICT strategies could be considered more as a success rather than as a failure.<br />

4. Limitations<br />

The use of neoinstitutionalism as a theoretical approach to explain some of the main issues in this study<br />

is only an exploratory one based on an attempt to combine quantitative and qualitative data analysis. A<br />

more detailed analysis could contribute to neoinstitutionalism focusing more on the issues of power,<br />

without excluding here the potential of other theoretical and methodological approaches such as the<br />

Actor Network Theory to provide a different explanation of international eGovernment assistance<br />

networks and dynamics.<br />

This study is limited to a few countries and one donor, analyzing only the eGovernment and ICT strategy<br />

assistance. Other international donors and organisations might show different characteristics in the<br />

strategy – implementation – evaluation cycle, especially in the absence of the donor-benchmarker duality.<br />

The donors’ interaction with each other, especially when they share common objectives and goals is<br />

something that deserves some more attention in future research.<br />

5. Conclusions<br />

This study suggests that international assistance on ICT and eGovernment strategy development could<br />

have a limited but positive impact on overall eGovernment levels based on their positive relationship<br />

identified here. This could be especially true in less developed countries, similar to the ones studied in<br />

this research. At the same time, the research identifies some important problems that need to be<br />

addressed carefully before driving any results on international eGovernment assistance efficiency such<br />

as the starting inequalities between countries compared and the involvement of organisations and donors<br />

in different stages of the strategy – implementation – evaluation cycle. In this study, using both<br />

quantitative and qualitative data, critically analysing benchmarking and trying to explain phenomena<br />

through a theoretical framework was indeed challenging. However, this might be the only way to analyse<br />

complex situations of international assistance throughout the strategy, implementation and evaluation<br />

stages especially in fast developing sectors such as ICT and eGovernment.<br />

Long term development remains one of the biggest challenges, both for the international assistance<br />

donors and the recipient countries in all stages of ICT and eGovernment development from strategy to<br />

evaluation. It is generally implied that countries receiving international assistance have, at a certain point<br />

to develop their own capabilities. The ICT and eGovernment national strategies are only the first step<br />

towards long lasting reforms.<br />

From a neoinstitutionalist perspective, internationally assisted eGovernment initiatives in one hand and<br />

benchmarking on the other can be transformed from instruments into institutions. For this to occur, a<br />

process of trend creation, continuous support, long-term joint interests and isomorphic changes is<br />

needed. The donor-benchmarker duality critically analyzed in this study suggests that these two<br />

institutions are inter-related and could develop jointly. A major role in this case is played by international<br />

organizations with multifaceted involvement in the strategy-implementation-evaluation cycle of<br />

institutional development.<br />

References<br />

Aiken, M. & Hage, J. 1968, "Organizational Interdependence and Intra-Organizational Structure", American<br />

Sociological Review, vol. 33, no. 6, pp. pp. 912-930.<br />

Alesina, A. & Dollar, D. 2000, Who Gives Foreign Aid to Whom and Why?, Boston.<br />

Archer, M.S. 1982, "Morphogenesis versus Structuration: On Combining Structure and Action", The British journal of<br />

sociology, vol. 33, no. 4, pp. 455-483.<br />

Bannister, F. 2007, "The curse of the benchmark: an assessment of the validity and value of eGovernment<br />

comparisons", International Review of Administrative Sciences, vol. 73, no. 2, pp. 171.<br />

Baptista (John), J., Newell, S. & Currie, W. 2010, "Paradoxical effects of institutionalisation on the strategic<br />

awareness of technology in organisations", The Journal of Strategic Information Systems, vol. 19, no. 3, pp.<br />

171-183.<br />

345


Endrit Kromidha<br />

Burnside, C. & Dollar, D. 2000, "Aid, Policies, and Growth", The American Economic Review, vol. 90, no. 4, pp. 847-<br />

868.<br />

Collier, P. & Dollar, D. 2002, "Aid allocation and poverty reduction", <strong>European</strong> Economic Review, vol. 46, no. 8, pp.<br />

1475-1500.<br />

Colyvas, J.A. 2007, "From divergent meanings to common practices: The early institutionalization of technology<br />

transfer in the life sciences at Stanford University", Research Policy, vol. 36, no. 4, pp. 456-476.<br />

Crawford, G. & Kearton, I. 2002, "Evaluating democracy and governance assistance", Centre for Development<br />

Studies, University of Leeds.<br />

Crawford, G. 2001, Foreign aid and political reform: a comparative analysis of democracy assistance and political<br />

conditionality, Palgrave Macmillan.<br />

Diermeier, D. & Krehbiel, K. 2003, "Institutionalism as a Methodology", Journal of Theoretical Politics, vol. 15, no. 2,<br />

pp. 123.<br />

DiMaggio, P.J. & Powell, W.W. 1983, "The Iron Cage Revisited: Institutional Isomorphism and Collective Rationality<br />

in Organizational Fields", American Sociological Review, vol. 48, no. 2, pp. 147-160.<br />

Fountain, J.E. 2001, Building the virtual state: Information technology and institutional change, Brookings Inst Pr.<br />

Geels, F.W. & Schot, J. 2007, "Typology of sociotechnical transition pathways", Research policy, vol. 36, no. 3, pp.<br />

399-417.<br />

Harrison, M.I., Koppel, R. & Bar-Lev, S. 2007, "Unintended consequences of information technologies in health care-<br />

-an interactive sociotechnical analysis", Journal of the American Medical Informatics Association, vol. 14, no. 5,<br />

pp. 542-549.<br />

Hawley, A.H. 1950, Human ecology: A theory of community structure.<br />

Hay, C. 2006, "Constructivist institutionalism", The Oxford Handbook of Political Institutions, pp. 56–74.<br />

Heeks, R. & Bailur, S. 2007, "Analyzing eGovernment research: Perspectives, philosophies, theories, methods, and<br />

practice", Government Information Quarterly, vol. 24, no. 2, pp. 243-265.<br />

Kallinikos, J. 2004, "Deconstructing information packages: Organizational and behavioural implications of ERP<br />

systems", Information technology & people, vol. 17, no. 1, pp. 8-30.<br />

Madon, S., Reinhard, N., Roode, D. & Walsham, G. 2009, "Digital inclusion projects in developing countries:<br />

Processes of institutionalization", Information technology for development, vol. 15, no. 2, pp. 95-107.<br />

March, J.G. & Olsen, J.P. 1989, Rediscovering institutions: The organizational basis of politics, Free Pr.<br />

Meyer, J.W. & Rowan, B. 1977, "Institutionalized Organizations: Formal Structure as Myth and Ceremony", The<br />

American Journal of Sociology, vol. 83, no. 2, pp. pp. 340-363.<br />

North, D.C. 1990, Institutions, institutional change, and economic performance, Cambridge Univ Pr.<br />

Orlikowski, W.J. 2008, "Using technology and constituting structures: A practice lens for studying technology in<br />

organizations", Resources, Co-Evolution and Artifacts, , pp. 255-305.<br />

Orlikowski, W.J. & Robey, D. 1991, "Information technology and the structuring of organizations", Working paper<br />

(Sloan School of Management); 3284-91., .<br />

Orlikowski, W.J. 1992, "The Duality of Technology: Rethinking the Concept of Technology in Organizations",<br />

Organization Science, vol. 3, no. 3, Focused Issue: Management of Technology, pp. 398-427.<br />

Orlikowski, W.J. & Barley, S.R. 2001, "Technology and Institutions: What Can Research on Information Technology<br />

and Research on Organizations Learn from Each Other?", MIS Quarterly, vol. 25, no. 2, pp. pp. 145-165.<br />

Poel, I.v.d. 2003, "The transformation of technological regimes", Research Policy, vol. 32, no. 1, pp. 49-68.<br />

Scott, W.R. 1995, "Institutions and organizations. Foundations for organizational science", London: A Sage<br />

Publication Series, .<br />

Stone, D., Maxwell, S. & Keating, M. 2001, "Bridging research and policy", Background paper presented for An<br />

International Workshop Funded by the UK Department for International Development, Radcliffe House, Warwick<br />

University.<br />

Thompson, J.D. 1967, "Organizations in action: Social science bases of administration", .<br />

UNCTAD 2010, Information Economy Report, United Nations, New York and Geneva.<br />

UNDP Europe and CIS 2010, United Nations Development Programme - Democratic Governmance [Homepage of<br />

United Nations Development Programme], [Online]. Available: http://europeandcis.undp.org/ [2010, November] .<br />

UNPAN 2003-2010, United Nations EGovernment Development Knowledge Base, United Nations Public<br />

Administration Networks, New York and Geneva.<br />

Walsham, G. 2006, "Doing interpretive research", <strong>European</strong> Journal of Information Systems, vol. 15, no. 3, pp. 320-<br />

330.<br />

Walsham, G. 1995, "Interpretive case studies in IS research: nature and method", <strong>European</strong> journal of information<br />

systems, vol. 4, no. 2, pp. 74-81.<br />

Walsham, G. & Waema, T. 1994, "Information systems strategy and implementation: a case study of a building<br />

society", ACM Transactions on Information Systems (TOIS), vol. 12, no. 2, pp. 150-173.<br />

World Bank 2010, World Population statistics. Available: http://datafinder.worldbank.org/population-total [2010].<br />

Zucker, L.G. 1977, "The Role of Institutionalization in Cultural Persistence", American Sociological Review, vol. 42,<br />

no. 5, pp. pp. 726-743.<br />

346


Challenges to the Design and use of Stages-of-Growth<br />

Models in eGovernment<br />

Devender Maheshwari, Anne Fleur van Veenstra and Marijn Janssen<br />

Delft University of Technology, Delft, The Netherlands<br />

D.Maheshwari@tudelft.nl<br />

A.F.E.vanVeenstra@tudelft.nl<br />

M.F.W.H.A.Janssen@tudelft.nl<br />

Abstract: In the past decade stages-of-growth models have gained considerable attention in eGovernment research<br />

and practice. Stage models often regard eGovernment development as a progressive accumulation of steps.<br />

Although stage models have advantages as they give direction to development and help to outline the desired<br />

outcomes, they provide limited help at the organizational level and attract much criticism. This paper investigates and<br />

compares a number of stages-of-growth models to identify challenges to the design and use of these models in<br />

eGovernment. Based on existing literature and by analyzing stages-of-growth models, challenges are identified and<br />

discussed to give better insight into the design, use, and application of these models both for research and practice.<br />

We found that many of the stage models propose a linear sequence of activities, and only provide help at the early<br />

stages of development. Although conceptually appealing, most stage models are hard to translate to the situation of<br />

individual organization. Stages-of-growth-models do not have any standardized design and development structure as<br />

the majority of models evolved from an effort to achieve specific objectives of an organization, business or<br />

researcher. Measuring and benchmarking the stages models is a multifaceted exercise as the models not only differ<br />

in scope and dimensions, but also give scant attention to the back-office stages-of-growth.<br />

Keywords: eGovernment, stages-of-growth models, benchmarking, measurement, stages<br />

1. Introduction<br />

eGovernment development started in the mid-1990s when organizations realized the significance of<br />

information technology (IT) for their performance and began to use IT to excel in their administrative<br />

processes (Siau and Long 2004; Siau and Long 2005). At the same time, stage models describing<br />

eGovernment development gained attention and they are used by many government organizations all<br />

over the world (Layne and Lee 2001; Moon 2002; Reddick 2004; Siau and Long 2005; Klievink and<br />

Janssen 2008; Lee 2010). The development of stage models by different organizations and governments<br />

has resulted in a wide variety of models, varying in their scope and focus. Currently, however, the stage<br />

models are increasingly criticized for their design, operation, implementation, measurement and<br />

benchmarking methods (Janssen, Rotthier et al. 2004; Kaplan and Norton 2004; Bannister 2007;<br />

Coursey and Norris 2008; Janssen 2010). After having been applied for over a decade, these authors<br />

also discuss a range of problems related to the application of stage models in eGovernment. Thus, the<br />

development and application of stage models faces several challenges. Furthermore, the wide variety of<br />

stage models present also leads to questions on which stage model is applicable in a specific situation.<br />

The development and use of stage models depends on the benefits that are realized and any adverse<br />

effects that might exist. Although benefits of stages-of-growth-models are highlighted by many, providing<br />

an insight into the challenges and disadvantages of these stage models is likely to give policy and<br />

decisions makers the opportunity to better exploit the advantages and overcome these challenges.<br />

Therefore, in this paper we analyse the characteristics of existing stages-of-growth-models and identify<br />

challenges to the design and use of the stage models. In section 2 we give an overview of the most<br />

commonly used stage models in literature by discussing their characteristics, differences, and the<br />

criticism that they have attracted. Then, in section 3 we identify challenges to the design and use of stage<br />

models based on the characteristics and comparison of stages-of-growth models, followed by a<br />

discussion of these characteristics and challenges in section 4. Finally, in section 5 we present our<br />

conclusions and recommendations for future research.<br />

2. Background of stages-of-growth models in eGovernment<br />

2.1 Origins and application<br />

eGovernment aims to implement electronic services for citizens and businesses, as well as digitizing<br />

processes and applications in governments across the globe. After the emergence of eGovernment,<br />

researchers as well as public and private sector organizations started to draw frameworks to fulfil the<br />

objectives of eGovernment initiatives. Stage models were introduced in eGovernment to describe<br />

347


Devender Maheshwari et al.<br />

eGovernment development (descriptive) and guide eGovernment implementation (prescriptive). Many<br />

different stage models have been developed by governments, private organizations, and by researchers.<br />

In 2000, the Gartner group presented a stage model defining the roadmap to achieve objectives of<br />

eGovernment (Baum and Di Maio 2000). In 2001 four more stage models were developed (Hiller and<br />

Bélanger 2001; Layne and Lee 2001; UN 2001; Wescott 2001), followed by another one in 2002 (Moon<br />

2002). Since then, many more stage models have been proposed, tested and implemented by various<br />

researchers and organizations. Most of the eGovernment stage models focus on the front-office as<br />

starting point to satisfy the needs of citizens and businesses, (see for, example (Baum and Di Maio 2000;<br />

Hiller and Bélanger 2001; Kaplan and Norton 2001; Layne and Lee 2001; Moon 2002).<br />

Applications of eGovernment stages-of-growth are many, e.g. publishing, interaction, integration, political<br />

participation, and transformation (see Table 1); whereas the applications for using the stages-of-growth<br />

models are based on the design and implementation objectives of eGovernment. An advantage of<br />

applying stage models to the implementation of eGovernment is the reduction of complexity. Depending<br />

on the scope of the implementation and on its complexity, similar blocks are combined and renamed as<br />

stages, and used to implement eGovernment step-by-step in a customized manner. Layne and Lee<br />

(2001) state that the unmanageable and chaotic challenges of eGovernment implementation can be<br />

resolved to some extend by defining a stages-of-growth model.<br />

Stage models illustrate the growth and maturity of eGovernment that helps organizations to determine the<br />

current status and provides guidelines for further developments. Stage models can be used to determine<br />

the maturity level of eGovernment within a stage or on the preferred roadmap. The term maturity<br />

describes the current state of a given level in a continuous process (Andersen and Henriksen, 2006).<br />

Furthermore, the stage models can also be used for measuring and benchmarking. In order for this to be<br />

effective, the stage models need to be aligned, structured and designed comprising balanced front-office,<br />

back-office, and political participation stages. Stage models are flexible and can be designed for<br />

achieving the objectives of policy makers. Hence, the designers can develop software applications to<br />

implement the stages as per the policies. Whereas the designers only implement policies, the policy<br />

makers and strategy developers can also indirectly inherit the consequences and re-define the policies<br />

based on design constraints.<br />

2.2 Comparing stages-of-growth models in eGovernment<br />

A number of eGovernment stage models is listed in Table 1. We conducted a comprehensive literature<br />

review and selected some of the most common stage models from literature using scientific search<br />

engines (e.g. Google scholar and Scopus), by looking at well-known eGovernment journals, and through<br />

snowballing (by following cross referencing). Furthermore, the selection of models is limited to the<br />

maximum number of six stages. The stages-of-growth models listed in Table 1 are developed both by<br />

researchers (Hiller and Bélanger 2001; Layne and Lee 2001; Wescott 2001; Moon 2002; West 2004;<br />

Siau and Long 2005; Andersen and Henriksen 2006; Klievink and Janssen 2008), as well as by public<br />

and private organizations e.g. (Research, Deloitte et al. 2000; UN 2001; Accenture 2003; UN 2003;<br />

Global 2005; UN 2008; Leveraging 2010). Assessment and comparison of stages-of-growth is a complex<br />

endeavour because stages that have similar names, in fact, have different definitions and explanations.<br />

Table 1 shows the comparison of different stage-of-growth models, by comparing the order and topic of<br />

their stages.<br />

Stage models define stages in series starting from the very initial stage progressing stepwise to the final<br />

stage e.g. (Baum and Di Maio 2000; Howard 2001; Accenture 2003; Siau and Long 2005; and UN 2008<br />

etc.). For example, Moon (2002) describes the minimum or initial stage as one-way communication,<br />

which increases gradually step-by-step to two-way communication, service and financial transaction,<br />

integration, and political participation. Although the stages are defined in series, the stages themselves<br />

are different. Table 1 clearly shows that majority of stage models start with a front-office based first stage,<br />

for example, often the stage models have information provisioning on government websites as a first<br />

stage. The later stages aim for different levels of maturity, although some of the more advanced stages<br />

are recurrent, but in a different sequence. For example, integration is defined as the second stage by<br />

Klievink (2008); as the fourth stage by Moon (2002); and as the sixth stage by Baum and Di Maio (2000).<br />

The stage models listed in Table 1 also show that the back-office stages are mostly in the later stages as<br />

most stage models predominantly focus on the front-office.<br />

348


Table 1: Overview of stage models in eGovernment<br />

No.<br />

1<br />

2<br />

3<br />

4<br />

5<br />

6<br />

7<br />

8<br />

Stage<br />

Model<br />

Gartner<br />

Group<br />

(2000)<br />

Deloitte<br />

Research<br />

(2000)<br />

Layne<br />

and Lee<br />

(2001)<br />

Hiller and<br />

Belanger<br />

(2001)<br />

UN<br />

(2001)<br />

Wescott<br />

(2001)<br />

Howard<br />

(2001)<br />

Moon<br />

(2002)<br />

9 Accenture<br />

(2003)<br />

10<br />

11<br />

12<br />

13<br />

14<br />

15<br />

16<br />

UN<br />

(2003)<br />

West<br />

(2004)<br />

Siau and<br />

Long<br />

(2005)<br />

UN<br />

(2005)<br />

Anderson<br />

and<br />

Henriksen<br />

(2006)<br />

UN<br />

(2008)<br />

Klievink<br />

and<br />

Janssen<br />

(2009)<br />

Devender Maheshwari et al.<br />

Stage 1 Stage 2 Stage 3 Stage 4 Stage 5 Stage 6<br />

Web presence Interaction Transaction Transformation<br />

Info publishing<br />

and<br />

dissemination<br />

Two way<br />

transaction<br />

Catalogue Transaction<br />

Info<br />

dissemination<br />

and catalogue<br />

Emerging<br />

presence<br />

Email and<br />

internal<br />

network<br />

Two-way<br />

communication<br />

Enhanced<br />

presence<br />

Interorganization<br />

and public<br />

access to<br />

information<br />

Multi-purpose<br />

portals<br />

Vertical<br />

integration<br />

Service and<br />

financial<br />

transaction<br />

Interactive<br />

presence<br />

Two-way<br />

communication<br />

Publish Interaction Transact<br />

One-way<br />

communication<br />

Online<br />

presence<br />

Emerging<br />

presence and<br />

enhanced<br />

presence<br />

Billboard stage<br />

Two way<br />

communication<br />

Basic capability<br />

Interactive<br />

presence<br />

Partial service<br />

delivery stage<br />

Service and<br />

financial<br />

transaction<br />

Service<br />

availability<br />

Transactional<br />

presence<br />

Portal stage<br />

Portal<br />

personalization<br />

Horizontal<br />

integration<br />

Vertical and<br />

horizontal<br />

integration<br />

Transactional<br />

presence<br />

Allowing<br />

exchange of<br />

value<br />

Integration<br />

Mature<br />

delivery<br />

Networked<br />

presence<br />

Interactive<br />

democracy<br />

Clustering of<br />

common<br />

services<br />

Political<br />

participation<br />

Seamless<br />

presence<br />

Joined-up<br />

government<br />

Political<br />

participation<br />

Service<br />

transformation<br />

E-participation<br />

index<br />

Web presence Interaction Transaction Transformation E-democracy<br />

Emerging<br />

presence and<br />

enhanced<br />

presence<br />

Interactive<br />

presence<br />

Transactional<br />

presence<br />

Networked<br />

presence<br />

Cultivation Extension Maturity Revolution<br />

Emerging<br />

presence and<br />

enhanced<br />

presence<br />

Stove-piped<br />

applications<br />

Interactive<br />

presence<br />

Integrated<br />

organization<br />

Transactional<br />

presence<br />

Nationwide<br />

portals<br />

349<br />

Connected<br />

Interorganizational<br />

integrations<br />

E-participation<br />

index<br />

E-participation<br />

index<br />

Demanddriven,<br />

joined-up<br />

government<br />

Full<br />

integration<br />

and<br />

enterprise<br />

transaction<br />

Digital<br />

democracy


Devender Maheshwari et al.<br />

Not only do these models have a different placement of the respective stages, also the number of stages<br />

differs. For example, Howard (2001) distinguishes three different stages, West (2004) four, UN (2005)<br />

five, and Deloitte Research (2000) six stages. Furthermore, some stages such as multi-purpose portals,<br />

portal personalization, nationwide portals, mature delivery, and portal stage are a combination of frontoffice<br />

transactions and back-office integration. The stage models also seem to be designed and<br />

implemented based on biased criteria to fulfil objectives that vary across organizations and governments.<br />

Many of the growth stage models actually do not explicitly describe and discuss the important back-office<br />

attributes such as inter-operability, policies and regulations, and unified standards.<br />

3. Typical challenges of stage models<br />

Based on the overview of stages-of-growth models, a number of challenges for developing and using<br />

stage models is derived. Some of the challenges are based on the criticism given to stage models by<br />

other authors (Janssen, Rotthier et al. 2004; Bannister 2007; Coursey and Norris 2008; Janssen 2010),<br />

and some of the challenges are derived by the comparison of the different stage models in the previous<br />

section. Bannister (2007) pointed out that the outcomes of ill-designed stage models risk distorting the<br />

policies of the governments. Therefore, it is important to have an understanding of the challenges that are<br />

related to deploying stage models. Understanding the problems of eGovernment stage models is vital for<br />

improving current stage models to become less complex, better structured, more easily implementable,<br />

and more sophisticated. A short description of the identified challenges is given in Table 2. Hereafter we<br />

discuss each challenge and how it is derived.<br />

Table 2: Overview of challenges of stage models<br />

No. Type of challenges Short Description<br />

1 Bias (non-empirical) Existence of bias and lack of theory-based developments<br />

2 Lack of explanation Unclear design, development, and implementation approaches<br />

3 Number of stages Unclear how the number of stages in a stage model is decided upon<br />

4 Linear implementation Shortage of future predictions, and due to step-by-step linear implementation<br />

5 Common frameworks<br />

6 Concatenation<br />

Difficulties to assess and compare the stages-of-growth models due to the<br />

difference in structure and scope<br />

Maturity of stage models cannot be determined if the growth stages are<br />

overlapping<br />

7 Economical Adverse effects of high costs and low return on investment (ROI)<br />

8 Inter-connection Interruptions and time delays in the transition from one stage to succeeding stage<br />

9<br />

Measuring and<br />

benchmarking<br />

10 Meta-synthesis<br />

11<br />

Time and growth<br />

relationship<br />

Stage models do not describe assessment and evaluation methods, and existing<br />

evaluation methods are based on end results and rarely measure back-office<br />

Integrative review of different eGovernment stage models may increase the<br />

overall complexity<br />

Stage models can take indefinite time to achieve desired maturity level as the<br />

model do not define any time frame for growth<br />

Bias (non-empirical) The mature stages of the majority of eGovernment stage models are yet not fully<br />

reached by most of the organizations (Klievink and Janssen 2008). It can, thus, be concluded that<br />

majority of stage models is not based on empirical grounds and remains speculative and based on<br />

presumptions (Coursey and Norris 2008). Many of the stage models (e.g. Hiller and Bélanger 2001;<br />

Layne and Lee 2001; Wescott 2001; Moon 2002; West 2004; Siau and Long 2005; and Andersen and<br />

Henriksen 2006 etc.) discussed in this paper are not based on theoretical foundations and do not provide<br />

any structure or guidelines of theory development for strategy and policy makers.<br />

Lack of Explanation Not one model explains how to achieve the highest maturity level. Thus, the lack of<br />

explanation of how to achieve the next growth stage does not provide enough information for<br />

governments to achieve the desired maturity level. Klievink and Janssen (2008) criticize existing stage<br />

models on the basis of these being derived based on past performance of eGovernment organizations<br />

and rarely providing any information related to the future predictions.<br />

350


Devender Maheshwari et al.<br />

Number of Stages Stage models often have a different number of stages, some have as many as up to<br />

ten different stages (Zarei, Ghapanchi et al. 2008), and others as little as two stages (Reddick 2004).<br />

Stages are placed into separate similar blocks of growth processes for better performance and<br />

effectiveness of eGovernment. However, the varying number of stages makes eGovernment growth and<br />

maturity assessment and benchmarking complex. So far, there has been little discussion about the<br />

criteria for choosing a number of stages.<br />

Linear Implementation Stage models are normally deployed in linearly concatenated steps progressing<br />

from first stage to the final stage (Coursey and Norris 2008). According to Coursey and Norris (2008)<br />

eGovernment progression is non-linear, whereas the stage models are based on linear implementation of<br />

stages starting from the basic level.<br />

Common Framework Depending on the organizational manifestos some public organizations focus on<br />

customer-oriented service delivery, others focus on effective internal processes and ICT systems (Jansen<br />

2005). The stage models listed in Table 1 do not have a common scope and order of stages. Some<br />

models define back-end integration in the initial stages while others define them in the later stages,<br />

whereas none of these stage models is applicable for both local and national governments. EGovernment<br />

growth stage models do not have a generic common framework, making measuring and benchmarking,<br />

as well as comparing such models very difficult.<br />

Concatenation Each stage is dependent on the previous stage and should not be implemented unless<br />

the desired maturity level of previous stage is achieved. This means that the linearly concatenated stages<br />

should not overlap with each other as they are not implemented simultaneously. Therefore, if a stage<br />

overlaps with preceding and/or succeeding stages in linear progressive fashion, the status of current<br />

growth stage cannot be determined.<br />

Economical Stages-of-growth models are also referred to as maturity models. Therefore, public<br />

organizations can use stage models for measuring and benchmarking purposes. Bannister (2007)<br />

highlighted that the benchmarking costs for widespread areas like eGovernment might be exorbitant if the<br />

benchmarking parameters are not carefully chosen, whereas the misinterpretation of such benchmarks<br />

can also result in economic problems (e.g. ROI) and wrong decision-making.<br />

Inter-connection: Stage models comprising a number of stages hardly allow any inter-connection<br />

(smooth transition from one stage to another) within stages for continuum of eGovernment development.<br />

Growth of the stage models experiences time delays and interruptions during inter-connection. Stages-ofgrowth<br />

models do not define a threshold maturity level so that the overlapping, interruptions, and the time<br />

delays can be avoided. For example, a service can only be offered once the ICT infrastructure is in place<br />

and fulfills minimum technical requirements to provide services. In this case, the implementation of next<br />

stage already starts if the minimum threshold maturity level is achieved.<br />

Measuring and Benchmarking: Through measuring and benchmarking, government organizations<br />

determine the current status, advantages and disadvantages, and further growth and progress of the<br />

level of eGovernment. Stage models shown in Table 1 vary in structures, dimensions, and scope,<br />

therefore, the measurement methods can also vary for different types of models. Stage models do not<br />

explain evaluation methods, and often the evaluation is based on the end results. Growth stages for<br />

back-end are rarely measured (Janssen 2010) because the existing evaluation approaches<br />

predominantly focus on the front-end. EGovernment measures are mostly qualitative and lack<br />

quantitative measures.<br />

Meta-Synthesis This is one approach for theory development by integrative review of existing stage<br />

models. It is, however, subjective to selecting particular stage models since the models themselves are<br />

biased and developed to achieve specific objectives as discussed in section 2. According to Siau and<br />

Long (2005) the advances and evolution of stage models increase the complexity and the desired level of<br />

integration of ICT-systems. Hence, meta-synthesis of existing different stage models is a complex<br />

endeavor. Furthermore, the meta-synthesis approaches do not deal with futuristic predictions and may<br />

result in less effective stage model.<br />

Time and growth relationship Stages-of-growth models comprise a number of stages (0,1,2,3..n) and<br />

stages are implemented in concatenated linear fashion. Each stage achieves the minimum required<br />

maturity level before the stage models progresses to the next stage. The growth of linear stage models<br />

351


Devender Maheshwari et al.<br />

can be measured at different instants of time (t) to determine the maturity level of the current stage as<br />

well as the model itself so that the stages can be plotted against the time. This type of time and growth<br />

relationship may face problems, i.e. stages might not reach the highest desired maturity level, stages<br />

might overlap when the next stage start before the current stage reaches the desired maturity, and the<br />

growth might be discrete with steady states where no progress can be observed due to the time delay<br />

between different maturity growth stages. Finally, benchmarking the overall growth of the stage models is<br />

not possible because the stage models designed for similar objectives do not adopt standard time frames<br />

(comprising of n number of stages) to reach the maximum maturity.<br />

4. Discussion<br />

A wide variety of stage models exists in literature, but it is difficult to determine which model is the best<br />

model in which situation. By looking at the number of citations in indexes as Google Scholar and Google<br />

the model of Layne and Lee (2001) is the most cited model. Their model is also criticized very often. It<br />

seems that no model has ever been accepted and recognized as a standard benchmark. The design<br />

methodology, objectives, and outcomes vary greatly from model to model. Growth stage models have<br />

traditionally been designed and implemented according to the objectives of the particular organizations,<br />

governments or individual researchers. Stage models that are effective in one organization can be<br />

ineffective in another organization. As it is dependent on the specific situation, none of the stage models<br />

can be regarded as the best model, but policy makers wanting to use these models, need to look<br />

carefully which model suits best their environment.<br />

Stages within stage models can be generally classified into three categories: front-end, back-end and eparticipation.<br />

As discussed earlier, the proportional weight of the stages in a model lacks the balance<br />

between these three classification categories. Stage models bear certain characteristics based on the<br />

desired objectives, applications, and processes. A model requires trade-offs like the level of abstraction,<br />

implementation help, time and growth, costs and achievements, and ease of understanding. There<br />

always exists a trade-off between different stages and the balance of stages. Some eGovernment<br />

applications need more attention on the front-end, while others need more focus on the back-end or on eparticipation.<br />

Although limited attention is given to the trade-offs; they can be really useful in reengineering<br />

the existing stage models to overcome disadvantages. Stage growth models supporting such<br />

kind of flexible design methods with different trade-offs can be adopted by more private as well as public<br />

organizations. Thus, a common standardized framework can be formed that is more of less acceptable in<br />

different eGovernment scenarios and applications for different types local, national and international<br />

public organizations.<br />

eGovernment growth stage models can be vulnerable if there are no measurement and evaluation<br />

methods to identify the current status of an organization. There is a lack of instruments to monitor the<br />

growth of the stage models. Almost none of the stage models include measurement methods (qualitative<br />

and/or quantitative) to evaluate and assess the maturity level of different stages and the model itself.<br />

Furthermore, the evaluation gets more difficult when it becomes impossible to measure the growth during<br />

overlapping time between various stages. This may support the argument that the stage models do not<br />

have linear growth, while the stages could start growing parallel to each other at different times. Back-end<br />

measurements, which make up a major part of the overall measurements, have been widely ignored,<br />

since the major focus of the growth stage models has been on the front-end.<br />

5. Conclusion<br />

This paper aims to explore the challenges of existing eGovernment growth stage models to advance the<br />

use of these models in practice. Stage models have gained considerable attention in eGovernment and<br />

are widely applied as they give direction to development and help to outline desired outcomes.<br />

Furthermore, stages-of-growth models can be useful for benchmarking, when characteristics and criteria<br />

of steps are clearly defined. We compared a number of stage models by outlining their respective stages.<br />

Our comparison shows that stage models differ greatly in the number of stages and their proposed<br />

course of action. On the basis of literature and by comparing the stage models we derived eleven<br />

challenges to the development and use of these models. We found that the majority of the stage models<br />

predominantly focuses on front-office and largely ignores back-office developments. Another matter is<br />

that stages are implemented in concatenated linear fashion, but depending on the preceding stages to<br />

reach full maturity can lead to indefinite delay due to technical and political issues.<br />

Currently, eGovernment stage models are not empirically derived, but instead, based on predictions for<br />

the future, whereas empirical approaches are necessary to advance the accuracy of these stage models.<br />

352


Devender Maheshwari et al.<br />

eGovernment is a broad area and successful outcomes of a particular past event do not necessarily<br />

represent various pertaining aspects of eGovernment. Furthermore, differences in structure, scope, and<br />

design criteria of stage models limit the possibilities for comparison and benchmarking. Also, there are no<br />

measurement and evaluation methods to monitor the current status and growth of stage models. Stage<br />

models need to describe measurement instruments to evaluate the maturity level of each stage and the<br />

overall model. And finally, whereas stage models are designed for policy makers, they provide little help<br />

for business process reengineering, infrastructure development and IT decision-making.<br />

References<br />

Accenture (2003). "EGovernment Leadership: Engaging the Customer." New York, Accenture.<br />

Andersen, K. V. and H. Z. Henriksen (2006). "EGovernment maturity models: Extension of the Layne and Lee<br />

model." Government Information Quarterly 23(2): 236-248.<br />

Bannister, F. (2007). "The curse of the benchmark: an assessment of the validity and value of eGovernment<br />

comparisons." International Review of Administrative Sciences 73(2): 171-188.<br />

Baum, C. and A. Di Maio (2000). "Gartner’s four phases of eGovernment model." Stamford, Ct., Gartner Group 21:<br />

12-6113.<br />

Coursey, D. and D. Norris (2008). "Models of eGovernment: Are they correct? An empirical assessment." Public<br />

Administration Review 68(3): 523-536.<br />

Global, E. (2005). "Government Readiness Report 2005: From EGovernment to E-Inclusion." ONU. United Nations.<br />

Hiller, J. S. and F. Bélanger (2001). Privacy Strategies for Electronic Government. EGovernment 2001. M. A.<br />

Abramson and G. E. Means. Lanham, Maryland, Rowman & Littlefield Publishers: 162-198.<br />

Howard, M. (2001). "eGovernment Across the Globe: How Will" e" Change Government?" Government Finance<br />

Review 17(4): 6-9.<br />

Jansen, A. (2005). "Assessing EGovernment progress–why and what." NOKOBIT: 82-8033.<br />

Janssen, D., S. Rotthier, et al. (2004). "If you measure it they will score: An assessment of international<br />

eGovernment benchmarking." Information Polity 9(3): 121-130.<br />

Janssen, M. (2010). "Measuring and Benchmarking the Back-end of EGovernment: A Participative Self-assessment<br />

Approach." Electronic Government: 156-167.<br />

Kaplan, R. and D. Norton (2001). "Transforming the Balanced Scorecard from Performance Measurement to<br />

Strategic Management: Part I." Accounting Horizons 15(1).<br />

Kaplan, R. and D. Norton (2004). Strategy maps: Converting intangible assets into tangible outcomes, Harvard<br />

Business Press.<br />

Klievink, B. and M. Janssen (2008). Stage models for creating joined-up government: from local to nation-wide<br />

integration, Digital Government Society of North America.<br />

Layne, K. and J. Lee (2001). "Developing fully functional EGovernment: A four stage model." Government<br />

Information Quarterly 18(2): 122-136.<br />

Lee, J. (2010). "10 year retrospect on stage models of eGovernment: A qualitative meta-synthesis." Government<br />

Information Quarterly.<br />

Leveraging, E. (2010). "United Nations EGovernment Survey 2010."<br />

Moon, M. (2002). "The Evolution of E Government among Municipalities: Rhetoric or Reality?" Public administration<br />

review 62(4): 424-433.<br />

Reddick, C. (2004). "A two-stage model of eGovernment growth: Theories and empirical evidence for US cities."<br />

Government Information Quarterly 21(1): 51-64.<br />

Research, D., Deloitte, et al. (2000). At the Dawn of eGovernment: The Citizen as Customer, Deloitte Consulting.<br />

Siau, K. and Y. Long (2004). Factors impacting eGovernment development.<br />

Siau, K. and Y. Long (2005). "Synthesizing eGovernment stage models- a meta-synthesis based on metaethnography<br />

approach." Industrial Management & Data Systems 105(3): 443-458.<br />

UN (2003). "UN Global EGovernment Survey 2003. ."<br />

UN, E. (2001). "Government Report(2001)“Benchmarking EGovernment: A Global Perspective-Assessing the UN<br />

membestates”." UN Publication,[online] http://www. upan1. org/egovernment2. asp.<br />

UN, O. (2008). "Government Survey 2008: from eGovernment to Connected Governance." United Nations. New<br />

York.<br />

Wescott, C. (2001). "EGovernment in the Asia-Pacific Region." Asian Journal of Political Science 9(2): 1-24.<br />

West, D. (2004). "E Government and the Transformation of Service Delivery and Citizen Attitudes." Public<br />

administration review 64(1): 15-27.<br />

Zarei, B., A. Ghapanchi, et al. (2008). "Toward national eGovernment development models for developing countries:<br />

A nine-stage model." The International Information & Library Review 40(3): 199-207.<br />

353


Developing Measures for Benchmarking the Interoperability<br />

of Public Organizations<br />

Devender Maheshwari, Anne Fleur van Veenstra and Marijn Janssen<br />

Delft University of Technology, Delft, The Netherlands<br />

D.Maheshwari@tudelft.nl<br />

A.F.E.vanVeenstra@tudelft.nl<br />

M.F.W.H.A.Janssen@tudelft.nl<br />

Abstract: Public organizations increasingly collaborate with each other by forming public service networks for<br />

realizing joined-up service delivery to facilitate their clients, citizens and businesses. In such networks, similar data is<br />

collected, stored, and maintained recursively and repeatedly among governmental agencies. Many managers and<br />

decision-makers in organizations are aware of the need for interoperability, but they are unaware of their<br />

interoperability maturity level. Although some maturity models exist, they do not define procedures to measure and<br />

benchmark interoperability. There is a lack of measures for benchmarking interoperability and measuring is<br />

complicated as interoperability is a multifaceted concept, covering many interdependent aspects. This paper aims to<br />

develop a set of measures for benchmarking interoperability in public organizations to enable them to avoid<br />

repeatedly gathering already existing data. Firstly, based on a literature review we define measures for<br />

benchmarking interoperability. Secondly, we present a measurement model for interoperability between<br />

organizational divisions as well as for the overarching interoperability of organization. Measures of benchmarking will<br />

not only help public organizations ascertaining their position of interoperability maturity, but will also allow them to<br />

compare their status with other organizations in service networks as well as assist them to provide effective and<br />

efficient services.<br />

Keywords: eGovernment, interoperability, measurement, benchmarking, public service organizations<br />

1. Introduction<br />

The field of electronic government (eGovernment) predominantly focuses on the introduction of<br />

information and communication technology (ICT) in the front-office, and it requires online access and<br />

availability of public resources desired by citizens, employees, businesses, and government<br />

organizations (e.g. Breen 2000; Layne and Lee 2001; Moon 2002; Lee 2010; and Leveraging 2010 etc.).<br />

In order to make governments and governance more efficient, transparent, effective, and accountable,<br />

the central focus of eGovernment initiatives shifts to the back-office processes, procedures and services.<br />

This requires that disparate systems need to work together. Hence, one of the central challenges faced<br />

by public service organizations (PSOs) today is achieving interoperability.<br />

Scholl and Klischewki (2007) argue that achieving interoperability in PSOs is challenging and evaluation<br />

of interoperability is also underdeveloped and needs to be properly investigated. In literature,<br />

interoperability is usually defined from a technical perspective, for example as the “technical capability for<br />

eGovernment interoperation” (Scholl and Klischewski 2007,p. 901), and the “ability of different types of<br />

computers, networks, operating systems, and applications to work together effectively, without prior<br />

communication, to exchange information in a useful and meaningful manner” Moen (2000). IEEE<br />

definition of interoperability given as the ability of two or more systems or components to exchange<br />

information and to use the information that has been exchanged (IEEE 1990). Scholl and Klischewski<br />

(2007) identify nine different constraints that influence interoperability of PSOs: 1) constitutional, 2)<br />

jurisdictional, 3) collaborative, 4) organizational, 5) informational, 6) managerial, 7) technological, 8) cost,<br />

and 9) performance.<br />

A number of eGovernment models mention interaction and integration as essential components (Baum<br />

and Di Maio 2000; Breen 2000; Hiller and Belanger 2001; Layne and Lee 2001). Although there is an<br />

informal agreement between all concerned parties that eGovernment interoperability is not only a<br />

technical subject, but it also applies to organizational aspects (Goldkuhl 2009), in extant literature it is<br />

predominantly regarded as a technical matter. Technical aspects of interoperability are discussed in<br />

detail by several authors and organizations having a major focus on information systems, e.g. (DoD<br />

1998; Clark and Jones 1999; NATO 2003; Tolk and Muguira 2003; ATHENA 2004; Turnitsa 2005). The<br />

level of interoperability is relative and difficult to determine since it depends on the needs and desires of<br />

services, processes, and procedures that an organization has to offer to meet the objectives.<br />

Interoperability can be between two individual systems, between entire sets of systems within<br />

organization, and within the multiple systems in different public service organizations. In this paper, we<br />

354


Devender Maheshwari et al.<br />

consider a single organization with multiple systems. Our focus is to highlight the organizational as well<br />

as technical aspects and measures that influence the overarching interoperability in organization.<br />

The goal of this paper is to investigate the eGovernment interoperability models and develop a set of<br />

measures for benchmarking. In this explorative paper we identify measures of benchmarking<br />

interoperability in PSOs, investigating both technical as well as organizational aspects. Section 2 gives a<br />

brief description of the existing interoperability measurement and benchmarking practices in PSOs and<br />

related approaches. In section 3 we propose an instrument for benchmarking interoperability of PSOs,<br />

which is subsequently used in a case study. Finally, we present conclusions and recommendation for<br />

future research in section 4.<br />

2. Literature review<br />

2.1 Interoperability in public service organizations<br />

eGovernment interoperability maturity is often referred to as a technological issue. For example, (Moen<br />

2000; Scholl and Klischewski 2007) discuss the Z39.50 middleware standard with four interoperability<br />

levels: syntactic, functional, semantic, and user task. Others consider interoperability to be a combination<br />

of organizational as well as technical issues, (e.g. Janssen and Scholl 2007) described four<br />

interoperability architecture layers: pragmatic, syntax, semantic, and technical. These layers were<br />

previously referred to as standardisation requirements of interoperability with a brief explanation of the<br />

pragmatic level (Papazouglou 2006). PSOs across the globe use different interoperability models with<br />

different levels. An overview of various models including their levels of interoperability maturity is shown<br />

in Table 1.<br />

Table 1: Models of interoperability maturity<br />

No. Model Year Author Level - 0 Level - 1 Level - 2 Level - 3 Level - 4 Level - 5 Level - 6<br />

1 LISI 1998 DoD<br />

2 OIM 1999<br />

3 NMI 2003 NATO<br />

4 LCIM 2003<br />

Clark, T. and<br />

R. Jones<br />

Tolk, A. and<br />

J. Muguira<br />

Isolated<br />

systems<br />

Connected<br />

systems<br />

Functional<br />

distributed<br />

Domain<br />

integrated<br />

Enterprise<br />

universal<br />

Independent Ad-hoc Collaborative Integrated Unified<br />

System<br />

specific data<br />

Unstructured<br />

data<br />

Documented<br />

data<br />

Structured Seamless Seamless<br />

data data sharing information<br />

Aligned static Aligned Harmonized<br />

data dynamic data data<br />

5 EIF 2004 IDABC Organizational Semantics Technical<br />

6 EIMM 2004 ATHENA Performed Modeled Integrated Interoperable Optimizing<br />

7 LCIM 2005 Turnitsa CD No - Interop: Technical Pragmatic Semantic Syntatical Dynamic Conceptual<br />

8 ALI<br />

Janssen, M.<br />

2007<br />

and H. Scholl<br />

Pragmatic Syntax Semantic Technical<br />

9 EIF 2.0 2008 IDABC<br />

(Proposed)<br />

Organizational Semantics Technical Political Legal<br />

10 MLIDG 2009 Gottschalk, P<br />

Computer<br />

Interop:<br />

Process<br />

interop:<br />

Knowledge<br />

interop:<br />

Value interop: Goal interop:<br />

As shown in Table 1, early interoperability models lacked organizational (non-technical) aspects, and<br />

technicalities of information systems were the centre of attention. The US Department of Defence (DoD<br />

1998) developed an interoperability model called Levels of Information Systems Interoperability (LISI)<br />

including five levels: isolated systems, connected systems, functional distributed, domain integrated, and<br />

enterprise universal (DoD 1998). Clark and Jones (1999) developed the Organizational Interoperability<br />

Maturity (OIM) model including five levels: Independent, ad-hoc, collaborated, integrated, and unified.<br />

Whereas the LISI model predominately focuses on the technical aspects of information systems<br />

interoperability, the OIM model is an extension of LISI model including the modes and ability of<br />

interoperation between organizations (Clark and Jones 1999; Guédria, Naudet et al. 2010). Other models<br />

shown in Table 1 were developed by government organizations, e.g. the North Atlantic Treaty<br />

Organization (NATO 2003) interoperability model NC3TA Reference Model for Interoperability (NMI)<br />

(NATO 2003), the <strong>European</strong> Interoperability Framework (EIF) set up by Interoperable Delivery of<br />

<strong>European</strong> eGovernment Services to public Administrations, Businesses and Citizens (IDABC 2004) as<br />

well as an extension of this model (IDABC 2008), the <strong>European</strong> Interoperability Maturity Model (EIMM) by<br />

Advanced Technologies for interoperability of Heterogeneous Enterprise Networks and their Applications<br />

355


Devender Maheshwari et al.<br />

(ATHENA 2004); and also by individual researchers, e.g. Levels of Conceptual Interoperability Model<br />

(LCIM) (Tolk and Muguira 2003), which was reproduced by (Turnitsa 2005) with seven different<br />

conceptual levels, Architecture Layers of Interoperability (ALI) by (Janssen and Scholl 2007), and<br />

Maturity Levels for Interoperability in Digital Government (MLIDG) by (Gottschalk 2009). The models<br />

clearly lack to define the measures as well as the procedures to measure interoperability. The<br />

interdependence of sequentially layered divisions is a multifaceted concept and complex to measure.<br />

2.2 Overview of major related approaches<br />

As interoperability is only one of the issues governments around the world are trying to measure, this<br />

section gives a short introduction to related approaches that are utilized by various governments and<br />

private sector organization for design, development, implementation and measurement.<br />

Stage models Stage models are commonly used in the field of eGovernment; in which each stage is<br />

defined as a state on the roadmap, interconnecting these states in a systematic order to accomplish the<br />

desired objectives. Stage models are utilized for multiple purposes, i.e. growth and development,<br />

maturity, policy designing, measurements, and benchmarking. Existing stage models in eGovernment are<br />

a set up by researchers, e.g. (Hiller and Belanger 2001; Layne and Lee 2001; Moon 2002; Andersen and<br />

Henriksen 2006; Klievink and Janssen 2008) or developed by public, private, and semi-public<br />

organizations, e.g. (Baum and Di Maio 2000; Hunter and Jupp 2002; Global 2005; UN 2008; Leveraging<br />

2010). Despite the overwhelming acceptance of stage models in eGovernment, some authors (Bannister<br />

2007; Janssen 2010; Maheshwari, Veenstra et al. 2011) have described them as predominantly frontoffice<br />

focused and ill-structured, specifically in relation to interoperability.<br />

Capacity Maturity Model (CMM) The concept of CMM was first described by Humphrey (1988). He<br />

describes that the CMM maturity framework regulates each stage to provide the foundation for<br />

improvements undertaken in the next stage. It was later published in a report in February 1993 as the<br />

Capability Maturity Model SM for Software Version 1.1 (Paulk, Weber et al. 1993) and as a book in 1995<br />

(Paulk, Curtis et al. 2002). CMM helps organizations to select appropriate strategies by determining the<br />

current process maturity and critical issues for software process improvements. For continuous process<br />

improvements, the evolutionary path steps are organized into five maturity levels in CMM framework,<br />

respectively: 1) initial, 2) repeatable, 3) defined, 4) managed, and 5) optimizing (Paulk, Curtis et al. 2002).<br />

Balanced Scorecard (BSC) The BSC method is a multi-perspective approach for the balance of<br />

premeditated goals and their translation into computable objectives. The basic framework of the BSC<br />

approach was based on cause-and-effect relationships of four perspectives, i.e. finance, customers,<br />

internal process and, learning and development (Kaplan and Norton 2004). The BSC approach was<br />

initially implemented by profit-based organizations, but later it was also applied in PSOs. Originally, the<br />

focus of BSC is on the financial perspective at the top of the hierarchy, while PSOs do not necessarily<br />

have financial success as their primary objective (Kaplan and Norton 2001; Tolk, Turnitsa et al. 2006;<br />

Guédria, Naudet et al. 2010).<br />

<strong>European</strong> Foundation for Quality Management (EFQM) Model The EFQM model is a framework for<br />

organizational management systems, promoted by the <strong>European</strong> Foundation for Quality Management<br />

(www.efqm.org). The model is designed for helping organizations in their drive towards being more<br />

competitive, effective, and efficient. The EFQM model has nine criteria, including five ‘enablers’ (i.e.<br />

leadership, people management, policy management, resources and processes) and four ‘results’ (i.e.<br />

people satisfaction, customer satisfaction, impact on society and business results). The enablers include<br />

processes, structure and means of the organization, while the results criteria cover the characteristics of<br />

performance (Nabitz and Klazinga 1999; EFQM 2003).<br />

Extended Enterprise Architecture Maturity Model (E2AMM) E2AMM is a maturity model that provides<br />

a path towards improvement of enterprise architecture and procedures within an organization. The model<br />

has six levels, i.e.: level 0: no extended enterprise architecture, level 1: initial, level 2: under<br />

development, level 3: defined, level 4: managed, and level 5: optimized. The E2AMM model requires<br />

iterative efforts to accomplish the desired objectives and missions of an organization. E2AMM model<br />

guides the operating disciplines to effectively and efficiently organize and engage the technology entities<br />

and business components (Schekkerman 2006).<br />

356


3. Measuring interoperability<br />

Devender Maheshwari et al.<br />

The literature review of interoperability models and related approaches in section 2 makes clear that<br />

interoperability of PSOs is complex to measure and benchmark, as it covers a wide range of diverse<br />

areas and dimensions. Furthermore, the levels shown in Table 1 are mostly interrelated and<br />

interdependent. Implementing these levels in the ordered form starting at level 0 can be abysmal as<br />

some models have technical interoperability as their first level while others consider it to be the last level.<br />

Most of the interoperability models lack a clear explanation of various organizational and architectural<br />

aspects that influence the maturity of interoperability in PSO’s. While the maturity of technical levels is<br />

concrete and can be achieved by utilizing state-of-art technological method and techniques, the maturity<br />

of organizational levels (e.g. pragmatic, governance, business process, judicial, political, and organization<br />

etc.) is much more vague (Janssen and Scholl 2007).<br />

Related measurement and benchmarking approaches, as discussed in section 2.2, provide insight for<br />

developing a measurement model that fulfils the overarching objectives. These approaches are<br />

developed by different organizations as well as individual researchers for predefined objectives. The<br />

majority of these approaches is used in PSOs as well as in private organizations. Stage models face<br />

similar problems as mentioned above, while the quality models (BCS and EFQM) only focus on quality<br />

aspects. The CMM model is famous for software-based solutions for software process assessment,<br />

improvement and evaluation. Finally, EAMM is purely based on organizational aspects and lacks<br />

technical aspects. All of the approaches discussed in section 2.2 lack a balance of organizational and<br />

technical aspects, and not one of them caters for financial constraints. Moreover, none of the<br />

interoperability maturity models provide any measures for benchmarking and implementing the<br />

interoperability levels. Furthermore, the majority of interoperability models still remains conceptual and<br />

needs to give more attention to unexplored aspects. In this paper we propose a maturity model without<br />

an ordering format of levels and we define the related measures for benchmarking.<br />

3.1 Proposed instrument<br />

The instrument proposed in this paper is adapted from the interoperability architecture layers (technical,<br />

syntactical, semantic and pragmatic) proposed by (Janssen and Scholl 2007). The layers carefully<br />

address the organizational as well as technical aspects of interoperability. They split the pragmatic layer<br />

into: 1) organizational level and 2) business process level. The instrument is valid for inter-connecting<br />

various components of a single public service organization as well as different organizations, but for<br />

reasons of simplicity we limit our scope to one organization.<br />

Pragmatic Level: LCIM model explains pragmatic interoperability as the awareness level of procedures<br />

and processes between the interoperating systems. Highest maturity at this level is achieved when<br />

exchange of information is clear, transparent, and truly interpretable by the sender as well as the receiver<br />

(Tolk, Turnitsa et al. 2006). This level also includes the sender’s intension of information exchange, and<br />

contemplates contextual, personal, and psychological factors for differentiating different type of<br />

communication (Picot, Reichwald et al. 2008). The pragmatic level helps PSOs to identify limitations to<br />

avoid the adverse effects by analysing the maturity of organizational aspects and provides the guideline<br />

to the right path for improving organizational aspects (Janssen and Scholl 2007). The pragmatic level<br />

deals with various organizational and architectural aspects of PSOs; therefore we split this level into<br />

further sub-levels: organization, business process, judicial, governance and financial (see Figure 1).<br />

Figure 1: Instrument for measuring and benchmarking interoperability<br />

Organization: This sub-level deals with procedures, contracts, processes, services, and agreements<br />

within organizations that affect the exchange of information between back-office systems. Organization<br />

357


Devender Maheshwari et al.<br />

level helps PSOs with the development of a functional infrastructure for information systems<br />

interoperation. Components of level surround several organizational issues e.g. uninterrupted progress,<br />

horizontal implementation, reliance, collaboration, friendliness, readiness, business process reengineering<br />

(BPR), relationships, and coordination. (Feenstra, Janssen et al. 2006).<br />

Business process: PSOs aim to deliver better services by improving their processes; whereas the<br />

intricacies in business processes not only impact the service provision, but also complicate the<br />

information interpretation and understanding. This level deals with the alignment of business processes<br />

and procedures, value creation, monitoring and controlling activities, long-term and short-term process<br />

triggered integration, and continuously tracking and managing responsibilities, etc. Collaboration and<br />

interaction between different information systems require clear, explicable, and lucid orchestration of<br />

business processes.<br />

Judicial: This level contains laws and regulations, constitutional and legal restraints, and organizational<br />

safety and security issues. Unfortunately, judicial issues related to interoperability are sparsely discussed<br />

(e.g. ATHENA 2004; IDABC 2004; Turnitsa 2005; Janssen and Scholl 2007; Scholl and Klischewski<br />

2007; Cimander and Kubicek 2009). Goldkuhl (2009,p-4) defined the judicial interoperability layer as<br />

“congruence between different laws and regulations”. We extend the scope of the judicial maturity level<br />

by adding all concrete inflexible rules, regulations, laws, restraints, and issues that affect the interaction<br />

of information systems in PSOs.<br />

Governance: Pragmatic governance is characterized by the efficient and effective interoperation<br />

between organizational mechanisms, provided these mechanisms steer the organizations in the right<br />

direction (Janssen and Scholl 2007). According to Janssen and Joha (2007) “governance mechanisms<br />

determine how communication, responsibilities, and decision-making structures are formalized”(Janssen<br />

and Joha 2007, p.2307). Maturity of this level depends on the political and jurisdictional regulations,<br />

official communication mechanisms, and execution of assigned responsibilities.<br />

Financial: This maturity level concerns the economic issues that limit the overarching scope of<br />

interoperability in PSOs.<br />

As the explanation of semantic, syntactical, and technical levels is already well defined by many<br />

organizations as well as individual authors (e.g. IDABC 2004; Turnitsa 2005; Janssen and Scholl 2007;<br />

IDABC 2008; Maheshwari, Veenstra et al. 2011), we do not explain these issues further here. Although<br />

the concepts of these levels are well-understood, unfortunately, there are no explicit measures for<br />

benchmarking interoperability. Therefore, we adapt the already existing concepts of these technical levels<br />

for developing measures for benchmarking interoperability.<br />

3.2 Measures of benchmarking interoperability<br />

The measures for benchmarking interoperability are developed based on the instrument shown in Figure<br />

1, and on the literature review of section 2. The instrument that is developed comprises four maturity level<br />

that are divided into sub-levels. The pragmatic level comprises five sub-levels that were described in the<br />

previous section. The measures for each sub-level of the pragmatic level are: 1) organizational (context<br />

and demarcation, collaboration and interaction, standards and policies, enterprise architecture (EA), and<br />

environment and ethics); 2) business process (processes and procedures alignment, and service level<br />

agreements (SLAs)); 3) judicial (laws and regulations, constitutional and legal restraints, and<br />

organizational safety and security); 4) governance (political and jurisdictional regulations, formal<br />

communication and responsibilities); and 5) economical (Return on Investment(ROI)). The semantic level<br />

comprises three measures (definitions, classifications and relationships among systems). The syntactic<br />

level makes sure that the data follow similar standards and structures (Janssen and Scholl 2007) and<br />

comprises three maturity measures: solicitation, presentation, and translation. Finally, the technical level<br />

deals with physical infrastructure for communication and information exchange, transportation of data,<br />

and different types of information and communication protocols. The technical level is further divided into<br />

two sub-levels: 1) physical (infrastructure, and telecommunication standards); and 2) information (Quality<br />

of Service (QoS), and protocols). Table 2 shows the maturity levels and their respective measures with a<br />

brief description of the concepts of the measures.<br />

358


Devender Maheshwari et al.<br />

Table 2: Levels of interoperability and overview of measurement elements<br />

Pragmatic Measures Description<br />

Context and Level of to-the-point clearness and distinctiveness of the definitions,<br />

demarcations<br />

goals, objectives, challenges, and expectations of the PSOs.<br />

Collaboration and Interactive, willing-full, and collaborative working relationships<br />

interaction<br />

among all quarters in PSOs.<br />

Organizational standards and policies for horizontal implementation,<br />

Organizational<br />

Standards and policies reliance, uninterrupted progress, and BPR across different<br />

departments, sections and divisions.<br />

EA portrays the adverse effects of unprecedented nuts and bolts of<br />

Enterprise architecture any organization at low level that effect the information exchange in<br />

an organization.<br />

Environment and ethics<br />

Internal rivalries, monopolies, and un-willingness of the stakeholders<br />

in PSOs.<br />

Business<br />

Processes and<br />

procedures alignment<br />

Smooth business transitions, control and monitor, integration, valuecreation,<br />

and management and tracking of relative activities in<br />

PSOs.<br />

Process<br />

Service level agreements<br />

(SLAs)<br />

SLAs assure the quality of service (QoS) and trigger the concerned<br />

stake-holders to abide minimum requirements of information<br />

exchange and interoperation.<br />

Laws and regulations Correspondence between different laws and regulations in PSOs.<br />

Judicial<br />

Constitutional and legal<br />

restraints<br />

constitutional and legal limitations, correspondence restrictions, and<br />

compatibility issues concerning information exchange and<br />

interoperation in PSOs.<br />

Organizational safety and Privacy, discretion, security limitation boundaries, and compliance of<br />

security<br />

information exchange.<br />

Political and jurisdictional Avoiding imbalance and ill-use of power and prevention from wrong<br />

regulations<br />

decision making.<br />

Governance<br />

Formal communication<br />

Cooperation and understanding among different concerned<br />

quarters.<br />

Responsibilities Smooth execution of tasks by assigning right-job-for-right-person.<br />

Economical<br />

Return on investment<br />

(ROI)<br />

Effects of economic constraints on maturity of interoperability.<br />

Semantic Measures Description<br />

Definitions<br />

Describing the actual concepts that underpin the real meaning and<br />

avoid misconceptions.<br />

Semantic Classifications<br />

categorical classification of information data to enable sender and<br />

receiver (vice versa) to recognize the message.<br />

Relationships among Understanding and cooperation among system for improved quality<br />

systems<br />

of service (QoS).<br />

Syntactical Measures Description<br />

Solicitation<br />

Format of information for encoding and decoding the exchanged<br />

information.<br />

Syntactical Presentation<br />

Structure of information for encoding and decoding the exchanged<br />

information<br />

Translation<br />

Translation of exchanged information for proper interpretation of<br />

different formats of data.<br />

Technical Measures Description<br />

Physical<br />

Infrastructure<br />

Telecommunication<br />

standards<br />

Physical infrastructure for reliable information exchange and<br />

communication.<br />

Communication medium, equipment, hardware, and software<br />

Quality of service(QoS) Timestamps, sessions, and accessibility<br />

Information<br />

Protocols<br />

Routing, transport, data management, security, and quality protocols<br />

etc.<br />

4. An illustrative case study for the pragmatic level<br />

To illustrate the pragmatic level of the interoperability benchmark, we invited experts from the Dutch<br />

Inland Revenue Service to participate in a survey. We focused on the pragmatic level as the other levels<br />

of benchmarking interoperability are already well defined. The Dutch Inland Revenue Service is one of<br />

the largest public organizations that employs more than 3000 staff involved in ICT. In this illustrative and<br />

explorative case study, we asked experts in Dutch tax organization to fill out a questionnaire on<br />

organizational issues related to EA and interoperability. This survey was part of a session on EA in which<br />

359


Devender Maheshwari et al.<br />

we eleven participants took part, from which five persons filled out the questionnaire . The participants<br />

were encouraged to reflect on the measures and provide suggestions for improvements. The questions<br />

were put together to measure organizational aspects influencing the overarching EA and interoperability<br />

by categorically specifying the maturity value of each measure of the pragmatic level from 1 (low) to 5<br />

(high). Table 3 shows the list of twenty questions related to interoperability out of a total of 96 questions<br />

that were included in the survey.<br />

Table 3: Questions related to the measures developed for the pragmatic layer<br />

Table 3 shows the average and the standard deviation calculated for each question. The resultant<br />

average values for each measure show the maturity level, where the standard deviation shows the level<br />

of consensus or disagreement among the participant’s perceptions on these measures. Table 3 shows<br />

that different questions related to the same measure might have different outcomes. For example,<br />

question 4 has a relatively low average value compared to the questions 1, 2 and 3. Whereas the vision<br />

on interoperability is clear, there is a lack of organizational principles guiding the implementation of<br />

interoperability. The discussion with the five participants showed that there was space for further<br />

refinement and extension of the questions asked as shown in Table 3 and that measuring interoperability<br />

and covering all levels requires a large amount of questions. It is, however, questionable if it is desired or<br />

feasible to have hundreds of questions for measuring all levels and details of interoperability. Hence, our<br />

further research concentrates on better understanding the level of abstraction that is required to measure<br />

interoperability at a satisfactory level. The elements of Table 3 provide a starting point for this.<br />

360


Devender Maheshwari et al.<br />

The results of the illustrative case study show that although the level of interoperability can be measured,<br />

interpreting and understanding the measures remains difficult. This is explained by the high standard<br />

deviations of some responses, which means that the persons have limited agreement about the answer.<br />

Furthermore, we found that there were discussions about the outcomes on some questions. For example<br />

Q19 shows that there is cooperation among stakeholders, however, this does not mean that the<br />

cooperation is smoothly. This finding is confirmed in the literature. Benchmarking is a difficult<br />

phenomenon since a wrong interpretation can result as a disguise rather than blessing (Bannister 2007).<br />

Furthermore, benchmarking measures for interoperability are difficult to select as they vary in scope,<br />

based on desired objectives of PSOs. Hence, a trade-off between completeness and level of abstraction<br />

(how much detail is measured) is present. As the measures of the pragmatic level were identified after<br />

the survey was sent out, this illustrative case study only focuses on part of the pragmatic. The illustrative<br />

case study shows that the measurements that identified, provide further insight into interoperability<br />

benchmarking. Therefore, the measures will be extended in further research.<br />

5. Conclusion and future work<br />

Interoperability measuring and benchmarking remains a challenging subject for public organizations. It is<br />

often defined as a merely technical problem, even though organizational aspects of interoperability have<br />

proven to be equally important. Based on a division between technical, syntactical, semantic and<br />

pragmatic interoperability, we developed a list of measures for benchmarking interoperability on the<br />

pragmatic level. These measures were applied in an illustrative case study to evaluate whether they<br />

provide greater insight into pragmatic operability in organizations. Furthermore, we developed an<br />

instrument for determining overall interoperability of organizations. We found that the measures for<br />

benchmarking interoperability on the pragmatic level were seen as useful, although a trade-off between<br />

the scope and abstraction level was identified. Further research will look closer into the application of the<br />

interoperability measures and the benchmarking instrument. This paper is a first step toward further<br />

expansion of the measures for benchmarking interoperability. We intend to carry out an extensive case<br />

study in future. Furthermore, this study should include more respondents to evaluate further the<br />

measures proposed in this paper.<br />

References<br />

Andersen, K. and H. Henriksen (2006). "EGovernment maturity models: Extension of the Layne and Lee model."<br />

Government Information Quarterly 23(2): 236-248.<br />

ATHENA, C. (2004). "Enterprise interoperability maturity model (EIMM) " ATHENA IP (Advanced Technologies for<br />

interoperability of Heterogeneous Enterprise Networks and their Applications Integrated Project) IST-507849<br />

accessed from: modelbased.net/aif/methodology/eimm.htm.<br />

Bannister, F. (2007). "The curse of the benchmark: an assessment of the validity and value of eGovernment<br />

comparisons." International Review of Administrative Sciences 73(2): 171-188.<br />

Baum, C. and A. Di Maio (2000). "Gartner’s four phases of eGovernment model." Stamford, Ct., Gartner Group 21:<br />

12-6113.<br />

Breen, J. (2000). "At the dawn of eGovernment: the citizen as customer." Government Finance Review 16(5): 15-20.<br />

Cimander, R. and H. Kubicek (2009). "Organizational interoperability and organizing for interoperability in<br />

eGovernment." Second <strong>European</strong> Summit on Interoperability in the iGovernment held in Rome: 109–122.<br />

Clark, T. and R. Jones (1999). Organisational interoperability maturity model for C2.<br />

DoD, W., DC. (1998). "C4ISR Architectures Working Group report. Levels of Information Systems Interoperability<br />

(LISI) " February ,1998<br />

EFQM (2003). " EFQM Model for Business Excellence." <strong>European</strong> Foundation for Quality Management, Brussels,<br />

2003.<br />

Feenstra, R. W., M. Janssen, et al. (2006). Designing a Service Composition Framework to Support Multi Actor<br />

Network. Proceedings of Euro mGov 2006: The Second <strong>European</strong> <strong>Conference</strong> on Mobile Government. I.<br />

Kushchu, C. Borucki and G. Fitzpatrick. Brighton, UK, Mobile Government Consortium International LLC: 103-<br />

112.<br />

Global, E. (2005). "Government Readiness Report 2005: From EGovernment to E-Inclusion." ONU. United Nations.<br />

Goldkuhl, G. (2009). "The challenges of Interoperability in EGovernment: Towards a conceptual refinement."<br />

Statistics: 10-10.<br />

Gottschalk, P. (2009). "Maturity levels for interoperability in digital government " Government Information Quarterly<br />

26(1): 75-81.<br />

Guédria, W., Y. Naudet, et al. (2010). Interoperability Maturity Models–Survey and Comparison–, Springer.<br />

Hiller, J. and F. Belanger (2001). "Privacy strategies for electronic government." EGovernment: 162-198.<br />

Humphrey, W. (1988). "Managing the software process."<br />

Hunter, D. and V. Jupp (2002). "EGovernment Leadership—Realizing the Vision." Accenture Report.<br />

IDABC, E. (2004). "<strong>European</strong> Interoperability Framework for Pan-<strong>European</strong> EGovernment Services." <strong>European</strong><br />

Communities.<br />

361


Devender Maheshwari et al.<br />

IDABC, E. (2008). "Draft document as basic of EIF version 2.0." <strong>European</strong> Communities: accessed on 02-01-2011 at<br />

http://ec.europa.eu/idabc/servlets/Docb0db.pdf?id=31597.<br />

IEEE (1990). IEEE Standard Computer Dictionary: A Compilation of IEEE Standard Computer Glossaries, New York:<br />

IEEE, 1990.<br />

Janssen, M. (2010). "Measuring and Benchmarking the Back-end of EGovernment: A Participative Self-assessment<br />

Approach." Electronic Government: 156-167.<br />

Janssen, M. and A. Joha (2007). "Understanding IT governance for the operation of shared services in public service<br />

networks." International Journal of Networking and Virtual Organisations 4(1): 20-34.<br />

Janssen, M. and H. Scholl (2007). Interoperability for electronic governance, ACM.<br />

Kaplan, R. and D. Norton (2001). "Transforming the Balanced Scorecard from Performance Measurement to<br />

Strategic Management: Part I." Accounting Horizons 15(1).<br />

Kaplan, R. and D. Norton (2004). Strategy maps: Converting intangible assets into tangible outcomes, Harvard<br />

Business Press.<br />

Klievink, B. and M. Janssen (2008). "Improving Government service delivery with private sector intermediaries."<br />

<strong>European</strong> Journal of ePractice 5.<br />

Layne, K. and J. Lee (2001). "Developing fully functional EGovernment: A four stage model." Government<br />

Information Quarterly 18(2): 122-136.<br />

Lee, J. (2010). "10 year retrospect on stage models of eGovernment: A qualitative meta-synthesis." Government<br />

Information Quarterly.<br />

Leveraging, E. (2010). "United Nations EGovernment Survey 2010."<br />

Maheshwari, D., A. F. v. Veenstra, et al. (2011). "Advancing the Use of Stages-of-Growth-Models in eGovernment by<br />

Identifying Trade-offs." 16-17 June, ECEG Ljubljani, Slovenia.<br />

Moon, M. (2002). "The Evolution of E Government among Municipalities: Rhetoric or Reality?" Public administration<br />

review 62(4): 424-433.<br />

Nabitz, U. and N. Klazinga (1999). "EFQM approach and the Dutch Quality Award." International Journal of Health<br />

Care Quality Assurance 12(2): 65-71.<br />

NATO (2003). "NATO C3 Technical Architecture (NC3TA)." 34 (ADatP-34) March 2003, NATO standard website:<br />

http://www.nato.int/docu/standard.htm.<br />

Papazouglou, M. (2006). E-Business Organisational & Technical Foundations, Wiley-India.<br />

Paulk, M., B. Curtis, et al. (2002). "Capability maturity model, version 1.1." Software, IEEE 10(4): 18-27.<br />

Paulk, M., C. Weber, et al. (1993). "Key Practices of the Capability Maturity Model SM, Version 1.1." Software<br />

Engineering Institute, CMU/SEI-93-TR-25.<br />

Picot, A., R. Reichwald, et al. (2008). Information, organization and management, Springer Verlag.<br />

Schekkerman, J. (2006). Extended Enterprise Architecture Maturity Model (E2AMM) Version 2.0.<br />

Scholl, H. and R. Klischewski (2007). "EGovernment integration and interoperability: framing the research agenda."<br />

International Journal of Public Administration 30(8): 889-920.<br />

Tolk, A. and J. Muguira (2003). The levels of conceptual interoperability model, Citeseer.<br />

Tolk, A., C. Turnitsa, et al. (2006). "Composable M&S web services for net-centric applications." The Journal of<br />

Defense Modeling and Simulation: Applications, Methodology, Technology 3(1): 27.<br />

Turnitsa, C. (2005). Extending the levels of conceptual interoperability model.<br />

UN, O. (2008). "Government Survey 2008: from eGovernment to Connected Governance." United Nations. New<br />

York.<br />

362


786<br />

Barriers to Developing eGovernment Projects in Developing<br />

Countries<br />

Zaigham Mahmood<br />

University of Derby, UK<br />

z.mahmood@derby.ac.uk<br />

Abstract: eGovernment is about transforming the way a government interacts with its citizens and harnessing the<br />

information and technology revolution to improve the efficiency of the government. It is the use of information and<br />

communications technologies (ICTs) to operate more effectively and transparently to strengthen support to public<br />

policies and involve the citizens in decision making processes. eGovernment is not a one-off process or a single<br />

event: its implementation is a staged and iterative process that requires a clear vision and long term strategy. If<br />

implemented appropriately, eGovernment offers numerous benefits including: 1) cost reduction, efficiency gains and<br />

improved quality of service delivery; 2) transparency and accountability; 3) development of a networked digital<br />

community and a true information society; 4) better and efficient decision making on the part of government leaders<br />

and 5) citizens’ participation through e-democracy. Whereas, developed economies of the world are well advanced in<br />

the process of achieving vertical and horizontal full integration within the eGovernment provision, many developing<br />

countries are only at the initial stages of such developments and are finding it difficult to progress to the next stages<br />

to achieve full eGovernment. Difficulties are due to the fact that eGovernment is a huge undertaking and there are<br />

numerous inherent issues and barriers to successful development and implementation which include: 1) lack of clear<br />

vision and commitment from political leadership; 2) inappropriate assessment of eReadiness of the nation; 3) lack of<br />

ICT infrastructure and provision; 4) unavailability of ICT equipment and citizens’ limited access to such technology<br />

and 5) citizens’ inability to make full use of ICT usually due to lack of e-literacy and the digital divide that normally<br />

exist in most developing countries. This paper discusses such limitations and barriers and presents a way forward by<br />

suggesting that governments need to ensure that: 1) they have a clear vision, strategy and commitment; 2) they<br />

understand the complexity of the undertaking and the level of investment required; 3) they develop workable and<br />

transparent policies and structures and 4) they also consider human factors including people’s preferences and ways<br />

of actions. The aim of this paper is to provide some useful practical guidance so that the eGovernment projects have<br />

a better chance of being more successful.<br />

Keywords: eGovernment, eReadiness, barriers, issues, developing countriest<br />

1. Introduction<br />

eGovernment is a multi- and interdisciplinary field. It is about harnessing the information revolution to<br />

improve the efficiency of a government. According to the <strong>European</strong> Commission (2003), EGovernment is<br />

the use of information and communications technology (ICT) in public administrations combined with<br />

organizational change and new skills in order to improve public services and democratic processes and<br />

strengthen support to public policies. InfoDev (2002) define it as the use of ICT to transform government<br />

by making it more accessible, effective and accountable. The World Bank (Kannan, 2009) provides a<br />

much more succinct definition suggesting that eGovernment refers to utilising ICT for changing and<br />

improving the relationship between governments, citizens, businesses and other government entities.<br />

The aim is to enhance the transparency of government operations and enrich the lives of its citizens. It<br />

provides a citizen centred vision of a government that facilitates effective governance, better<br />

management and efficient services through the use of ICT.<br />

In this context, world governments are mobilizing huge amounts of resources to develop, implement and<br />

promote the use of eGovernment. Depending on the clarity of governments’ vision and availability of<br />

resources, world governments are at different stages of eGovernment developments. It should be noted<br />

that eGovernment is not a single event that immediately and forever alters the universe of government. It<br />

is a staged and iterative process. Provision of eGovernment is a complex undertaking and it takes years<br />

of implementation effort. Numerous models for eGovernment development have been suggested by<br />

researchers e.g. Gartner (2000), Howard (2001), Chandler and Emanuels (2002), Hiller and Belanger<br />

(2002), Layne and Lee (2001), Moon (2002), Alpar (2005), Andersen and Henriksen (2006). Based on<br />

these, Mahmood (2009a) suggests a five-step model with the following stages:<br />

Informational: this is the first stage, often termed as G2C (government-to-customer) integration which<br />

refers to the provision of one way information via one or more government portals. The aim is to<br />

provide static information with respect to services and make announcements. The C2G (customer-togovernment)<br />

interaction is missing at stage.<br />

Interactive: this is the next stage in the process that provides a two-way interaction (G2C and C2G)<br />

for the provision of further information. Here, a certain amount of interaction is available e.g. citizens<br />

363


Zaigham Mahmood<br />

can make enquiries through the use of e-mail and engage in discussion through the use of bulletin<br />

boards etc.<br />

Transactional: this stage is the real beginning of effective eGovernment where transactions can take<br />

place via the telephone and other Internet technologies. At this stage, citizens can make online<br />

payments of bills and purchase goods via the Internet. This is where citizens can engage in ecommerce<br />

(and e-business) activities. The relevant terms include: G2B (government-to-business),<br />

B2B (business-to-business), B2C (business-to-customer), C2B (customer-to-business).<br />

Integrated: this is the next stage where G2G (government-to-government) interaction takes place<br />

(along with G2C, C2G and B2B). It refers to aligning the horizontal integration of government services<br />

within departments as well as implementing vertical integration so that there is a complete network<br />

where two-way communications and transactions takes place between and across government<br />

divisions (as well as between the government departments and the governed).<br />

Participative: this is final stage which provides the highest level of interaction. Here, citizens can<br />

participate in the provision and affairs of the government to further affect the government decisions<br />

and processes. A term commonly used, in this context, is e-democracy.<br />

Whereas, developed economies such as those in Europe and the US are well advanced in the process of<br />

achieving vertical and horizontal integrating with respect to eGovernment projects and are, therefore, at<br />

Integrated and Participative stages, many developing countries are at the first three stages of such<br />

developments and are finding it somewhat difficult to progress to the next stages of eGovernment.<br />

Difficulties are due to the fact that eGovernment projects are huge undertakings and there are numerous<br />

inherent issues and barriers to successful implementation.<br />

Successful development of eGovernment requires robust ICT infrastructure to be in place, serious<br />

commitment from political leadership and investment of huge amounts of time and money resources as<br />

well as provision of education to citizens. It is also imperative that relevant technologies are easily<br />

available to citizens and they have full access to their capabilities.<br />

In this paper, we first discuss, in some detail, the issues and barriers to successful development and<br />

implementation of eGovernment projects in the context of developing nations, and then present<br />

suggestions for a way forward. The aim is to provide some useful practical guidance so that the<br />

eGovernment projects have a better chance of being more successful.<br />

2. Barriers to developing eGovernment<br />

Barriers to developing eGovernment projects can be categorised as belonging to the following varieties:<br />

cultural, political, institutional, external, human, financial and citizens concerns (Kannan, 2009). In the<br />

case of developing countries, the issues and limitations are many. These generally include the following:<br />

Lack of commitment from political leadership: unfortunately, this is generally the case in developing<br />

countries<br />

Inappropriate assessment of eReadiness: often due to the fact that the inherent complexity is not well<br />

understood<br />

Lack of ICT infrastructure and provision: often because of limited financial resources as well as due<br />

to lack of understanding and commitment<br />

Citizens’ limited access to ICT: usually due to the digital divide but also due to the general lack of ICT<br />

provision<br />

Citizens’ inability to make full use of ICT: usually due to lack of awareness and education and fear of<br />

embracing the new technologies.<br />

Government’s lack of full support to e-business community and certain highly embedded cultural aspects<br />

are also important limiting factors. EGovernment in the developing world must also accommodate certain<br />

conditions, needs and obstacles, that are unique to such societies, including a continuing oral tradition,<br />

corruption at the government level as well as in the society, lack of clear legal frameworks and weak<br />

educational systems.<br />

InfoDev (2002) mentions 17 challenges with respect to eGovernment development. Some of these, more<br />

relevant to developing countries, include: 1) developing infrastructure; 2) establishing policies - public and<br />

legal; 3) developing e-literacy programmes; 4) marketing of innovation and 5) gaining citizen’s trust. The<br />

last two points are particularly interesting. Lack of proper marketing of innovation is due to lack of<br />

364


Zaigham Mahmood<br />

commitment and responsibility on the part of the government officials and a lack of citizen’s trust is often<br />

due to corruption in government circles (and perhaps also within the society).<br />

Ndou (2004) mentions a number of similar challenges facing the developing countries, in particular:<br />

ICT infrastructure – referring to a lack of eReadiness and computer literacy in the society as well as<br />

unavailability of ICT equipment<br />

Policy issues – referring to inappropriate legislation with respect to legal and data protection<br />

regulations<br />

Human capital development – referring to a lack of opportunity for sustained learning and acquiring<br />

skills<br />

Change management – referring to the masses’ resistance to change to adopt new attitudes due to<br />

the way the society normally operates<br />

Strategy (vision, mission) – referring to insufficient political commitment<br />

Leadership role and strategy – referring to a lack of motivation, commitment and long term strategy.<br />

This also suggests that developing countries must pursue a more active role in the formulation of national<br />

policies and strategies to promote the information economy, to develop opportunities for long-life learning<br />

and to show the required commitment and political will to reap the benefits in terms of economic and<br />

social growth and development that come as a result of successful implementation of eGovernment.<br />

Ndou (2004) has no doubt that eGovernment is often limited and largely hampered by the existence of<br />

many political, social and economic hindrances.<br />

One primary reason for inherent issues has been described as due to a mismatch between the existing<br />

reality and the future desired system. According to Heeks (2003), there are three types of such gaps:<br />

Technology vs. Human Factors gaps: this refers to the difference between the existing technology<br />

(hardware) and the reality of the social context by way of the culture, people attitudes etc (soft).<br />

Private-Public gaps: this refers to the way the private and public sectors operate. There is usually a<br />

big difference, mainly due to the digital-cultural-affluence divide.<br />

Country-sensitive gaps: this refers to the difference in the way the developed and developing<br />

countries approach in organising a system. Often the developing countries copy the approaches<br />

taken by developed countries disregarding the differences in context.<br />

An investigation conducted by Heeks (2003) suggested that implementations of eGovernment in<br />

developing countries failed in case of 35% of projects in the sense of total failure when the projects were<br />

abandoned and roughly half of the projects were judged as partial failures. Although, situation has<br />

improved, failure rates or number of unsuccessful or abandoned projects is still unacceptably high.<br />

The following sections provide guidance with a view to suggesting solutions to some of the issues<br />

mentioned above.<br />

3. Guidance on implementation of eGovernment<br />

In view of the issues and barriers outlined in the previous section, it is clear that appropriate technology<br />

infrastructure needs to be put in place and adequate marketing of the innovation is carried out. It is also<br />

imperative that the following human factors are taken into account:<br />

Peoples’ attitudes and fears towards new technologies, their existing educational level, the level of<br />

their willingness to embrace new products and procedures based on their preferences and cultural<br />

backgrounds.<br />

Digital-educational-affluence divide that often exists in developing countries. If ignored then<br />

acceptance of new innovation by educated, e-literate and affluent sectors of the society will results in<br />

the gap getting even wider.<br />

eGovernment also implies fundamental knowledge redistribution and requires a careful rethinking of the<br />

management of project know-how, domain expertise, information resources and knowledge bases. At the<br />

same time, the specific problems of public administration, governance and document management<br />

system also need to be taken into account. This suggests that knowledge management, in all its aspects,<br />

is an area not to be ignored.<br />

365


Zaigham Mahmood<br />

It is important that a proper assessment of the country’s eReadiness is carried out, before agreeing a<br />

strategy. Once a strategy is devised, the process of implementation can begin. A review of e-assessment<br />

approaches can be found in Mahmood (2009b). At a very basic level, therefore, it is important that the<br />

framework for the adoption of eGovernment includes the following steps in the same order (Siemens,<br />

2008; Mahmood, 2009b):<br />

eReadiness assessment – of the current situation, existing infrastructure, available skills and the<br />

existing processes.<br />

Strategy – based on the assessment reports for the overall project specification, roadmap for<br />

eGovernment implementation and projects’ management.<br />

Processes – required for the fulfilment of the project goals and monitoring of activities.<br />

If implemented correctly, considering the factors as mentioned above, the benefits to be achieved are the<br />

same as those in developed countries. These include (Ndou, 2004):<br />

Cost reduction, efficiency gains and improved quality of service delivery<br />

Transparency and accountability<br />

Development of a networked digital community and a true information society<br />

Better and efficient decision making on the part of government leaders<br />

Citizens’ participation through e-democracy.<br />

The following sections discuss some of the important factors that are important for successful<br />

development of eGovernment projects.<br />

3.1 Developing Infrastructure<br />

Developing even a basic infrastructure for the entire nation, to take advantage of the latest ICTs, is a<br />

complex undertaking. It takes a considerable amount of time, financial resources as well as a long-term<br />

commitment. It requires a policy decision and sensible workable strategy and implementation plan. If a<br />

country is limited in the financial resources required, which is often the case for developing countries, the<br />

task at hand becomes even more difficult. In practice, therefore, implementation is carried out in stages.<br />

Often, certain areas are chosen (initially big cities) to pilot the scheme and then the areas extended<br />

slowly over a period of time – to cover the entire country in the fullness of time. This is sensible and<br />

workable strategy as there is a good chance that the citizens in the pilot areas are more affluent and<br />

better e-literate than their countrymen in other areas.<br />

It should be noted that infrastructure is not just laying the cables; it also includes provision of business<br />

opportunities for the marketing of ICT tools and technologies (e.g. computing equipment, telephones,<br />

modems, software) so that citizens can have access to these. With this in place, other related businesses<br />

will also begin to appear to provide related services (e.g. internet service providers, software and<br />

hardware vendors).<br />

3.2 Policies and controls<br />

When the infrastructure exists, it is imperative that the civil and legislative policies are also in place,<br />

especially in relation to the following:<br />

Data transmission protocols<br />

Data protection and data privacy legislation<br />

Legislation to protect citizen’s rights in connection with all aspects of the new innovation.<br />

This, again, is not easy. Although, this does not necessarily require investment of money, it does require<br />

a commitment on the part of political leaders as well as a clear foresight to ensure that the resulting<br />

policies are appropriate and workable. In doing so, the government must take a holistic view so that the<br />

focus is not just on technology but also on human and social aspects. The idea is to protect citizens as<br />

much as smooth introduction of technology. Transparency of such regulations is also important. It is<br />

imperative that such policies are seen to be working – rather than just being in the rule books. A useful<br />

side effect of this is that the citizens will feel secure and be more willing to embrace the innovation; this<br />

being the ultimate goal of implementation of eGovernment. It is noticed that policies are often not seen to<br />

be working in developing countries and therefore the political leaders need to be extra committed that<br />

best practices, as suggested by other successful nations, are transparently adhered to.<br />

366


3.3 Training of the masses<br />

Zaigham Mahmood<br />

In developing countries, opportunities are often lacking, whether these are in relation to business,<br />

education or training. If the government is investing in the ICT infrastructure and developing correct<br />

policies then it is imperative that citizens are appropriately empowered to take advantage of the new<br />

opportunities. In this context, relevant training and increase in e-literacy is of paramount importance. This<br />

may mean providing training opportunities during evenings and weekends and through local schools and<br />

other similar organisations. This may also mean setting up a new breed of training places just for this<br />

purpose and ensuring that the expertise is readily available in case people have difficulties or issues.<br />

This also requires a sensible long-term plan and a phased approach: piloting the scheme in a few<br />

geographical areas to begin with and then extending it to other regions over a period of time. There is<br />

often a fear when venturing into new technological areas, so one aspect of such training must be to alley<br />

such fears otherwise citizens will remain reluctant to embrace the innovation.<br />

3.4 Transparency of functions<br />

Transparency must be a primary guiding principle behind all such development. In developing countries,<br />

there is often a lack of vision and commitment on the part of government officials which causes mistrust<br />

within the government departments and between the government and the governed. Policies need to be<br />

seen to be working and working equally and fairly for all sections of the society. Transparency of<br />

whatever the government does is much more important for developing nations than it is for the<br />

developed. Strategy should be to start small, have it seen to be working efficiently and effectively and<br />

then build on it to develop further. Marketing of the new approaches must be with honesty that people<br />

can see. Officials and government departments must lead by example.<br />

This also requires an understanding and admittance of the fact that there may well be a trust deficit;<br />

otherwise, the efforts will not bear the fruits expected of such developments.<br />

4. Conclusion<br />

eGovernment is the use of ICT for the government to operate more effectively and the use of same<br />

technologies by the citizens to participate in government’s decision making processes. It is a huge<br />

undertaking that requires a long term planning and commitment of effort and resources. Whereas,<br />

developed countries are being successful in implementing eGovernment, developing countries face many<br />

barriers and limitations. Such difficulties are, generally, due to the following reasons:<br />

Lack of clear vision and commitment from political leadership<br />

Inappropriate assessment of eReadiness of the nation<br />

Lack of ICT infrastructure and provision<br />

Unavailability of ICT equipment and citizens’ limited access to technology<br />

Lack of e-literacy of the masses<br />

Digital and economic divide that normally exists in developing countries.<br />

The solution is to ensure that: 1) a proper eReadiness assessment is conducted; 2) a workable strategy<br />

is devised; and 3) appropriate process are designed and implemented. It is important that human factors,<br />

a nation’s cultural values and people’s attitudes to new technologies are taken into account. Commitment<br />

of political leaders and a clean vision with respect to eGovernment development is a pre-requisite. Case<br />

studies from other nations and elements of good practices must also be studied. It should be noted that<br />

eGovernment is a staged process and it should be implemented in an iterative manner.<br />

This paper has discussed the issues and barriers to successful development and implementation of<br />

eGovernment projects in the context of developing nations. It also provides some useful guidance so that<br />

eGovernment developments have a better chance of being more successful.<br />

References<br />

Alpar, P. and Olbrich, S. (2005) ‘Legal Requirements and Modelling of Processes in EGovernment’, Electronic<br />

Journal of EGovernment, Vol 3, Issue 3, pp 107-116<br />

Andersen, K. V. and Henriksen, H. Z. (2006) ‘EGovernment Maturity Models: Extension of the Layne and Lee Model’,<br />

Government Information Quarterly, Vol 23, No 2, pp 236-248<br />

Baum, C. and Di Mayo, A. (2000) ‘Gartner’s Four Phases of EGovernment Model’, Gartner Group, Research Note<br />

367


Zaigham Mahmood<br />

Chandler, S. and Emanuels, S. (2002) ‘Transformation not Automation’, Proc. <strong>European</strong> Conf on EGovernment,<br />

Oxford, UK<br />

<strong>European</strong> Commission (2003) ‘The Role of EGovernment for Europe’s Future’, <strong>European</strong> Economic and Social<br />

Committee Report, <strong>European</strong> Parliament, Brussels<br />

Heeks (2003) ‘Most EGovernment-for-Development Projects Fail: How can risks be reduced?’, iGovernment Working<br />

Paper Series, Paper no 14, IDPM, University of Manchester, UK<br />

Hiller, J. S. and Belanger, F. (2001) ‘Privacy Strategies for Electronic Government’, The Price Waterhouse<br />

Endowment for the Business of Government, Virginia, US<br />

Howard, M. (2001) ‘EGovernment Across the Globe: How will ‘e’ Change Government’, Government Finance<br />

Review, 17(4), pp 6-9<br />

InforDev (2002) ‘The EGovernment Handbook for Developing Countries’, Centre for Democracy and Technology,<br />

Washington D.C., Nov 2002<br />

Kannan, R. K. (2009) ‘Making Sense of EGovernment Implementation in Jordan: A Qualitative Investigation’, PhD<br />

Thesis, De Montford University, UK, April 2009<br />

Layne, K. and Lee, J. (2001) ‘Developing Fully Functional EGovernment: A Four Stage Model’, Government<br />

Information Quarterly, 18, pp 122-136<br />

Moon, M. J. (2002) ‘The Evolution of EGovernment among Municipalities: Rhetoric or Reality?’, Public Admin<br />

Review, Vol 62, No 4, pp 424-433<br />

Mahmood, Z. (2009a) ‘EGovernment: Stage Models for Successful Development’, Proc 13 th Int. IBIMA Int.<br />

<strong>Conference</strong>, Morocco, Marrakech, Nov 2009<br />

Mahmood, Z. (2009b) ‘EGovernment: EReadiness Factors and Implementation Strategy’, Proc 13 th Int. IBIMA conf.,<br />

Marrakech, Morocco, Nov 2009<br />

Ndou, V. D. (2004) ‘EGovernment for Developing Countries: Opportunities and Challenges’, Electronic Journal on<br />

Information Systems in Developing Countries, 18.1, pp 1-24<br />

Siemens, A. G. (2008) ‘EGovernment Framework – Building Blocks of EGovernment’, Siemens AG<br />

368


Digital Inclusion: A Target not Always Desirable<br />

Fausto Marcantoni and Alberto Polzonetti<br />

School of Science and Technology, University of Camerino, Camerino, Italy<br />

fausto.marcantoni@unicam.it<br />

alberto.polzonetti@unicam.it<br />

Abstract. Activities directed at "including" more people in the use of digital technology are predicated on the<br />

assumption that such inclusion is invariably a good thing. It appears so, when judged solely by immediate<br />

practical convenience. However, if we also judge in terms of human rights, whether digital inclusion is good or<br />

bad depends on what kind of digital world we are to be included in. If we wish to work toward digital inclusion as a<br />

goal, it behooves us to make sure it is the good kind. In this paper after introducing the problem, we analyzed the<br />

threats faced by the surfers. In this context, we examined the challenges of human rights in society and we have<br />

provided some final evaluations that justify our title.<br />

Keywords: digital divide, digital inclusion, information society<br />

1. Introduction<br />

In the social sciences, inclusion refers to a process, de facto and/or de jure, of including people in a<br />

given social structure, most often, in society at large. Conversely, social exclusion describes ‘‘the<br />

inability of our society to keep all groups and individuals within reach of what we expect as a<br />

society…[or] to realize their full potential’’.(Power and Wilson,2000). Although an echo of a pure<br />

economic theory can be traced in EU policies on e-inclusion (e.g., the emphasis accorded to the need<br />

to promote ‘‘active’’ living), it is indisputable that the EU approach to e-inclusion is based on a<br />

different vision. Ethics are an integral part of the EU concept of e-inclusion: ‘‘e-Inclusion is necessary<br />

for social justice, ensuring equity in the knowledge society’’. (<strong>European</strong> Commission A. (2007)).<br />

On 11–13 June 2006, the <strong>European</strong> Commission, together with the Latvian government and the<br />

Austrian Presidency of the EU, organized a high-level conference on the theme ‘‘ICT for an inclusive<br />

society’’ in Riga. The conference included an informal meeting of Ministers ,where Ministers of the EU<br />

Member States and accession and candidate countries, <strong>European</strong> Free Trade Area (EFTA) countries<br />

and other countries adopted a Declaration on e-inclusion, commonly known as the ‘‘Riga Declaration’’<br />

The Riga Declaration explicitly calls for increasing ethical awareness:<br />

Particular attention must be paid to further improve user motivation towards ICT use, as well as<br />

trust and confidence through better security and privacy protection. Furthermore, greater gender<br />

balance in the information society remains a key objective.<br />

Realizing increased quality of life, autonomy and safety, while respecting privacy and ethical<br />

requirements.<br />

The centrality of ethical issues in e-inclusion has been further reasserted by the Communication on<br />

Ageing well in the Information Society. (<strong>European</strong> Commission B (2007))<br />

Solutions can only bring benefits if users have access to basic ICT facilities, have the appropriate<br />

education and motivation, and ethical and psychological issues are properly addressed. There is no<br />

specific reference point for ethics in ICT for ageing, for example, in safeguarding human dignity and<br />

autonomy where solutions require a degree of monitoring and intervention.<br />

The concept is also affirmed in the associated Commission Staff Working Paper (<strong>European</strong><br />

Commission. C 2007) . With the emergence of ICT and ageing new ethical questions are being<br />

raised. These questions find their origin in the vulnerability of the user, the changing characteristics of<br />

the user population (e.g. more people surviving at high age but also the trend towards more educated<br />

and empowered users), economic constraints such as public budgets that are at tension with serving<br />

all fully in health and social care and the constant renewal of science and technology.<br />

Still more specifically, the recent Communication ‘‘<strong>European</strong> i2010 initiative on e-Inclusion” says that<br />

‘‘It is also important to raise awareness of the risks involved in processing personal data through ICT<br />

networks and educate users in this field, e.g. risks of identity theft, discriminatory profiling or<br />

369


Fausto Marcantoni and Alberto Polzonetti<br />

continuous surveillance.’’ Yet until the Seventh Framework Program, there have been few systematic,<br />

coordinated initiatives on ethics and e-inclusion.<br />

2. Threats<br />

Digital information and communication technology offers the possibility of a new world of freedom. It<br />

also offers possibilities of surveillance and control which dictatorships of the past could only struggle<br />

to establish. The battle to decide between these possibilities is being fought now. Activities directed at<br />

"including" more people in the use of digital technology are predicated on the assumption that such<br />

inclusion is invariably a good thing. It appears so, when judged solely by immediate practical<br />

convenience. However, if we judge also in terms of human rights, the question of whether digital<br />

inclusion is good or bad depends on what kind of digital world we are to be included in. If we wish to<br />

work toward digital inclusion as a goal, it behooves us to make sure it is the good kind. The digital<br />

world today faces six major threats to users' freedom: surveillance, censorship, proprietary software,<br />

restricted formats, copyright enforcement. A program to promote "digital inclusion" must take account<br />

of these threats, so as to avoid exposing its intended beneficiaries to them.<br />

2.1 Surveillance and censorship<br />

In general, the various texts relating Information Society refer in euphoric terms to the potential<br />

benefits of ICTs and the new opportunities they open up, but fail to address the threats and<br />

challenges they can bring with them. These are particularly apparent with regard to the right to<br />

privacy. It is true that ICTs can and should be used to protect the right to privacy, but they also<br />

provide unprecedented possibilities for massive violations of this right. Contrary to the Summit, the<br />

International Symposium considered the following issues: The use of increasingly invasive means of<br />

surveillance and of interception of communications, of intrusive profiling and identification, and of<br />

biometric identification technology, the development of communication technologies with built-in<br />

surveillance capacities, the collection and misuse of genetic data, genetic testing, the growing<br />

invasion of privacy at the workplace, and the weakening of data protection regimes give rise to<br />

serious concerns from the point of view of respect for human rights (Statement on Human<br />

Rights,2005). The Statement adopted by the International Symposium emphasized that "[n]ew means<br />

must be developed to protect the human right to privacy, such as the right to know about one's<br />

personal data held by public and private institutions and to have them deleted where not strictly<br />

necessary for a legitimate purpose in a democratic society” The Symposium also stated that "the<br />

development, transfer and use of technology permitting illegitimate invasion of privacy must be<br />

controlled and curbed.”<br />

The digital divide is no more than a symptom of a far more serious and deep-seated evil, i.e. the<br />

unequal distribution of wealth among and within countries, the growing gap between the rich and the<br />

poor. Any serious effort to heal, remedy or alleviate this state of affairs must obviously address the<br />

disease and not simply the symptom. ICTs are not the panacea. It is certainly naive to believe that<br />

giving people in poor countries mobile phones or Internet connections will in itself eradicate or reduce<br />

poverty. Is it necessary to recall that for the Internet one needs electricity and that the use of the<br />

Internet is difficult for people who are illiterate? It is true that there is a boom in cellular phones in<br />

many countries of the South; however it is essentially concentrated in the cities. This certainly serves<br />

the interests of the producers of cellular phones, but does it serve the interests of the poor in the<br />

South and will it reduce poverty? Are costly cellular phones or Internet connections priorities for<br />

people who lack nutrition, water and health? ICTs should not be seen as ends in themselves. Any<br />

serious policy of ICT development must be part and parcel of a global policy of human and<br />

sustainable development and poverty reduction.<br />

When the topic of Internet censorship is mentioned, people are likely to think of China, but many<br />

supposedly freedom-respecting countries have imposed censorship. Denmark's government has<br />

blocked access to a secret list of web pages. Australia's government wants to do likewise, but has<br />

met strong resistance, so instead it has forbidden links to a long list of URLs. Australia now says it will<br />

censor access to a secret list of foreign sites starting this year. (Electronic Frontiers Australia,2009).<br />

Censorship of the contents of web sites is also a threat. India just announced a broad plan of<br />

censorship that would effectively abolish freedom of the press on the Internet (The times of<br />

India,2009).Some <strong>European</strong> countries censor particular political views on the Internet. In the United<br />

370


Fausto Marcantoni and Alberto Polzonetti<br />

States, people have been imprisoned as "terrorists" for running a web site which discussed actions<br />

taken against experiments on animals.<br />

Censorship is nothing new. What is new is the ease and effectiveness of censorship on electronic<br />

communication and publication (even where a few wizards have ways to bypass it). China in 1960<br />

achieved effective censorship by cutting its population off from the world, but that held back the<br />

country's development, which was painful for the regime as well as for the population. Today China<br />

uses digital technology to achieve effective political censorship without cutting itself off in other ways.<br />

(Network World, 2009)<br />

2.2 Proprietary Software And Restricted Formats<br />

In order for computer users to have freedom in their own computing activities, they must have control<br />

over the software they use. This means it must be free software. A program is free/libre if it gives the<br />

user these four essential freedoms: (GNU,2009)<br />

- The freedom to run the program, for any purpose (freedom 0).<br />

- The freedom to study how the program works, and change it to make it do what you wish<br />

(freedom 1). Access to the source code is a precondition for this.<br />

- The freedom to redistribute copies so you can help your neighbor (freedom 2).<br />

- The freedom to distribute copies of your modified versions to others (freedom 3). By doing this<br />

you can give the whole community a chance to benefit from your changes. Access to the<br />

source code is a precondition for this.<br />

When software is free, the users control what it does. A non-free or proprietary program is under the<br />

control of its developer, an functions as an instrument to give the developer control over the users. It<br />

may be convenient or it may not, but in either case it imposes on its users a social system that keeps<br />

them divided and helpless. Avoiding this injustice and giving users control over their computing<br />

requires the four freedoms. Freedoms 0 and 1 give you control over your own computing, and<br />

freedom 3 enables users to work together to jointly control their computing, while freedom 2 means<br />

users are not kept divided.<br />

Many argue that free/libre software is impossible on theoretical economic grounds. Some of them<br />

misinterpret free/libre software as "gratis software"; others understand the term correctly, but either<br />

way they claim that business will never want to develop such software. Combining this with a<br />

theoretical premise 'Such as "Useful software can only be developed by paying programmers," they<br />

conclude that free software could never exist. This argument is typically presented elliptically in the<br />

form of a question such as, "How can programmers make a living if software is free?" Both premises,<br />

as well as the conclusion, contradict well-known facts; perhaps the elliptical questions are meant to<br />

obscure the premises so people will not compare them with the facts.<br />

Restricted file formats impose private control over communication and publication Those who control<br />

the formats control, in a general sense, society's use of information, since it can't be distributed or<br />

read/viewed without their permission. For instance, text files are often distributed in the secret<br />

Microsoft Word format, which other developers have only imperfectly been able to decode and<br />

implement. This practice is comparable to publishing books in a secret alphabet which only officially<br />

approved scribes know how to read.<br />

A restricted format is a trap; any and all use of the format has the effect of pushing computer users<br />

into the trap. Inclusion in dependence on these formats is not a step forward.<br />

2.3 Copyright and sharing<br />

The biggest conflict over freedom in the Internet is the War on Sharing: the attempt by the publishing<br />

industry to prevent Internet users from enjoying the capability to copy and share information.<br />

Copyright was established in the age of the printing press as an industrial regulation on the business<br />

of writing and publishing. The aim was to encourage the publication of a diversity of written works.<br />

The means used was to require publishers to get the author's permission to publish recent writings.<br />

This enabled authors to get income from publishers, which facilitated and encouraged writing. The<br />

general reading public received the benefit of this, while losing little: copyright restricted only<br />

371


Fausto Marcantoni and Alberto Polzonetti<br />

publication, not the things an ordinary reader could do, so it was easy to enforce and met with little<br />

opposition. That made copyright arguably a beneficial system for the public, and therefore legitimate.<br />

One obstacle stands in the way of this utopia: copyright. Readers and listeners who make use of their<br />

new ability to copy and share published information are technically copyright infringers. The same law<br />

which formerly acted as a beneficial industrial regulation on publishers has now become a restriction<br />

on the public it was meant to benefit.<br />

In a democracy, a law that prohibits a popular and useful activity is usually soon relaxed. Not so<br />

where corporations have more political power than the public. The entertainment companies' lobby is<br />

determined to prevent the public from taking advantage of the power of their computers, and has<br />

found copyright a suitable tool. Under their influence, rather than relaxing copyright rules to permit<br />

productive and free use of the Internet, governments have made it stricter than ever, forbidding the<br />

act of sharing<br />

3. New economy motivations<br />

In common parlance, the .new economy. is defined as the transformation of the economy from one<br />

based on agriculture and manufacturing into one based on services and high-technology skills<br />

(Greenspan 2000). Information technology enables firms and governments to push the limits of<br />

economic efficiency. Developed countries are faced with a shortage of skilled labor and are, therefore,<br />

trying to attract qualified labor from developing. countries. This has a dual effect for the developing<br />

nations: the flow of remittances into the country increases, but they lose qualified workers for their<br />

own national development (United Nations 2000). Human talent becomes just another one of the<br />

commodified natural resources exported for consumption in the developed world. For workers<br />

worldwide, this practice leads to a decline in job security and solidarity because individuals must now<br />

compete in a global labor force. Long-term employment in one company becomes increasingly rare. It<br />

signals a cultural change where loyalty to institutions and places becomes a liability. Those who do<br />

manage to obtain longevity are seen as either having a lack of initiative or as simply being<br />

incompetent.<br />

This loss of solidarity and collective reference is also seen in the management ranks where the focus<br />

is on short-term financials. This leads to a reign of flexibility with recruitment on temporary contracts,<br />

repeated downsizing, and competition within firms by profit centers. Managers are individually<br />

monitored and controlled with practices such as pay-for-performance, individual objective setting,<br />

bonuses, and incentive based on individual merit. Managers act more like independent proprietors,<br />

often abdicating their social responsibility to their subordinates. Therefore, it is not surprising that talk<br />

of trust, knowledge sharing, communities of practice, and corporate culture are prevalent because the<br />

organization is stripping its workers. commitment through short-term employment. In a world of<br />

downsizing, anxiety, and demoralization, there is a strong need on the part of management to give a<br />

discourse of continuity to workers (Bourdieu 1998).<br />

Information technologies have allowed for enormous flexibility in several key dimensions. Economic<br />

capital flows from place to place electronically. Intellectual capital is captured and distributed in much<br />

the same fashion. Virtual teams are assembled when and where specific skill sets are required. When<br />

the task is accomplished, the team is dismantled. Temporary or full-time workers move on to new<br />

tasks, new settings, new teams. Management becomes increasingly virtual in a world of increasingly<br />

virtual organizational and social arrangements. In this new economy, the traditional employment<br />

covenant has been discarded (Truex et al. 1995). Skill sets change rapidly and the employee must<br />

take responsibility for gaining these skills and keeping them current. Retraining is akin to school<br />

exams within the enterprise where employees have to prove their mastery of new skills and<br />

competencies. Insecurity and a sense of unworthiness are being reinforced because the aptitudes<br />

that served workers well in the past are now being evalued and replaced with often short-lived<br />

knowledge-based skills. Such messages coupled with the structural violence of knowing that the<br />

people next door as well as people on the other side of the globe can take one’s job are perquisites<br />

for creating a submissive and exploitable workforce (Bourdieu 1998).<br />

In short, the new economy is fueled and driven by information and communications technologies.<br />

Thus it has become a matter of faith that everyone must be technology literate, web connected, and<br />

willing to change at Internet speeds. How are we to make sense of all this?<br />

372


Fausto Marcantoni and Alberto Polzonetti<br />

4. Challenges to human rights in information society<br />

Information technology presents opportunity and risk to people in the information society. New<br />

challenges to human rights have been emerged in the information age. These new challenges include<br />

but not limited to the commercialization of the Internet, invasion of the personal privacy, the growth of<br />

law enforcement authority, and the globalization of decision-making authority. Equally important are<br />

limitations, surveillance and censorship by the State or private parties, especially in the post-<br />

September 11th, 2001.<br />

Central to these challenges is the exclusion of most people in developing countries from the<br />

advantages of advances in digital information, the commoditization of information and knowledge, and<br />

the growing concentration of ownership and control of the means of producing and disseminating<br />

information and knowledge. The massive disparities in access to information and to the means of<br />

communication, known as “the digital divide,” are a result of the unequal distribution of wealth among<br />

and within countries. The digital divide results in unequal access to information and to the means of<br />

communication and information, thus producing massive exclusion. All avenues must be explored to<br />

ensure to all equal and affordable access to information, means of communication, and the necessary<br />

technology and infrastructure.<br />

Concentration of ownership in the hands of a few major corporations limits the opportunities for<br />

information and communications technologies to adequately reflect the pluralism of perspectives and<br />

diversity of cultures The Information and Communication Society will not contribute to human<br />

development and human rights unless and until access to information is considered a public good to<br />

be protected by the State and promoted by the market.<br />

The Commercialization of the Internet. The graphical interface of the internet has made it easier for<br />

many individuals, organizations and nations to take advantage of global networks, to establish an<br />

online presence, interaction, use and to exchange information and ideas in the global information<br />

society. Information society for all and all have benefited from it.<br />

First, commercialization of the Internet also poses the threat to the rights which would otherwise be<br />

protected in the physical reality. Individuals have forced to pay for services that might otherwise be<br />

routinely provided free. A critical example is the confidentiality of correspondence. By tradition,<br />

communication services have assured the privacy of personal correspondence and personal<br />

communication. But these rights are not protected in the cyber environment records of<br />

communications and the transactions are valuable for marketing purposes.<br />

Secondly, commercialization of the Internet may pose a threat to the freedom of expression. And<br />

finally, the threat is the use of the Copyright Management Systems to track the interests of Internet<br />

users. Figure presents internet users by region<br />

373


Fausto Marcantoni and Alberto Polzonetti<br />

The Growth of Law Enforcement Authority. An increased concern about cyber crime, computer<br />

crimes and internet crimes (i.e., child pornography on the Internet, women and children trafficking)<br />

have led to calls for government intervenes and attempts to censorship the use of the Internet. While<br />

there is a need to protect people’s security and safety and investigate and prosecute criminal<br />

behaviors. But unrestricted government authority or power and control coupled poses threats to the<br />

rights and freedoms of citizens in the information society. Because the Internet has no boundaries,<br />

government censorship and surveillance not only affect the citizens’ rights of one society, but<br />

threatens the freedoms and rights of people on the globe.<br />

Globalization of Decision Making. In information society economy has become globalized.<br />

International organizations, such as the World Trade Organization and the World Intellectual Property<br />

Organization have gained greater prominence in setting public policy for the digital age. This poses<br />

challenges to human dignity, as these international organizations tend to emphasize commercial<br />

interests and do not generally recognize the broader values of the local cultural, social, political, or<br />

artistic activities, Individuals may threats their rights may not be recognized by the international<br />

organizations.<br />

Personal Privacy. It is fundamental to an understanding of the Information Society to recognize that<br />

information is power. Control of personal information and the deprivation of the right of privacy are<br />

ways of exercising power over individuals. The protection of personal information and privacy is<br />

central to the autonomy of the individual and for the respect of human rights. The development,<br />

transfer, and use of technology permitting illegitimate invasion of privacy must be controlled and<br />

curbed. Anonymity and protection of privacy and free expression enable individuals to receive<br />

information and ideas without the requirement of routine tracking and surveillance (Rotenberg,2007).<br />

Free Expression. Free expression is not possible without the protection of private life Full respect for<br />

freedom of expression and information by State and non- State actors is an essential precondition for<br />

the building of a free and inclusive Information and Communication Society. There must be no<br />

censorship and no arbitrary controls or constraints imposed on participants in the information process,<br />

that is, on the content of information, its transmission, or its dissemination. Pluralism of sources of<br />

information and media must be safeguarded and promoted. The trend to provide public access to the<br />

information produced or maintained by governments and protected under “freedom of information”<br />

legislation should be extended to all countries that do not have such legislation, ensuring that<br />

government-controlled information is timely, complete, and accessible in a format and language the<br />

public can understand. Freedom of expression should be protected through the Internet in the same<br />

way it is protected offline and Internet service providers should be guided by this freedom rather than<br />

by codes of conduct that are not based on human rights (Rotenberg, 2007).<br />

374


Fausto Marcantoni and Alberto Polzonetti<br />

The Right to Education. Connectivity to the net and Access to information stimulate wider<br />

dissemination of information regarding social, economic, and cultural aspects of life. E-learning has a<br />

potential for promoting democratic citizenship through education and enhancing the level of people’s<br />

knowledge on the globe.<br />

The Right to Free Election. E-voting should respect the principles of democratic elections. ICTs<br />

have the potential to strengthen representative democracy by making it easier to hold elections.<br />

Citizen’s consultations are accessible to all citizens.<br />

The Right to Assembly. The right of assembly is related to the right of free election. Free assembly<br />

is a crucial factor in a democratic society. All groups should have the freedom to participate in a<br />

cyberassociation.<br />

The Right of Cultural and Linguistic Diversity. Language is very important tool in every day<br />

interaction as well as for F2F cyber interaction. Internet has a heterogeneous population, cultural<br />

understanding and competitiveness has become critical issue over the net. In information society<br />

plurality of identities, including cultural diversity has increasingly regarded as an asset and a<br />

fundamental value to be defended and promoted. Fostering diversity is crucial to respecting cultural<br />

rights, promoting tolerance and fighting discrimination. The preservation and promotion of cultural and<br />

linguistic diversity and interaction must be a character of a flourishing Information Society. Figure<br />

presents top ten languages used on the net.<br />

5. Conclusion<br />

In the age of information where information is the corner stone of all types of human activities. A rapid<br />

development in technologies, (i.e., the commercialization of the Internet, and the increase of<br />

globalization) Has affected human life on all levels. On one hand Light side of such developments<br />

enhance and support the protection and building of a global human rights. Availability of information,<br />

public awareness and borderless global society, connectivity and interdependence among other<br />

characteristics of information society all contribute toward a global physical and virtual system of<br />

human rights. On the other hand the dark side of this development (i.e. threats to human rights in<br />

general and personal privacy and freedom of expression in specific). All efforts should be directed<br />

toward the protection of human rights on the global level. In the area of privacy protection, the primary<br />

goal should be to ensure adoption and enforcement of “Fair Information Practices” that are the basis<br />

for privacy protection around these world. It is appropriate to encourage adoption of “Privacy<br />

Enhancing Technologies,” after assessing its adaptability and legality with human rights. Encryption<br />

can be used both to protect the privacy of personal communication and to compel the disclosure of<br />

identity. Also it is important to minimize government censorship and unlawful police surveillance that<br />

takes place around the globe. The right of all should be protected against unlawful intrusions into<br />

private life.<br />

Free exchange of information should be protected and maintain the openness of the Internet. The<br />

Internet continues to offer extraordinary opportunities to expand human knowledge, to strengthen<br />

human understanding, and to promote cooperation across borders. Efforts by government to restrict<br />

access to information on the Internet or to limit the distribution of information on the Internet,<br />

particularly information that is political, cultural or artistic should be opposed.<br />

Organization should promote open, non-proprietary standards that enable competition and discourage<br />

the development of “bottlenecks” in the communications infrastructure. Organizations should<br />

discourage the adoption of network-based techniques that “filter” information, which is more<br />

accurately described as “digital censorship.” While individual users may choose to use software that<br />

limits access to certain information, the use of these techniques at the network level is a direct threat<br />

to freedom of expression in the digital world.<br />

The growth of the Internet has a witnessed the growth of a new type of Non Governmental<br />

Organizations (NGOs) can be named cyber NGOs or (CNGOs). These CNGOs are easily identified<br />

by their “.org” suffix. They are independent of the government (.gov) and business organizations<br />

(.com). They focus on the social issues arising from the impact of information technology, such as<br />

privacy and free expression, but they also use the Internet for public education, organizing, and public<br />

action. Typically, they maintain a web site, publish an electronic newsletter, organize public<br />

campaigns, issue reports, and host conferences. Theses CNGOs forms a collective action against the<br />

375


Fausto Marcantoni and Alberto Polzonetti<br />

violation of human rights on the globe and arising public awareness of regarding social and political<br />

issues (Rotenberg, 2007).<br />

References<br />

Bourdieu, P. Acts of Resistance: Against the Tyranny of the Market, New York: Norton, 1998<br />

Electronic Frontiers Australia,2009 The EFA home page. [online] Available from: <<br />

http://www.efa.org.au/2009/12/17/flltering-comint-to-australian-in-2010/ > [Accessed December 18 2010].<br />

<strong>European</strong> Commission A. (2007). <strong>European</strong> i2010 initiative on e-Inclusion: ‘‘To be part of the information<br />

society’’. Communication from the Commission to the <strong>European</strong> Parliament, the Council, the <strong>European</strong><br />

Economic and Social Committee and the Committee of the Regions. COM(2007) 694 final. Brussels, 8 Nov<br />

2007.<br />

<strong>European</strong> Commission.B (2007). Ageing well in the information society, action plan on information and<br />

communication technologies and ageing, an i2010 initiative. Communication from the Commission to the<br />

<strong>European</strong> Parliament, the Council, the <strong>European</strong> Economic and Social Committee and the Committee of the<br />

Regions. COM(2007) 332 final. Brussels, 14 June 2007.<br />

<strong>European</strong> Commission. C (2007). The <strong>European</strong> research area: New perspectives. Green paper. COM(2007)<br />

161 final. Brussels, 4 Apr 2007[online]. Available from :<br />

http://ec.europa.eu/research/era/pdf/era_gp_final_en.pdf. [Accessed June 14 2010].<br />

GNU,2009 The Free Software Definition,[online] Available from: < http://www.gnu.org/philosophy/free-sw.html ><br />

[Accessed December 18 2010].<br />

Greenspan, A. .Structural Change in the New Economy,. paper delivered at the National Governors. Association,<br />

92nd Annual Meeting, State College, Pennsylvania, July 11, 2000.<br />

Network World, 2009 [online] Available from: < http://www.networkworld.com/news/2009/052909-20-years-aftertiananmen-china.html><br />

[Accessed December 18 2010].<br />

Power, A., & Wilson, W. J. (2000). Social exclusion and the future of cities. London: Centre for Analysis of Social<br />

Exclusion, London School of Economics.<br />

Rotenberg, M. (2007). Protecting Human Dignity in the Digital Age. [online] Available from < http://www.epic.org ><br />

Accessed December 12,2010]<br />

Statement on Human Rights, Human Dignity and the Information Society, International Symposium on the<br />

Information Society, Human Dignity and Human Rights Palais des Nations, Geneva, 3-4 November 2003<br />

The times of India,2009, [online] Available from http://timesofindia.indiatimes.com/lndia/Govt-gearing-up-to-gagnews-websites/articleshow/4562292.cms<br />

[Accessed December 18 2010]<br />

Truex, D. P., Caldow, J., and Shank, M. Reshaping the IS Culture: Understanding Organizational Culture in High-<br />

Performance Information Systems Organizations, Chicago: Society for Information Management and IBM<br />

Working Group on Reshaping IS Culture, Working Group Report, 1995.<br />

United Nations. Development and International Cooperation in the 21st Century: The Role of Information<br />

Technology in the Context of a Knowledge-based Global Economy, United Nations, May 18, 2000.<br />

376


Multi-Level Interoperability for ICT-Enabled Governance: A<br />

Framework for Assessing Value Drivers and Implications for<br />

<strong>European</strong> Policies<br />

Gianluca Misuraca 1 , Giuseppe Alfano 2 and Gianluigi Viscusi 3<br />

1<br />

<strong>European</strong> Commission, Joint Research Centre, Institute for Prospective<br />

Technological Studies, Seville, Spain<br />

2<br />

University of Udine, Italy<br />

3<br />

University of Milano-Bicocca, Milan, Italy<br />

gianluca.misuraca@ec.europa.eu<br />

giuseppe.alfano@uniud.it<br />

viscusi@disco.unimib.it<br />

Abstract: In the context of <strong>European</strong> policy and strategy for e-Government, Information and Communication<br />

Technologies (ICTs) are seen not only as a means to improve public services, but a way to facilitate multi-level<br />

governance. As a consequence, interoperability is predominantly seen as an instrument for enabling cross-border<br />

collaboration between public administrations within and between different Member States. Many initiatives and<br />

projects have been promoted and carried out during the last decade resulting in a growing number of potentially<br />

reusable best practices and benchmarks. Nevertheless, the complexity and volume of resulting project outcomes<br />

represent a challenge for effective exploitation of the results in other initiatives and intervention contexts.<br />

Furthermore, despite the recognition of interoperability as a multi-faceted concept (i.e. technological, organizational,<br />

and semantic), it seems to be mainly the technological aspects of interoperability that emerge from the available<br />

project results. This paper proposes an interpretative framework which aims to provide a systemic perspective and<br />

an instrument to elicit the links between interoperability and governance, outlining the various challenges that this<br />

poses. It considers state-of-the-art contributions at both academic and practitioner level. In particular, it discusses the<br />

multiple dimensions of interoperability and the value drivers underpinning the conceptual and measurement<br />

framework proposed. It also looks at how this framework could be applied to the evaluation of two case studies at<br />

cross-border, and national-city level in Europe. The paper concludes with the main findings of this exploratory<br />

analysis, outlining indications for future research on interoperability as a key driver for ICT-enabled governance.<br />

Interoperability is found to play a strategic role in the delivery of e-Government services to local and national<br />

communities within the EU. Moreover, its significance is expected to increase over the next few years, especially in<br />

terms of how it supports emerging city governance models and acts as the backbone of communications at a pan-<br />

<strong>European</strong>, national and local level.<br />

Keywords: interoperability, eGovernance, information systems, Europe, policy, value<br />

1. Introduction<br />

The interpretative framework for ICT-enabled governance proposed in this paper resulted from<br />

exploratory research conducted by the Information Society Unit of the Institute for Prospective<br />

Technological Studies (IPTS) of the <strong>European</strong> Commission's Joint Research Centre, on emerging ICTenabled<br />

governance models in EU cities (EXPGOV) (Misuraca 2010a). This research aimed to better<br />

understand the interplay between ICTs and governance processes at city level and formulate an<br />

interdisciplinary framework to assess the various dynamics emerging from the application of ICT-enabled<br />

service innovations in <strong>European</strong> cities. The proposed framework aims to provide a systemic perspective<br />

and an instrument to elicit the links between interoperability and governance, outlining the various<br />

challenges that this poses, especially from a <strong>European</strong> perspective, in order to link local to pan-<strong>European</strong><br />

perspectives. It is feasible to say that local authorities should be considered a fundamental part in this<br />

multi-level or - as it is often called in official documents – “pan-<strong>European</strong>” governance, which consists of<br />

increasing networking between local and national administrations across the <strong>European</strong> Union and of the<br />

emergence of a new and more integrated “<strong>European</strong> public space”. <strong>European</strong> strategy related to the<br />

harmonization of policy-making in the field of e-government among the Member States is not a “lawmaking<br />

system”. On the contrary, it is based, as Criado states, on “‘soft’ institutional mechanisms of<br />

coordination, which consist of spreading best practices, benchmarking, defining common policy<br />

objectives and common technological, semantic and organizational standards. While vertical<br />

mechanisms are based on adaptive pressure and coercion, horizontal mechanisms indicate policy<br />

framing, mutual adjustment and policy learning” (Criado 2009, p. 301). In this sense, local e-government<br />

initiatives and experiences play an important role in this process of “soft <strong>European</strong>ization”. This paper<br />

looks at the state of the art in e-government, which has to deal with a cross-border <strong>European</strong> project and<br />

a local experience. It discusses the multiple dimensions of interoperability within the EU, the value drivers<br />

377


Misuraca Gianluca et al.<br />

underpinning the conceptual and measurement framework proposed, and how this could be applied to<br />

the evaluation of ICT-enabled governance systems in two case studies at cross-border and national-city<br />

level in Europe.<br />

The paper concludes by presenting the main findings of this exploratory analysis, and outlines policy<br />

challenges and indications for future research on interoperability as a key driver for ICT-enabled<br />

governance.<br />

2. Background and motivations<br />

Interoperability plays a strategic role in the delivery of e-Government services to local and national<br />

communities within the EU. In terms of technical definition, an interoperability platform is a solution that<br />

enables two or more software applications to exchange data and achieve a common objective, even if the<br />

two applications were not originally intended to cooperate. However, interoperability can take place at<br />

different governance levels; i.e. from the exchange of simple data items, to structured documents (e.g., a<br />

purchase order), to business process cooperation where different organizations are enabled by<br />

interoperable software applications to achieve a common objective (Gottschalk 2009). According to the<br />

<strong>European</strong> Interoperability Framework (EIF) and the UNDP e-Government Interoperability Study Group<br />

(UNDP 2007), there are three layers of interoperability: technological interoperability (hardware and<br />

software issues), semantic interoperability (meaning interpretation issues) and organizational<br />

interoperability (cooperation issues).<br />

These three layers are interdependent. For instance, the user interface and interaction methods (for civil<br />

servants and end users) require solutions that cut across the three layers. They also have an inherent<br />

progression, in terms of the achievable interoperability scope. Interoperability initiatives should consider<br />

the actual administrative needs and available resources according to the defined objectives. Therefore<br />

Interoperability has no value per se; its value depends on the context of cooperation among<br />

organizational units and the benefits produced in terms of public value (Misuraca and Zambrano 2009).<br />

Public value refers to the value created by government through services, law regulations and other<br />

actions (Moore 1995). The close relationship between the concept of public value and e-Government was<br />

first noted by Kearns (2004). From this perspective, the use of ICTs to improve government and<br />

governance is also a means to improve the production of public value. Thus, an e-Government system<br />

resulting from a process of technological and organisational innovation can be indirectly evaluated by<br />

considering the possible increase of public value deriving from the adoption of that system. In general, a<br />

public value-based evaluation must be performed by considering the value that citizens perceive in their<br />

interactions with Public Administration (Alford 2002; Bannister 2002). Since the interactions between<br />

stakeholders and Public Administration can concern both stakeholders as users (mostly citizens) and<br />

stakeholders as operators of Public Administration (mostly private organizations and suppliers), public<br />

value can be measured both from an external point of view (stakeholders as users) and from an internal<br />

point of view (stakeholders as operators). In the first case, the policies for e-Government can be<br />

evaluated with respect to the quality of the services delivered. In the latter case, they can be evaluated<br />

with respect to their ability to improve the system of local government. All these results can be achieved<br />

only by means of a governance framework that considers the various relations and effects (not only from<br />

a technical perspective) in a 'dynamic' manner, and maintains the aggregations (for example, at city or<br />

community level) stable in time. Thus, in our research, we define governance as the process of decisionmaking<br />

and the process by which decisions are implemented, monitored and evaluated. These changes<br />

in decision-making are strongly conditioned by historical transformations in society’s underlying values<br />

and organisational models and can be analysed from several research perspectives (Misuraca 2010b). In<br />

particular, ICTs are important tools to support the transformation of governance processes through<br />

eGovernance. Here, we define eGovernance as the field of activity where policy design, decision-making,<br />

co-ordination, arbitration, networking and regulation, with ICTs, but also of ICTs, take place (Misuraca<br />

2010b). eGovernance can therefore be considered as a broad framework to capture the co-evolution of<br />

ICTs' various stakeholders with the political institutions, at local, national and global level. eGovernance<br />

can also be regarded as a multidimensional construct that encompasses ICT research, at the<br />

intersections with social, economic, political, and organizational science research, and addresses the<br />

investigation of the missions of government in relation to the interests of society (Misuraca 2010a).<br />

3. An interpretative framework<br />

ICT applications that support the transformation of governance processes and innovative forms of local<br />

service delivery have been developed in pioneering experiments and pilot projects in several large and<br />

378


Misuraca Gianluca et al.<br />

medium-sized cities all over the EU. In particular, as mentioned above, we will look at a study conducted<br />

by the Information Society Unit of the Institute for Perspective Technological Studies (IPTS) of the<br />

<strong>European</strong> Commission’s Joint Research Centre, namely the Exploratory Research on emerging ICTenabled<br />

governance models in EU cities (EXPGOV). Making reference to recent work in the area of<br />

social studies, public policies and ICT (see e.g. Viscusi et al. 2010), the EXPGOV theoretical framework<br />

argues for the adoption of a wide definition of e-Government as a system of ICT-enabled innovation<br />

policies for public administration and related governmental functions. From this point of view, ICTenabled<br />

projects – and the implementation of interoperability systems are included as part of this<br />

category – can be considered high-level, context-sensitive interventions that aim to introduce and<br />

facilitate gradual changes. In this connection the EXPGOV project has identified three main value drivers<br />

that constitute the basis of a theoretical framework for ICT-enabled governance at the local level:<br />

Performance: effectiveness and efficiency (enabling optimal use of resources for citizens and tax<br />

payers in the service delivery); and also, indirectly, responsiveness (serving all citizens in a<br />

consistent and predictable way).<br />

Openness: access to information as a proxy for participation (enabling the empowerment of citizens<br />

so that they can legally control service delivery to their advantage) and transparency (bringing<br />

visibility to citizens of the service workflow by means of automated service delivery); and<br />

accountability (creating standards against which the individuals providing a service and the service<br />

delivery can be held accountable), that also serves the goal of ensuring consensus orientation<br />

(following democratic practices).<br />

Inclusion: equity and inclusiveness (referring to citizens receiving a service on an equal basis and<br />

providing services to disadvantaged and minority groups), which implicitly ensures respect for the<br />

rule of law (ensuring that laws and regulations governing the service are applied impartially).<br />

These value drivers represent the principles and the expected outcomes of the e-Government initiatives,<br />

experiments and pilot projects taking place at different governance levels. Though it has been recognized<br />

that interoperability plays a key role in ICT-enabled governance, there has been little research into the<br />

non-technical dimensions of this phenomenon, or into the relation between interoperability and<br />

governance processes. Furthermore, there are few instruments which allow the systemic perspective<br />

needed by scholars and public administration managers to face up to the challenges of these multiple<br />

facets of interoperability. At the moment, a silo representation of interoperability tends to prevail. For this<br />

reason in this paper we discuss a conceptual model built on the analysis of state-of-the-art research and<br />

literature on ICT-enabled governance, and also the authors’ previous experiences in the implementation<br />

of concrete projects.<br />

The conceptual model represented in Figure 1 aims to support the elicitation of different configurations of<br />

Interoperable governance systems on the basis of the relationships between the following factors:<br />

Governance model characteristics (i.e. cultural administrative tradition and socio-economic<br />

characteristics of the intervention context),<br />

Value drivers (i.e. performance, openness, inclusion).<br />

This conceptual model aims to provide an interpretative instrument to deal with the multiple facets and<br />

layers of ICT-enabled interoperability and governance. In particular, the role played by interoperability<br />

and its impact on the value drivers, in turn influenced by governance model characteristics and related<br />

dimensions (see Figure 1), can be evaluated in terms of quality dimensions associated with the<br />

considered value drivers. Thus, for each driver we provide a set of quality dimensions, which enable a<br />

better interpretation of the type of contribution offered by interoperability initiatives. The relevance of a<br />

systemic perspective on quality assessment to support the strategic planning of e-Government initiatives<br />

has been discussed in Viscusi, G. et al. (2010), who also propose a quality framework. This framework<br />

has been applied to eGovernance issues in Misuraca, G and Viscusi G. (2011) and Misuraca, G., Alfano,<br />

G. and Viscusi, G. (2011 forhcoming). In this paper, we apply some of the dimensions of this framework<br />

to the elicitation of interoperability targets and goals for each considered value driver (see Table 1).<br />

In the following section, we apply the conceptual framework to two <strong>European</strong> case studies at different<br />

governance levels: one is a cross-border pan-<strong>European</strong> project and the other, a city government<br />

initiative.<br />

379


Figure 1: The conceptual model<br />

Misuraca Gianluca et al.<br />

Governance models’ Valuedrivers<br />

characteristics<br />

Cultural administrative<br />

tradition<br />

Table 1: Drivers, quality dimensions and related levels of application<br />

4. A pan-<strong>European</strong> case study: STORK<br />

Influence<br />

Performance<br />

Openness<br />

Socio-economic<br />

characteristics Inclusion<br />

Interoperabilitysystems<br />

Value driver Dimension Qualitylevel<br />

Performance<br />

Efficiency Service<br />

Effectiveness Organization<br />

Openness Transparency Service<br />

Organization<br />

Accountability Organization<br />

Legal<br />

Accessibility Organization<br />

Technology<br />

Information<br />

Inclusion Accessibility Service<br />

Technology<br />

Information<br />

STORK (Secure idenTity acrOss boRders linKed) is a large-scale project involving 17 EU countries, with<br />

backing from the <strong>European</strong> Commission. The STORK project deals with the use of electronic identities in<br />

a cross-border context and it has established a number of pilot projects to test the mutual recognition of<br />

eIDs by public authorities in different <strong>European</strong> Union member states (Tauber, A. and Rössler, T., 2010)).<br />

STORK is working on an EU-wide interoperable solution to provide mutual recognition of eID and eIDbased<br />

services such as authentication, which will enable citizens and businesses to use their national<br />

eIDs in any Member State involved in the project.<br />

380


Misuraca Gianluca et al.<br />

The six STORK pilots (’Cross-border authentication platform for electronic services’, ’Safer Chat’,<br />

’Student Mobility’, ’Electronic Delivery’, ’Change of Address’ and ’ECAS Integration’) are testing common<br />

eID specifications for several applications that have a substantial impact on e-Government across<br />

Europe. In particular, the technologies and services developed and tested by the STORK project are<br />

expected to be key enablers of interoperable electronic identification management (eIDM) for access to<br />

eGovernment services across Europe. The STORK electronic identity project has gone live with a pilot<br />

initiative, which demonstrates how <strong>European</strong> Union citizens can use their national eIDs to receive<br />

electronic documents securely from eDelivery portals of any participating EU Member State. The crossborder<br />

eDelivery pilot demonstrates how citizens of Slovenia, for example, can register at Austria’s<br />

eDelivery portal. Using their existing national eID cards, citizens are able to receive and pick up electronic<br />

documents by accessing the Austrian eDelivery portal. In addition, citizens may also receive eDeliveries<br />

from senders in other Member States through the Austrian portal. Currently, Austria, Estonia, Finland,<br />

Luxembourg and Slovenia are participating in the cross-border eDelivery pilot.<br />

The STORK project is expected to be a best practice or benchmark for further cross-border initiatives<br />

dealing with the exchange of sensitive information and documents. Indeed, the main outputs of projects<br />

like STORK are expected to be functional documents for ICT-applications integrated in a cross-border<br />

platform.. In summary, the final outcomes of projects like STORK tend to focus mainly on the<br />

technological facets of interoperability initiatives. In fact, however, the main challenge is to elicit the<br />

multiple dimensions of interoperability, and the value drivers that underpin ICT-enabled governance<br />

systems. In Error! Reference source not found., we apply the interpretative model discussed in<br />

Section 3 to the STORK project.<br />

Table 2: Governance value drivers, quality dimensions, and type of interoperability<br />

Value driver Quality dimension/level Type of interoperability (enabling layer)<br />

Openness Accountability/Legal Organizational<br />

Accountability/Organization<br />

Transparency/Organization<br />

Accessibility/Service Semantic<br />

Accessibility/Legal<br />

Accessibility/Technological<br />

As shown in Table 2, the main challenge for cross-border initiatives dealing with the exchange of<br />

sensitive information and documents is related to the fitness or alignment of the openness value driver<br />

(as the strategic and political guiding principle) and the different cultural administrative traditions at<br />

operational and procedural level. In the STORK project, the alignment has been reached by dealing first<br />

with the legal and organizational issues, and then with the service and related technological issues.<br />

In terms of quality elicitation, the implementation of the openness value driver focused first on<br />

accountability at legal (who is the guarantor of information flow? how can rules and laws from different<br />

legal frameworks be aligned?) and organizational level (how can the administrative process be<br />

coordinated in order to make transparent the service provision and the local responsibilities?). As a<br />

consequence, accessibility was also a relevant quality dimension which could improve the abovementioned<br />

accountability and transparency levels: e.g. accessibility to citizens of services (in terms of<br />

language and appropriateness for the e-readiness level of constituencies); accessibility at legal level to<br />

public administration employees and managers (in terms of understanding laws and rules from foreign<br />

legal frameworks); accessibility at technological level (in terms of cooperative information system<br />

architectures, allowing multichannel provision of services at front-office level).<br />

Thus, the application of the interpretative model discussed in Section 3 shows that organizational and<br />

semantic interoperability are the main focus for projects like STORK and should be addressed in parallel<br />

to technological interoperability issues. Furthermore, the model allows us to elicit the critical quality<br />

dimensions to be considered and the level at which they have an impact. This again highlights the need<br />

for a multi-level analysis when conceptualizing and implementing such a broad and ambitious<br />

interoperability initiative at pan-<strong>European</strong> level.<br />

5. A city case study: VENIS<br />

VENIS (Venezia Informatica Sistemi S.p.A.) is an ICT company owned by the local authorities and the<br />

public utilities of the City of Venice. It has a wide spectrum of objectives concerning the design,<br />

381


Misuraca Gianluca et al.<br />

implementation, management and maintenance of the information systems, the software, the<br />

technological infrastructures and the telecommunication networks used by the majority of the local<br />

authorities and the public utilities of Venice. Venis states on its internet page that the ‘innovation of the<br />

City’ is the brief it has been given by the local authorities.<br />

The local government is the biggest shareholder in Venis (75.1%), followed by ACTV S.p.A – a local<br />

transport company (14.9%), the municipal Casinò of Venice and Veritas S.p.A a local public utility (5%<br />

each). Moreover in the future shares will be issued to other important institutions of the City of Venice,<br />

such as, for example, the “Fondazione Musei Civici” – the municipal cultural foundation that manages<br />

and promotes the museum system of Venice. This broad sharing of ownership of VENIS amongst<br />

Venetian public institutions aims to secure wide product diversification, with economies of scales.<br />

Furthermore, it contributes to fostering interoperability between the information systems of local<br />

authorities - the backbone for enabling an ICT-enabled governance system for the City of Venice.<br />

Although it is owned by local institutions, VENIS has considerable managerial autonomy in the industrial,<br />

commercial, and financial operations covered by its statutory purpose. It is fair to say that the projects<br />

managed by VENIS are not focused on the technological needs of a given institution but on the urban<br />

systems as a whole. In 2009 and 2010, two of the main projects VENIS dealt with were the construction<br />

of an urban fibre-optic network and the design of “Venice Connected”, the official city website for tourism<br />

that aims to develop a sustainable tourist flow into Venice. The fibre-optic network provides a high<br />

transmission capacity (10 Gigabits) and connects not only municipal offices but also the whole University<br />

system of the City (University of Venice Ca’ Foscari, IUAV). Moreover, the urban fibre-optic network<br />

constitutes the backbone for 120 free WiFI hotspots that provide high-speed access to the Internet in the<br />

whole urban area to citizens and tourists. The website “Venice Connected” is defined as an<br />

“interoperable platform” (Figure 2) for the online booking and sales of the City’s tourist services<br />

(transport, museums, etc,). It helps visitors to reserve the services they are interested in and, at the same<br />

time, it helps the City to organize services according to the actual number of visitors expected. Venice<br />

Connected allows the purchase with a single payment transaction of various tourist services from<br />

different providers. Tourists get a single booking number which they can use to access all the most<br />

important services in Venice (from transport to museums). The website aims to encourage tourists to<br />

reserve services before they arrive in the city through a differentiated pricing policy. The lowest prices<br />

are applied if you book online and the website explains the different prices, depending on the season. It<br />

thus contributes to guiding the flow of tourists and limiting the number of unsustainable peaks of too<br />

many tourists in the City.<br />

Figure 2: The interoperable system of Venice Connected (www.venis.it)<br />

382


Misuraca Gianluca et al.<br />

As shown in Figure 2, the technological infrastructure shared amongst different Venetian local authorities<br />

and public utilities fosters the development of interoperability projects for the urban system. Another<br />

important project in this sense is the “imob” smart-card that, in the near future, will contain all the<br />

information and the codes for access to mobility services in the city (e.g. public transport, parking spaces,<br />

car-sharing, bike-sharing, and others). In this regard, the high-speed network and interoperability<br />

between the information systems of local institutions and public utilities are important enablers for<br />

technological and organizational innovation in the City’s public services.<br />

In summary, the case of VENIS is important as it highlight how far the aforementioned technological,<br />

semantic and organizational levels of interoperability can be connected and interdependent. The<br />

development of interoperable systems amongst public authorities in this case is conditioned by an<br />

institutional and organizational structure that is peculiar to Venice. This structure enables city policies and<br />

city governance models that are strictly dependent on the technological infrastructure and the<br />

interoperable systems – as seen in the example of tourism policies and coordination between tourism<br />

services in the city (Venice connected). In this sense, it can be argued that the ICT-enabled governance<br />

system of Venice is characterized by the presence of a single organization, which is owned by the local<br />

authorities, and is focused on the technological development of the urban area. In the Table 3, we<br />

applied the conceptual model proposed in this paper in order to understand the specificity of the<br />

interoperability system in this city.<br />

Table 3: Governance value drivers, quality dimensions, and type of interoperability<br />

Value driver Quality dimension/level Type of interoperability (enabling layer)<br />

Performance<br />

Efficiency/Service<br />

Technical /Semantic<br />

Effectiveness/Organization<br />

Inclusion Accessibility/Service Technical<br />

Accessibility/Legal<br />

Accessibility/Technological<br />

Indeed, the aforementioned interoperable applications and projects are interconnected with a significant<br />

change in policy strategies, in stakeholder relationships and in organizational structures (Alfano, 2011). In<br />

this case, Performance and Inclusion (see Table 3) are the two main value drivers as the improvement of<br />

the urban system via ICT and interoperability infrastructures and policies both set out to improve public<br />

services and provide wide and ubiquitous accessibility.<br />

Thus, the application of the interpretative model shows that technical and semantic interoperability are<br />

the main concerns in the Venice case; whereas, organizational and semantic interoperability were more<br />

relevant in the cross-border pan-<strong>European</strong> case described in Section 4.<br />

6. Conclusions and future work<br />

The paper has proposed and discussed an interpretative framework for interoperability in ICT-enabled<br />

governance. This framework aims to provide a systemic perspective and an instrument to elicit the links<br />

between interoperability and governance, outlining the various challenges that this poses. In this<br />

connection, the paper has discussed the multiple dimensions of interoperability and the value drivers<br />

underpinning the conceptual framework proposed together with its application in evaluating more<br />

specifically the ICT-enabled governance systems in two case studies at cross-border and city level in<br />

Europe. The application of the framework showed how at both cross-border and city level different<br />

cultural administrative traditions and objectives influence the critical governance value drivers and<br />

characteristics of interoperability systems deployed. Different governance levels of focus and objectives<br />

influence different value drivers at cross-border (openness) and city level (performance/inclusion)<br />

enabled by different types of interoperability, i.e. organizational/semantic at cross-border level and<br />

technical/semantic at city level. It is worth noting how semantic interoperability is relevant for service layer<br />

at both levels of investigation: accessibility/service (cross-border level) and efficiency/service (city level).<br />

The results of this preliminary analysis of the application of the interpretative framework provide insights<br />

for further analysis and research on how the design and reuse of interoperability initiatives should be<br />

implemented. As shown in the two examples analysed, technical interoperability seems to be more<br />

appropriate for local initiatives focused on elementary services (such as payments, booking services,<br />

etc.); whereas organizational interoperability is a critical factor in cross-border initiatives, where the<br />

383


Misuraca Gianluca et al.<br />

alignment of legal framework constraints and administrative requirements are the key to an effective<br />

(and reusable) outcome of the initiative.<br />

In both case, however, semantic interoperability plays a intermediate role as a representational tool which<br />

enables both the correct translation of organizational and legal requirements (at cross-border level) and<br />

the efficiency of the technical infrastructure (at city level).<br />

However the sample of application of the framework does not yet allow more than a classification of the<br />

initiatives and the elicitation of the relevant type of interoperability to be considered by policy makers<br />

when planning interoperability initiatives. In future work, we aim to further refine and apply the quality<br />

dimensions of the conceptual framework proposed to rank and also benchmark the type of barriers to<br />

interoperability initiatives. This should allow us to reach higher granularity in the analysis of the<br />

application of the interpretative framework. Finally, we will extend the analyses in order to have a wider<br />

set of case studies for comparison of experiences at the same and different levels of policy design and<br />

implementation.<br />

Disclaimer: The views expressed in this paper are purely those of the authors and may not in any<br />

circumstances be regarded as stating an official position of the <strong>European</strong> Commission.<br />

Acknowledgments<br />

This article is inspired by and in part drawn from the Exploratory Research on emerging ICT-enabled<br />

governance models in <strong>European</strong> cities (EXPGOV) conducted by Gianluca Misuraca as part of his work<br />

for the Information Society Unit of the Institute for Prospective Technological Studies (IPTS) of the<br />

<strong>European</strong> Commission's Joint Research Centre, in collaboration with EUROCITIES.<br />

(See http://is.jrc.es/pages/EAP/EXPGOV.html ).<br />

References<br />

Alfano, G. (2011 forthcoming) “Adapting bureaucracy to the Internet. The case of Venice Local Government”,<br />

Information Polity.<br />

Alford, J. (2002) "Defining the client in the Public Sector: a social-exchange perspective," Public Administration<br />

Review,Vol. 62, Issue 3, pp 337-346.<br />

Bannister, F. (2003) "Citizen Centricity: A Model of IS Value in Public Administration," Electronic Journal of<br />

Information Systems Evaluation, vol. 3:2.<br />

Batini, C., Viscusi, G., Cherubini, D., (2008), “eG4M: The Planning Methodology”, QD Research Report, University of<br />

Milan Bicocca, DISCO, Starrylink Ed.<br />

Bloisi, D., Iocchi, L., (2009) ARGOS – A Video Surveillance System for Boat Traffic Monitoring in Venice,<br />

International Journal of Pattern Recognition and Artificial Intelligence<br />

Castelnovo, W., Simonetta, M. (2008) “A Public Value Evaluation of e-Government Policies.” The Electronic Journal<br />

Information Systems Evaluation Volume 11 Issue 2, pp. 61 - 72, available online at www.ejise.com<br />

Criado, J. I., (2009) <strong>European</strong>ization of eGovernment policy. Institutional mechanisms and implications for public<br />

sector innovation. Information Polity, 14, pp 299 – 314.<br />

<strong>European</strong> Commission, (2006), Interoperability for Pan-<strong>European</strong> e-Government Services, COM 45 final of 13th<br />

February 2006.<br />

Gottschalk, P. (2009) "Maturity levels for interoperability in digital government," Government Information Quarterly,<br />

Volume 26, Number 1, pp 75-81.<br />

Kearns, I. (2004) "Public value and e-government", Institute for Public Policy Research, London UK, from<br />

http://www.ippr.org.uk/.<br />

Misuraca, G., and Zambrano R., (2009), UNDP Primer on eGovernance for Public Administration Reform (UNDP<br />

New York, Working Documents - Unpublished)<br />

Misuraca, G., and Viscusi, G. (2010) " eGovernance for Development: lessons learned and strategic principles for<br />

designing an operational roadmap " International Journal of Electronic Governance (IJEG), Vol. 3, pp 118 –<br />

133.<br />

Misuraca, G. (2010a). "Concept Paper of the Exploratory Research on emerging ICT-enabled governance models in<br />

EU cities", <strong>European</strong> Commission, Joint Research Centre, Institute for Prospective Technological Studies<br />

(IPTS). Available at: http://is.jrc.ec.europa.eu/pages/EAP/EXPGOV.html<br />

Misuraca, G. (2010b). "Literature Review - Working Paper of the Exploratory Research on emerging ICT-enabled<br />

governance models in EU cities", <strong>European</strong> Commission, Joint Research Centre, Institute for Prospective<br />

Technological Studies (IPTS). Available at: http://is.jrc.ec.europa.eu/pages/EAP/EXPGOV.html<br />

Misuraca, G., Rossel, P., and Glassey, O. (2010) ''Overcoming barriers to innovation in e-Government: the Swiss’<br />

way'', in Nixon, G et alii (eds.) (2009) Understanding eGovernment in Europe: issues and challenges,<br />

Routledge, Taylor and Francis Publisher.<br />

384


Misuraca Gianluca et al.<br />

Misuraca, G., Alfano, G. and Viscusi, G, (2011 forthcoming) ''Interoperability challenges for ICT-enabled governance:<br />

towards a pan-<strong>European</strong> conceptual framework'', in Journal of Theoretical and Applied Electronic Commerce<br />

Research, Special Issue on eGovernment Interoperability, enterprise architecture and strategies.<br />

Moore, M.H. (1995) Creating public value : strategic management in government, Harvard University Press,<br />

Cambridge, Mass.<br />

Tauber, A. and Rössler, T. (2010) "Interoperability Challenges for Pan-<strong>European</strong> Qualified Exchange of Electronic<br />

Documents", In Proceedings of the 10th <strong>European</strong> <strong>Conference</strong> on e-Government, Limerick, Ireland 17-18 June<br />

2010<br />

UNDP " e-Government Interoperability Study Group: Overview and Guide."<br />

Viscusi, G., Batini, C., and Mecella, M. (2010) Information Systems for eGovernment: a quality of service perspective<br />

Springer, Berlin-Heidelberg.<br />

www.venis.it<br />

www.veniceconnected.it<br />

https://www.eid-stork.eu/<br />

385


Strategies for eGovernment Implementation in Developing<br />

Countries: A Case Study of Botswana Government<br />

Racious Moilamashi Moatshe and Zaigham Mahmood<br />

University of Derby, UK<br />

R.Moatshe@derby.ac.uk<br />

Z.Mahmood@derby.ac.uk<br />

Abstract: eGovernment as a multi-dimensional and multi-disciplinary field, its implementation in developing countries<br />

is confronted with many barriers which require winning strategies in order to successfully implement the projects.<br />

Inter alia, the barriers include; weaknesses in governance systems, ineffective political structures, lack of requisite<br />

technical skills, proficiency and implementation capacity, ineffective information provision and access, poor<br />

infrastructure, a non-conducive policy environments and legislation. The fundamental aspect of eGovernment is that<br />

it must deliver public information and services in ways that citizens and businesses want them using internet and<br />

other ICTs as enablers. Thus eGovernment serves as a platform of infrastructure that governments today are<br />

building to transform the way they complete their missions, values and aspirations. This should have direct impact on<br />

the effectiveness of public services and government’s continuous contacts with citizens, especially those living in<br />

remote areas. Winning strategies are therefore needed for successful implementation of eGovernment. The<br />

identification of barriers and determining critical success factors for eGovernment are a crucial part of winning<br />

formulae to eGovernment projects success. A case study of Botswana, a developing country is used as part of an<br />

ongoing broader research, to identify and discuss the barriers and consequently suggests strategies for developing<br />

eGovernment by introducing a new framework called; EGovernment Implementation Critical Success Factor Model<br />

which is intended to guide Botswana government and other developing countries in their eGovernment<br />

implementation pursuit. The new model and discussions thereof are necessary to give a detailed perspective of<br />

requisite factors that enable the successful impementation of eGovernment projects. These factors are classified into<br />

(a) technical and proficient personnel to implement eGovernment, (b) enabling high political leadership involvement,<br />

(c) A conducive legislation and public policy environment, (d) dedicated and sustainable budgetory framework, (e)<br />

equitable provision and access to information, (f) innovative government to foster economic development (g) vision<br />

and strategic decision capability, (h) adequate infrastractural development, and (i) creation of all stakeholders<br />

Inclusive environment. The methodology for the case study comprises of both secondary and primary data sources.<br />

The primary sources covered interviews with general members of the public and project office in Botswana, whilst<br />

secondary sources included, external and internal reports, policy documents and publications by individual<br />

researchers and other research organisations.<br />

Keywords: eGovernment, eCommerce, eBusiness, ICTs, Botswana<br />

1. Defining eGovernment<br />

eGovernment concept originated at the beginning of 21 st century as a copy of eCommerce into public<br />

sector (Spremic, et al (2009). According to (Almarabeh and AbuAli, 2010) the eGovernment idea was<br />

raised by the United States of America vice president (Algore) within his vision of linking the citizens to<br />

the various agencies of government for getting all kinds of government services automated, reduce costs<br />

and improve performance. It allows government departments to integrate services using information and<br />

communication technologies (ICTs) and better services delivery to citizens and empower people through<br />

participation in public decision making (UN, 2005).<br />

2. eGovernment in developing countries<br />

The traditional model of government is ineffective and inefficient and is not working any longer, as the<br />

emerging vast networks in interacting public and private organisations could no longer be served using<br />

the traditional setups of a single administration for single services and specific functions. As a result<br />

eGovernment attracted the attention of political leaders and statesmen around the world (Hwang et al,<br />

1999; Sharifi and Zarei, 2004). In developed countries, the services are offered in a self service mode<br />

through internet portals that become a single point of interaction for the citizens to receive services from a<br />

larger number of departments (Bhatnagar, 2003). For example, in Singapore, Canada, New Zealand,<br />

citizens can pay parking tickets, job seekers can search for employment and public trustees can file an<br />

application for estate administration using opportunities provided by eGovernment (Ngulubane, 2007).<br />

In developing countries, businesses face challenges different from those in developed countries (Molla<br />

and Licker, 2005). The potential for eGovernment in developing countries remains largely unexploited<br />

and compared to the developed, developing countries lack in (1) history and culture; (2) technical<br />

capabilities; (3) Infrastructure; (4) e-citizen development; (5) public service focus (Ndou, 2004; Chen, et<br />

386


Racious Moilamashi Moatshe and Zaigham Mahmood<br />

al, 2006). There is digital divide between developed and developing countries, hence, developing<br />

countries need winning eGovernment strategies to catch up.<br />

A number of authors (Ndou, 2004; Molla and Licker, 2004; Schuppan, 2008; Chen et al, 2006; Heeks,<br />

2003; Sharifi and Zarei, 2004; Akman et al, 2005; InfoDev, 2002; Reffat, 2006; Al-Busaidy &<br />

Weerakkody, 2009; Mahmood, 2011), have outlined the barriers and challenges facing eGovernment<br />

implementation in developing countries as (a) Inadequate ICT infrastructure development; (b) Lack of<br />

supportive legislation and policy environment; (c) Security and protection of privacy; (d) organisational,<br />

managerial skills; (e) lack of monitoring capacity; (f) Lack of transparency and citizens trust; (g)<br />

Information and data challenges; (h) Information technology challenges; (i) Digital divide, accessibility<br />

and e-literacy; (j) E-readiness challenges; (k) Inadequate funding.<br />

3. Botswana Government case study<br />

Botswana, a developing country situated in Southern Africa like any developing country face challenges<br />

which include inter alia; declining rankings in global competitiveness, labour market and public sector<br />

inefficiencies, escalating unemployment and crime, declining quality of life and reduced trust in<br />

government. These challenges compelled government to embark on eGovernment implementation.<br />

Botswana government conducted an e-readiness assessment in 2004 and enacted the National ICT<br />

policy, 2007. This policy set the platform for eGovernment implementation for provision of e-information<br />

and e-services through government web portal by setting targets. The Botswana eGovernment targets<br />

were set guided by the seven pillars of (a) Connecting Communities; (b) Government On-line (GOL); (c)<br />

E- learning/Thuto Net Botswana; (d) E-Health Botswana; (e) Economic Development and Growth of the<br />

ICT Sector; (f) Infrastructure, and (g) Legislation and Policy.<br />

In pursuit of the Botswana case study, as part of an ongoing broader research we carried out<br />

investigations, which methods are presented in the next section.<br />

4. Methodology and approach<br />

In order to identify barriers and challenges facing eGovernment implementation in Botswana and<br />

subsequently develop a model or framework for successful eGovernment implementation, A primary<br />

research was carried in two urban villages and three surrounding sub villages in the capital city southern<br />

part of Botswana within a 100km radius of Gaborone city. A total of 66 ordinary citizens in urban villages<br />

were randomly approached and probed on the level of ICT and internet usage, frequency and type of use<br />

and further to establish awareness and gather citizens initial responses about the eGovernment project.<br />

A further 38 citizens were also randomly approached in Gaborone city. The choice of location was based<br />

on population densities of Botswana, where the majority of the population (over 50%) live in the<br />

southeast and mainly in Gaborone and within a 100km radius of Gaborone, (Botswana Central Statistics<br />

Office, 2001).<br />

Furthermore, reports and publications were perused through (Botswana E-readiness Assessment Report,<br />

2004; Botswana National ICT Policy, 2007; United Nations EGovernment Survey, 2008; Botswana<br />

Budget Speech, 2009; ICT Development in Africa: Botswana Country Presentation; 2009; UNPAN Portal<br />

project: Modernising Botswana government in the Digital Era, 2009; The Botswana Minister of Science<br />

Communication and Technology –MCST Speech, 2010; Bwalya, 2010).<br />

The findings are presented as; (a) citizens’ questionnaire survey results, (b) outcome of discussions with<br />

Botswana eGovernment project office, and (c) observations and analysis made from secondary data<br />

sources.<br />

4.1 Citizens’ questionnaire survey results<br />

Lower levels of ICT are revealed as most people especially in the villages do not have access to internet,<br />

computers, unaware of the eGovernment project, have not accessed the website and those who did<br />

found the website not helpful. People in Gaborone (City) generally are aware about internet but resources<br />

limit access and those aware mostly had secondary and tertiary education and use ICT mostly for their<br />

work especially in the private sector. The three sub villages in south of Botswana did not have any<br />

internet facilities let alone privately run and a few privately run internet cafes’ existed in urban villages<br />

and the broadband speed was cited as a challenge together with the access costs. The investigations<br />

further revealed lack of adequate user engagement and focus, somewhat lack of citizens’ lacked trust<br />

and confidence in eGovernment due to lack of knowledge.<br />

387


Racious Moilamashi Moatshe and Zaigham Mahmood<br />

4.2 Outcome of discussions with eGovernment project office<br />

As aforementioned, eGovernment project team was visited and findings of issues probed are; Unrealistic<br />

and non rational based targeting; (a) Botswana government targets for non mining to be 80% of GDP by<br />

2009 when currently the mining contribution to GDP is approximated at 50%; (b) Development of policy<br />

and legislation dealing with electronic signature not achieved by targeted date of 2005 and 2006, In<br />

August 2010 the legislation had not been developed; (c) Botswana eGovernment targets for a fully<br />

transformed and seamless government by 2016 reflected a serious reality gap challenge.<br />

Poor implementation capacity; Data protection, electronic commerce, privacy, electronic signatures and<br />

freedom of information laws not in place despite targeted for enactment 5years ago.<br />

Inadequate authority and autonomy of the project team; (a) Project office relied wholly on government<br />

officials to drive the intiative to facilitate project implementation, e.g. effecting necessary legislation; (b)<br />

Lack of budget control and unware of the funding source, that is, whether State President Ministry or<br />

Ministry of Communication Science and Technology (MCST).<br />

Lack of Stakeholder inclusion; (a) Lack of government and private sector partnerships for sharing of<br />

resources, resources and co-funding of the eGovernment project; (b) The private sector is considered<br />

key as is mostlly considered more technologically advanced than the public sector.<br />

4.3 Observations and analysis from secondary data sources<br />

The secondary data sources revealed further constraints facing the Botswna eGovernment initiative<br />

which are:<br />

ICT Status; lower levels of ICT usage and penetration, that is, internet user 6%, Broadband 1% and<br />

PC 2-3%).<br />

Speech by Minister of Communications, Science and Technology (MCST) May (2010) highlighted (a)<br />

lack of strategies, and initiatives for citizens safe access to online resources; (b) disparities between<br />

people in urban and rural areas in the provision of ICT services; and need for adaptation of policies<br />

and strategies to help promote ICT in rural areas. Worth noting is that the Botswana eGovernment<br />

project falls under the MCST.<br />

Botswana dropped in ratings, (The United Nations EGovernment Survey, 2008), Botswana<br />

experienced a major drop from 90 th position in 2005 to 119 th in 2008 on web measure index and<br />

connectivity scorecard survey.<br />

Other individual research (Bwalya, 2010) reveal that the majority of the ordinary individuals do not<br />

appreciate the value of eGovernment applications in as far as public service delivery is concerned<br />

and further that few individuals have exploited public services offered mainly through the<br />

eGovernment web portal.<br />

4.4 Summary of findings<br />

The above findings identify (1) design reality gaps [where the eGovernment project is now and where it is<br />

intended to get Botswana to by 2010 and 2016] and inadequate strategic capabilities and decisions<br />

issues (e.g. unrealistic and non rational based targeting and master plan had not yet been developed). It<br />

worth noting that winning strategies and appropriate decisions are a key success factor in implementing<br />

eGovernment (The working group, 2002; Infocomm, 2006); (2) ICT status (e.g. low PC and internet user<br />

penetration and lack of e-human capital as the vast majority of the population is not e-ware and e-ready),<br />

does not support the ambitious eGovernment targets and raises access and connectivity issues.<br />

Infrastructure development is a prior necessity to pursuing eGovernment project. It facilitates the creation,<br />

distribution and manipulation of information (Wesso et al, 2004; Chen et al, 2006); (3) access and<br />

connectivity challenges invariably lead to digital divide and e-illiteracy [rural and urban digital gap], these<br />

disparities between people in urban and rural areas in the provision of ICT services further hinders<br />

equitable provision and access to government information by all citizens; (4) resulting in serious exclusion<br />

and marginalisation of most stakeholders ( that is, Lack of enabling environment for all stakeholder<br />

inclusion). The literature states that achieving participation of citizens and other stakeholders in<br />

eGovernment has become a pivotal criterion (Wimmer, 2002). It is also reported (UN, 2005)<br />

developments in ICTs allows an unprecedented opportunity for countries to leap frog traditional modes of<br />

service delivery and make manifold improvements in process effectiveness and efficiency; (5) thus,<br />

internet and eGovernment are new world’s trade routes and the nation’s ability to leverage on the internet<br />

388


Racious Moilamashi Moatshe and Zaigham Mahmood<br />

will determine its competitive and comparative advantage in the global digital economy (Caldow, 1999;<br />

Moodley, 2001). Hence, establishing eGovernment requires eCommerce, eBusiness, and eGovernment<br />

plans strategic enough to achieve the much need competitiveness (Peters, 2001; Moatshe et al, 2010);<br />

(6) Lack of supportive and enabling laws (e.g. data protection and eCommerce laws) clearly shows lack<br />

of conducive legislation and public policy environment (Raman et al, 2007; Ebrahim and Irani, 2005); (7)<br />

Lack of these laws raises fundamental issues of public trust in government activities inclusiveness of<br />

eGovernment services and has an impact on the public administration transparency, of which Freedom of<br />

Information Act is paramount. This position points to inadequate high political leadership involvement as<br />

revealed that the Botswana eGovernment project is not embraced at the highest political level [not fully<br />

driven from office of the president] (UN, 2008). Undoubtedly, state politics and culture can support or<br />

impede eGovernment (Seifert and McLoughlin 2008; OECD, 2003), thus political leadership and<br />

commitment is a critical success factor for implementing eGovernment project; (8) Citizens survey and<br />

inquiries with the eGovernment project office highlighted challenges of; Lack of eGovernment awareness,<br />

inadequate user engagement, inadequate strategies to manage society’s resistance to change, lack of<br />

common understanding among change agents and project team members, lack of project buy-in by<br />

public sector middle management, inadequate collaboration with the private sector for sharing of skills,<br />

resource and expertise, and citizens inability to access government website. All these show limitations in<br />

the implementation capacity and project management; (9) Lastly, although Botswana has budgeted<br />

approximately GBP 95 Million over 5 years for the project, it may not be enough given the infrastructure<br />

development required and that all finding comes from government, design reality gap will worsen this<br />

position, thus a funding issue.<br />

The above barriers could lead to project failure if not mitigated with appropriate strategies. In light of this,<br />

we have developed a new model presented below.<br />

5. New eGovernment critical success factor model<br />

Figure 1::eGovernment implementation critical success factors model<br />

The new model identifies and establishes the critical success factors impacting on eGovernment<br />

development and is intended to guide Botswana government and other developing countries when<br />

implementing eGovernment projects, herein classified into nine categories:<br />

Technical and Proficient Personnel to implement<br />

The key skills are:<br />

Analytical and Project Management Skills, covering ability to analyse processes, practices, policies and<br />

other factors contributing to eGovernment implementation. project management skills refers to planning,<br />

organising, estimating and allocating resources, negotiation, results measurement, trouble shooting and<br />

progress tracking.<br />

Technical and Information Management Skills, this covers; higher understanding and skills to implement<br />

eGovernment solutions; and information is a valuable public organisational resource and skills required<br />

include information context quality, format, storage, classification, searching, transmission, accessibility,<br />

usability and security<br />

389


Racious Moilamashi Moatshe and Zaigham Mahmood<br />

Communication and Presentation Skills, it covers; on going and adequate training education and<br />

marketing initiatives. The need for ongoing communication of project goals, issues and results, continued<br />

interaction with stakeholders can lead to buy-in and participation. Various types of communication, for<br />

example, emails, bulletins and formal reports on the project need issuing. However, information needs to<br />

be categorized, summarized and presented into briefings that convey crucial facts without over<br />

simplification beyond underlying data (Reffat, 2006).<br />

Enabling High Political Leadership Involvement<br />

eGovernment is at the mercy of the political leadership who govern the state and can decide to /not<br />

finance and implement eGovernment project, fully or partially irrespective of its value to citizens. The<br />

fundamental question now is, how best can the political leadership be compelled to embrace, initiate and<br />

sufficiently finance and fully get involved to make an eGovernment initiative a success? Should there be<br />

an eGovernment Act? to make implementation a legal requirement. Since the political ownership is vital,<br />

in the UK, a minister was entrusted with the implementation responsibility and reported directly to the<br />

Prime Minister (Sigh, 2003)<br />

The political ownership gets reflected when political leadership take the responsibility and find resources<br />

to take the initiative forward. Only such a commitment can bring about the necessary momentum in over<br />

coming inter departmental rivalries and burreaucratic hurdles that are encountered in the implementation<br />

process, (Seifert and McLoughlin, 2008). In Italy, Parliment applied a law (4/2004) which imposed that<br />

impaired people should not be discriminated and must have access to sources supplied using ICT<br />

technologies (Signore et al, 2005).<br />

A Conducive Legislation and Public Policy Environment<br />

Legislation and regulatory issues can impede the uptake of eGovernment (OECD, 2005) and developing<br />

eGovernment services requires a high penetration in homes or presence of a large number of public<br />

kiosks, e.g. handling e-payments and building trust between citizens and government in doing<br />

transactions over long distance requires an enabling legal framework, (Bhatnagar, 2002; Caldow, 1999).<br />

This covers data protection, access to sensitive data, networking of activities and database, electronic<br />

signatures, cyber law, security policy, transparency etc, (Reffat, 2006; OECD, 2005; Wimmer, 2002)<br />

Government must set up law supported structures, maitaining a healthy policy environment to address<br />

security issues, service requirement of eGovernment, eGovernment model. An aware and demanding<br />

citizenry, which understands its rights, willing to express them and to fight for them in case of laxity and<br />

ineffeciency becomes critical. Hence, e-governement can be an instrument for promoting citizens<br />

awareness and publishing performance data and citizens charters, (Bhatnagar, 2002; Hwang et al 2004)<br />

Dedicated and Sustainable Budgetory Framework<br />

Developing countries mostly given lack infrastracture, resources and eGovernment initiative would<br />

compete for limited resources with other national needs (e.g. roads construction, schools etc.) Therefore,<br />

implemention costs inappropriate cost benefit analysis approaches, can constrain or block the flow of<br />

investment at the level necessary to support eGovernment innovation (<strong>European</strong> Commission, 2006).<br />

While planning under a difficult financial climate, governments should seek to invest in sustainable<br />

programs that can produce savings (Almarabeh and Abu Ali, 2010). This can be achieved by: activating<br />

functionalities clearly and try not to add details that will push budget into deficit; develop projects that are<br />

achievable within the resources available; consider the government’s current use of technology and study<br />

past successes and failures; and designate competent officer or organising body to oversee costs.<br />

Funding is really the life blood of eGovernment, in many OECD countries, budgetary arrangements<br />

restricted eGovernment initiatives, funding was done through traditional government silos and ITC<br />

expenditure not recognised as an investment (OECD, 2003). EGovernment requires level of certainity on<br />

future funding of projects and a central funding programme could help faster innovations and allow for<br />

key demonstration projects. Public private partnerships are necessary to share expertise,facilitate<br />

innovating flexible longterm relationships with partners sharing risks and rewards. This help on how to<br />

respond to changing technologies and opportunities (Seifert and McLoughlin, 2008)<br />

Equitable and Access to Information<br />

A mature private sector has enabled business process outsourcing and public-private partnership while a<br />

technologically mediated world made possible self service delivery and government online not ín-line”,<br />

(Sigh, 2003). Why could not government services be accesable 24/7 like the Automatic Teller Machines<br />

390


Racious Moilamashi Moatshe and Zaigham Mahmood<br />

(ATMs)? Citizens and businesses increasingly expect government to perform more like commercial<br />

entities, they want convienent, instant access to public information and services 24hours a day, 7 days a<br />

week.<br />

The eGovernment rethinking transformation of the functioning of the democratic process is all about<br />

enhancing, facilitating convienant and instant access to government information and services by citizens,<br />

businesses, employees, government entities and other agencies (Aicholzer and Schmutzer, 2000; Wong<br />

et al, 2007); Lyane and Lee, 2001; Sharifi and Zarei, 2004)<br />

Government must be prepared to employ technology strategy that include interactive capabilities which<br />

allow citizens to take active real time participatory roles in government on line and unrestricted secure<br />

access to information (24/7) provides opporturnities of real time participation throughout the democratic<br />

process, not simply disseminating stale, inaccurate and irrelevant information (Caldow, 1999)<br />

Information is a competitive tool, knowledge power, and life blood of every nation, hence eGovernment<br />

initiative should be backed by sound policies to improve access to information and online services and<br />

customers and citizens should have a choice in the method of access and interaction. Understanding<br />

customer needs should drive the 24/7 on line information access is critical in the current globalised and<br />

privatised world economy. Existing laws that support equitable flow and access to information are a<br />

necessity, e.g Freedom of Information Act and broader government policy on information sharing.<br />

Through the use of eGovernment (internet) various stakeholders are able to share ideas and information<br />

and inform specific policy outcomes e.g sharing of information between central and local level<br />

government can facilitate environmental policies, sharing information on health sector can improve<br />

resource use and patient care, (OECD, 2003). Within the information and knowledge society, data<br />

information and knowledge objects are the major resources to be elaborated, therefore appropriate<br />

design of the data, information and knowledge object is required, standardization, interoperatability,<br />

comminicability and intergration to distinct IT systems over a corporate semantic web becomes important<br />

(Wimmer, 2002); with the strategies to provide electronic public services through virtual or physical self<br />

service shops, information needs to be transfered adequately so that citizens and businesses are able to<br />

use these facilities in a smart way<br />

Innovative Government to Foster Economic Development<br />

Becoming a competitive eGovernment involves systematic technological transformation of traditional<br />

economic development assets such as great schools, safe streets, a clean environment, quality health<br />

care, viable land use and good governance. How well the technology and/or internet is exploited in each<br />

of those assets is the new differentiation, critical issues are, what is the student-to-pc ratio? Are the<br />

school wired? Can citizens and businesses conduct business with the government online? Is there a<br />

healthy and growing market of high capability, telecommunications, wireless cables to the homes and<br />

businesses? Do transportation systems, law enforcement and hospitals employ the latest technological<br />

advances? Are higher education resources connected to new technologies, re-skilling and producing a<br />

workforce of knowledge workers? Are technology strategies employed in urban planning and help to<br />

alleviate urban sprawl? Are processes in place to continually re-evaluate traditional competitive assets in<br />

a digital society? Are public policies and the legal environment conducive to eCommerce, eBusiness and<br />

eGovernment? (Caldow, 1999). For eGovernment to succeed, implementing goverments need to have a<br />

clear vision and priorities for eGovernment and promote priority economic sectors through the best<br />

selection of projects (The working group, 2002)<br />

Vision and Strategic Decision Capability<br />

Vision and strategic decisions capabilities are critical to; (1) determine goal for pursuing eGovernment;<br />

(2) define and set clear vision, mission and priorities for eGovernment; (3) determine the eGovernment<br />

the nation is ready for; (4) assess the political will to support and lead eGovernment efforts; (5) decide on<br />

the best method of selection of eGovernment projects; (6) Planning and managing eGovernment<br />

projects; (7) decide on change management processes to overcome resistance from within governments<br />

and outside government; (8) determine progress measurement and communication strategies and how to<br />

depict failure; (9) determine relationship level with private sector; (10) determine how can eGovernment<br />

facilitates and improves citizens participation in public affairs, (Almarabeh and AbuAli, 2010;Working<br />

Group 2002).<br />

391


Racious Moilamashi Moatshe and Zaigham Mahmood<br />

For necessary transformation of governments towards a customer- oriented virtual administration,<br />

eGovernment needs proper vision, decisions and strategies(Wimmer, 2002) These must be formulated<br />

into innitiatives, here the financial and operative resources for realising eGovernment initiatives are<br />

allocated and strategic decisions made to implement the strategy.<br />

Strategic vision and decisions determine the extent of partnership with private sector given the private<br />

sector experience in developing IT applications. Partnership could be to find a single partner for the entire<br />

strategy, producing guidelines for design, re-engineer processes, developing software, helping in<br />

procurement and providing training (Bhatnagar, 2002).<br />

Adequate Infrastractural Development<br />

eGovernment can only thrive when the required and necessary information and communication<br />

technology (ICT) infrastracture is available. A developed telecommunications sector with a fast reliable<br />

and security ICT networks to facilitate voice, data and media is critical.<br />

Different access methods such as remote access by Cellular Phones, Satellite Receivers, Kiosks etc,<br />

need to be considered by governments in order that all members of society can be served irrespective of<br />

their physical and financial capabilities (Ndou, 2004), without ICT effective and competitive public sector<br />

is unattainable.<br />

Global market based networks on IT based communication platforms a pre-requisite for successful<br />

implementation of eGovernment (Moatshe et al, 2010).<br />

Enabling Environment for all Stakeholders Inclusion<br />

eGovernment is not about using the internet in performing administrative work, it is also more about reengineering<br />

of administrative processes, re-organising and restructuring of public organization and<br />

shifting focus towards a citizen and customer centred service provision. EGovernment is strongly shaped<br />

and driven by social, cultural and political factors on local, regional and supra-natural levels. It therefore<br />

calls for focus on programmes and policies aimed at the diversification of the ICT base such that those<br />

with low income, women, youth, disabled, disadvantaged and those living in rural areas are<br />

systematically included in the impending benefits of newer technologies (UN, 2005).<br />

It worth recognising that people are not just citizens of government, they are parents, volunteers,<br />

neighbours, business owners and employees, people with shared ethnic backgrounds, consumers,<br />

students, sports enthusiats, senior citizens and children (Caldow, 1999). Inclusion of a community service<br />

in the overall web strategy is the way to go, conducting seminars, educational programs, establishing<br />

outreach to citizens, underserved communities, community groups and non-governmental and civic<br />

organisations are also important aspects to an informed and participative community.<br />

All stakeholders inclusion is key to successful eGovernment initiative. Citizens in their interaction with<br />

government agencies, should have greater awareness of services and priorities, wider choice of access<br />

channels, greater convienance, low costs, flexible and more personalized services as well as greater<br />

participation and openness in the democratic process. Equally, businesses would benefit from quicker<br />

and faster interactions, minimum transaction costs and regulatory burdens, greater benefits such as eprocurement,<br />

better inventory management and shared data management, greater openness and<br />

transparency would benefit the whole economy by attracting Foreign Direct Investments (FDI), (Sigh,<br />

2003; OECD, 2003; Wesso et al 2004; <strong>European</strong> Commission 2006)<br />

6. Conclusion<br />

eGovernment is not an easy initiative and there are no short cuts, hence, the new model identifies and<br />

establishes the critical success factors impacting on eGovernment development. Whilst a number of<br />

studies have invariably outlined the challenges and barriers facing eGovernment in developing countries,<br />

the same studies have not made a significantly strong case to present explicitly factors of (stakeholder<br />

inclusion; equitable provision and access to information; Innovative government to foster economic<br />

development; enabling high political leadership involvement; vision and strategic decision capability) as<br />

critical components of successful eGovernment implementation. The new model though not prescriptive<br />

offers developing countries in pursuit of eGovernment initiatives an implementation framework. The<br />

model hopefully fills the knowledge gap and goes a long way in assisting Botswana and other<br />

governments to better implement eGovernment projects.<br />

392


References<br />

Racious Moilamashi Moatshe and Zaigham Mahmood<br />

Aicholzer, G. and Schmutzer, R. (2000) EGovernment: the hard way from political agendas to service improvements;<br />

the Special <strong>European</strong> Council of Lisboa, 23 and 24 March 2000<br />

Almarabeh, T and Abu Ali (2010); A General Framework for EGovernment; Definition Maturity Challenges,<br />

Opportunities, and Successes; <strong>European</strong> Journal of Scientific Research ISSN 1450-216X, Vol 39, No 1 (2010),<br />

pp 29-42<br />

Bhatnagar, S (2003); Transparency and Corruption; Does EGovernment help? Indian Institution of Management.<br />

Botswana; ICT helps improve lives (2010); Speech by the Botswana Minister of Communication, Science and<br />

Technology, Tuesday, 18 May 2010<br />

Botswana National ICT Policy (2007) Botswana Government policy Document<br />

Botswana E-readiness Assessment (2004): Botswana Government policy Document<br />

Caldow, J (1999), The Quest for Electronic Government: A Defining Vision; Institute for Electronic Government, IBM<br />

Corporation<br />

<strong>European</strong> Commission (2006) Breaking Barriers to EGovernment: Case Study Report; Overcoming Obstacles to<br />

Improving <strong>European</strong> Public Services; Deliverable 2<br />

Hwang, M.S., Tali, C., Shen, J.J. and Chu, Y.P. (2004); Information and Security. International Journal, Vol 15, No 1,<br />

2004, 9-20.<br />

Kereletswe, O.C, (2009) ICT Development in Africa: The Case of Botswana, Botswana Country Presentation: Public<br />

Sector Reforms; Office of the President<br />

Lyane, K. And Lee, (2001), Developing fully functional EGovernment: A four stage model, Journal of Government<br />

Information Quarterly 18, pp 122-136<br />

Mahmood, Z. (2011), Barriers to Developing EGovernment Projects in Developing Countries, Proc 11 th <strong>European</strong><br />

Conf on eGovernment – ECEG-2011, Ljubljana, Slovenia, June 2011<br />

Moatshe, R. M., Mahmood. Z. and Antonopoulos, N. (2010): SDEAT; A Six Dimensional Framework for Assessing Ereadiness<br />

for EGovernment Projects. Proceedings of the 15 th IBIMA <strong>Conference</strong> Cairo, Egypt 6-7 November<br />

2010. www.ibima.org/CA2010/papers/rmsn.html<br />

OECD (2005); EGovernment for Better Government ISBN 92-64-01833-6-OECD.<br />

Reffat, M (2006) Developing a Successful EGovernment: University of Sydney, NSW 2006, Australia<br />

Sharifi, H. and Zarei B (2004): An adaptive approach for implementing eGovernment in I.R. Iran: Journal of<br />

Government Information 30 (2004) 600-619<br />

Seifert, J.W and McLoughlin (2008) State eGovernment Strategies; Identifying Best Practices and Applications<br />

Sign, S.H (2003) Governments in the Digital Era and Human Factors in EGovernment<br />

Signore, O., Chise, F., and Pallotti, M. (2005) EGovernment Challenges and Opportunities: CMG Italy- XIX Annual<br />

<strong>Conference</strong> 7-9 June 2005<br />

Spremic, M., Simurina, J., Jakovic, B. and Ivanov, M. (2009) EGovernment in Transition Economies: World Academy<br />

of Science, Engineering and Technology 53, 2009<br />

The Working Group on EGovernment in the Developing World (2002) Roadmap for EGovernment in the Developing<br />

World (10 Questions EGovernment Leaders should ask themselves): Pacific Council on International Policy.<br />

The World Bank. A Definition of EGovernment [online]. http://www/.worldbank.org/ publicsector/egov/definition.htm<br />

UN (2005). UN Global EGovernment Readiness Report 2005 from EGovernment to E-inclusion.: United Nations<br />

Department of Economic and Social Affairs, Division of Public Administration and Development Management.<br />

New York<br />

UNPAN Portal Project (2009) Modernising Botswana Government in the Digital Era: Botswana Experience, CPS/<br />

UNPAN Workshop Johannesburg, South Africa<br />

Wesso, H., Naidoo, R. and Neville, M. (2004) Technology EGovernment and Economic Development: A Background<br />

Paper to Inform the Strategy of the Centre for E-innovation<br />

Wimmer, M.A. (2002) Towards Knowledge Enhanced EGovernment: Integration as Pivotal Challenge<br />

393


The use of ICT by Government Departments and Parastatals<br />

in South Africa<br />

Matsobane Frans Mosetja<br />

North West University, Mafikeng Campus, South Africa<br />

frans.mosetja@nwu.ac.za<br />

Abstract: There are some success stories in eGovernment in South Africa. The South African Revenue Services<br />

(SARS) e-filling was created in 2003 and proved to be successful. The successful application and conversion from<br />

proprietary software to open source for National Traffic Information Systems (eNaTIS) is another. In a previous<br />

paper, Trusler (2003) argues that EGovernment in South Africa has a particularly important historical and social<br />

context due to the previous dispensation. He noted that as a result, a ten year eGovernment implementation horizon<br />

has been created from tested world-wide practices. From the examples mentioned above it is clear that the plan is<br />

not being realised. The result is that a gap is appearing between what the policy says should be happening and what<br />

is actually happening. This paper examines what has been done and what can be done to increase service delivery<br />

and to encourage citizen participation through an efficient ICT structure. It ends with some guidelines on what could<br />

help the situation.<br />

Keywords: eGovernment, South Africa, SARS e-filing, e-Natis, citizen, policy<br />

1. Introduction<br />

South Africa has a population of over 49 million people scattered across the Country in 9 nine provinces.<br />

Each province is divided into municipalities. Municipality also referred to as Local government is the<br />

sphere of government closest to the people.<br />

All provinces have websites that provide provincial information. Two provinces namely Western Cape and<br />

Gauteng are ahead of the rest. The advantage of these provinces is their developed communication<br />

infrastructure due to them being the economic hubs, (SITA, 2002).<br />

The South African government understands the need to develop an Information Society and harness the<br />

power of ICTs for economic and social development for the benefit of the country and its citizens.<br />

Government understands the need for reform and the transformation of its core activities to make<br />

processes more effective and efficient and more citizen oriented. The need to manage information,<br />

internal functions as well as serving business and citizens is core to their strategy. EGovernment is part<br />

of Public Service transformation guided by the principle of public service for all and Batho Pele, (Farelo<br />

and Morris, 2006).<br />

Currently the government is seeking to achieve three main objectives through its eGovernment initiatives:<br />

increased productivity; lowered costs; and increased citizen convenience. This indicates a strong focus<br />

on service delivery improvement. Achieving eGovernment success also requires active partnerships<br />

between government, citizens and the private sector, (Farelo and Morris, 2006). South Africa's<br />

eGovernment strategy is led by the Centre for Public Service Innovation (CPSI) in partnership with the<br />

Department of Public Service and Administration and the State Information Technology Agency.<br />

2. Success stories<br />

The World Summit on the Information Society (WSIS) plan of action foresees the formation of a peoplecentred,<br />

inclusive and development-oriented Information Society, where everyone can access, utilise and<br />

share information and knowledge. South Africa has made great strides towards meeting the<br />

commitments of the WSIS Declaration of Principles and Plan of Action to which the country is a signatory,<br />

(Farelo and Morris, 2006). Various arms of the South African government have embarked on a number of<br />

eGovernment programmes. Examples of these include inter-alia, the Batho Pele portal, SARS e-filing, the<br />

e-Natis system, electronic processing of grant applications from remote sites, and a large number of<br />

departmental information websites, (Kaisara & Pather, 2009).<br />

Statutory bodies have established to co-ordinate implementation of eGovernment projects. Amongst<br />

these are the State Information Systems Agency (SITA) and Government Information Technology<br />

Officers Council (GITO Council). SITA is responsible for the acquisition, installation, implementation and<br />

maintenance of IT in the public sector. On the other hand the GITO Council, which consists of national<br />

and provincial IT officers, is responsible for consolidating and coordinating IT initiatives in government,<br />

394


Matsobane Frans Mosetja<br />

including eGovernment, to facilitate service delivery Regulatory frameworks have also been developed to<br />

direct the implementation of eGovernment initiatives, (Matavire, 2010).<br />

South Africa Online” website (www.gov.za) shows that some progress is being made. Almost all<br />

individual government departments and municipalities have their own websites. A comprehensive<br />

resource of government documents including White Papers, Green Papers, speeches, annual reports,<br />

legislation, policies and other information is available for download, (Trusler, 2003).<br />

2.1 SARS efiling<br />

Government has since I can remember been critisised for their poor service delivery, lack of performance<br />

and general lack of good process management and governance. With the launch of SARS eFiling in 2003<br />

as a free online replacement process for the manual tax return submissions, the government should be<br />

congratulated for one of their departments which has the most efficient online application. SARS eFiling<br />

is a free service that allows individual taxpayers, tax practitioners and businesses to register for free and<br />

submit tax returns, make payments and perform a number of other interactions with SARS in a secure<br />

online environment. All employees earning more than R60 000 a year must complete their tax returns<br />

and ensure that the IRP5 forms accompany them when submitting the information to SARS. The<br />

employees must be registered with SARS before they can complete their returns. The SARS e-filing<br />

system makes it possible to submit the information electronically.<br />

The system is aimed at removal of the risks and inconvenience normally associated with the traditional<br />

form of manual tax return submission. The eFiling service is on a par with international standards, being<br />

comparable with services offered in the US, Australia, Singapore, Ireland, Chile and France. SARS has<br />

seen eFiling in South Africa grow significantly since it was initiated. For the 2009 tax year, more than 2.7<br />

million individual tax returns were submitted through e-Filing and annually over 7.5 million returns are<br />

submitted by businesses and practitioners.<br />

2.2 eNaTIS<br />

eNaTIS is a system which provides for the registration and licensing of vehicles. It manages and records<br />

applications for and authorisation of driver's and learner's licences. It is also a law enforcement tool used<br />

to ensure that the details of vehicles that are stolen are circulated in order to prevent irregular and<br />

fraudulent re-registration of such vehicles.<br />

eNaTIS is today recognised as the most advanced of its kind on the continent, with, on average, more<br />

than 16 million monthly transactions.<br />

In January 2009, eNaTIS recorded a massive 16 167 279 transactions– by far the most transactions<br />

recorded in a single month since the system’s launch. Compared to January 2008, this represents a yearon-year<br />

increase of 22.56%. The system once again performed flawlessly and users experienced<br />

excellent processing speeds. As was the case in December 2008, two major factors contributed to the<br />

record volumes experienced. At the end of 2008 functionality was enabled to prevent the issuing of a<br />

licence disc to a vehicle if any other vehicle of the owner in question was still unlicensed. The<br />

functionality was introduced to compel owners to also license their other vehicle(s) before obtaining a<br />

licence disc. This contributed to an increase in vehicle licensing volumes as well as related queries and<br />

reports.<br />

eNaTIS has achieved significant improvements to performance, functionality and stability over the past<br />

two years. The system has also accommodated growth of 53% in the country's vehicle population, a 50%<br />

increase in system users and a 90% increase in Department of Transport sites. eNaTIS processes 99,8%<br />

of all transactions in under one minute.<br />

2.3 Electoral voting system<br />

The Independent Electoral Commission (IEC) is a permanent body established in terms of the Electoral<br />

Commission Act of 1996 to promote and safeguard democracy in South Africa. It is a publicly funded<br />

body and is accountable to Parliament, but is independent of government. Elections in South Africa take<br />

place on national, provincial, and local levels. The IEC voting system supported the 48 percent of South<br />

Africa's 18 million registered voters who visited 15 000 voting stations around the country to cast their<br />

ballots in municipal elections.<br />

395


Matsobane Frans Mosetja<br />

The election centre was extraordinary in terms of technological and logistical achievement. It acted as the<br />

hub of activity over the election period. The concept behind the election centre was to establish an<br />

operational centre where the IEC, members of the public, media and politicians could have access to<br />

information as it became available. This required the IEC not only to share its successes but also<br />

problems, (Mutula, 2010).<br />

The IEC relied on large-scale innovative technology to transform the processes and management of the<br />

elections and it succeeded. One of the world's most extensive Geographic Information Systems was used<br />

to accurately map and plan out the voting districts. The GIS produced over 75,000 electronic and color<br />

scale maps which drew the voting districts. The GIS system allowed the IEC to quickly identify and react<br />

to problem areas. For example, aerial photographs were incorporated into the GIS to provide "quick<br />

mapping" for the movement of informal settlements, (Mutula, 2010).<br />

2.4 ePassport<br />

The Department of Home Affairs' turnaround strategy is on track, marking a change in the way the<br />

department does business and delivers services to citizens and residents.<br />

The department acquired a new ePassport production system, which is installed in the government<br />

printing works, with staff already having been trained and working on the new system. The main benefit<br />

of the new system is the reduction in the passport production turnaround time due to the printing systems<br />

ability to print higher volumes. The implementation of online fingerprint verification and subsequent<br />

interface with the passport completion processes further enhanced the turnaround times and issuance<br />

within 10 days.<br />

The fingerprint verification system enables the department to verify fingerprints electronically at local<br />

offices even before applications are sent to the head office in Pretoria. The online verification makes it<br />

possible for counter staff to conduct real-time fingerprint comparison of citizens whose fingerprints were<br />

previously registered on the automated fingerprint identification system. This has lead to further improved<br />

turnaround times in respect of issuing ID documents, temporary identity certificates, emergency and<br />

temporary passports. Previously centralised manual fingerprint verification took an average of seven days<br />

to process.<br />

"We can report that the system is now fully operational in all our permanent offices<br />

nationwide. We are receiving positive feedback both externally and internally. The system<br />

has clearly worked as a management and a service tool", (Mapisa-Nqakula, 2008).<br />

2.5 Track and trace system<br />

Track and Trace system has transformed the way in which the department handled customer enquiries<br />

about progress of their applications. The system allows departmental managers to trace and, if<br />

necessary, speed up the progress of an ID application document from the moment it was lodged until<br />

delivery to the applicant.<br />

Specially developed matrixes allow managers to establish which official had assumed responsibility for<br />

processing at each stage of the application, from acceptance at a home affairs office to transport to<br />

headquarters, verification of the applicant's identity, permission for an ID document to be printed, printing,<br />

return to the issuing office, and handover to the applicant. Citizens can also track the progress of their<br />

application via cellphone or internet.<br />

2.6 Paymaster<br />

The South African Post Office’s Paymaster to the Nation project promises to make life considerably<br />

easier for recipients of pensions, particularly those who live in remote rural areas. Under the scheme,<br />

welfare grants and pensions are paid into a Postbank account that is linked to a smart card containing a<br />

magnetic strip and a chip, which contains the beneficiary’s fingerprints and photo to eliminate fraud,<br />

(Farelo and Morris, 2006)<br />

3. Work in progress<br />

Citizens have rights and duties. For example, the right to actively participate in the government’s<br />

decision-making processes and the duty to pay for services received. The provision of accurate and<br />

verifiable accounts to customers, and the collection of rates, services charges and other taxes is one of<br />

396


Matsobane Frans Mosetja<br />

the critical duties of a government. Accurate and reliable customer data has become the central focus of<br />

most government departments.<br />

4. Water meter project – Mafikeng Local Municipality<br />

The vision of the Mafikeng Local Municipality is to enhance the quality of services offered to its clients<br />

through the use of new technology. This prompted the city administration to embark on a project to verify<br />

its consumer data and water meter registration numbers. The migration of new information system<br />

requires that data from the existing system be in a process that is transparent, error-free, and compatible<br />

with current and future municipal information systems.<br />

The project will allow the municipality to capture a water meter number, its meter reading, its GPS<br />

coordinates as well as the GPS coordinates of its plot. Once the information is captured the municipality<br />

will be able to respond quickly to queries and maintenance issues. At end of the project citizens should<br />

be able to access their information online. Error free accurate, easily accessible information will<br />

encourage members of the community to pay for services received.<br />

4.1 Smartcard ID<br />

The Department of Home Affairs promote the vision on re-defining the relationship between government<br />

and citizens. A smartcard-ID is under development that focuses on the automation of finger prints and the<br />

development of an electronic Population Registry. The smart ID card system is supposed to replace the<br />

current green ID book that South African residents are required to have as proof of identity for various<br />

official institutions, such as banks, government services and to vote. Residents can apply for one from<br />

the age of 16. However, these ID books are often forged or altered.<br />

Through its Home Affairs National Information System (HANIS) project citizens can access birth and<br />

death registration forms online. To the extent that increased transparency, accountability and<br />

predictability (of rules and procedures) are made priorities, eGovernment may offer a weapon against<br />

corruption, (Farelo and Moriss, 2006).<br />

5. Conclusion<br />

eGovernment has already arrived in Africa, though it is essentially an imported concept based on<br />

imported designs. There are growing numbers of eGovernment projects, some of which are contributing<br />

to public sector reform and delivering gains of efficiency and/or effectiveness across a broad agenda,<br />

(Richard Heeks, 2002). For South Africa to achieve the objectives of the Local Government Turnaround<br />

Strategy (LGTAS) of improving service delivery, increasing efficiency, accountability and responsiveness<br />

in government, a citizens-centred integrated ICT system and eGovernment is one of the key interventions<br />

South African local government requires, Minister for Cooperative Governance and Traditional Affairs,<br />

(Sicelo Shiceka, 2010).<br />

Instead of the Presidency simply blurting out buzzwords like ‘community engagement‘, ‘cooperation‘ and<br />

‘working together‘, the state needs to confirm these measures with local authorities and community<br />

residents – get sign-off from all the stakeholders concerned.<br />

The government should introduce Multipurpose Portals Single entry point to enable citizens to transact<br />

with Multiple Government Departments via Gateway and Portals and downscale it municipal level.<br />

Government need to provide more training to the ordinary citizens on how to use these UCTs facilities to<br />

access e-governance service, (Mphidi, 2009). Having witnessed the success of various eGovernment<br />

systems and projects at national and provincial level, the municipalities should follow suit and automate<br />

most of their services and help government achieve the objectives of Batho-Pele.<br />

References<br />

Farelo, M. and Morris, C. (2006). The Status of EGovernment in South Africa.<br />

Heeks, R. (2002). eGovernment in Africa: Promise and practice.<br />

Mapisa-Nqaula N. (2009). Home Affairs Budget Vote 2008/09<br />

Matavire, R, et al. (2010). Challenges of eGovernment Project Implementation in a South African Context<br />

Mphidi, H. (2009). Digital divide and e-governance in South Africa.<br />

Mutula, M. (2010). Challenges and Opportunities of eGovernment in South Africa.<br />

Kaisara, G. and Pather, S. (2009). eGovernment in South Africa: e-service quality access and adoption factors.<br />

SITA. (2002). eGovernment Experience in South Africa.<br />

Trusler, J. (2003). South African EGovernment Policy And Practices: A Framework to Close The Gap.<br />

397


The Workload for the Structural Implementation of<br />

eDemocracy: Local Government Policy Issues Combined<br />

With the Policy Cycle and Styles of Citizenship.<br />

Bert Mulder and Martijn Hartog<br />

eSociety Institute of The Hague University of Applied Sciences, The Netherlands<br />

bertmulder@esocietyinstituut.nl<br />

martijnhartog@esocietyinstituut.nl<br />

Abstract: Today, governmental bodies in many countries acknowledge ICT applications to be powerful tools for<br />

increasing involvement of citizens in public policy-making, and as such a sound investment in better public policy<br />

(OECD 2003: 9). Within the Dutch governmental bodies a study by Prof. Dr. Kickert (2005:10) has shown that these<br />

ICT developments also demand an optimal public service. Furthermore citizens are inclined to participate more often<br />

if governments use digital tools, because of their (usability) speed and comfort (Beffers & Van den Brink, 2007). The<br />

last decade the Dutch governmental bodies have become increasingly aware of the possibilities of ICT applications<br />

and the growing digital behaviour of its citizens. To prepare the next phase of large scale and structural<br />

implementation of eDemocracy, the size and range of that task must be researched. This paper describes research<br />

conducted at the municipality of The Hague (The Netherlands). It was aimed to determine how many political issues<br />

lend itself to e-democratic support. The research then categorized the issues using the policy cycle (agenda-setting,<br />

preparation, determination, execution, monitoring and evaluation) and styles of citizenship (dutiful, pragmatic and<br />

society critic). Some results of the research: During the course of 3 years the city council and its committees treated<br />

1834 issues. Of these, 69% were treated by the city council committees and 31% by the city council itself. 78% of<br />

issues could be categorised within the policy making process. According to the styles of citizenship, citizens are most<br />

likely to participate when issues directly relate to their personal environment (pragmatic), as well as issues<br />

concerning the qualitative functionality of the local government (society critic).<br />

Keywords: eDemocracy, public agenda issues, local policy-making, policy cycle, styles of citizenship, digital<br />

participation<br />

1. Introduction<br />

1.1 Context<br />

This exploratory research grew out of an interest in the future of eDemocracy. The large-scale practical<br />

adoption of eDemocracy that is to be expected creates many questions that are not asked or answered.<br />

Based in The Netherlands, we wanted to inquire what adopting eDemocracy would actually mean when<br />

each and every one of the 430 Dutch municipalities would structurally enrich all their democratic<br />

processes with it. How many democratic issues should be active in a municipality at any one time? Who<br />

would be interested in digital participation on those issues and what type of support would they require?<br />

Should such digital support be consistent over different municipalities, possibly adding to the legitimacy of<br />

government? What is the magnitude of such an endeavour, would it require extra people and would<br />

enough funds be available? The aim of this research is to take a first step towards providing answers to<br />

these questions.<br />

We found a lack of available research that could assist in the predictive planning of eDemocracy. While it<br />

is assumed that eGovernment will see continued development and possibly widespread adoption, current<br />

research focuses on issues such as conceptual context, the process of development, the various tools<br />

available, the transformation of government and the possible effectiveness of such applications. There is<br />

little or no research that prepares government organizations with actual practical and predictive planning.<br />

1.2 eGovernment development<br />

The widespread and global development of eGovernment has been addressed by many institutions,<br />

including the UN, in their reports on the civil society (2001, 2003 & 2005). Several parties describe the<br />

stages of development for eGovernment: Gartner (2000); The United Nations (2001); Layne and Lee<br />

(2001); Janssen en Van Veenstra (2005) & Al Hashim and Darem overview (2008). Those models of<br />

development may have information management (Gartner, UN & IBM) or technical management<br />

(Janssen & Van Veenstra 2005) as their angle, but all models assume growth in use, size and quality of<br />

eGovernment infrastructure and applications, often implicitly. The new research agenda’s described<br />

(Codagnone & Wimmer 2007) identify ‘research into e-participation’ as one of the 13 trends and mentions<br />

398


Bert Mulder and Martijn Hartog<br />

the ‘broad realization of e-participation’ but does not designate the magnitude of the practical application<br />

of eDemocracy as an area of interest.<br />

1.3 eDemocracy: is democratic decision making a constant?<br />

This research adopts a narrow focus and looks at existing policy development processes within current<br />

government: what would it mean when a municipality adopts eDemocracy throughout its existing<br />

processes? The research is exploratory and preliminary in that it seeks to outline the validity of a<br />

viewpoint and an approach. The viewpoint is that most democratic processes exist for a reason, such as<br />

running a city or a state. Performing that task requires a certain number of issues that have to be decided<br />

upon. The question is whether the number of democratic issues in a process such as running a city is a<br />

relative constant. It is an interesting question: when that would be the case, adding eDemocracy might<br />

possibly change the dynamics of the process and the quality of the outcome, but it would not dramatically<br />

increase the number of issues decided upon. The approach that this research tries to develop is using<br />

the entries on the municipal agenda’s to gauge to amount of democratic issues, and use life style<br />

research to gauge possible interest in the population. It is the first in a series that in the coming years<br />

tries to develop a model that may allow municipalities to assess the necessary investment required to<br />

support its core democratic process and answer the question whether democratic decision-making within<br />

a certain context is a constant.<br />

1.4 Research question<br />

But the widespread adoption of e-democratic tools and applications throughout government will require<br />

an extensive effort and investment in time and tools. Our research aims to outline those practical<br />

requirements: what would the broad adoption of eDemocracy mean in the current democratic processes?<br />

Although the exploratory research is simple, the aim is to create a model that allows municipalities to<br />

determine the possible workload of broad digital support for democratic processes. Such a model would<br />

be based on at least two aspects: the number of democratic issues that lend themselves to digital support<br />

and the latent need of citizens to participate in the democratic process. Thus the main question translates<br />

into three sub-questions:<br />

How many democratic issues are active at any one time?<br />

How many issues lend themselves for digital support?<br />

How many citizens would be interested in e-participation?<br />

2. Method<br />

In order to answer these questions, we have utilised the following method;<br />

Inventory democratic issues on the agenda of a large city, in this case The Hague<br />

Categorize them according to the policy cycle<br />

Assess citizen’s possible interest in participation according to lifestyle<br />

Map lifestyles preferences onto democratic issues citizens may wish to participate in<br />

Match citizen’s interests and democratic issues<br />

The study in question was conducted at the municipality of The Hague, one of the four largest<br />

municipalities of The Netherlands with circa 450.000 inhabitants. The city of The Hague was selected<br />

since research shows that larger municipalities are able to reach larger groups of citizens for<br />

participation, due mainly to the fact that they have more possibilities of offering information when<br />

compared to smaller municipalities (Cascadis 2007: 6).<br />

2.1 Inventory of the number of democratic issues<br />

To determine the number of democratic issues treated by municipal governing bodies we created an<br />

inventory of the topics on the agenda and the list of decisions of both the city council and its committees.<br />

To that end we looked at the agenda’s of a three year period of one council (following elections in 2006)<br />

for the city of The Hague (Beleidsakkoord Den Haag 2006-2010, [Policy agreement of The Hague 2006-<br />

2010] 2006).<br />

399


Bert Mulder and Martijn Hartog<br />

2.2 Categorizing issues according to policy cycle<br />

In order to determine what issues would lend themselves to e-democratic support the issues were<br />

categorized according to the phases of a model of the policy cycle. Policymaking can be defined as ‘the<br />

case-to-case determination of guiding and controlling the developments within the society by the<br />

government’ (Bovens, ’t Hart & van Twist 2007: 99). The process of shaping and executing policy implies<br />

a policy making process that is cyclical in character, and indicates policymaking is an ongoing<br />

development process.<br />

For our research we adopted the policy cycle model of Simon (in Edelenbos & Monnikhof 2001: 44),<br />

consisting of six phases: agenda-setting, preparation, determination, execution, evaluation and<br />

monitoring. The characteristics of the phases can be found in table 1.<br />

Table 1: Phases policy cycle<br />

Phase in the cycle<br />

Characteristics<br />

1 Agenda-setting The process in which citizens and /or government policy makers are confronted with<br />

problems that are occurring within the society (Bovens et al 2007).<br />

2 Preparation The collection and analyses of information concerning the specific problem in order<br />

to formulate a recommendation concerning the conducted policy (Bovens et al<br />

2007), as well as finding and proposing workable and affordable solutions for the<br />

problem (Herweijer & Pröpper 2008).<br />

3 Determination Decision making concerning the content of the policy (Bovens et al 2007).<br />

Specifically, the policy must be coherent with the wishes of the society concerning<br />

the problem, including the conditions in which the execution of the policy occurs<br />

should be determined (Pröpper & Steenbeek 1999).<br />

4 Execution This phase concerns the actual execution of the policy (Pröpper & Steenbeek 1999)<br />

by transforming policy proposals into concrete actions (Bovens et al 2007).<br />

5 Evaluation Judging and analysing the content of the policy and its gained results/effect (Bovens<br />

et al 2007).<br />

6 Monitoring Processing the results from the evaluation concerning an eventual continuous follow<br />

up on the policy, otherwise redefining the policy core and the execution of the policy<br />

(Bovens et al 2007).<br />

Each phase within the cycle creates a different context for participation. The influence of citizens depends<br />

on their right/ability to participate and their desire to do so. Local government may choose to only inform<br />

citizens, to let them give advice or involve citizens in the co-production of local policy. Some research<br />

indicates that the effectiveness of policy and its execution is related to the influence citizens have or had<br />

(Peeters 2002). Each of the phases in the cycle provides different opportunities. According to Peeters<br />

(2002) the phase of agenda setting is specifically shaped by social and political issues. In choosing their<br />

political representatives, citizens exercise one means of influencing whether certain issues are treated by<br />

the city council (Herweijer & Pröpper 2008). In some situations citizens have the right to generate “citizen<br />

initiatives” that has legal validity. It may be advantageous for local government to let citizen’s advice or<br />

co-produce within the policy preparation phase. Additionally, it is mandatory by law for the municipality to<br />

offer at least a voting opportunity for citizens to approve certain policy actions (Herweijer & Pröpper<br />

2008). Within the execution phase experienced citizens may participate, because there transparency may<br />

have citizen’s recognize whether governmental action was appropriate. The phases most geared to<br />

contributions by citizens seem to be agenda setting, preparation, execution and evaluation.<br />

2.3 The interest of citizens in participation: Lifestyle analysis of citizenship<br />

The second factor determining the magnitude of adoption of eDemocracy is the interest and motivation of<br />

citizens in participating. In order to determine such interest in participation by citizens we looked at the<br />

method of lifestyle analysis. In 1997 the Dutch research and strategy organization, Motivaction,<br />

developed a Mentality lifestyle model identifying seven lifestyle clusters.<br />

On the basis of that model they went on to further develop the notion of ‘styles of citizenship’ (Motivaction<br />

2001) in which four styles of citizenship are distinguished based upon their research on the mentality and<br />

society norms of citizens:<br />

400


Outsiders/inactive<br />

Dutiful/dependent<br />

Pragmatic/conformist<br />

Society critic/responsible<br />

Bert Mulder and Martijn Hartog<br />

This research, undertaken for the Commissions Toekomst Overheidscommunicatie (Committee of Future<br />

Governmental communication) and the Wetenschappelijke Raad voor het Regeringsbeleid (Scientific<br />

Council for Governmental Policy), is used by many different Dutch government organizations to segment<br />

their clients. In this exploratory research we use this method to determine both what part of the<br />

population might be interested in policy issues, as well as what issues they might be interested in.<br />

The first style, called ‘outsiders’, is characterized as low intensity participants. These types of citizens are<br />

rarely invited to co-produce policy (Motivaction 2001). That is the reason this group ‘outsiders’ is<br />

excluded from this research.<br />

The second style, called ‘dutiful’, is characterized as having a passive attitude towards developments in<br />

society (Motivaction 2001). Although they are involved with activities within their immediate and local<br />

environment, they distance themselves from other forms of involvement. These citizens may be active<br />

within local activities such as volunteering for social organizations. This group is missing key<br />

competencies to keep up to date on developments within society and they have to build on the<br />

experience of local governments.<br />

The third style, called ‘pragmatic’, is a large group in Dutch society. They are not directly involved nor feel<br />

responsible, show a selective reactive attitude and they prefer information in main points which are easy<br />

and straightforward to understand. They expect (local) governmental bodies to perform according to a<br />

predetermined framework and do their work in the background (Motivaction 2001).<br />

The last style, called ‘society critics’, is described as having the most involved and responsible attitude<br />

towards the society. The group is characterized by initiative and participative activities and an open<br />

attitude with interest in the democratic process of (local) government. This group of citizens is particularly<br />

interested in the functioning of government bodies, such as financial prognoses and elected management<br />

functions (Motivaction 2001).<br />

3. Results<br />

3.1 The number of democratic issues<br />

Over a period of three years the city of The Hague had 1834 issues on the agenda’s of both city council<br />

and committees. This follows from a meeting frequency with city council meetings every three weeks and<br />

two committees meetings every week.<br />

Of the 1834 issues counted 31% were treated by the city council and 69% by its committees. If we look at<br />

the issues we notice that 1266 issues were treated by the committees and could be divided into seven<br />

topics, roughly following the structure of working committees displayed in table 2.<br />

Table 2: number of issues and committees<br />

79 accounts / process<br />

132 mobility and environment<br />

254 safety, governance and finances<br />

107 social affairs, employment, economics and international affairs<br />

395 urban development<br />

116 welfare development<br />

183 youth and citizenship<br />

In corporation with the office of the clerk we were categorize 67% of the 1834 issues according to a<br />

phase in the policy cycle. 227 issues were marked a phase ‘0’ because they were identified as internal<br />

and procedural and I) of little interest to those outside the municipal organization and II) the policy making<br />

phases offer no functionality.<br />

401


Bert Mulder and Martijn Hartog<br />

Some issues on the agenda could be categorized in two or more phases at the same time, for example<br />

when they may be interpreted as creating new policy as well as contributing to the effectiveness of<br />

existing policy. That way they would fir the preparation as well as evaluation phases. Such the double or<br />

triple appearances are divided proportionally over their different phases as detailed in table 3.<br />

Table 3: Policy making phases and number of issues<br />

Number of issues according combined phases<br />

Phases # 1/2 2/3 2/5 2/5/6 3/5 4/5 5/6<br />

Agenda-setting (phase 1) 95 58<br />

Preparation (phase2) 597 58 118 16 125<br />

Determination (phase 3) 177 118 2<br />

Execution (phase 4) 20 2<br />

Evaluation (phase 5) 176 16 125 2 1 21<br />

Monitoring (phase 6) 158 125 21<br />

After categorization the differences are clear: most issues that might benefit from citizen’s participation<br />

are found in the preparation, the determination and the evaluation phases.<br />

3.2 Determining citizen interest in policy and preference for issues<br />

Using questionnaires, Motivaction determined how the four different citizenship styles - outsiders, dutiful,<br />

pragmatic and society critic - were present within the population of The Hague. This research does not<br />

only show the number of people characterized by each of the different lifestyles, but it will in fact allow us<br />

to determine which part of the population might be interested in democratic participation and on which<br />

topics.<br />

The research shows a marked difference between the population of The Hague and that of the rest of<br />

The Netherlands in table 4.<br />

Table 4: Styles of citizenship The Hague compared with The Netherlands (Motivaction 2005)<br />

Style of citizenship The Netherlands The Hague Population<br />

Outsiders 36% 32% 144.000<br />

Dutiful 21% 7% 31.500<br />

Pragmatic 24% 35% 157.500<br />

Society critic 19% 26% 117.000<br />

The city of The Hague shows a more prominent group of pragmatic (24%) and society critic citizens<br />

(19%) than other parts of The Netherlands. These groups have an individual attitude, are well informed,<br />

are used to expressing their opinions and stand their ground on such issues. They also want to co-decide<br />

with the (local) government. The pragmatic group has a more distanced attitude and is mostly concerned<br />

with its grounds. The society critic group is politically active and also stands for social ground. The groups<br />

named outsiders and dutiful are relatively outnumbered and represent themselves as family orientated<br />

and less socially concerned. Dutiful take a more docile approach towards the government, while<br />

outsiders stay distanced. Due to the large distance of the ‘outsider’ style to the democratic process, they<br />

are assumed to be fully disinterested and do not play a further role. To determine what part of the<br />

population might be interested in what kind of democratic participation we categorized the democratic<br />

issues on the agenda according to the qualities of the different styles of citizenship. The result may be<br />

seen in the table 5. With both the number of citizens for a lifestyle and democratic issues, we can infer<br />

the number of citizens with a probable interest in those issues.<br />

Table 5: Styles of citizenship and issues<br />

Lifestyle Percentage Population Issues Issues<br />

3 yr 1 yr<br />

Outsiders 32% xxx.xxx x x<br />

Dutiful 7% 31.500 218 73<br />

Pragmatic 35% 157.500 243 81<br />

Society critic 26% 117.700 540 180<br />

Total 450.000 1001 334<br />

402


Bert Mulder and Martijn Hartog<br />

This shows that when a city like The Hague wants to provide digital support for eDemocracy it will mean<br />

providing that support for around 330 policy issues each year. Of the total population of 450.000 people,<br />

around 275.000 citizens would be interested in participating, being a member of either the pragmatic of<br />

the society critic styles of citizenship.<br />

4. Concluding observations and further directions<br />

With this research we address eDemocracy from a different angle. We focus on the broad and structural<br />

support of digital democratic processes in the future. Rather than researching available new technologies<br />

we look at democratic processes in real life: how many democratic issues does it take to run a city and<br />

how many of its citizens would be interested? And as a consequence: what would it take for local<br />

governments to start supporting that in the coming years?<br />

The results of this initial exploratory research show that a Dutch city with a population of around 450.000<br />

inhabitants handles approximately 300 democratic issues per annum. In the case of the broad adoption<br />

of eDemocracy with full digital support for current democratic activities that would mean setting up and<br />

maintaining approximately 300 democratic dialogues online. Such digital support might allow citizens to<br />

inform themselves, reflect on and participate in the democratic process. That reality of maintaining 300<br />

online democratic dialogues could turn out to be quite an effort. In its simplest form it implies the<br />

necessity for supportive document management systems, appropriate meta data and appropriate forms<br />

of presentation. Though simple in concept, in reality each of these aspects is a challenge: we would need<br />

to develop a consistent online representation of political issues, including its financial aspects. These do<br />

not exist today. In its most complex form online case files would be enriched with news and background<br />

information, communities and forums and special applications that solicit advice from interested parties.<br />

In that form such online case files would require constant attention from a new breed of professionals that<br />

is able to inspire, maintain and structure a complex set of interactions on many different levels such that<br />

the contributions of the audience provide a constructive addition to the existing process.<br />

All this would be worth it if enough citizens would be interested. Using lifestyle research as an angle to<br />

gauge possible interest shows that around 275.000 or 60% of this city’s inhabitants might be interested in<br />

participating on some of these issues. They might be interested: it wouldn’t mean they actually would be<br />

interested. This research also revealed a marked difference between the population of The Hague (the<br />

seat of government, parliament and many other international organizations) and the general population,<br />

which might indicate that democratic participation is sensitive in its context and would have to be<br />

determined in each city again. It also provided the initial view of the size and scope of digital support for<br />

democratic processes online.<br />

The aim of our research is the creation of practical support for local governmental bodies, creating a<br />

model allowing municipalities to assess the investment necessary to realize digital support for<br />

eDemocracy. Such a model might balance on two aspects: operational en democratic.<br />

Firstly, since we are interested in questions of implementation we would pay attention to the operational<br />

complexity of implementing online support for democratic issues. Operational complexity may identify<br />

both the technical and procedural effort required to realize digital support for democratic issues. It may<br />

seem odd to have operational issues as a main element in deciding the quality of democratic support, but<br />

creating true digital support for eDemocracy may be technically complex requiring the replacement of<br />

current IT systems and web environments, and might even need preliminary research to create the<br />

solutions necessary. The time and money required by that process determines the pace of adoption of edemocratic<br />

support.<br />

Low operational complexity might consist of issues that may be supported by a small number of existing<br />

documents, delivered from existing information systems. High operational complexity might consist of<br />

issues needing to be supported by live coverage or meetings with meta data, crowd sourcing, intensive<br />

dialogues with the population, e-petitions or even voting. These would require extensive investment in<br />

research and testing before being able to be used routinely.<br />

Secondly, we need to assess the democratic necessity of creating online support for issues. This is<br />

determined by size, procedural constraints and importance for individual citizens or politics. On the one<br />

hand democracy consists of many rather inconsequential issues with relatively low interest and<br />

involvement, while on the other end it has issues which are high visibility, high importance and high<br />

involvement.<br />

403


Bert Mulder and Martijn Hartog<br />

This might lead to a matrix that, when filled, allows us to decide whether and how we may prioritize the<br />

implementation of digital support for eDemocracy.<br />

The figure below displays the matrix.<br />

Figure 1: Matrix to prioritize the implementation of digital support for eDemocracy<br />

The broad and structural implementation of eDemocracy is not a simple matter. Further research will<br />

need to determine what kind of support is suitable for what issue, how e-democratic case files should be<br />

represented online to achieve the most effective participation, how a collaborative decision making<br />

process could be supported for larger audiences and how the financial structure of underlying issues<br />

should be visualized to be understandable. Such research may show the many different tools we may<br />

need to really support eDemocracy on a larger scale and allow government professionals to make a<br />

reasonable decision how to develop the systems and tools needed to realize that.<br />

References<br />

Al-Hashmi, A. & Darem, A.B. (2008) Understanding Phases of EGovernment Project, in: Sahu, G.P. (ed) Emerging<br />

technologies in eGovernment, from http://www.csi-sigegov.org/emerging_pdf/17_152-157.pdf (retrieved, 5 May<br />

2010)<br />

Codagnone, C. & Wimmer, M.A. (2007) Roadmapping eGovernment research, vision and measures towards<br />

innovative governments in 2020, results from the Project egovRTD2020. eGovRTD2020 Project Consortium,<br />

2007, from http://www.egovrtd2020.org/EGOVRTD2020/FinalBook.pdf (retrieved, 5 May 2010)<br />

Bovens, M.A.P., ’t Hart, P. & van Twist, M.J.W. (2007) Openbaar Bestuur: beleid, organisatie en politiek [Public<br />

Management: policy, organisation and politics], Kluwer, Alphen aan den Rijn<br />

Cascadis (2007) Benchmark Nederlandse Gemeenten in de elektronische overheid [Benchmark Dutch Municipalities<br />

as electronic government], Apeldoorn<br />

Derksen, W. & Schaap, L. (2007) Lokaal Bestuur [Local Government], Reed Business, The Hague<br />

Edelenbos, J. & Monnikhof, R. (2001) Lokale interactieve beleidsvorming: een vergelijkend onderzoek naar de<br />

consequenties van interactieve beleidsvomring voor het functioneren van de lokale democratie [Interactive local<br />

policy making: a comparative research for the consequences of interactive policy making in the functionality of<br />

the local democracy], Lemma, Utrecht<br />

Gartner Research (2003) Traditional ROI Measures Will Fail in Government, from<br />

http://www.gartner.com/DisplayDocument?doc_cd=116131 (retrieved, 5 May 2010)<br />

Herweijer, M. & Pröpper, I.M.A.M. (2008) Overheidsbeleid: een inleiding in de beleidswetenschap, burgers in het<br />

beleidsproces [Governmental policy: an introduction in the science of policy, citizens in the policy making<br />

process], Kluwer, Alphen aan den Rijn<br />

404


Bert Mulder and Martijn Hartog<br />

IBM Business Consulting Services (2003) How eGovernment are you? EGovernment in France: State of play and<br />

perspectives, from http://www-935.ibm.com/services/au/igs/pdf/g510-3552-00-esr-eGovernment.pdf (retrieved,<br />

5 May 2010)<br />

Janssen, M. & Van Veenstra, A.F. (2005), ‘Stages of Growth in eGovernment: An Architectural Approach’, The<br />

Electronic Journal of eGovernment, Vol. 3, no. 4, pp. 193-200<br />

Layne, K., & Lee, J. (2001), ‘Developing fully functional EGovernment: A four stage model’, Government Information<br />

Quarterly, vol. 18, pp. 122 -136<br />

Motivaction (2001) Burgerschpasstijlen en overheidscommunicatie, in opdracht van de Commissie Toekomst<br />

Overheidscommunicatie [Styles of citizenship and governmental communication, in assignment of the<br />

Committee of Future Governmental communication], Amsterdam<br />

Motivaction (2005) Gemeente Den Haag: Burgerschapsstijlen in Den Haag [Municipality The Hague: styles of<br />

citizenship within The Hague], Amsterdam<br />

Municipality The Hague (2006) Beleidsakkoord gemeente Den Haag 2006-2010 [Policy agreement of The Hague<br />

2006-2010], The Hague<br />

Peeters, N. (2002) Interne audit en ombudsfunctie in de gemeente: een vergelijking [Internal audit and the function of<br />

the Parliamentary Commissioner in the municipality: a comparison], University of Antwerp, Antwerpen<br />

Pröpper, I. & Steenbeek, D. (1999) De aanpak van interactief beleid: elke situatie is anders [The approach of<br />

interactive policy: every situation is different], Coutinho, Bussum<br />

United Nations Division for Public Economics and Public Administration (2001) Benchmarking Egovernment: A<br />

Global Perspective - Assessing the Progress of the UN Member States, from<br />

http://unpan1.un.org/intradoc/groups/public/documents/ un/unpan021547.pdf (retrieved, 5 May 2010)<br />

Vernieuwingsimpuls dualisme en lokale democratie [Renewal impulse dualism and local democracy] (2006)<br />

Handreiking commissies in het dualistische stelsel [Manual committees in dualistic system], The Hague, from<br />

http://actieprogrammalokaalbestuur.nl/book/export/html/2602 (retrieved, 4 April 2010)<br />

405


Channel Shift - a UK Customer Response<br />

Darren Mundy 1 , Qasim Umer 1 and Alastair Foster 2<br />

1 University of Hull, Scarborough, UK<br />

2 Independent Researcher, UK<br />

d.mundy@hull.ac.uk<br />

q.umer@2008.hull.ac.uk<br />

alifozzy@hotmail.com<br />

Abstract: This paper details the findings from a project carried out on behalf of a group of local councils in the UK to<br />

discover scope for channel shift (i.e. migrating users from mediated to self-help solutions) within local services. The<br />

project consisted of four clear stages: identification of scope from service managers; discovery of case study<br />

examples from councils within the UK; an investigation of customer perspectives on channel shift linked to particular<br />

areas of service; and, finally a framework to establish a business case for introducing new channels to identified<br />

government services. The first stage of the project demonstrated that there is no shortage of ideas in relation to the<br />

potential that individual services have for channel shift. Customer Service Managers identified a range of<br />

independent areas worth exploration from basic reporting linked to customers in the local area, through automation of<br />

benefits services, to online services to support waste and recycling management. Whilst individual areas where<br />

benefit could occur were identified it was also clear that data may not be easily accessible to support a case for the<br />

provision of new channels. The areas highlighted by the initial stage of the project formed the basis for exploration at<br />

the second stage in identifying thirteen case studies linked to channel shift from a range of different levels of<br />

government and a private organisation. A brief description of a couple of these studies is provided in this paper along<br />

with key lessons learnt. The third stage of the project enabled analysis of the customer views towards channel shift.<br />

This stage illustrated a number of critical observations found within local customer groups through a detailed<br />

questionnaire and location based canvassing (n=197 customers). The first observation is that there is a sub-set of<br />

the local customer group who access council services that are not equipped in knowledge, equipment or in terms of<br />

motivation for access to channels other than face-to-face and telephone. Indeed some customers in this group see<br />

channel shift as potentially discriminatory. Secondly, whilst the findings do not establish a substantial demand for<br />

channel shift in relation to council services, many of those questioned recognised that provision of council services<br />

through more cost effective channels was a good thing (for other people), or in the case of web access was<br />

inevitable. Thirdly, it is clear that at present the most valuable service offered on the web by local government is<br />

access to local information. Finally a Business Case Template is presented which is derived from the findings of all of<br />

the stages above. This is designed to enable the evaluation of requests for service channel growth with critical<br />

examination of potential success factors for shift of government services. Overall, local government around the<br />

country is investing in channel shift, it is clear that not all of these ventures are meeting with success, however, if full<br />

consideration is given to the business case for channel shift and time is taken to understand and target customer<br />

groups successful channel shift can be achieved.<br />

Keywords: eGovernment, channel shift, transformational government, citizen requirements, e-services<br />

1. Introduction<br />

With the global economic downturn has come a wave of austerity measures in national and international<br />

public services expenditure. In this context, the UK government has recently announced 7.1% of cuts per<br />

year in funding allocation to regional and local government (Her Majesty’s Government, 2010). This<br />

translates to a loss of 27% of funding over 4 years. Therefore the present focus is to look at ways in<br />

which to increase efficiency in government expenditure. One of the ways that is continually lauded, is to<br />

take advantage of the web in the delivery of public services, primarily because “the cost ... (is)<br />

approximately one-tenth the cost of a contact by telephone” (Socitm Consulting, 2010). However,<br />

managers within government organisations face questions of, whether reduced costs are myth or reality,<br />

and whether or not the addition of web based functionality will work for them.<br />

Channel shift has been defined as “the design and marketing of effective and efficient channels because<br />

they are the most appropriate channel for the type of contact, customer and organisation….” (Simon<br />

Pollock, Head of Customer Services at Surrey County Council, as quoted in Public Networks, 2010).<br />

Channel shift is not simply limited to the transformation of service to take advantage of technology such<br />

as the World Wide Web but instead should involve a comprehensive strategic evaluation of the most<br />

appropriate approaches for the delivery of service. The evaluation of the most appropriate channel can<br />

obviously be quite complex but will generally come down to a balance of metrics such as cost, quality of<br />

service, access and demand.<br />

This paper reports on the findings of a short research consultancy project delivered by academics within<br />

the University of Hull for a partnership of nine UK councils and other public service bodies. The aim of the<br />

406


Darren Mundy et al.<br />

project was to explore moving services from one-to-one or telephone based interaction to self-help web<br />

based channels. This ‘channel shift’ project was designed to consist of four clear stages: identification of<br />

the potential for channel shift from within partner councils; analysis of the impact of channel shift from<br />

within local governance case study scenarios; an investigation of customer perspectives on channel shift<br />

linked to particular areas of service; and, finally a framework to establish a business case for introducing<br />

new channels to identified services within government areas. This papers contribution is in detailing the<br />

outcomes of the four stages and in presenting a new framework for the strategic planning of switching<br />

public modes of access to council services.<br />

2. The project problem and literature review<br />

In July 2010, a short research project (funded by a partnership of nine UK councils) commenced focused<br />

on exploring the potential for the transition of a variety of eGovernment services to self-help web based<br />

channels. Motivation for the project came from questions being asked by managers of customer focused<br />

council services around the benefits/limitations of moving services to the web, and the need to gather an<br />

understanding of best practice in relation to transformation of services. To understand the issues and<br />

provide some answers to the questions being asked it was thought a four stage process would be of<br />

benefit. In the first stage the scope for channel shift would be evaluated from within, therefore time would<br />

be taken to understand a number of internal stakeholder views on the potential for channel shift within<br />

governmental services. This would be followed by a detailed exploration of literature relating to<br />

successful and unsuccessful channel shift in private and public sector environments. This case study<br />

material would provide the partner organisations with an understanding as to what has been successfully<br />

translated in the past and give some examples of best practice. In the third stage of the project, the<br />

research would focus on the customer and trying to understand customer perspectives on channel shift in<br />

relation to governmental services, taking into account the nuances of some customer responses to shifts<br />

of service provision. Finally, from the results of each of the stages, there was a requirement to establish a<br />

mechanism to enable better evaluation of service potential for channel shift. The form of this evaluation<br />

mechanism was established as a business case template for service transition.<br />

Looking towards related research to the project described within this paper we find that the research<br />

essentially can be categorised into three sections. The first section being analysing and understanding<br />

perspectives on channel shift from within government and from citizens. The second being the research<br />

of barriers to shifting services to self-help web content. Finally, the identification of best practice case<br />

examples of shifts of service provision.<br />

As outlined in Transformation Government published in 2005, there is a clear need in governmental<br />

organisations to focus not just on the provision of appropriate channels for delivery but also re-evaluation<br />

of processes to put the customer at the heart of online services (Cabinet Office, 2005). This was followed<br />

by David Varney’s book “Service Transformation – A better service for citizens and businesses, a better<br />

deal for the taxpayer” (Varney, 2006) in 2006 outlining the clear case for the transformation of<br />

government services to take account of other channels of delivery. Since these publications, researchers<br />

such as Pumphrey (Pumphrey, 2006) have concentrated on developing guidance for successful channel<br />

migration. For example, Pumphrey suggests in his paper “golden rules for formulating future channel<br />

strategies in consumer-facing organizations in both commercial and public sectors”. These rules are<br />

developed from Pumphrey’s experience in implementing online services for public private sector<br />

organisations and from identified best practice. Organisations such as Socitm (see<br />

http://www.socitm.gov.uk/) produce a wide range of consultancy papers focused on developing strategies<br />

for channel shift, for example (Socitm Consulting, 2010). In addition governmental guidance in relation to<br />

shifting of governmental services including planning for channel shift (Cabinet Office, 2010) is also<br />

available. These papers, associated events and workshops provide targeted support for government<br />

service managers to understand how channel shift can best work for them.<br />

In relation to the identification of barriers in the shifting of service delivery, Kernaghan (Kernaghan, K,<br />

2005) suggests that there are “four major categories of barriers to integrated service delivery (these) are<br />

political/legal, structural, operational/managerial and cultural ones”. He suggests that successful services<br />

are generally seamless in operation between front and back end systems, helping government leverage<br />

efficiencies and helping customers also gain advantages. There are also papers discussing issues such<br />

as marketing practice of public online services (Apicella and Streatfeild, 2010).<br />

The identification of best practice case examples of shifts of service provision formed part of the research<br />

conducted for this project. This is detailed within section 4 of this report.<br />

407


Darren Mundy et al.<br />

3. Scope for channel shift in local government<br />

To establish an understanding of the potential scope for channel shift within government organisations<br />

the project started with a workshop for customer service managers. The workshop provided an<br />

opportunity to collect qualitative perspectives about which services had the most potential for a shift of<br />

service provision. To begin with the workshop outlined a short explanation of the channel shift project and<br />

some brief case study material related to channel shift. It then moved on to outline some of the issues<br />

needing discussion and identification in relation to the scope for specific services to shift channels.<br />

Following this an activity took place focused on identifying council services that attendees felt were<br />

appropriate for exploration, in relation to, shifting some of the present interaction between customers and<br />

the services to self-help web based channels. Some of the services identified were:<br />

Benefits Services<br />

Leaflet Provision and online information regarding access to services<br />

Licensing and Planning Applications<br />

Parking (including Parking Permits and the Blue Badge process)<br />

Reporting<br />

For each of the services identified by the Customer Services Managers time was taken to outline the<br />

expected benefits and issues associated with adopting them to being provided over other more cost<br />

efficient channels. Further services were explored in relation to the perceived complexity of transactions<br />

conducted and transaction cycles. Finally, the potential impact of transformation of services was<br />

discussed.<br />

The first stage of the project demonstrated that there is no shortage of ideas in relation to the potential<br />

that individual services have for channel shift. Customer Service Managers identified a range of<br />

independent areas worth exploration (as noted above) from basic reporting linked to customers in the<br />

local area, through automation of benefits services, to online services to support waste and recycling<br />

management. Whilst individual areas where benefit could occur were identified it was also clear that data<br />

may not be easily accessible to support a case for the provision of new channels.<br />

4. Case study examples of channel shift success<br />

After analysing the scope for the potential shift of governmental services to self-help services, the<br />

research focus shifted to the identification of case studies linked to the previously identified services. The<br />

case studies were identified through desk research identifying through available literature best practice<br />

examples (and some poor examples) of successful channel migration. Thirteen case studies were<br />

identified through the project; in the paragraphs below we outline three of the identified services and<br />

findings from related case studies.<br />

Reporting services are mainly concerned with citizens informing council operatives regarding poor<br />

services (e.g. damaged roads) or other problems within their neighbourhood (anti-social behaviour).<br />

Waste and environmental services are one of the most important council and getting more significant with<br />

the increasing trend of recycling. Different councils have employed a shift of delivery channel for<br />

reporting. For example, South Tyneside Council shifted its main reporting mechanism to the internet in<br />

2008 (Astun Technology, 2009) (see http://my.southtyneside.info/). This resulted in increases in the<br />

number of transactions (from 203 to 2873) coupled with a reduction in cost (from £2.97 to £1.25). The<br />

council gained 2000 new subscribers to this service in 2009. Subscriptions keep subscribers updated<br />

about the services and anything new going on around them. Another council which has experimented<br />

with electronic reporting are, Tameside Council. In 2008, they started using email related to waste and<br />

recycling (Experian, 2009). Tameside Council also provides a form based system for the customer<br />

registration of council services such as bulky waste collection allowing residents to report anything such<br />

as abandoned cars and fly tipping.<br />

Case studies were also identified relating to the availability of online information instead of print leaflets<br />

(Department for Work and Pensions, 2006)( Kirklees Metropolitan Council, n.d.). For example, Kirklees<br />

Council have adopted a web based multi directional communications system to aid with citizen<br />

interaction. The system uses a low cost SMS service to enable council-citizen and citizen council<br />

messaging. People register with the service and text key words about the information that they want.<br />

Reponses to their information requests are sent to their phones in response. This service has been used<br />

to provide a mechanism for engaging young people with council services providing information about<br />

408


Darren Mundy et al.<br />

events happening in the region and information regarding entitlements to benefits etc... In addition, the<br />

system has also been used to help communication between the council and those in debt arrears from<br />

rental accommodation (with the levels of response from tenants in arrears increasing by 85%) and to<br />

provide a communication system for the deaf community.<br />

Benefits services in the UK include items such as housing benefits, job seekers allowance, free school<br />

meals and clothing grants, etc. Different councils are taking advantage of channel shift in giving benefit<br />

services to citizens in various ways. For example, Tameside Council has introduced a system of online<br />

application for child related benefits (PublicTechnology.net, 2009). The online system focused initially on<br />

providing applicants with an online form for applying for school meals benefits. However, Tameside<br />

quickly realised the linkage between benefits schemes and introduced a mechanism for using single<br />

forms to apply for multiple benefits i.e. many of the individuals who claim for certain benefits are also<br />

entitled to other benefits e.g. in this case school clothing grants. Instant decisions are provided to the<br />

customer on their entitlement, with the web system carrying out the validation of data entered and<br />

checking benefit entitlements. It is estimated the system has reduced the number of transactions for the<br />

service by 40,000 and reduced the majority of transaction costs to 6p. Dundee City Council has also used<br />

a single application form for access to benefit services with integration to back end systems. The system<br />

pre-fills in form information for benefits claimers on an annual basis, without the need to re-visit the<br />

council or re-submit proof of eligibility. Calculations are performed and payments are directly made to the<br />

customers’ account.<br />

The vast majority of case studies identified involved the introduction of targeted systems which have<br />

combined in linking back office to front end services. It is also evident from the material publicly available<br />

on the web that there is a lack of reporting on the fundamental benefits of transformation in the move to<br />

online services. Taking into account documents such as the Channel Strategy Guidance (Cabinet Office,<br />

2010) and Citizen Service Transformation (CSTransform, 2010), it is clear that at the heart of a<br />

successful transformation is an understanding of information such as present channel strategy, cost per<br />

transaction, customer satisfaction and potential scope for savings. Key lessons learnt from the case<br />

studies include:<br />

The need to clearly target the service or part of service for channel shift.<br />

To think clearly about the marketing strategy including segmentation of customer groups.<br />

Take time establishing key performance indicators which can be used to support a case for channel<br />

shift and to evaluate success.<br />

That channel shift can reduce costs and a proportion of customers are willing to move but it will not<br />

replace frontline services.<br />

5. Investigation of customer perspectives on channel shift<br />

The third stage of the project enabled analysis of customer views towards migration of council services to<br />

self-help web based channels. Customer views were captured through the design and use of a multi-part<br />

questionnaire. The multi-part questionnaire essentially covered a range of generic information related to<br />

access to council services, web access and future access; captured information from leisure users about<br />

potential for channel shift; captured information from tourists about potential for channel shift and<br />

captured information from residents about potential for channel shift across a range of services. 197<br />

Individuals were questioned across six town centre locations on three separate days from nine in the<br />

morning until five in the evening. There are limitations of the survey related to location (attracting sub-sets<br />

of council customers), timing (limits sample respondent group reducing the number of employed<br />

individuals surveyed) and to the methods of collection (some individuals will not respond to the survey<br />

method chosen). However, the survey provides a selection of customer responses to service transition.<br />

The main findings from the survey are outlined below, however, access to the full report and findings can<br />

be requested from the author (Mundy and Foster, 2010).<br />

Observation 1: Whilst there may be an economic imperative to switch service provision to web based<br />

self-help services there are some major problems. The results of the survey suggest that there is a subset<br />

of the local customer group who access council services that are not equipped in knowledge,<br />

equipment or in terms of motivation for access to channels other than face-to-face and telephone. 46% of<br />

survey participants reported never having accessed council web pages. A wide range of barriers to<br />

access were stated, however, 69 % of those sampled who had infrequent or no access to council pages<br />

409


Darren Mundy et al.<br />

cited either a lack of a computer, lack of an Internet connection, lack of knowledge, lack of interest or<br />

preference of the personal approach as their main barrier to council web page access.<br />

Observation 2: Whilst the findings do not establish a substantial demand for channel shift in relation to<br />

council services, many of those questioned recognised that provision of council services through more<br />

cost effective channels was a good thing (for other people), or in the case of web access was inevitable.<br />

In terms of the services residents would like to see online, parking attracted the largest interest (17%)<br />

followed by reporting and general information (each attracting 10%). Some citizen : council interactions<br />

(e.g. loss of job, death, disabilities, licensing, parking permits etc) can involve a lot of clarifications,<br />

clearances and paperwork. Although, the channel shifting of these services may be beneficial for some<br />

customers groups there are associated risks, for example, privacy and security (as illustrated by<br />

customer comments, “I don’t like filling in forms online, I feel uncomfortable” and the description of online<br />

services as a “total invasion of privacy”) and fraudulent claims. Government organisations are sometimes<br />

reluctant to deal with these issues in the ways they can be dealt with by private enterprise (e.g. through<br />

customer log-in) because of the associated potential for ‘big brother’ related issues. In addition there are<br />

financial issues regarding the need to properly link front end and back end operations.<br />

Observation 3: It is clear that at present the most valuable service offered on the web by local<br />

government is access to local information. Of the 58% of citizens surveyed who accessed council web<br />

pages 35% suggested their main reason of use was to find out local information (interestingly fo some<br />

this was the telephone number of particular services). Local government procedures and policies relating<br />

to delivered services can sometimes be difficult to gather and understand. Individuals requiring this<br />

information generally have to visit council offices or book appointments with advisors to guide them to<br />

more detailed information about these processes. For example, bus timetables, council tax rates,<br />

recycling information, and helpline and security numbers, etc. Availability of this information online can<br />

reduce these visits substantially.<br />

Observation 4: Some current eGovernment services have not necessarily delivered a standard of service<br />

commensurate with the standard delivered previously. Taking an example, negative views were<br />

expressed regarding the provision of service in place for online planning applications. At present there<br />

are concerns over the reporting of planning permission status using the online system. Customers<br />

enquire about the status of planning applications through the site and sometimes the online system can<br />

present an inaccurate understanding of planning permission status e.g. at the top level of the site it can<br />

state rejection, but only when examined in detail at lower levels might you find that the application had<br />

been accepted on appeal. Of critical importance is, services when delivered through different channels<br />

should take advantage of the channel in order to improve the service. Comments about the provision of<br />

forms to complete and physically take into council facilities don’t promote a reason to ‘Do It Online’.<br />

6. Developing a framework for service assessment<br />

The final stage of the research project involved drawing together the research findings from scoping the<br />

potential for channel shift, investigating successful channel shift case studies and investigating customer<br />

perspective on channel shift. As noted in the introduction research shows that at present approaches to<br />

channel shift within governmental organisations do not generally go through a substantial planning<br />

process. Therefore there is a need to suggest a comprehensive strategy for assessing the potential for<br />

successful channel shift. The final output of this project is in the outlining of a business case template for<br />

channel shift.<br />

The business case template (Mundy and Foster, 2010) involved the analysis of requirements, issues and<br />

concerns extracted from the project’s research findings. Drawn out from this analysis was a range of key<br />

criteria to enable evaluation when judging whether a service is or is not appropriate for channel shift.<br />

These key criteria are detailed in table 1.<br />

Once these key criteria had been identified questions relating to them were categorised and organised<br />

into a business case template document requesting information from the proposer of a channel shift<br />

project. The aim of this was to enable evaluation of the potential impact of new channels so that<br />

decisions can be made about potential success.<br />

410


Table 1: Key criteria<br />

Benefits to the<br />

Customer<br />

Benefits to the Council<br />

Complexity<br />

Cost and Savings<br />

Customer Demand<br />

Service Integration<br />

7. Conclusions and further work<br />

Darren Mundy et al.<br />

The provision of additional channels does not necessarily indicate a benefit to the<br />

customer. Web based access has the potential to streamline processes and provide<br />

other more substantial benefits to the customer rather than the simple creation of an<br />

extra channel. Benefits can lead to shifts in usage when customers realise there are<br />

added benefits to web based service over other forms of access they may perceive to<br />

be easier (e.g. picking up the phone).<br />

Potential benefits to the council from the provision of extra channels should not be<br />

ignored. However, these benefits must be balanced against the other factors given<br />

that members of the public are unlikely to move to a different channel for the sole<br />

benefit of increased council efficiencies. As has been evidenced elsewhere<br />

mechanisms for public change may come in the form of simplified service offerings or<br />

by passing on the cost of channel interaction to the customer.<br />

In simple terms services can be informational, transactional or provide mechanisms<br />

for customer interaction, they also all contain varying degrees of complexity. Even<br />

what may seem the simplest service may relate to a complex system e.g. in relation to<br />

leisure centre bookings an existing culture (i.e. a group always books on Fridays) may<br />

impact on an online booking system. The complexity of the service requires evaluation<br />

of the potential impact on its customer groups. As mentioned previously extra<br />

channels may provide the potential to streamline individual processes. A final thing to<br />

consider in relation to complexity is the service and its relationship to other services,<br />

potentially providing a mechanism to join up services and provide simplified combined<br />

processes for the customer.<br />

Detailed understanding of cost to serve and use of service provides a mechanism to<br />

evaluate the potential impact of extra channel provision. When this is coupled with<br />

projections about growth in web usage over time, this can provide an understanding of<br />

the potential savings from the shift of service.<br />

As evidenced within the case studies and through the primary research, it is important<br />

to understand the customer base for particular services. If the customer base is such<br />

that there is substantial potential for channel shift (and growth in use of service) then<br />

this could represent potential future savings. However, if the customer base has<br />

limited access or knowledge at present then the costs may be far greater than the<br />

benefits.<br />

There is limited benefit to providing additional front end channels if these channels do<br />

not lead to back end savings. Additional front end channels without integration lead to<br />

continued costs as front end service staff are required to pass messages on and<br />

respond in similar ways to present face to face or telephone contact.<br />

The current austerity drives within the public sector are driving a growing imperative to reduce the costs<br />

per transaction in the delivery of government services. With this pressure comes a risk of simply adding<br />

channels without fully considering the financial impact and potential benefits to local customer groups.<br />

From the research conducted for this project come a number of simple steps forward towards the<br />

successful shift of delivery channel.<br />

1. Selecting services which will provide the greatest impact both in terms of finances and customer<br />

service will lead to a growing confidence in local council online services. Once chosen these services<br />

need to be easy to use and add value to the user experience as noted by a number of customers, many<br />

still it easier to pick up the phone than access online services.<br />

2. Understand the cost of service and potential costs of service across different channels.<br />

3. One of the main problems identified within this research is the requirement to understand nuances with<br />

individual systems. The better online services will provide personalised and customised information which<br />

helps the customer deal with this feeling that face-to-face or phone call engagement with service staff will<br />

provide them with more tailored information. Facilities such as online archiving of forms requiring annual<br />

completion and simple collection of only update information are examples of how online systems can be<br />

designed to make particular tasks much easier for the average customer to complete.<br />

4. Taking time to understand different elements of the customer groups which engage with particular<br />

services can lead to more targeted marketing strategies in relation to promote engagement with new<br />

channel services. These strategies may not cost substantial amounts.<br />

411


Darren Mundy et al.<br />

5. Successful channel shift comes through integration of services. Automated channels have the potential<br />

to bring clear efficiencies to process, however, they need to be linked directly to back-end systems. An<br />

absence of integration can lead simply to additional tasks for front end customer service staff to handle.<br />

Follow on work from the work presented within this research paper, will centre around the use of the<br />

developed business case template in practice, to evaluate its potential for providing clarity over the<br />

potential for channel shift success. In addition, more can be learnt from better understanding current<br />

successful case studies of eGovernment channel shift to better understand strategies for success and<br />

failure.<br />

References<br />

Apicella, S and Streatfeild, N. (2010), Direct, database and digital marketing practice in the government sector: Black<br />

hole or parallel universe?, Journal of Direct, Data and Digital Marketing Practice, 11, 302–316<br />

Astun Technology, (2009): GI Data Integration and Publishing - the evolution of a platform,<br />

(Accessed 12.01.11).<br />

Cabinet Office, 2005, “Transformational government enabled by Technology”, Cabinet Office publications, <br />

(accessed 12.01.11)<br />

Cabinet Office, (2010): Channel Strategy Guidance, <br />

(Accessed 12.01.11).<br />

CSTransform, (2010): Citizen Service Transformation: A manifesto for change in the delivery of public services, <<br />

http://www.cstransform.com/white_papers/CitizenServiceTransformationV1.pdf> (Accessed 12.1.11).<br />

Department for Work and Pensions, (2006): Using leaflets to communicate with the public about services and<br />

entitlements, (Accessed<br />

12.01.11).<br />

Experian, (2009): Case study: Connecting with Communities and Customers Online,<br />

(Accessed 12.01.11).<br />

Her Majesty’s Government, (2010), Spending Review Statement, Her Majestys Government, http://www.hmtreasury.gov.uk/spend_sr2010_speech.htm<br />

(Accessed 12.1.11).<br />

Kernaghan, K. (2005):Moving towards the virtual state: integrating services and service channels for citizen-centred<br />

delivery, International Review of Administrative Sciences March 2005 vol. 71 no. 1 119-131<br />

Kirklees Metropolitan Council, (n.d): Text Messaging for Local Authorities,<br />

http://www.kirklees.gov.uk/business/consultations/itex/iTexOverviewAndCaseStudies.pdf (Accessed 12.01.11).<br />

Mundy, D. and Foster, A. (2010): Transforming Government Services: Channel Shifting – An exploration of moving<br />

services from mediated to self-help web based channels, Consultancy report, Available on request from author.<br />

PublicTechnology.net, (2009): Case study: Dundee City Council - Transforming the Free School Meals/School<br />

Clothing Grants Application Process, (Accessed 12.1.11).<br />

Pumphrey, S. (2006): "A vision for channel strategies", info, Vol. 8 Iss: 5, pp.56 - 66<br />

Socitm Consulting, (2010): Putting the web at the heart of your business, Socitm Consulting Report, available with<br />

subscription to Socitm.<br />

Varney, D, (2006): Service Transformation – A better service for citizens and businesses, a better deal for the<br />

taxpayer, Crown Copyright, ISBN: 0-11-840489-X<br />

412


eGovernment in Social and Economic Development: The<br />

Asymmetric Roles of Information, Institutionalization and<br />

Diffusion<br />

Bongani Ngwenya<br />

Solusi University, Zimbabwe<br />

ngwenyab@solusi.ac.zw<br />

nbongani@gmail.com<br />

Abstract: There are documented differences between the success and failure factors in the developed and<br />

developing countries with regard to the adoption and embracement of Openness in eGovernment practice models.<br />

This paper posits that eGovernment constitutes a critical context for social and economic development in both<br />

developed and developing countries. The paper also suggests that eGovernment encompasses more than just<br />

technology, that is, attempts to highlight the social and economic implications of changes that have occurred in<br />

recent years as a result of the transparency and accountability of government and how software usage can influence<br />

digital inclusion, trust and privacy and possible strategies to eliminate the digital divide by encouraging greater public<br />

and commercial use and re-use of government information through putting government data on the Web. In addition<br />

to leveraging economic development, eGovernment also helps to stream line government services to more social<br />

based values of inclusion and citizens participation, accessibility and power relationship ratios. Although<br />

eGovernment is not a new phenomenon in most developed countries such as the US, UK, Japan, most of the<br />

<strong>European</strong> countries and some developing countries in Asia and Africa which have already announced their Open<br />

Government Initiatives and data portals it also leads to greater information asymmetry among citizens and<br />

government and also, institutionalization and diffusion asymmetry of the practice of the current Openness in<br />

eGovernment models within developed and developing countries. Drawing on organizational decision-making<br />

research and following the explorative and grounded based research approach the findings of this research are that<br />

the information asymmetry between citizens and government and asymmetry in institutionalization and diffusion<br />

within developed and developing countries are widely attributed to socio-economic and political variations in<br />

developed and developing countries. Unless these differences are skill fully identified and accommodated as such<br />

into the development and use models, Openness in eGovernment efforts would not help achieve the social and<br />

economic development goals by both developed and developing countries.<br />

Keywords: eGovernment, institutionalization, diffusion, asymmetric roles, social and economic development<br />

1. Introduction<br />

eGovernment is about using the tools and systems made possible by Information and Communication<br />

Technology (ICTs) to provide better public services to citizens and business. ICTs are already widely<br />

used by government bodies, just as in enterprises, but eGovernment involves much more than just the<br />

tools (Ngwenya et al, 2010). Effective eGovernment involves rethinking organizations and processes, and<br />

changing behaviour so that public services are delivered more efficiently to the people who need to use<br />

them. Implemented well, eGovernment enables all citizens, enterprises and organizations to carry out<br />

their business with government more easily, more quickly and at lower cost (Reding, 2006). Differing<br />

characteristics of local environments, both infrastructural and socio-economic, have created a significant<br />

level of variation in the acceptance and growth of eGovernment in different regions of the world. This<br />

paper posits that eGovernment constitutes a critical context for social and economic development in both<br />

developed and developing countries. This paper also suggests that eGovernment encompasses more<br />

than just technology, that is, attempts to highlight the social and economic implications of changes that<br />

have occurred in recent years as a result of the transparency and accountability of government and how<br />

software usage can influence digital inclusion, trust and privacy and possible strategies to eliminate the<br />

digital divide by encouraging greater public and commercial use and re-use of government information<br />

through putting government data on the Web. There are documented differences between the success<br />

and failure factors in the developed and developing countries with regard to the adoption and<br />

embracement of Openness in eGovernment practice models. In addition to leveraging economic<br />

development, eGovernment also helps to stream line government services to more social based values<br />

of inclusion and citizens participation, accessibility and power relationship ratios.<br />

Although eGovernment is not a new phenomenon in most developed countries such as the US, UK,<br />

Japan, most of the <strong>European</strong> countries and some developing countries in Asia and Africa which have<br />

already announced their Open Government Initiatives and data portals it also leads to greater information<br />

asymmetry among citizens and government and also, institutionalization and diffusion asymmetry of the<br />

practice of the current openness in eGovernment models within developed and developing countries.<br />

413


Bongani Ngwenya<br />

Drawing on organizational decision-making research and following the explorative and grounded based<br />

research approach the findings of this research are that the information asymmetry between citizens and<br />

government and asymmetry in institutionalization and diffusion within developed and developing<br />

countries are widely attributed to socio-economic and political variations in developed and developing<br />

countries. Unless these differences are skill fully identified and accommodated as such into the<br />

development and use models, Openness in eGovernment efforts would not help achieve the social and<br />

economic development goals by both developed and developing countries.<br />

The author is proceeding in the following order of consideration, the author first examines some insights<br />

from the literature and conceptual framework. Following the discussion of the conceptual framework, a<br />

discussion of this explorative and grounded based research approach into information asymmetry<br />

between citizens and government and asymmetry in institutionalization and diffusion within developed<br />

and developing countries is done, based on comprehensive literature review and the interpretivist<br />

research conventions used in this study. The research methodology is outlined, followed by the analysis<br />

of the data, and discussion. Finally, the conclusions are drawn and suggestions for further future studies<br />

are made.<br />

2. Insights from the literature and conceptual framework<br />

2.1 The concept of eGovernment<br />

eGovernment involves the use of online information technologies by government agencies to provide<br />

services. eGovernment services are essentially concerned with the delivery of public services to citizens,<br />

employees, businesses, and government organizations through the use of information communication<br />

technology (ICT).Belanger and Hiller (2005) suggest three aspects of eGovernment, that is, Government<br />

to Individuals (G2Is) or Government to consumer (G2C).On the other hand, (Carter 2008) suggests<br />

Government to Business as a Citizen (G2BC) and Government to Business in the Marketplace<br />

(G2BMKT).Government to Individuals(G2Is) or Government to Consumer(G2C) takes public agencies to<br />

provide services to citizens such as issuance of national identity documents, drivers’ licenses, tax return<br />

applications, or obtaining passport via online, etc. Similarly, G2BC is involved with commercial<br />

transactions, such as institutional payment of taxes or fines by the commercial enterprises to public<br />

agencies. G2BMKT is concerned with the business transactions between government and businesses<br />

such as e-procurement, government hiring of contractors, and government acquisition of goods or<br />

services. The term “eGovernment” is a comprehensive term that is sometimes referred to as “on-line<br />

government” or “Internet-based government.” Dawes (2002) gives us a sense of the multidimensionality<br />

of the term when she states that it is “…the use of Internet technology to support government operations,<br />

engage citizens, and provide government services”. The first of these, government operations, primarily<br />

involves management practices that, although critical, are largely invisible to the public.<br />

Implementation of Internet technology in American state governments for example is taking place at a<br />

brisk pace. In his annual review of features available online in American federal and state websites, West<br />

(2007) documents changes that have occurred since he began his review in 2000. In 2000 only two<br />

percent of government sites offered three or more services online; in 2007 that figure was 58 percent. He<br />

notes that almost all sites now provide publications and databases (98 and 84 percent respectively).<br />

Almost half the sites (46 percent in 2007) now comply with the World Wide Web Consortium (W3C)<br />

standards for disability access. This is a phenomenal social development. The most common services<br />

offered by the states include business registration, professional licensing, driver license and license plate<br />

renewal, filing and paying taxes, locating information on sex offenders and missing persons. This reflects<br />

considerable effort towards achieving socio-economic development. Many state legislatures offer bill and<br />

legislation search and live broadcasts of legislative sessions. In addition, many states offer unique<br />

services. For example, in New York and New Jersey, using Privacy Policy links, citizens may request any<br />

site information that is public record. Georgia citizens may search for the lowest gas prices in the state,<br />

and South Carolina legislators provide legislative broadcasts with closed captioning (West, 2007).From<br />

2007, for example 89 percent of government sites allowed the public to e-mail public officials directly<br />

rather than simply e-mailing the webmaster (West, 2007). While state implementation of digital services<br />

and outreach is changing quickly, there is considerable progress to be made. Most sites exceed the<br />

reading level of the average citizen. Many are poorly organized; portal pages make it difficult to navigate<br />

through the sites. Some sites have limited accessibility, while others have no apparent privacy provisions,<br />

leading to more challenges of digital divide.<br />

414


2.2 eGovernment and the digital divide<br />

Bongani Ngwenya<br />

Just because technology is available does not mean it is accessible to all. The term digital divide has<br />

been used since the 1990s to describe patterns of unequal access to ICTs—primarily computers and the<br />

Internet—based on income, ethnicity, geography, age, and other factors, such as lack of skills. The<br />

realization of these goals requires that the digital divide be addressed. Indeed, in a study of eGovernment<br />

use by citizens, the digital divide was found to be more pronounced among government web site visitors<br />

than among internet users in general (Thomas and Streib 2003). A lack of access to the Internet is a<br />

major element of the digital divide. Research consistently identifies ethnicity, income, age and education<br />

as significant predictors of access to technology. According to Wright and Larsen (2001),60 percent of<br />

white households had Internet access, while only 34 percent of African American and 38 percent of<br />

Latino households did. Also, roughly 78 percent of households with income between $50,000 - $75,000<br />

by then had Internet access, while only 40 percent of those with household incomes between $20,000 -<br />

$25,000 had Web access. Thomas and Streib (2003), found that ethnicity, education, income, and age<br />

discriminate Internet users from non-users. They conclude that among Internet users, ethnicity and<br />

education are important predictors of which Internet users will also utilize government Web sites, with<br />

those users more likely to be white and better educated. The perpetuation of digital exclusion in<br />

Zimbabwe and other developing countries for example is contradictory to citizens’ constitutional right to<br />

the access of information as enshrined in their constitutions, notwithstanding the negative impact of<br />

information asymmetry, another critical challenge to eGovernment in social and economic development.<br />

In Zimbabwe there is Access to Information and Protection of Privacy Act (AIPPA). The Act enshrines the<br />

citizens rights to access to information, at the same time gives the government agents authority to pry on<br />

individual citizens use and dissemination of information. The whole thing is politically motivated, and used<br />

to curtail opposition to the ruling party. There is a clear contradiction here.<br />

2.3 Information asymmetry and its problems<br />

The theory of asymmetric information has been lively developed in the field of economic research for the<br />

last two decades. The prominent foundations for this theory were established by George Akerlof (Akerlof,<br />

1970), Michael Spence (Spence, 1973) and Joseph Stiglitz (Rothschild and Stiglitz, 1976). Information<br />

asymmetry occurs when one party has more or better information than the other party; it assumes that at<br />

least one party to a transaction has better relevant information whereas the other(s) do not. This is<br />

typically with governments. Naturally government would have more or better information about itself than<br />

its citizens. Information asymmetry has mass effect on the business networks, for example, supply<br />

chains. Fiala (2005) indicates that information asymmetry is a key source of supply chain inefficiency and<br />

strategic partnerships and information sharing can help to cope with the “bullwhip effect”, caused by the<br />

information asymmetry in supply chains. Mishra et al. (2007) point out that information distortion may<br />

reduce the benefit levels or even stop information sharing in supply chains. There are two typical<br />

problems asymmetric information may trigger, namely, moral hazard and adverse selection. Moral hazard<br />

refers to “situations where one side of the market can't observe the actions of the other. For this reason it<br />

is sometimes called a hidden action problem” (Varian, 2002). In addition, it means the chance, or hazard,<br />

that a party in a transaction with more information about its intentions or actions behaves in a way that a<br />

party with less information would consider inappropriate, or in the extreme, "immoral". An example of<br />

moral hazard is when people are more likely to behave recklessly if insured, either because the insurer<br />

cannot observe this behaviour or cannot effectively retaliate against it, for example by failing to renew the<br />

insurance.<br />

On the other hand adverse selection generally refers to a market process in which bad results occur due<br />

to information asymmetries between buyers and sellers, where the "bad" products or customers are more<br />

likely to be selected and the “good” ones are driven out of the market. It has been discussed extensively<br />

in the fields of economics, insurance, and risk theory. An example of adverse selection in the insurance<br />

market is when people who are of high risk are more likely to buy insurance, because the insurance<br />

company cannot effectively discriminate against them. In some countries, for example, people living with<br />

“HIV, AIDS”. The same premiums are set by the insurer for both groups with high risk and low risk. The<br />

insurance company anticipates or learns that the cost of the combined policy holders exceeds that of the<br />

general population, and sets the higher premiums accordingly. The result is that people with lower risks<br />

tend to go uninsured.<br />

Another famous example is illustrated by (Akerlof, 1970) for the second hand car market, which is<br />

referred to as the "lemon market"-people buying used cars do not know whether they are "lemons" (bad<br />

cars) or "cherries" (good ones), so they are willing to pay an average price that lies in between the<br />

415


Bongani Ngwenya<br />

lemons and cherries. As a result, the same situation as in the insurance market happens here, the<br />

“cherries” will be driven out and “lemons” will dominate the market. The similar findings are also<br />

supported by the recent e-commerce research of Liao and Cheung (2001) that the “poor vendor quality,<br />

especially as regards “lemons”, is identified as a significant disincentive to virtual retailing over the<br />

Internet”. Arrow (1984) equates these two terms, that is, moral hazard and adverse selection with hidden<br />

action and hidden information, respectively. Moral hazard arises when the action undertaken by the agent<br />

is unobservable and has a differential value to the agent as compared to the principal. With the fast<br />

development of information technology (IT), more recently, the theory of asymmetric information has<br />

been expanded in the field of economics of information technology and discussed by various researches,<br />

such as,(Garicano and Kaplan, 2001; Varian, 2002; Varian et al., 2004; Wigand et al., 1997; Stiglitz,<br />

2000; Kauffman and Mohtadi, 2003). In addition to “moral hazard” and “adverse selection” information<br />

asymmetry would also increase costs of acquiring information, such as transaction costs (which raise<br />

more in opaque situations). These could be: search costs; information costs; decision costs; policing<br />

costs; and enforcement costs.<br />

2.4 Information asymmetry problems between business and government<br />

Very little attention has been paid to the asymmetric information issues between profit driven businesses<br />

and public good oriented government. However, the recent movement of the public sector transformation<br />

of forming the so called public-private partnerships (PPP) by many countries in this world, where a<br />

government and a private entity collaboratively undertake traditionally public activity (Naschold and Von<br />

Otter, 1996), has made the boundary between the government and private business become less and<br />

less obvious. In this section the researcher puts his focal point on this transforming regime and discuss<br />

whether asymmetric information problems of moral hazard and adverse selection can also be triggered<br />

during the business and government interaction. One of the most important roles for government in the<br />

G2B relationship is the government control role.<br />

A good example of such control is in Tax and Customs Administration, as it is directly related with the<br />

collection of government revenues. <strong>European</strong> Union (EU) governments for example have been<br />

experiencing severe losses from various tax frauds. According to EU Commission (2006a), estimates of<br />

tax fraud of 2 to 2.5% of Gross Domestic Product (GDP) are mentioned, which is about 200 to 250 billion<br />

Euro per year at EU level and at unprecedented levels in developing countries, especially in Africa. Such<br />

tax fraud is a fitting example and can be interpreted as the moral hazard problem caused by the<br />

asymmetric information. An illustrative example is the value added tax (VAT) collection. Simply two<br />

parties are involved here: a private company who is obliged to declare VAT and pay the tax; and a Tax<br />

office as a government agency who audits the tax report and control the VAT collection. However in the<br />

real world, especially in developing countries the private company always, knows better about its own<br />

operating details and the real value of transactions, whereas the Tax office does not. Private company<br />

has better information than the Tax office and thus has motivation to hide and even falsify certain<br />

information from Tax office to get tax advantages. If such motivation is obvious and easy to achieve<br />

without tax office knowing, or the penalty of defaulting is not severer enough, the private company will<br />

choose to cheat - a moral hazard problem is caused that the tax office receives less VAT than it should<br />

have. The researcher posits that the problem of asymmetry does not only lie with information, in this case<br />

pertaining to eGovernment but also with institutionalization and diffusion of organisational practices, such<br />

as eGovernment.<br />

2.5 Asymmetry in institutionalization and diffusion<br />

In accordance with the existing literature, diffusion is defined as a process by which policy innovations<br />

are communicated in the international system and adopted voluntarily by an increasing number of<br />

countries over time (Elkins and Simmons 2005; Rogers 2003; Dolowitz and Marsh 2000). Diffusion refers<br />

to an international spread of policy innovations driven by information flows rather than by hierarchical or<br />

collective decision-making within international institutions. At the micro-level it is triggered by<br />

mechanisms of social learning, copying or mimetic emulation (Jo¨rgens, 2004; Orenstein,<br />

2003). The essential feature of policy diffusion is that it occurs in the absence of formal or contractual<br />

obligation. Moreover, diffusion is basically a horizontal process whereby individually adopted policies and<br />

programmes add up to a decentralized regulatory structure (Levi-Faur, 2005). Unlike in the case of<br />

multilateral legal treaties, which are negotiated centrally between states and subsequently<br />

416


Bongani Ngwenya<br />

implemented top-down, with diffusion, decision-making procedures are decentralized and remain at the<br />

national level, at its own pace and ability to implement. In the absence of a centralized regulatory regime<br />

with highly visible and explicitly stated aims, international policy diffusion may thus result in a ‘regulatory<br />

revolution by stealth’ (Levi-Faur and Jordana, 2005). While our understanding of diffusion follows the<br />

predominant use of this concept in the recent literature (Elkins and Simmons, 2005;Rogers, 2003;<br />

Howlett, 2000; Bennett 1991a, 1997) it contradicts those approaches that view diffusion as an outcome<br />

rather than a process. A prominent example for this body of literature is Eyestone’s understanding of<br />

diffusion as ‘any pattern of successive adoption of a policy innovation’ (Eyestone, 1977). This<br />

understanding of diffusion as the sum of all domestic adoptions of a policy innovation, regardless of the<br />

particular causal mechanisms through which these adoptions were brought about, certainly is legitimate.<br />

3. Research methodology employed in this study<br />

At an early stage of investigation, the research was exploratory, for which a single country case study<br />

was appropriate (Benbasat et al. 1987 and Galliers 1992). The selection of Zimbabwe`s government<br />

departments, that is, Department of Information; Department of Local Government; Department of<br />

Registry and Zimbabwe Revenue Authority (ZIMRA) constituted this case study in a developing country,<br />

while literature review sufficed to appreciate the same developments in the developed countries, that is,<br />

US and EU. The researcher conducted a purposeful sampling technique, which provided a total of168<br />

households, based on the community members surrounding these government departments, and as<br />

representative of the technologically disadvantaged. These represented the intended beneficiaries of<br />

eGovernment services in Zimbabwe. Very few possessed skills or training in computer technology or had<br />

any knowledge and information about on-line government services and some communities had virtually<br />

no access to computer technology. The author served as volunteer within the community, which<br />

cultivated familiarity and trust necessary to collect data (Rubin and Rubin 1995). Any unintended<br />

influence of the author was minimized as the author was volunteer among several other volunteers who<br />

were not even aware of the research objectives. In addition to 168 households, the author interviewed 8<br />

heads of these selected government departments, 17 Members of Parliament of Zimbabwe, 7 Permanent<br />

Secretaries and 11 Principal Directors of some key ministries in the Zimbabwean government as well, in<br />

this explorative and interpretivist research. The semi-structured interviews lasted between 30 minutes<br />

and 1.5 hours and all of them were recorded. The interviews were transcribed and their contents were<br />

analysed. The processing and analyses of the information had the following stages:<br />

Creation of a content analysis matrix segment<br />

Detailing the Data Collection and Analysis Procedures<br />

Discussion and Summary of Research Findings<br />

Conclusion and Suggestions for Future Studies<br />

3.1 Interview script<br />

The script for the interview had some of the following “grand tour” questions:<br />

Do you have any knowledge and information about eGovernment practices in Zimbabwe?<br />

What is your opinion and understanding of eGovernment practice?<br />

What is the government doing about information asymmetry within its departments?<br />

In your opinion how far is Zimbabwe in terms of Open Government Initiatives and data portals?<br />

What challenges is Zimbabwe facing with regard to adopting and implementing Openness in<br />

eGovernment practices?<br />

What is your assessment of the digital divide levels in Zimbabwe?<br />

What is your assessment of the digital inclusion levels in Zimbabwe?<br />

Are there any plans to expand technology accessibility to rural areas as well?<br />

Do the promoters of technology usage participate readily? Where is there most resistance?<br />

What is your role in the implementation of eGovernment practice?<br />

With increases in internet usage, is there improvement in terms of government service delivery?<br />

With increases in open government data portals and internet usage, is there changes in social<br />

development of communities in the country?<br />

417


Bongani Ngwenya<br />

With increases in open government portals and internet usage, is there changes in economic<br />

development within the country?<br />

What are the areas in which the department has most difficulty in implementing the usage of<br />

technology?<br />

In terms of eGovernment practices, can one say that there is a set of best practices which are<br />

transmitted by people?<br />

With eGovernment data portals usage, have there been changes in the sharing and distribution of<br />

information within the stakeholders in the country?<br />

Is there an Intranet where the processes are managed within the departments?<br />

What kind of innovations have emerged with eGovernment practices?<br />

Does the entire department staff have training?<br />

How is the know-how of employees transmitted? Orally? Written? Have there been changes with<br />

information technology usage?<br />

Is the government department well aware of its clients? How evident is it? How does the department<br />

try to meet the needs of its customers or clients?<br />

Are there partnerships with various organizations? Are they the same as those that existed before<br />

eGovernment practices or improvements were made? What kind of partnerships are these?<br />

Does the department share knowledge and information in the network of openness in eGovernment<br />

organizations? What are the advantages?<br />

Do you consider that eGovernment practice has made processes simpler or more bureaucratic?<br />

4. Detailing the data collection and analysis procedures<br />

The analysis was undertaken in a systematic format that is similar to previous interpretive research<br />

(Brockman et al., 2008). An extensive systematic and interpretive analysis employing categorization,<br />

abstraction, comparison, dimensionalization, integration, iteration, and refutation was conducted<br />

(Spiggle,1994). As interviews were conducted and transcribed notations were made regarding<br />

respondents opinions and perceptions of the effectiveness of eGovernment as a leverage for social and<br />

economic development. This paper posits that eGovernment constitutes a critical context for social and<br />

economic development in both developed and developing countries. However the findings of this study<br />

are that eGovernment also leads to information asymmetry among citizens and government and also,<br />

institutionalization and diffusion asymmetry of the practice of the current Openness in eGovernment<br />

models within developed and developing countries. An interpretive analysis was developed, refined, and<br />

reviewed by the researcher. First, an individual or ideographic understanding of each interview was<br />

sought. Secondly, separate interviews were related to each other as the researcher attempted to grasp,<br />

rather than impose meanings that emerged from the dialogue. In this way, the interpretations sought do<br />

describe common patterns of experience (Thompson et al.,1989). Still further, the researcher formulated<br />

a classification analysis of the data to identify concepts, guided by the literature in what is prevailing in<br />

the developed countries. Next, the researcher elaborated on this analysis by integrating concepts and<br />

bringing into the picture a process analysis that the perceptions of Openness in eGovernment<br />

institutionalization and diffusion asymmetry are subject to change over time. Upon closer inspection of<br />

the eGovernment, digital divide, information asymmetry and institutionalization and diffusion asymmetry<br />

literature and the transcriptions of the 211 interviews, this interpretivist research analysis revealed two<br />

underlying attributes to this “asymmetry challenge” in eGovernment: (1) Socio-Economic Variation and<br />

(2) Political Variation in developed and developing countries. Unless these differences are skill fully<br />

identified and accommodated as such into the development and use models, Openness in eGovernment<br />

efforts would not help achieve the social and economic development goals by both developed and<br />

developing countries.<br />

Figure 1, combines these elements to present potential adoption motivations in a simple matrix diagram.<br />

Developing countries` motivations appear in the left and upper segment; this segment is characterized<br />

by high socio-economic and political variation, and high information, institutionalization and diffusion<br />

asymmetry and hence, high digital divide intensity. Developed countries` motivations appear in the right<br />

segment; this segment is characterized by low socio-economic and political variation, and low<br />

information, institutionalization and diffusion asymmetry and hence, high digital inclusion intensity.<br />

418


Bongani Ngwenya<br />

Figure 1: Motivations for adopting innovation and diffusion<br />

However, connecting this part of the conventional diffusion model with theories of issue interpretation<br />

requires suggested hypotheses, which is not the focus of this paper at this stage. The researcher<br />

suggests future non interpretivist research to consider sighting hypotheses and testing them.<br />

5. Discussion and summary of research findings<br />

This article offers a look at combining rational and social accounts of eGovernment practice<br />

institutionalization and diffusion by asking whether a concern with “asymmetry problems” discussed<br />

before are necessarily influenced by the level of a country`s development. The researcher`s argument is<br />

that the higher the socio-economic and political variation in a country the greater the challenge and<br />

problem of asymmetric information and asymmetry in diffusion of innovation like eGovernment models.<br />

This study`s findings thus suggest that both developed countries based on previous studies and<br />

developing countries based on the results of this interpretivist study are challenged by information<br />

asymmetry problems, digital divide and asymmetry in diffusion. As a result concerns with social and<br />

economic development gains driven by eGovernment practice models are not as period-dependent as<br />

has been argued; rather, they may be more universally shared. On the basis of this study, the researcher<br />

can only suggest as to why this is the case, but it appears possible that aspirations to achieve social and<br />

economic gains may be, to some extent, independent of the diffusion process. For instance, if the<br />

theorization of eGovernment as offering performance benefits of greater social and economic gain<br />

appears compelling to adopting organizations throughout a diffusion process, then one would not expect<br />

to see differences between developed and developing countries in terms of social and economic gains as<br />

a motive for adoption. The findings of this interpretivist research are that the information asymmetry<br />

between citizens and government and asymmetry in institutionalization and diffusion within developed<br />

and developing countries are widely attributed to socio-economic and political variations in developed<br />

and developing countries. These findings prompt rethinking of the classic institutional, and diffusion<br />

theory, to suggest eGovernment models that will suit the socio-economic and political context of<br />

developing countries in particular. Specifically, this study has shown that both developed and developing<br />

countries report having both social and economic motivations for adopting openness in eGovernment,<br />

419


Bongani Ngwenya<br />

albeit for pursuing social gains and economic gains. Overall, the findings support rethinking the<br />

institutional diffusion theory’s dichotomization of social and technical motivations for adopting innovations.<br />

Finally, this study deepens understanding of why the implementation of new practices is frequently<br />

shallow or even nonexistent (Meyer and Rowan, 1977; Westphal and Zajac, 1994)-an area that has<br />

drawn increasing research attention. Developing countries, in this instance, are equally motivated by both<br />

social and economic gains for adopting innovation, however from the information gathered from the<br />

interviews conducted in this study, it became clear that developing countries have concern about their<br />

social, economic and political contexts and that they may not be ready to adopt the current<br />

eGovernment models that are adopted by the rest of the world.<br />

6. Conclusion and suggestions for future studies<br />

In this study the researcher posits that eGovernment constitutes a critical context for social and economic<br />

development in both developed and developing countries. The study also suggests rethinking of the role<br />

of motivations in the diffusion of practices among organization by extending the diffusion of practices and<br />

innovation to eGovernment model. Specifically, this study has shown that both developed and developing<br />

countries report having both social and economic motivations for adopting eGovernment models or<br />

practices, albeit for pursuing social gains and economic gains. Although organisations and managers or<br />

leaders are frequently subject to constraints that limit their ability to be mindful of practices or habits of<br />

thinking that are taken for granted in their institutional environments, the researcher believes that the<br />

extent of mindless imitation has been overstated. This study has taken considerable steps toward<br />

recognizing greater managerial or leadership rationality and agency (Dacin, Goodstein, and Scott, 2002).<br />

For instance in this research, the findings are that the information asymmetry between citizens and<br />

government and asymmetry in institutionalization and diffusion within developed and developing<br />

countries are widely attributed to socio-economic and political variations in developed and developing<br />

countries. Unless these differences are skill fully identified and accommodated as such into the<br />

development and use models, eGovernment practice efforts would not help achieve the social and<br />

economic development goals by both developed and developing countries. These findings prompt<br />

rethinking of the classic institutional, framing and diffusion model, to suggest full grounded theory<br />

research in future, that would develop eGovernment models that suit the social, economic and political<br />

context of developing countries in particular. The findings and conclusions of this interpretivist study could<br />

be strengthened by hypothesizing and testing the assertions on “asymmetry challenges” in the future.<br />

References<br />

Akerlof, G. A 1970, “The market for" lemons": Quality uncertainty and the market mechanism”, The Quarterly Journal<br />

of Economics 84 (3), 488-500.<br />

Arrow, K. J. 1984, The economics of agency. Institute for Mathematical Studies in the Social Sciences, Stanford<br />

University.<br />

Benbasat, I., Goldstein, D.K., and Mead, M 1987,“The Case Research Strategy in Studies of Information Systems,”<br />

MIS Quarterly, 11(3): 369-386.<br />

Bennett, C.J 1991a, “How states utilize foreign evidence”, Journal of Public Policy 11: 31–54.<br />

Bennett, C.J 1997, “Understanding ripple effects: the cross-national adoption of policy instruments for bureaucratic<br />

accountability”, Governance: An International Journal of Policy and Administration 10(3): 213–33.<br />

Dacin, M. T., Goodstein, J., and Scott, W. R 2002, “Institutional theory and institutional change: Introduction to the<br />

research forum”, Academy of Management Journal, vol. 45, pp. 45-56.<br />

Dolowitz, D., and Marsh, D 2000, “Learning from abroad: the role of policy transfer in contemporary policy making,<br />

Governance”, An International Journal of Policy and Administration 13(1), 5–24.<br />

Elkins, Z., and Simmons, B 2005, “On waves, clusters and diffusion: a conceptual Framework”, The Annals of the<br />

American Academy of Political and Social Science 598 (March 2005): 33–51.<br />

Eu Commission (2006a) Eu coherent strategy against fiscal fraud – frequently asked questions.<br />

Available:Http://europa.Eu/rapid/pressreleasesaction.Do?Reference=memo/06/221&format=html&ag<br />

d=0&language=en&guilanguage=en. Brussels.<br />

Eyestone, R 1977, “Confusion, diffusion and innovation”, American Political Science Review 71(2): 441–7.<br />

Fiala, P 2005, “Information sharing in supply chains”, Omega(Oxford) 33 (5), 419-423.<br />

Galliers, R.D 1992, “Choosing Information Systems Research Approaches”, in Robert D. Galliers (ed) Information<br />

Systems Research: Issues, Methods, and Practical Guidelines, Alfred Waller Ltd, Henley on-Thames: 144-162.<br />

Garicano, L., and Kaplan, S. N 2001, “The effects of business-to-business e-commerce on transaction costs”,<br />

Journal of Industrial Economics 49 (4), 463-485.<br />

Howlett, M 2000, “Beyond legalism? Policy ideas, implementation styles and emulation based convergence in<br />

Canadian and U.S. environmental policy”, Journal of Public Policy 20(3): 305–29.<br />

Jo¨rgens, H 2004, “Governance by diffusion – Implementing global norms through cross-national imitation and<br />

learning”, in, W.M. Lafferty (ed.), Governance for Sustainable Development. The Challenge of Adapting Form to<br />

Function, Cheltenham: Edward Elgar Publishing: 246–83.<br />

420


Bongani Ngwenya<br />

Kauffman, R. J., and Mohtadi, H. 2003, “Analyzing interorganizational information sharing strategies in b2b ecommerce<br />

supply chains”, In INFORMS <strong>Conference</strong> on Information Systems and Technology, Atlanta, GA.<br />

Levi-Faur, D 2005, “The global diffusion of regulatory capitalism”, The Annals of the American Academy of Political<br />

and Social Science 598 (March 2005): 12–34.<br />

Levi-Faur, D., and Jordana, J 2005, “Preface: The making of a new regulatory order”, The Annals of the American<br />

Academy of Political and Social Science 598 (March 2005): 6–9.<br />

Liao, Z., and Cheung, M. T 2001, “Internet-based e-shopping and consumer attitudes: An empirical study”,<br />

Information & Management 38 (5), 299-306.<br />

Meyer, J. W., and Rowan, B 1977, “Institutionalized organization: Formal structure as myth and ceremony”, American<br />

Sociological Review, vol. 83, pp. 340-363.<br />

Mishra, B. K., Raghunathan, S. and Yue, X 2007, “Information sharing in supply chains: Incentives for information<br />

distortion”, IIE Transactions 39, 863–877.<br />

Naschold, F., and Von Otter, C 1996, Public sector transformation: Rethinking markets and hierarchies in<br />

government. John Benjamins.<br />

Ngwenya, B., Lubbe, S., and Klopper, R 2010 “Institutionalisation, Framing and Diffusion: The Logic of Openness in<br />

eGovernment and Implementation Decisions (a lesson for developing countries)” 6 th International <strong>Conference</strong><br />

on eGovernment, Cape Peninsula University of Technology, South Africa.<br />

Orenstein, M.A 2003, “Mechanisms of diffusion. An interdisciplinary review”, Paper presented to the American<br />

Political Science Association Annual Meeting, Philadelphia, 28–31 August, 2003.<br />

Perrow, C (3 rd ) 1986, Complex organizations: A critical essay, New York.<br />

Reding, 2006; eGovernment in Europe 2006, eGovernment Action Plan, 2006, viewed on 07 April 2010,<br />


National Electronic Government Strategies in Austria<br />

Birgit Oberer 1 and Alptekin Erkollar 2<br />

1 Kadir Has University, Istanbul, Turkey<br />

2 Halic University, Istanbul, Turkey<br />

birgit.oberer@khas.edu.tr<br />

erkollar@etcop.com<br />

Abstract: One of the most emerging concepts of information technology is the one of electronic government.<br />

Electronic services that are made available by governments to citizens, businesses, and other governments<br />

(international) or governmental authorities (national) are general proof of the changes being made in the public<br />

sector. Intersecting the government, citizen, and business domain, a business model can be defined considering the<br />

government-to-business, government-to-citizen, and government-to-government approaches. Governments around<br />

the world try to follow their, most of the time, ambitious strategies to become, or stay, competitive. In this study<br />

Austrian strategies and projects for electronic government as well as their implementation plans were analysed,<br />

followed by an examination of the electronic services offered by the national governmental authorities in Austria, one<br />

pioneer in electronic government in Europe, leading in the <strong>European</strong> E-Government ranking 2010, and the declared<br />

'<strong>European</strong> champion in eGovernment' for the fourth time in a row. The results revealed that Austria has developed<br />

hybrid electronic government strategies, and has launched projects in that field, in which national governmental<br />

authorities have to participate, in order to offer electronic government services at a high level and in a competitive<br />

international environment. On a whole, offering a one-stop shop gateway to governmental information and<br />

transactions generally offers higher attractiveness for conducting nationwide business and all incentives for electronic<br />

government focus on developing good practices in the area of efficient and effective electronic government.<br />

Nevertheless, national strategies are transformed and implemented in different ways not always following the onestop-shop<br />

approach and contributing to the development of isolated applications instead of integrated ones.<br />

Keywords: electronic government, e-Austria, digital Austria explorer, gateway, one-stop-shop<br />

1. Introduction<br />

Electronic government is an instrument to provide a customer centric, one stop delivery of governmental<br />

services using a variety of channels, such as web portals, call centres, self service functionalities, or<br />

mobile applications. The term customer stands for a citizen, business, as well as a governmental<br />

authority itself. Electronic government portals are powerful tools for administration related reforms, reengineering<br />

and anti-corruption incentives enabling more customer oriented, transparent, effective, and<br />

efficient governmental services. Government to citizens and businesses focuses on easy access, a 'one<br />

window' approach, enhanced quality services, and multichannel service delivery. The 'intra agency' view<br />

focuses on process development and process improvements, whereas the targets for 'inter agency'<br />

activities smooth information flow, enhanced capability for analysis, and enhanced use of multimedia. For<br />

being competitive in global markets and to meet the needs of being competitive in an increasing area of<br />

globalisation, public authorities have to think about how to make their services more competitive. One<br />

aspect of becoming more competitive and contrasting with competitors on the market is investing in<br />

global oriented electronic government strategies. Based on the approach of business process reengineering<br />

and the improvement and increase of customer satisfaction, governments have to improve<br />

their public appearance within an international, competitive environment. Among other things, they can<br />

do so by using electronic government strategies following predefined goals, in turn transforming these<br />

strategies into measures in order to reach the defined goals and developing control structures for strategy<br />

progress analysis. One of the most emerging concepts of information technology is the one of electronic<br />

government. Government portals are an increasingly powerful element of the worldwide public<br />

administration reform strategies providing one stop online access to governmental services (Erkollar and<br />

Oberer 2010, Aichholzer and Schmutzer 1999). By providing benefits to citizens, electronic government<br />

has already become a part of life. The main targets are overcoming barriers of bureaucracy, reducing<br />

service time, increasing the efficiency of governmental processes, and permitting citizens and businesses<br />

as well as other governmental authorities to connect to government information. Electronic government<br />

enables communicating with governmental authorities and offering transaction possibilities for<br />

government driven processes in the private and business spheres. That is the case for not only citizens<br />

and businesses but also for governmental authorities as well. Electronic government established<br />

structures are able to change their business processes on a whole, interacting with each other using<br />

information technology avoiding media breaks, time delays, quality loss for process outcomes, and lost<br />

information due to lost data or available but not used data.<br />

422


2. Literature review<br />

Birgit Oberer and Alptekin Erkollar<br />

Electronic government is the use of information and communication technologies for providing and<br />

improving governmental services by enabling electronic information provision, communication, and<br />

transactions for administrations and their customers, who are citizens, businesses, as well as<br />

governments or administrative authorities themselves. Electronic government includes all administration<br />

measures at all levels (federal, state, as well as regional) to improve the requirement satisfaction for<br />

citizens (qualitative improvements in spheres of life), businesses and for governments to improve internal<br />

processes and procedures and to force structural changes. An electronic government strategy is a<br />

fundamental element of the modernisation process in administrations. Electronic government activities<br />

worldwide are driven by a need for higher efficiency, effectiveness, and the accessibility of public services<br />

for the administration's customers. Most governments follow certain strategies for electronic government<br />

or launched projects in this area to ensure a web presence of the administration, to offer communication<br />

methods, and on a higher level to offer transactional services for the government's customers (Aichholzer<br />

and Schmutzer 1999, Burn and Robin 2003, Chesher et al. 2003 and Ebrahim and Irani 2005).<br />

Governments produce, manage, and use huge amounts of data that become more valuable the easier<br />

the customers, which are citizens, businesses, and governmental authorities themselves, access these<br />

data. Information and communication technologies evolve into complex, globally oriented networks and<br />

governments are under pressure offering reliable, efficient, and effective services to their customers<br />

including, apart from citizens services trade and travel security, social service delivery and support for<br />

military services (Simon 2005). Electronic government refers to the improvement of internal service<br />

provision within administrations for external as well as internal customers and is related to the need for<br />

the higher transparency of public processes and procedures. Electronic government is an approach to<br />

increase governmental transparency, create added value for administration's customers and to ensure<br />

the effectiveness, efficiency, and security focus of internal processes. Stakeholder orientation is the main<br />

focus for electronic government oriented administrations. Around the world, a significant range of<br />

developing and developed countries have committed substantial resources to electronic government<br />

implementation. Electronic government as an instrument to strengthen competitiveness, increase<br />

efficiency, and enhance modernisation is a valuable component of public sector reform. Developments in<br />

electronic government comprise not only web-based developments but increasingly also mobile<br />

applications (m-government) (Al-Sebie and Irani 2003, Georgescu and Georgenscu 2008, Budde 2010<br />

and Claver-Cortés and de Juana-Espinosa 2006). According to a survey conducted by the United Nations<br />

in 2008, approx. 98% of member countries at least operate government websites (United Nations<br />

Department of Economic and Social Affairs 2008).<br />

3. The Austrian electronic government framework<br />

In 1998, the task force 'E-Austria', composed of leading experts in Austria, recommended to institute an<br />

'Information and Communication Technologies Board', responsible for the planning and coordination of<br />

electronic government implementation for federal government, provinces, and local governmental<br />

authorities. The board was headed by a federal chief information officer, who was responsible to<br />

coordinate the ideas and strategies of the board with the needs of the provinces and local authorities. For<br />

the board to be able to communicate with the federal government and provinces, an IT platform has been<br />

established that can be seen as the father of today's electronic government solutions: information<br />

exchange for all the parties involved, using simple information, best practices, white papers, or use cases<br />

to communicate and publish recommendations of specific work groups.<br />

In Austria, regulations regarding electronic government are not confined in a single law, in which there is<br />

a plenty of regulations and laws dealing with electronic government. The basic framework for Austrian<br />

electronic government consists of The eGovernment Act, General Administrative Procedures Act, Service<br />

of Official Documents Act, and the Electronic Signature Law. All of these laws are supplemented by other<br />

laws or regulations. Compared to other <strong>European</strong> countries, Austria was one of the first to pass<br />

comprehensive legal regulations in the area of electronic government. The eGovernment Act is the core<br />

of the Austrian laws on electronic government, enacted in 2004. 'It enables closer co-operation between<br />

all authorities that provide eGovernment services and gives them the opportunity for networking together.<br />

Many mechanisms such as the citizen card, sector-specific personal identifiers, and the electronic<br />

delivery of documents are also able to be put to use in the private sector' (Digital Austria 2010). The<br />

important principles are freedom of choice for citizens selecting the means of communication contacting<br />

government or public authorities, security and legal protection as well as unlimited access for people with<br />

special needs. The General Administrative Procedures Act lays the principles of administrative<br />

procedures, among other things regulating the ways how citizens and public authorities can communicate<br />

423


Birgit Oberer and Alptekin Erkollar<br />

with each other. The Service of Official Documents Act handles the delivery of all documents that<br />

governments are required to publish following the laws and regulations distinguishing between deliveries<br />

that require proof of delivery and others where no proof is required. Proof of delivery is carried out via an<br />

electronic delivery service that is available from delivery service providers, in turn allowing customers to<br />

register with their citizen card to confirm that they want to receive administrative documents<br />

electronically. Registering is sufficient notice in order to receive administrative documents. 'Proof of<br />

delivery is verified when the document is retrieved using the recipient’s citizen card, or when an explicit<br />

agreement exists that allows documents to be picked up automatically using an automated signature.<br />

Confirmation of delivery is also made even if the document is not picked up by the recipient. Electronic<br />

delivery can also be carried out in cases where the recipient gives an e-mail address to the public<br />

authority as his or her 'electronic delivery address' during a procedure' (Digital Austria 2010). The<br />

Electronic Signature Law lays down the principles of electronic signatures following the <strong>European</strong><br />

signature guidelines, differentiating simple, advanced, and qualified signatures. By definition, a qualified<br />

signature, as is used for citizen cards, is equal to a handwritten one. Apart from regulations for citizens,<br />

the law also defines the requirements for businesses that issue qualified certificates and procedures for<br />

the authentication of foreign certificates.<br />

IT and infrastructure: The Austrian electronic government strategy focuses on a secure, flexible, and<br />

expandable IT infrastructure. Basically, apart from a computer and a card reader, a citizen card<br />

environment, which is free for download software, is needed for enabling participation in the Austrian<br />

electronic government community. The citizen card environment is built upon open standards and allows<br />

all signature cards, which fulfil the predefined specifications and legal requirements, to be used as a<br />

citizen card. The same is valid for ID cards of foreign citizens, which follow the rules for electronic<br />

signatures. For the implementation of the citizen card, a secure layer, an interface between applications<br />

and citizen card, has been defined. The security layer, as a middleware, is embedded in the citizen card<br />

environment software and is hardware and technology independent as well as independent of<br />

cryptographic algorithms (Digital Austria 2010). To make applications available to the government’s<br />

customers, the Austrian electronic government strategy defined the need for modules for online<br />

applications, which are software components that encapsulate the procedures needed to carry out<br />

specific functions, such as reading identification data from the citizen card, delivering notifications from<br />

governmental authorities or verifying electronic signatures, within the electronic government area and<br />

implement open standard interfaces for web applications. An open source platform Digital Austria,<br />

EgovLabs, for developers was established offering information, distributions, releases, development data,<br />

and processes for Austrian electronic government projects. Being a registered user you can define your<br />

personal page (figure 1), monitoring assigned items, forums, file modules, and projects. According to<br />

Digital Austria (2010), by now modules supporting identification, signature verification, delivery, and<br />

server-side signature creation are available. For identification, a module is used to uniquely identify and<br />

authenticate users who want to conduct online procedures with their citizen cards. Using an identity link<br />

and the signature on the citizen card, the server-side module and the citizen card software interact and<br />

allow for identification and authentication. Public authority procedures can also be carried out by third<br />

parties on someone else's behalf. A valid electronic proxy authority agreement is needed between the<br />

parties. For this purpose, a module for 'authorisation and representation' has been created. For<br />

professional representatives, such as lawyers, there is an extension to the signature certificate on the<br />

citizen card showing that the representative is authorised to conduct electronic transactions on behalf of<br />

the principal. One module creates an interface between record delivery services and electronic file<br />

systems or special applications.<br />

3.1 Current electronic government initiatives<br />

In 2006, the Austrian Federal Government launched an initiative to reduce the administrative burden for<br />

businesses by 25% for each ministry by the end of 2007. The USP.GV.AT Portal, which is explained in<br />

section 4, is the flagship project for this initiative and one out of approximately 200 measures defined to<br />

reduce the administrative burden. For calculating the administrative burden for businesses, the standard<br />

cost model is used. By adding the costs of administrative procedures, data requirements, and information<br />

obligations to the individual legal provision, the total costs for individual regulation can be obtained.<br />

Administrative costs are the result of cost per administrative activity multiplied by the quantity of<br />

administrative activities. The initiative is coordinated by the Austrian Federal Ministry of Finance. The<br />

overall reduction should be achieved in two phases: the reductions for national induced burdens (by<br />

2010) and reductions for EU induced burdens (by 2012). For reducing the national burden by the end of<br />

2010, 50% of the reduction measures have already been implemented and, according to the Austrian<br />

Federal Government, approx. 40% are in the pipeline and an update process with the ministries ongoing<br />

424


Birgit Oberer and Alptekin Erkollar<br />

(Austrian Federal Government 2010). The final results for 2010 are currently not available but are<br />

expected to be below 90%.<br />

Figure 1: EgovLabs – personal page<br />

In 2009, the Austrian Federal Government launched a programme on the reduction of the administrative<br />

burden for citizens, including a focused baseline measurement, accompanied by actions in the areas of<br />

birth, marriage, and death, and increasing the quality of governmental services. The programme consists<br />

of two elements, the use of the standard cost model for the 100 most burdensome information obligations<br />

and fast track measures for priority areas such as birth, marriage, and death' (Austrian Federal<br />

Government 2010). To be able to calculate the administrative costs for citizens, the standard cost model<br />

has been adapted. Burdens are measured in time (hours) and out-of-pocket costs, such as travel<br />

expenses. The administrative burden for citizens in time is the result of time multiplied by quantity, which<br />

is the number of citizens multiplied by frequency. The administrative burden in costs is the result of the<br />

quantity multiplied by direct costs. Approximately 4,000 interviews have been conducted and, after the<br />

extrapolation of the results and the analysis of qualitative questions, workshops aiming at the<br />

identification of tangible reduction measures for citizens were organised. According to the 'less burden for<br />

the Austrian economy' initiative, an initiative of the Austrian Federal Government, coordinated by the<br />

Federal Ministry of Finance, more than 150 of the measures identified in these workshops have been<br />

reported to the Council of Ministers in fall 2010, where the next steps for the programme have been<br />

decided on. In addition, it will be implemented through defined measures starting from fall 2010 onwards<br />

(Stork 2010). The platform Digital Austria is a committee of the Federal Government for the coordination<br />

and management of electronic government in Austria. According to Digital Austria, more than 80% of all<br />

businesses use electronic government and more and more citizens become electronic customers.<br />

3.2 Electronic government tools and applications<br />

HELP.GV.AT is an interface between government, its authorities and citizens with a special emphasis<br />

placed on criteria such as transparency, clarity of information, and concentration on essential facts. The<br />

portal is designed to be accessed nearly without limits, dealing with information on hundreds of life<br />

situations within which different governmental authorities are involved. All content is listed in alphabetical<br />

order and arranged in main categories, such as documents, education, or finances, and themes. The<br />

HELP.GV.AT portal allows citizens and businesses to prepare interactions with authorities offline, handle<br />

administrative procedures electronically, and plan dealings with authorities. For governmental authorities,<br />

it is a new type of co-operation between authorities and their customers. HELP.GV.AT is an Internet<br />

platform with routes to a large number of public authorities, provides information on different interactions<br />

with Austrian authorities required in most frequent life situations such as housing, permits, pregnancy,<br />

childbirth, or marriage and the electronic processing of these procedures. HELP.GV.AT has offered<br />

services to citizens for years now and has been continuously improved since it was launched. An<br />

increasing number of administrative procedures can be done electronically using this portal. Apart from<br />

the main portal in the German language, a view in English is available that offers orientation to foreign<br />

nationals. Structured in accordance with individual life situations (e.g. work, car, retirement pension),<br />

425


Birgit Oberer and Alptekin Erkollar<br />

HELP.GV.AT provides information and support to foreigners who go to Austria in order to live and work<br />

there. It is the portal’s objective to guide foreign users step by step through the required administrative<br />

procedures. The entrance view of the portal is shown in figure 2.<br />

Figure 2: HELP.GV.AT portal<br />

USP.GV.AT – business service portal<br />

Electronic government for businesses means enabling them to make enquiries and file applications<br />

electronically, receive information online and to improve transactions with public authorities. In Austria, a<br />

customer centred approach is followed. Businesses should be able to apply for different services online<br />

or request documents such as criminal record certificates or income tax forms.<br />

In 2010, the USP.GV.AT (the abbreviation USP stands for 'Unternehmensserviceportal') portal, offering<br />

business services, was launched. By offering information, communications, and transaction services, the<br />

portal intends to help businesses fulfil their information obligations and to reduce their administrative<br />

burden. The Business Service Portal is an initiative of the Austrian Federal Government. The entrance<br />

view of the portal is shown in figure 3. The information provided is based on the business content<br />

originally offered under HELP.GV.AT that has been absorbed by the Business Service Portal. Generally,<br />

USP.GV.AT offers a links system, making it easy for businesses searching on a specific topic, contacting<br />

the authorities involved, and the forms needed for communication or transaction processing. One focus is<br />

offering regulatory news, thereby increasing transparency for businesses and deliver up-to-date<br />

information to businesses and enabling transactions processed fully or in the beginning at least partly<br />

(with media breaks).<br />

The Digital Austria Explorer provides all Austrian inhabitants and businesses access to over 1,000 forms<br />

and approximately 350 government procedures using one single portal. The portal developed by<br />

Microsoft Austria in co-operation with the Austrian Federal Chancellery was launched in 2010. It is a<br />

toolbar that, once downloaded and installed, provides the user with a virtual environment of the national<br />

government. Digital Austria Explorer enables easy access to the portals USP.GV.AT and HELP.GV.AT all<br />

under one flag, the Digital Austria Explorer. Generally, using this electronic platform, citizens and<br />

businesses can search for services, use electronic government applications, request certificates, and find<br />

useful information about daily services such as doctors, pharmacies, social security benefits, or public<br />

transport. After the platform has been installed, the Digital Austria Explorer can be opened using Internet<br />

Explorer and optionally the Digital Austria toolbar, which offers fast and easy access to different areas<br />

such as news, my help site, my citizen card, my region, Internet security, my Austria, and settings can be<br />

activated. In figure 4, the Digital Austria Explorer Toolbar is shown. In the section News, the user can find<br />

current information on new regulations in different areas (citizens and businesses as well) and can scroll<br />

down the menu searching for the relevant topics to them. For the other sections, such as my citizen card,<br />

there is a link system available for searching that is shown in figure 5. Because the toolbar is available in<br />

German, an English translation of the relevant terms has been added. The section 'my HELP' follows the<br />

link system of HELP.GV.AT and defines different topics regarding the life spheres of citizens, such as<br />

working, housing, education, documents, financial issues, social issues, families, the MYHELP portal,<br />

and information for businesses.<br />

426


Figure 3: USP.GV.AT portal<br />

Figure 4: Digital Austria explorer toolbar<br />

Birgit Oberer and Alptekin Erkollar<br />

My HELP is a personalised view on the Digital Austria Explorer. After filling in some relevant information<br />

about life spheres and identification using an Austrian citizen card and mobile phone, citizens can use the<br />

personalised view to get faster access to relevant information, data and forms, and finding authorities in<br />

the needed region easily. The citizen card is the key to electronic government services and to web<br />

services from businesses. The citizen card is increasingly becoming the "electronic identification for the<br />

Internet" and opportunities for using the citizen card are continuing to expand. The Austrian citizen card<br />

functionality can be activated on the e-card (the national insurance identification card), a bank card,<br />

student ID cards, or other official identity cards (Aichholzer and Strau 2010). For activating the citizen<br />

card, apart from a computer and Internet connection, you need a card reader, a chip card and the citizen<br />

card software. The a-sign citizen card installer from A-Trust makes it easy to install these components on<br />

Windows operating systems and no local software installation is needed. Using JAVA technologies, the<br />

citizen card software runs as an applet in the web browser. Foreigners can also use this service by filling<br />

in their foreign ID and selecting their home country, which is shown in figure 6. In using the 'Foreign Test<br />

ID' functionality, there are several countries available, as shown in figure 7.<br />

427


Figure 5: Digital Austria explorer link system<br />

4. Discussions<br />

Birgit Oberer and Alptekin Erkollar<br />

Austria started electronic government earlier compared to other <strong>European</strong> Union members and<br />

developed services such as Finanzonline, which is a portal where citizens can find services related to<br />

income and tax, which became show cases for solutions within the EU. One milestone for Austria was the<br />

successful go live of HELP.GV.AT, a service portal for citizens (at least in the beginning businesses as<br />

well), which is introduced in section 4. This portal has received the 'eEurope eGovernment Award' in<br />

2003. With the 'eGovernment Initiative 2003' that Austria wanted in order to make Austria one of the<br />

<strong>European</strong> Leaders in electronic government and ensure a position among the best five electronic<br />

government countries in the <strong>European</strong> Union. This initiative was started in addition to the Information and<br />

Communication Technology Board. In 2004, Austria reached fourth place within the <strong>European</strong> ranking<br />

and in 2005 placed second, claiming the title '<strong>European</strong> Champion' in 2006, defending this title in 2007<br />

and becoming a showcase country for electronic government in Austria. On the whole, Austria decided in<br />

2001 to focus on a long-run strategy, developing a flexible infrastructure that could be expanded and<br />

shows sustainability and security in the long-run (Digital Austria 2010). Basically, the Austrian electronic<br />

government strategy follows the concepts 'base components and open standards, which serve as<br />

guidelines for the implementation of electronic services and the creation of the underlying infrastructure'<br />

(Digital Austria 2010). The basic idea is that every citizen in every province has access to all electronic<br />

government services at all governmental levels focusing on secure communication, transactions, data<br />

integrity, and the appropriate handling of sensitive and confidential data. Following the main strategies of<br />

the <strong>European</strong> Union besides for cost reduction, more efficient government internal processes, improved<br />

services, and electronic government should make government activities and communication between the<br />

government and its customers, which are citizens, businesses, and the government itself, more<br />

transparent. The main focus of the information level is the downloading of forms, guides, and law<br />

information, electronic web forms in the communication area to start administrative processes and for<br />

transaction level tax declarations, public library systems, electronic procurement, or the registration of<br />

residence are the first results of the electronic government incentives in Austria (Oberer 2002, Rupp 2004<br />

and Digital Austria 2010). In the Austrian strategy, electronic government is seen as the basis for<br />

electronic democracy. E-democracy services, according to Rupp (2004) may cover all the stages of the<br />

political process from agenda setting over deliberation and decision making to the monitoring of the<br />

decisions made'. Austrian best practices in electronic democracy lie, according to Rupp (2004), in the<br />

downloading of political programmes, pages run by representatives, both of them at the information level,<br />

and moderated discussion fora and e-mail communication with representatives at the communication<br />

level. Sample services for the transaction level are voting, petition, and initiative, as in WWW.E-<br />

VOTING.AT. Electronic democracy systems require identification and authentication, which are<br />

428


Birgit Oberer and Alptekin Erkollar<br />

implemented in Austria with the citizen card and digital signature for public authorities as explained under<br />

the heading IT and infrastructure within section three. For Austria, the integration of all citizens, customer<br />

orientation, and management of data protection are of high priority. In a study conducted in 2010<br />

sponsored by the <strong>European</strong> Commission investigating electronic Government offerings in Europe as well<br />

as Iceland, Norway, and Switzerland, Austria was declared the '<strong>European</strong> Champion in eGovernment' the<br />

fourth time in a row. 'For the benchmark, 20 base services were defined; 12 for citizens and 8 for<br />

businesses. These were used to measure progress in the implementation of eGovernment in the more<br />

than 14,000 public administration websites that were analysed. The sophistication of each service is<br />

judged on a 4 or 5 level scale, starting from the net amount of information, to procedures that can be<br />

conducted completely online. In addition, they are also judged on the percentage of services that can be<br />

carried out completely online. Those services that achieved this are awarded the highest level' (Digital<br />

Austria 2010). The HELP.GV.AT site as a one stop portal as well as the application of the citizen card as<br />

a unique system of identification in Austria have mainly contributed to Austria’s success. Generally,<br />

procedures are able to be carried out electronically without media breaks (filling out applications, paying<br />

fees, government internal processing, document delivery, and notifications). Within the electronic<br />

government ranking conducted by the United Nations Department of Economic and Social Affairs in<br />

2010, published in the UN government survey 2010, the Austrian approach for operating a gender<br />

equality website is especially mentioned. The website provides information about current electronic<br />

government initiatives and promotes a programme providing parents with additional income during the<br />

first 14 months of their child's life. The website can be seen at WWW.FRAUEN.BKA.GV.AT. According to<br />

the United Nations Department of Economic and Social Affairs (2010), in addition to the USA, Canada,<br />

Denmark, the Netherlands, and about 15 other countries, Austria is one of the leaders in transactional<br />

and connected electronic government that currently has reached their third or fourth stage of online<br />

service development. 'Back office operations are integrated and electronic services to citizens are<br />

provided in a seamless manner while information is efficiently transferred between agencies and<br />

departments' (United Nations Department of Economic and Social Affairs 2010). HELP.GV.AT is a one<br />

stop shop in which procedures can be carried out without changing types of media, starting from filling<br />

out the form, paying fees, internal processing, and the final delivery of documents and notifications. The<br />

USP.GV.AT business service portal serves as a single entry point as well, and offers access to<br />

governmental services for businesses. To sum up, both portals follow the one-stop-shop idea.<br />

Historically, HELP.GV.AT was divided into two parts, one for citizens, and one for businesses. When<br />

developing detailed national strategies for electronic government for reasons of clearness and<br />

transparency Austria decided to divide this portal in two parts, offering two related but separated portals<br />

for different target groups. This means away from a one-stop-shop approach, to a one-stop-shop<br />

approach per target group. Responsible groups wanted to reach higher effectiveness and efficiency in<br />

offering separate portals, but neglected the aim of a one-stop-shop approach, having one single access<br />

point to governmental information, communication and transformation processes. The step towards to<br />

portals means a regression. Therefore, the Digital Austria Explorer was launched, which is a toolbar<br />

enabling access to USP.GV.AT and HELP.GV.AT all under one flag to make sure that target groups have<br />

(again) one single entry point. The benefit Austria communicated to justify the detouring from one portal<br />

over two separate ones, back to a toolbar combining these separate portals is, that the Digital Austria<br />

Explorer, once installed, can be used from a web browser to get easy access to governmental authorities<br />

without the need of opening some portal or different web pages, following the idea of simplification,<br />

efficiency and effectiveness demanded. With MY HELP, Austria offers personalized access for its target<br />

groups.<br />

Electronic government is of interest at all governmental levels, regional, state, as well as federal, and<br />

based on the success of modern information and communication technologies in the private sector,<br />

governments become increasingly more interested in embracing modern information and communication<br />

technologies. Electronic government is a key factor for increasing government productivity and efficiency<br />

and a driver for a customer-centric modern government with end-to-end one-stop-shop processes<br />

offered. Today, electronic government is a 'force for effective governance and citizen participation at the<br />

national and local levels. All <strong>European</strong> sub-regions excel in the e-government index and achieve high<br />

scores far above the world average'. Western and Northern Europe perform well in e-government,<br />

followed by Southern and Eastern Europe (United Nations Department of Economic and Social Affairs<br />

2010). The historically leading position of Austria is based on the first applications the country developed<br />

as one of the first member countries within the <strong>European</strong> Union, and these applications became show<br />

cases of highest relevance for all <strong>European</strong> Union member states. In 2009, the Austrian Federal<br />

Government launched a program on the reduction of the administrative burden for citizens, including a<br />

focused baseline measurement, accompanied by actions in the areas of birth, marriage, and death.<br />

429


Figure 6: MYHELP for foreigners<br />

Birgit Oberer and Alptekin Erkollar<br />

Figure 7: MYHELP for foreigners: foreign Test ID<br />

The first phase for this project ended in 2010 with the definition of about 150 measures to be taken to<br />

reduce the administrative burden, followed by the implementation of these measures, which started in in<br />

2011.Today, Austria has a leading position in doing electronic government because the country<br />

contributes to several pilot projects launched since 2010 within the <strong>European</strong> Union, offering inter alia<br />

cross border applications for electronic government: The applications include national portals from<br />

Austria (help.gv.at), Estonia (eesti.ee), Germany (mein-service-BW), Portugal (portaldocidadao.pt), the<br />

UK, one regional portal from Catalonia in Spain, and one specific service for compliance activities for<br />

working in Belgium (limosa.be)' (STORK 2010).To conclude, Austria has developed hybrid strategies on<br />

electronic government following the guidelines offered by the <strong>European</strong> Union, contributes to several<br />

leading pilot projects within the <strong>European</strong> Union to improve union-wide best practices on electronic<br />

430


Birgit Oberer and Alptekin Erkollar<br />

government. Nevertheless some inventions need to be revised because of missing linkage to the overall<br />

one-stop-shop approach.<br />

Lessons learnt from the Austria management on electronic government are that countries should develop<br />

an electronic government vision, conduct an electronic government strategy and define measures for<br />

implementing this strategy, always focusing on the one-stop-shop approach. This approach means<br />

focusing on all different target groups with one single entry point to governmental information,<br />

communication and transaction processes and not defining one-stop-shops per target group. With the<br />

Digital Austria Explorer Austria gave an example that, when focusing on single-access points per target<br />

group to be competitive in the longer run countries have to re-union these single approaches to one<br />

central one focusing on all target groups. One success factor for international competitiveness is as a<br />

country’s contribution to cross-country related electronic government projects. Within the <strong>European</strong> Union<br />

there are several cross-national pilot projects in the area of electronic government. Currently, there are<br />

two main pilots running: Pilot A covers 'secure identity across borders linked (STORK)', 'Pan <strong>European</strong><br />

public procurement online' and 'simple procedures online for cross-border services'. Pilot B runs 'e-<br />

Guidance and e-Government Services', '<strong>European</strong> Citizens' Attention Service', 'e-Government Lowering<br />

Administrative Burdens for Rural Businesses', and a '<strong>European</strong> Civil Registry Network'. The aim of the<br />

EU STORK Project is to establish a '<strong>European</strong> eID Interoperability Platform that will allow citizens to<br />

establish new e-relations across borders, just by presenting their national eID. Cross-border user<br />

authentication for such e-relations will be applied and tested by the project by means of five pilot projects<br />

that will use existing government services in EU Member States' (STORK 2010).<br />

To be successful and competitive in an international environment countries have to be active partners for<br />

cross-national electronic government projects and not simple followers facing time lacks for<br />

implementation and run of electronic government applications.<br />

References<br />

Aichholzer G. and Strau, B.S (2010) The Austrian case: multi-card concept and the relationship between citizen ID<br />

and social security cards, Identity in the Information Society, March, 2010, Springer Netherlands.<br />

Aichholzer G. and Schmutzer R (1999) E-Government - Elektronische Informationsdienste auf Bundesebene in<br />

Österreich, Institut für Technikfolgen-Abschätzung der österreichischen Akademie der Wissenschaften Wien.<br />

Al-Sebie, M. and Irani, Z. (2003) E-Government: Defining Boundaries and Lifecycle maturity, In Proceedings of the<br />

3rd <strong>European</strong> <strong>Conference</strong> on e-Government, Ireland: Trinity College of Dublin, 2003, pp 19-29.<br />

Austrian Federal Government, [online], www.verwaltungskostensenken.at<br />

Budde, P. (Ed.) (2010) World Digital Economy - E-Government, E-Health and E-Education Trends, report,Australia<br />

Burn, J. and Robins, G. (2003) Moving towards e-government: a case study of organizational change processes,<br />

Logistics Information Management, Vol. 16, No. 1, pp 25-35.<br />

Chesher, M., Kaura, R. and Linton, P. (2003) Electronic Business & Commerce, Springer, London.<br />

Claver-Cortés, E., de Juana-Espinosa, S. & Tari, J. (2006) e-Government maturity at Spanish local levels, In<br />

Proceedings of the 2006 EMCIS <strong>Conference</strong>, Alicante, Spain, 2006.<br />

Digital Austria, [online], www.digitales.oesterreich.gv.at.<br />

Ebrahim, Z. and Irani, Z. (2005) E-government adoption: architecture and barriers, Business Process Management<br />

Journal (Vol. 11, No. 5, pp 589-611.<br />

Erkollar, A. and Oberer, B. (2010) Globally branded E-Government IBIMA Publishing, Communications of the IBIMA,<br />

Vol. 2010 (2010), Article ID 267975.<br />

Federal Chancellery Austria, [online], www.austria.gv.at<br />

Georgescu, M. R. and Georgenscu, I. (2008) Do we Need a Powerful E-Government? IBIMA Publishing,<br />

Communications of the IBIMA, Vol. 5.<br />

Oberer, B. (2002) International Electronic Government Approaches, 35th Annual Hawaii International <strong>Conference</strong> on<br />

System Sciences (HICSS'02), Vol. 5, pp 127-133.<br />

Rupp, Ch. (2004) E-democracy in E-Austria, In Prosser, A. and Krimmer, R. (Eds.) (2004) 'Electronic Voting in<br />

Europe – technologies, law, politics and society, Proceedings Vol. P-47 (2004). Workshop of the ESF TED<br />

programme together with GI and OCG, June 7 -9, 2004, Bregenz, Austria. pp17-20.<br />

Simon, K.D. (2005) The value of open standards and open-source software in government environments, IBM<br />

Systems Journal, Vol. 44, No. 2, pp 227-238.<br />

STORK, secure identity across borders linked, URL: http://www.eid-stork.eu<br />

United Nations Department of Economic and Social Affairs (2010) UN Government survey 2010: Leveraging egovernment<br />

at a time of financial and economic crisis, [online],<br />

http://unpan1.un.org/intradoc/groups/public/documents/UN-DPADM/UNPAN038853.pdf<br />

United Nations Department of Economic and Social Affairs (2008) UN Government survey 2008: from eGovernment<br />

to Connected Governance, [online],<br />

http://unpan1.un.org/intradoc/groups/public/documents/UN/UNPAN028607.pdf<br />

431


Smoke and Mirrors: Can a Useful Approximation of the<br />

Cigarette tax gap be Determined?<br />

Clare Omelia<br />

Irish Revenue Commissioners, Dublin, Ireland<br />

comelia@revenue.ie<br />

Abstract: The tax revenue derived from cigarettes is a key contributor to the Irish Exchequer. Total net revenue<br />

receipts for 2009 amounted to €33.28 billion and within that, receipts of excise on cigarettes amounted to €1.159<br />

billion. The estimated return for VAT on cigarettes for 2009 is €0.325bn. Therefore, taken together, excise and VAT<br />

on cigarettes amount to a significant 4.5% of total net revenue receipts returned to the Exchequer. However,<br />

governments, health lobbies and tobacco companies universally acknowledge that the illicit trade in cigarettes is<br />

significant and growing and the consequent displacement of trade from the regulated to the unregulated market will<br />

reduce revenue, increase enforcement costs, and effectively undermine the fiscal planning process. This paper<br />

explores whether a useful approximation of the cigarette tax gap in Ireland can be arrived at. The factors affecting the<br />

cigarette tax gap are considered, and various approximation techniques are reviewed in order to choose a method<br />

that is appropriate in terms of cost and complexity. The selected method is adapted to Irish circumstances and<br />

applied for the years 2006-2009 to approximate the notional cigarette tax gap in Ireland for each of these years,<br />

highlighting that a significant cigarette tax gap exists and is growing.<br />

Keywords: Ireland, cigarette tax, illicit market, tax gap, tax gap approximation<br />

1. Introduction<br />

Government budget deficits by their nature create uncertainty, which can raise questions about fiscal<br />

policy and economic stability. In the context of Ireland’s national debt crisis, the economic recession,<br />

diminishing Exchequer returns and increasing pressure on the public purse, it is appropriate to monitor<br />

any erosion of the tax base.<br />

The “tax gap" is defined for the purposes of this paper as the difference between the tax revenue legally<br />

due to the Exchequer and the amount actually collected. It exists because revenue is lost due to error,<br />

non-payment, tax avoidance, evasion and fraud, and is sometimes described as the difference between<br />

potential and actual tax revenue. While actual tax collected by tax type can be measured with relative<br />

ease, significant challenges arise in obtaining a reasonably accurate measure of potential tax revenue.<br />

One of the reasons for the difficulty is that fraud is a significant element of revenue loss in the general tax<br />

gap. This is especially so in the case of cigarette tax. Cigarettes are lightweight, compact and highly<br />

taxed. Cigarette transport costs are relatively insignificant due to their high value-to-weight ratio and this<br />

renders them suitable for illicit trade. Despite regular increases in cigarette taxes, Ireland is currently<br />

experiencing disappointing tax returns in this area. It is of course possible that consumption has fallen in<br />

response to tax increases, anti-smoking initiatives and concerns about health. It is also possible that<br />

there has been significant product substitution (such as a switch to hand rolling tobacco), or other<br />

legitimate tax avoidance (e.g., cross border and duty free purchases). The alternative explanation is tax<br />

evasion and fraud.<br />

Deployment of mobile scanner technology is among the range of initiatives in place to improve antismuggling<br />

capability. Review of the effectiveness of this and other detection technologies is an essential<br />

element of any strategy to combat the illicit trade in cigarettes. In developing an effective response to<br />

erosion of the cigarette tax base and also to justify further investment in technology, it would be helpful to<br />

have a workable mechanism to approximate the extent of the tax loss and track changes. This paper<br />

explores whether a useful approximation of the cigarette tax gap in Ireland can be determined.<br />

The remainder of the paper is set out as follows. Section two briefly reviews the literature on tax gaps<br />

and the illicit cigarette trade. Section three examines cigarette tax in an Irish context and the factors<br />

affecting the tax gap, while section four investigates potential tax gap approximation methods. Section<br />

five describes how the measurement mechanism considered most appropriate in an Irish context is<br />

adapted and applied to approximate the Irish cigarette tax gap for each of the years from 2006 to 2009.<br />

Section six assesses the usefulness of the potential measure and concludes.<br />

432


2. Relevant literature<br />

Clare Omelia<br />

The literature indicates general agreement that the term ‘tax gap’ refers to tax revenue not collected and<br />

that the limitations of tax gap estimates are outweighed by potential benefits. Bird (2004) summarises the<br />

importance of general tax gap estimates in terms of maintaining and improving existing levels of<br />

compliance and facilitating fiscal planning. Feige (1990) contends that some method of measurement of<br />

the economic activity that takes place in the underground economy is essential to making informed policy<br />

decisions, arguing that “...while measurement alone is unlikely to provide definitive answers, it is sure<br />

folly to proceed without it.”<br />

Much work has been done both in the area of estimating the size of the hidden economy, (Feige 1982),<br />

(Frey and Weck Hannemann 1984), and of measuring tax evasion. One general approach to measuring a<br />

country’s tax gap, known as the ‘top down’ approach, uses aggregate data to estimate the size of the<br />

underground economy and multiplies this by the effective tax rate. Barthelemy (1988) and Schneider and<br />

Enste (2002) find that this macro approach has significant weaknesses and limitations.<br />

The literature does not always distinguish between cigarette tax avoidance and evasion. Saba et al<br />

(1995) found significant evidence of US citizens crossing state borders to purchase lower-priced<br />

cigarettes. In particular, they found that residents in high-tax jurisdictions, close to low-tax jurisdictions<br />

were very likely to cross the border to purchase. The factors influencing the level of cigarette smuggling<br />

include the income level in the country, the tax inclusive price of cigarettes, presence of informal<br />

distribution networks, tobacco industry participation, organised crime and corruption (Merriman et al.<br />

2000). The literature suggests a variety of estimates of the extent of cigarette smuggling. In 2000,<br />

Merriman et al summarised implied estimates of tax evasion, finding that worldwide cigarette smuggling<br />

could account for 6%-8.5% of consumption. More recently, Joossens et al. (2008) review a range of<br />

estimates and conclude that around 2007, 11.6% of the global cigarette market was illicit.<br />

Stehr (2005) compared consumption data from a telephone survey to tax-paid cigarette sales in the US,<br />

noting that reported consumption as a percentage of tax-paid sales averaged 57.1% from 1985 to 2001<br />

and indicating an issue in relation to under-reporting in such surveys. An earlier study of Mexican<br />

American smokers by Perez-Stable et al (1990) found occasional and light smokers under-reported their<br />

consumption by 20-25%, regular smokers by 8-10% and heavy smokers by 2-9%.<br />

The literature confirms that fraud and evasion are significant contributors to the tax gap. Inherent<br />

difficulties are identified in measuring tax evasion in general and cigarette tax evasion in particular. Selfreported<br />

consumption data has been shown to understate consumption levels. Despite these concerns,<br />

there appears to be widespread agreement that tax gap approximation adds value. It is increasingly<br />

recognised that such work can complement other forms of compliance and risk management, and can<br />

alert revenue authorities to emerging difficulties.<br />

3. Cigarette taxation in Ireland<br />

Excise taxes, or levies on specific commodities, have existed since the foundation of the State. While<br />

historically the primary aim of tobacco taxation was revenue generation, it is now increasingly used as a<br />

deterrent to consumption, to promote public health by reducing smoking. The tax on cigarettes in Ireland<br />

comprises three elements:<br />

A specific excise of a fixed amount per thousand cigarettes plus<br />

An ad valorem excise, levied at a fixed percentage of retail selling price (RSP) plus<br />

Value Added Tax (VAT)<br />

Customs duty in the form of Common Customs Tariff (CCT) is also chargeable on import of cigarettes<br />

from countries outside the EU.<br />

As the body of medical evidence on the negative health consequences of smoking grows, popular<br />

support for the Government health protection strategy and its objective of curbing smoking increases.<br />

Ireland is noted internationally as being to the forefront in implementing a range of tobacco control<br />

policies, which include tobacco taxation. In 2004, Ireland became the first EU country to implement a<br />

smoking ban. In 2007 and again in 2008 the Department of Health and Children raised the minimum price<br />

of cigarettes. During this period there were also notable increases in excise duty on cigarettes, which<br />

433


Clare Omelia<br />

increased in each of the five Government Budgets from 2006 to 2009. The total increase in specific duty<br />

per one thousand cigarettes in this period was 38%.<br />

Table 1: Rate of excise duty on cigarettes 2006-2009<br />

Year Specific duty per 1000<br />

cigs<br />

% var on last year Ad valorem duty as % of<br />

RSP<br />

Notes<br />

2006 133.39 18.32%<br />

2007 151.37 +13% 17.78%<br />

2008 160.57 +6% 17.92%<br />

2009 175.30 +9% 18.28% Oct 08 Budget<br />

2009 183.42 +5% 18.25% Apr 09 Budget<br />

Source: Revenue Commissioners Statistical Reports<br />

The tax inclusive retail selling price (RSP) of a standard pack of twenty Marlboro Red cigarettes in Ireland<br />

is 18% higher than that in our nearest neighbour the UK and 234% higher than the RSP in Estonia.<br />

Price € for 20 Marlboro<br />

9<br />

8<br />

7<br />

6<br />

5<br />

4<br />

3<br />

2<br />

1<br />

0<br />

EU Cigarette RSP Comparison April 2010<br />

8.55<br />

7.22<br />

2.63 2.65 2.56<br />

Country<br />

Figure 1: Cigarette price comparison within EU (source: Philip Morris International (PMI))<br />

Ireland<br />

UK<br />

Latvia<br />

Poland<br />

Estonia<br />

In Ireland, excise and VAT currently account for almost 79% of RSP of a pack of 20 cigarettes and the<br />

excise yield per 1000 cigarettes, at €260.98, is the highest in the EU. (<strong>European</strong> Commission 2010).<br />

The rational consumer response to high taxation is to minimise, avoid or evade the tax. There are a<br />

number of ways to reduce or escape cigarette tax without affecting ones level of consumption. This can<br />

be achieved legally by travelling to a low-tax jurisdiction to purchase cigarettes for personal use.<br />

Difference in price and the extent of international travel are key determinants of the extent of cross-border<br />

duty paid and duty-free cigarette purchases and it appears reasonable to assume that cigarettes<br />

purchased abroad are an element of total cigarette consumption in Ireland.<br />

Another option is to switch to a cheaper substitute product for manufactured cigarettes. In the period<br />

2006-2009, the quantity of RYO tobacco on which duty was paid more than doubled, suggesting that<br />

reduced Exchequer receipts of cigarette tax may be partly attributable to product substitution and a<br />

switch by consumers to RYO tobacco. Of course, the issue of smuggling RYO also arises as an element of the<br />

overall tobacco tax gap. However, this is outside the scope of this paper and RYO is dealt with only insofar as it is a<br />

substitute product for manufactured cigarettes.<br />

Alternatively, tax can be evaded by purchasing smuggled and counterfeit cigarettes within the<br />

underground economy. While it is clear that high taxation may reduce the demand for cigarettes, it is<br />

434


Clare Omelia<br />

equally clear that it specifically reduces the demand for highly taxed cigarettes. Thus, within the<br />

progression of normal consumer responses to taxation is introduced a displacement of demand from the<br />

regulated to the illicit market.<br />

In its submission to the Commission on Taxation in 2009, the Irish Tobacco Manufacturers Advisory<br />

Committee (ITMAC) stated that Irish people spend €2bn on cigarettes annually, approximately 20% of<br />

which are smuggled into Ireland resulting in a loss to the Exchequer of some €387m. In 2009, the (then)<br />

Irish Minister for Finance commented that, “While Revenue are not in a position to estimate the volume of<br />

smuggled cigarettes, they very tentatively estimate that about 20% of cigarettes consumed in Ireland may<br />

be untaxed. This however included substantial quantities of legitimate personal imports from other EU<br />

Member States and should be treated with caution”. (Lenihan 2009). Paul Cullen, writing in the Irish<br />

Times suggests “[Ireland is] The cigarette smuggling centre of Europe....the country is a tobacco<br />

smuggling black spot and a quarter of the cigarettes smoked here are illegal”. (Cullen 2010). The<br />

consensus view is that a significant part of the cigarette market in Ireland is illicit trade operating in the<br />

hidden economy.<br />

Figure 2: Annual RYO tobacco duty paid (source: revenue commissioners statistical reports)<br />

In period from 2006 to 2009, cigarette tax rates in Ireland increased progressively. Estimates by the<br />

Central Statistics Office indicate no decline in the ‘potential smokers’ population (aged fifteen years and<br />

over) in this period, and cigarette consumption surveys suggest no substantial change in smoking<br />

prevalence or in levels of cigarette consumption. It would therefore be expected that the number of<br />

cigarettes on which tax was paid would remain consistent and the amount of excise duty collected would<br />

increase. This was not the case. In 2009, the rate of excise duty on cigarettes increased twice and<br />

between 2008 and 2009 the duty collected on cigarettes increased by 2%. However, during this same<br />

period, the quantity of cigarettes on which duty was paid fell by 7%, indicating that a significant and<br />

persistent cigarette tax gap has emerged in Ireland. The facts are set out by the data in Table 2 and<br />

illustrated in Figure 3.<br />

Table 2: Quantity of cigarettes duty paid and amount collected 2006-2009.<br />

Year €m Duty collected % var on last year Quantity 000s Cigs duty % var on last year<br />

paid<br />

2006 1,071 5,604,884<br />

2007 1,155 +8% 5,401,702 -4%<br />

2008 1,132 -2% 4,940,567 -9%<br />

2009 1,159 +2% 4,607,146 -7%<br />

Source: Revenue Commissioners Annual Reports and Statistical Reports<br />

435


Figure 3: Fall in quantity of cigarettes duty paid<br />

4. Measurement options<br />

Clare Omelia<br />

Approximation of the cigarette tax gap requires a measurement of the illicit trade in cigarettes. Estimates<br />

of the extent of the illicit market may be based on academic articles, or compiled by market research<br />

organisations whose clients may be the tobacco industry, the EC, government agencies or health lobbies.<br />

It is common to see such estimates based on customs seizures, and not unusual for the calculation to be<br />

made by multiplying the number of cigarettes seized annually by ten, to arrive at a total estimate. Clearly,<br />

one major seizure such as that of 120 million cigarettes at Greenore Port in County Louth, in October<br />

2009, will skew such estimates. Furthermore, it is a recognised feature of illicit cigarette imports to Ireland<br />

that they are often destined for the Northern Ireland or United Kingdom markets, and are merely<br />

‘transiting’ Ireland. This approach is considered to be unsuitable for approximating of the cigarette tax<br />

gap in Ireland.<br />

An alternative is to measure total cigarette consumption and subtract legitimate consumption, the residual<br />

being the illicit market, from which the revenue loss can be derived. The challenge with this approach is<br />

the accurate measurement of total cigarette consumption.<br />

To assist in arriving at unbiased estimates of cigarette smuggling, the World Bank has developed a<br />

tobacco smuggling measurement toolkit. Five methods are identified to measure illegal circumvention of<br />

tobacco taxes and these are ranked from lower to higher, in terms of their level of technical complexity<br />

and statistical sophistication. The measurement methods are outlined below:<br />

1. Observe the producers and ask the experts for smuggling data.<br />

Experts, such as tobacco industry professionals, tobacco control advocates, academic experts,<br />

journalists, police, customs officials and, if possible, smugglers are identified and interviewed seeking<br />

estimates of changes in, rather than levels of, smuggling. The answers of different experts are weighted<br />

to arrive at a final estimate. While the objectivity of this method is clearly open to question, it can be of<br />

limited indicative use where a quick approximation is required.<br />

2. Observe smokers and ask them about their methods of obtaining cigarettes.<br />

Consumer’s cigarette packs are examined and on-street “show your cigarette pack” surveys and mail-in<br />

surveys are conducted. Social and demographic data about smokers whose packs are examined is also<br />

collected and the data is weighted so that it is representative of the population. This is recognised as a<br />

very high cost exercise requiring a high level of expertise.<br />

3. Monitor data on the import and export of cigarettes.<br />

436


Clare Omelia<br />

Data on recorded imports of cigarettes by country of origin is gathered. This is compared with the<br />

exporting countries’ recorded exports of cigarettes to arrive at an import/export discrepancy figure. Like<br />

method 1 above, this is said to be a suitable method for use when there is little data available and a quick<br />

approximation is required.<br />

4. Compare the sale of cigarettes with estimated consumption by using household surveys.<br />

Data on tax paid sales is compared with estimates of consumption that are based on household surveys<br />

for the same period. These figures used to estimate consumption of illicit cigarettes as a percent of total<br />

estimated consumption.<br />

5. Compare the sale of cigarettes with estimated consumption by using a mathematical formula and<br />

economic inference.<br />

An econometric study of the relationship between observed tax paid sales, variables associated with the<br />

demand for tobacco, and variables associated with smuggling, are used to estimate the level of<br />

smuggling. As the most technically demanding method, this is suitable only where there is adequate time<br />

and expertise is available.<br />

Methods 1,2, 3 and 5 are considered unsuitable for the purposes of this paper for the reasons as<br />

indicated. This leaves Method 4.<br />

5. Adjustment and application of method 4<br />

The six steps involved in the process are set out as follows:<br />

1. Estimate reported consumption from survey data<br />

2. Record tax paid sales from Revenue data<br />

3. Apply an uplift factor for assumed under-reporting<br />

4. Derive estimated consumption (1+3)<br />

5. Estimate the level of smuggling (4-2)<br />

6. Estimated smuggling as a percent of total estimated consumption<br />

Two further steps are added, to estimate legal tax avoidance and to factor in product substitution, given<br />

that both may feature in legitimate consumption in Ireland.<br />

Step 1 - Estimate Reported Cigarette Consumption in Ireland<br />

Household surveys are often seen as a source of independent data on cigarette consumption. However,<br />

we have seen in the literature that respondents to surveys may understate their consumption. Equally,<br />

caution is required in interpreting survey data based on different definitions of smokers, different survey<br />

methods and different sample groups. In search of reliable independent estimates of total cigarette<br />

consumption, a range of data sources was reviewed for this paper.<br />

A Eurobarometer survey was published in May 2010 based on approximately 1000 interviews per<br />

Member State, of citizens aged 15 years or over. Previous such surveys found that 98% of smokers in<br />

Ireland reported that they smoke every day. In 2005 it was found that the average number of cigarettes<br />

smoked per day was 16.7, and this reduced to 16 in 2009.<br />

Euromonitor International provides market research and business intelligence reports to industry. In a<br />

report published in July 2009, smoking prevalence, defined as the percentage of the total adult (aged 18<br />

years and over) population who report that they are daily smokers, was tracked for Ireland.<br />

In 2009, the Irish Department of Health and Children published SLAN 2007 ‘Smoking Patterns in Ireland’.<br />

A smoker was defined as someone who had smoked at least 100 cigarettes in their lifetime, and now<br />

smokes ‘every day’, or ‘some days’ and 10,364 adults aged 18 years or over were interviewed.<br />

437


Clare Omelia<br />

The Office of Tobacco Control conducted monthly tracker surveys from June 2003 to March 2008, of<br />

1000 adults each month, to collect data on smoking status and quantity consumed. A smoker was<br />

defined as someone who had smoked at least 1 cigarette in the previous 12 months. Smokers fell into<br />

four broad categories:<br />

10% of smokers are heavy smokers (21+ cigarettes per day),<br />

45% are regular smokers (11-20 Cigarettes/day),<br />

27% are light (6-10 cigarettes/day) smokers and<br />

18% are occasional (1-5 cigarettes/day) smokers.<br />

If the maximum smoked is 60 per day, this equates to an overall average of 13.7 per day and the data<br />

shows no significant fluctuation over the period.<br />

All these data sources indicate that smoking prevalence and quantity smoked have remained relatively<br />

stable in Ireland in the years 2006 to 2009. The findings of the various prevalence surveys are<br />

summarised below:<br />

Table 3: Summary of smoking prevalence surveys<br />

Year Eurobarometer:<br />

Smokers aged 15 and<br />

over<br />

Euromonitor:<br />

Smokers aged 18 and<br />

over<br />

SLAN 2007:<br />

Smokers aged 18 and<br />

over<br />

OTC:<br />

Smokers aged 18 and<br />

over<br />

2006 29% 20% Na Na<br />

2007 Na 20% 29% 24%<br />

2008 29% 20% Na Na<br />

2009 31% 19% Na Na<br />

While there are disparities in the definitions, the population base surveyed and the results, there are also<br />

some common threads. For the purposes of this paper, these have been pulled together as follows, to<br />

derive an objective basis for estimating cigarette consumption in Ireland in the period 2006 to 2009:<br />

The ‘smoking population’ is calculated as a percent of the total population aged 15 years and over,<br />

based on population estimates supplied by the Central Statistics Office for each of the years 2006-<br />

2009.<br />

A constant estimate of 29% smoking prevalence is used.<br />

A constant estimated average quantity consumed of 16 cigarettes per smoker per day by 98% of all<br />

smokers is used.<br />

This leads to an estimate of total consumption as set out in Table 4 below:<br />

Table 4: Estimate of cigarette consumption<br />

Year Population<br />

aged 15 years<br />

and over (000s)<br />

Smokers<br />

Consumption<br />

Estimate<br />

2006 3375 979 5,601,582<br />

2007 3455 1002 5,734,360<br />

2008 3510 1018 5,825,645<br />

2009 3522 1021 5,845,562<br />

Step 1a - Estimate Legal Cigarette Tax Avoidance<br />

Although legal tax avoidance is not typically a feature of the World Bank’s method four, it has been<br />

identified as a potentially relevant factor in Ireland. The 2009 Eurobarometer survey on Tobacco<br />

included data on EU citizens buying lower-priced cigarettes in another EU country during 2008 (<strong>European</strong><br />

Commission, 2009). The survey found that 20% of the Irish resident sample (both smokers and nonsmokers)<br />

who had travelled, purchased cigarettes at a lower price in another EU country. Focussing on<br />

this 20%, the quantities purchased are set out in Table 5 below.<br />

438


Clare Omelia<br />

Table 5: Declared cigarette quantities purchased abroad<br />

21 packets or more (400+ cigarettes) 7%<br />

11-20 packets (220-400 cigarettes) 6%<br />

5-10 packets (100-200 cigarettes) 5%<br />

1-5 packets (20-100 cigarettes) 2%<br />

While the Eurobarometer estimate refers to purchases in another EU country only, for the purposes of<br />

this paper, the same percentage is used in relation all travellers. Table 6 shows this data extrapolated to<br />

the entire population aged 15 years and over, combined with data from the CSO as to the number of<br />

visits abroad by Irish residents for each of the years 2006-2009. The resulting estimate of cigarettes<br />

purchased that avoid tax are added to tax paid quantities from Revenue data.<br />

Table 6: An approximation of the quantity of cigarettes purchased abroad<br />

2006 2007 2008 2009<br />

Total Population (‘000s) 4,240 4,339 4,422 4,459<br />

Number of visits abroad by Irish residents 6,848 7,713 7,877 7,047<br />

Population aged 15 years and over 3,375 3,455 3,510 3,522<br />

20 per cent purchase cigarettes abroad<br />

Aged 15 years and over, purchased cigarettes abroad 675 691 702 704<br />

Average trips abroad per person 2 2 2 2<br />

7% buy 800 75,600 77,392 78,624 78,893<br />

6% buy 320 25,920 26,534 26,957 27,049<br />

5% buy 160 10,800 11,056 11,232 11,270<br />

2% buy 60 1,620 1,658 1,685 1,691<br />

Number of cigarettes purchased abroad (‘000s) 113,940 116,641 118,498 118,90<br />

3<br />

Step 1b Estimate Product Substitution<br />

Consumers reacting to the high price of cigarettes may switch to a substitute product. Revenue data<br />

shows that in the period 2006-2009 clearances of RYO tobacco more than doubled. Table 7 shows how<br />

an estimate of 25 cigarettes per 12.5g pouch of tobacco has been applied, to derive the estimated<br />

number of RYO cigarettes consumed in each of the years 2006-2009. This is also added to tax paid<br />

quantities, to arrive at total legitimate consumption.<br />

Table 7: EstimatinG PRODUCT SUBSTITUTION by RYO tobacco<br />

2006 2007 2008 2009<br />

RYO Excise duty paid (kgs) 109,461 122,848 128,502 219,985<br />

Equivalent number 12.5g pouches 8,756,880 9,827,840 10,280,160 17,598,800<br />

Average cigarettes (000s) at 25 per pouch 218,922 245,696 257,004 439,970<br />

Step 2 Record Tax Paid Cigarette Sales from Revenue data<br />

439


Clare Omelia<br />

Information is available within Revenue as to the quantity of cigarettes on which excise duty was<br />

collected annually, as set out in Table 2 above.<br />

Step 3 Apply an Uplift Factor for Assumed Under-reporting<br />

An uplift factor is applied to allow for survey respondents understatement of their consumption levels.<br />

For the purposes of this project, an arbitrary uplift factor of 10%, thought to be conservative, has been<br />

applied each year.<br />

Steps 4-6 Estimate of the Illicit Cigarette Market<br />

Data from steps 1 and 3 is used to derive estimated total consumption. Combining this with Revenue<br />

data as to the number of cigarettes on which duty was paid, we derive the estimated illicit market<br />

percentage of total consumption as set out in Table 8 and illustrated in Figure 4 below.<br />

Table 8: Estimating illicit market percentage of total consumption<br />

2006 2007 2008 2009<br />

Total consumption 5,828,878 5,945,459 6,032,708 5,871,245<br />

Duty-paid 5,604,884 5,401,702 4,940,567 4,607,146<br />

Estimated illicit consumption 223,994 534,575 1,092,141 1,267,099<br />

Estimated illicit market percentage 4 9 17 20<br />

The emerging trend over the period from 2006 to 2009 is of a significant escalation in the proportion of<br />

cigarettes consumed that are likely to have been supplied by the illicit market.<br />

Figure 4: Estimated illicit market percentage of total consumption (source: Derived as set above)<br />

Approximating the Cigarette Tax Gap<br />

The tax loss is calculated by applying the relevant tax rates for each year to the estimated illicit cigarettes<br />

traded. It should be noted that the ad valorem rate of excise is based on the brand RSP and for the<br />

purposes of this project calculations are based on the RSP of a standard pack of 20 cigarettes of<br />

“unknown brand” in each year. This is the minimum RSP for cigarettes, as set by the Minister for Health<br />

and Children.<br />

The approximated cigarette tax gap for each of the years 2006-2009 is depicted in Figure 5:<br />

440


Clare Omelia<br />

Figure 5: Approximate cigarette tax gap €bn.(source: Derived as set out above)<br />

Given that total net tax receipts by the Irish Exchequer for 2009 were €32.28bn, the cigarette tax gap for<br />

2009 represents approximately 1.25% of Exchequer funds.<br />

6. Assessment and conclusions<br />

When demand for a popular commodity shifts from the regulated to the illicit market, the problems faced<br />

by our society are broader in their range than purely fiscal. That said, the relative simplicity of cigarette<br />

tax collection and the negative health effects of smoking, mark the commodity out as a sensible and<br />

politically acceptable target for taxation and there are obvious benefits in quantifying and monitoring any<br />

significant erosion of this tax base.<br />

Tax gap approximation is useful in indicating the existence of a tax compliance problem or warning of its<br />

emergence, suggesting the size of the problem and showing whether it is escalating or diminishing.<br />

However, any exercise based on estimates, extrapolation and data gathered from groups with vested<br />

interests has obvious limitations. A key question is whether the quality of the data output justifies the<br />

resources invested in deriving the approximation. The compilation of reliable objective cigarette<br />

consumption data is very costly, so the model used in this paper depends on previously published data.<br />

The disadvantages of using data compiled by interest groups are acknowledged, as is the established<br />

under-reporting bias in consumer surveys. Significant over- or under-estimation of any of the variables<br />

will seriously undermine the outcome of the exercise. Therefore, the findings carry a substantial ‘health<br />

warning’.<br />

Reliable consumption data is critical in this exercise and there is much scope for review and refinement of<br />

the data used here. Statistical assessment of all available data may produce a more reliable basis for<br />

estimating consumption. More detailed research into the phenomenon of under-reporting should be<br />

undertaken and the ‘uplift factor’ refined. The extent of legitimate importation of cigarettes from within the<br />

EU and from elsewhere merits further research, as does the extent of product substitution.<br />

Limitations aside, approximation and monitoring of the cigarette tax gap can focus attention on the factors<br />

that affect erosion of this tax base and can inform Revenue’s response to the issue. In the absence of<br />

another reliable measurement mechanism, such an approximation could be particularly useful in<br />

determining the effectiveness of the enforcement effort, possibly providing a trigger for changes in<br />

approach. It could be a reference in investment decisions for anti-smuggling technology such as<br />

scanning/imaging equipment, which require a large capital outlay. In considering whether to raise taxes<br />

further, it could also be a helpful reference in gauging the point of diminishing returns.<br />

Revenue’s primary goal is to ensure that all tax legally due is collected. While an approximation can<br />

never provide definitive answers, a consensus exists that it is an essential staring point in addressing the<br />

problem of tax base erosion. This paper set out to explore whether a useful approximation of the cigarette<br />

tax gap can be determined. From the methods suggested in the literature an approach suitable to Ireland<br />

441


Clare Omelia<br />

was adapted and applied for each of the years 2006-2009. The notional gap between actual and potential<br />

cigarette tax for each of these years has been approximated, clearly illustrating that a cigarette tax gap<br />

exists and is growing. With some refinement, the approach outlined in this paper has a potential<br />

application in focussing attention on the factors driving the illicit market and assisting in decision-making<br />

when responding to the erosion of this tax base.<br />

References<br />

Barthelemy P (1988) The Macroeconomic Estimates of the Hidden Economy: A Critical Analysis. Review of Income<br />

and Wealth, 34, 183-208<br />

Bird R (2004) Administrative Dimensions of Tax Reform. Asia-Pacific Tax Bulletin, 20, 134-150.<br />

Central Statistics Office. (2010) Population by Single year of Age and Sex.<br />

Central Statistics Office. Overseas Visits to and from Ireland (Thousand) by Visitor Detail and Year<br />

Comptroller and Auditor General. (2010). Central Government and Revenue. In Accounts of the Public Services<br />

2009.<br />

Cullen, P. (2010) The Cigarette Smuggling Centre of Europe. Irish Times, 20 February.<br />

Department of Health and Children. (2007). SLAN 2007, Survey of Life Attitudes and Nutrition in Ireland, Smoking<br />

Patterns in Ireland: Implications for Policy and Services. Dublin.<br />

Euromonitor International. (2009).Country Sector Briefing Cigarettes – Ireland.<br />

Euromonitor International. (2010) Illicit Trade in Tobacco Products – A World View.<br />

<strong>European</strong> Commission, Special Eurobarometer 239, Attitudes of <strong>European</strong>s towards Tobacco, January 2006.<br />

<strong>European</strong> Commission, Special Eurobarometer 272, Attitudes of <strong>European</strong>s towards Tobacco, May 2007<br />

<strong>European</strong> Commission, Special Eurobarometer 272c, Attitudes of <strong>European</strong>s towards Tobacco, May 2007<br />

<strong>European</strong> Commission, Flash Eurobarometer 253, Survey on Tobacco, Analytical Report, March 2009.<br />

<strong>European</strong> Commission, Special Eurobarometer 332, Tobacco, May 2010<br />

<strong>European</strong> Commission. Directorate General Taxation and Customs Union. Excise Duty Tables Part III Manufactured<br />

Tobacco, 7, July 2010.<br />

Feige E L (1982) A new perspective on macroeconomic phenomena: the theory and measurement of the unobserved<br />

economy in the United States: causes consequences and implications. In Walker M (ed) International Burden of<br />

Government, (pp112-136) The Fraser Institute Vancouver.<br />

Feige E L (1990) Defining and Estimating Underground and Informal Economies: The New Institutional Economics<br />

Approach. World Development 18(7), 989-1002<br />

Frey B S and Weck-Hanneman H (1984) The Hidden Economy as an unobserved variable. <strong>European</strong> Economic<br />

Review, 112, 33 -53<br />

Irish Revenue Commissioners. Revenue Annual Reports 2006-2009. Dublin.<br />

Irish Revenue Commissioners. Revenue Statistical Reports 2006-2009. Dublin.<br />

Irish Tobacco Manufacturers Advisory Committee. (2009). Submission to the Commission on Taxation.<br />

Joossens L, Ross H, Merriman D, & Raw M (2008). How eliminating the global illicit cigarette trade would increase<br />

tax revenue and save lives, Paris: The International Union against Tuberculosis and Lung Disease.<br />

Lakhdar CB (2008) Quantitative and qualitative estimates of cross-border tobacco shopping and tobacco smuggling<br />

in France. Tobacco Control 17, 12-16.<br />

Loveheim, M F (2008) How far to the border? The extent and impact of cross border casual cigarette smuggling.<br />

Stanford Institute for Economic Research Discussion Paper.<br />

Merriman D. Understand, Measure and Combat Tobacco Smuggling. In A Yurelki & J de Beyer (Eds.) World bank<br />

Economics of Tobacco Toolkit.<br />

Merriman D, Yurelki A, and Chaloupka F (2000) How big is the worldwide cigarette smuggling problem? pp365-392<br />

In Tobacco Control in Developing Countries eds P Jha and F J Chaloupka), London, Oxford University Press<br />

Office of Tobacco Control.2009) Research Programmes. Dublin.<br />

Perez- Stable EJ, Vanoss Marin B, Marin G, Brody DJ, Benowitz, NL (1990) Apparent Underreporting of Cigarette<br />

Consumption among Mexican American Smokers. American Journal of Public Health 80 (9).<br />

Saba R P, Beard T R, Ekelund R B and Ressler R (1995) The Demand for Cigarette Smuggling. Economic Inquiry<br />

33(2) 189-202<br />

Schneider F and D H Enste (2002) The Shadow Economy – An International Survey, Cambridge, England:<br />

Cambridge University Press<br />

Stehr M (2005) Cigarette Tax Avoidance and Evasion. Journal of Health Economics. 24(2), 277-297.<br />

Thursby J G and Thursby M C (2000) Interstate cigarette bootlegging: extent, revenue losses and effects of federal<br />

intervention. National Tax Journal 5(1) 59-78.<br />

442


Adopting Web 2.0 in Building Participatory eGovernment: A<br />

Perception Contour From Inside the Government<br />

Ching-Heng Pan 1 and Lichun Chiang 2<br />

1<br />

National Chung Hsing University, Taichung, Taiwan<br />

2<br />

National Cheng Kung University, Tainan, Taiwan<br />

chpan@nchu.edu.tw<br />

lcchiang@mail.ncku.edu.tw<br />

Abstract: Nowadays, the government is searching for new ideas to improve public governance so that it is not only<br />

more cost-effective in service delivery but also more responsive to the needs of multiple stakeholders including the<br />

citizens, political authorities, and administrative bodies. The Web technologies and applications have entered the<br />

phase of the conceptual umbrella of Web 2.0, which has been drawing increasing attention from public agencies. It is<br />

argued that Web 2.0 applications such as blogs, wikis, web syndication or web feeds, and a number of social<br />

networking services are useful tools for enhancing interactive collaboration and public participation. Web 2.0 can<br />

facilitate better service delivery by offering a platform where the government officials can exchange information more<br />

efficiently. Web 2.0 may as well help establish citizen-centric initiatives that reflect the core values of public services<br />

such as responsiveness, transparency, and social inclusiveness. In turn, this paper empirically examines the<br />

proposition that Web 2.0 enhances citizen participation. The literature suggests that the adoption and diffusion of<br />

technology-based initiative is subject to bureaucrat attitude. The purpose of this paper aims to explore government<br />

officials’ perception and intention to adopt Web 2.0-based citizen participation initiatives. The research model<br />

integrates the concepts of Technology Acceptance Model (TAM). A questionnaire is used to measure government<br />

officials’ intention to adopt Web 2.0 in eGovernment. Structural Equation Modeling (SEM) is used to further analyze<br />

the data and to design a theoretical model delineating the effects of perceived ease of use, perceived usefulness of<br />

e-services, attitude and trust. As the government is paying increasing attention to what Web 2.0 has to offer in public<br />

governance, this paper proposes a synthetic model in a timely manner to understand government officials’ intention as<br />

well as perceived obstacles to adopt Web 2.0 in participatory eGovernment initiatives.<br />

Keywords: technology acceptance model (TAM), Structural Equation Modeling (SEM), Web 2.0, public consultation<br />

1. Introduction<br />

In the first decade of the 21 st century, one of the most phenomenal trends in the internet world has been<br />

the growth of Web 2.0, a conceptual umbrella that describes the recent development of internet<br />

technologies and applications. The potential benefits of Web 2.0 are multifaceted. One key aspect is the<br />

remarkable networking capability that may pool people from around the globe to be “on the same page.”<br />

Private firms are seeking business opportunities by incorporate wikis, blogs, Facebook, Twitter, and other<br />

social networking services into their marketing strategy. The Web has become an indispensible platform<br />

for many firms to maintain good relationship with their customers. Governments are also aware that Web<br />

technologies can be of use to improve citizen engagement. Ever since the New Public Management era,<br />

concurrent with the take-off of internet usage, democratic governments around the globe have turned to<br />

utilizing internet technology to make the policy process more deliberative, transparent and citizen-centric.<br />

The positive experience of Web 2.0 applications that facilitate participation in the marketing context and<br />

political campaigns has drawn the attention of eGovernment reformers, who have been searching for<br />

ideas to improve public governance so it can be more responsive to the needs of diverse policy<br />

stakeholders. If Web 2.0 applications, characterized by participation, collaboration and network effects are<br />

effectively adopted to connect the government and the citizens, it will help reshape the governance<br />

structure and turn people from inert stakeholders to proactive designers and co-innovators of public<br />

policies (Tapscott & Williams 2006).<br />

This study specifically examines people’s perceptions of trust and their attitudes toward using Web 2.0 for<br />

public consultation. Social network service has been fast to gain general acceptance, suggesting that<br />

users hold positive attitudes toward it. Social network site such as Facebook, MySpace, and Twitter is a<br />

major category of Web 2.0 applications, and it would be an important venue for public consultation should<br />

the government chooses to deploy online public consultation. Besides the popularity of this Web 2.0<br />

application, the literature indicates that security and privacy are major concerns of using social network<br />

sites (Cain 2008). The perception of compromised security and privacy may result in lower user trust in<br />

participating in online communities. Meanwhile, other study shows that users were either unaware or<br />

unconcerned about their personal privacy while using social network services (Govani & Pashley 2005). If<br />

the government uses social network site as platform for public consultation, what would be the important<br />

factors that affect policy stakeholders’ intentions to use the platform?<br />

443


Ching-Heng Pan and Lichun Chiang<br />

The Technology Acceptance Model (TAM), a widely used model in management of information systems,<br />

offers an explanation of the determinants of adoption of a wide range of technology innovations (Davis<br />

1989; Davis, Bagozzi, & Warshaw 1989; Venkatesh, Morris, Davis & Davis 2003). TAM theorizes that an<br />

individual’s behavioral intention to adopt a new technology is determined by the person’s attitude toward<br />

the use of the technology, and attitude is determined by two basic beliefs: perceived ease of use and<br />

perceived usefulness. The literature also shows that trust is an important factor of purchase intention in an<br />

e-commerce context (Gefen 2002; Koufaris & Hampton-Sosa 2004). In the context of eGovernment, the<br />

lack of citizen trust brought on by the novelty and uncertainty of online transactions has inhibited the<br />

widespread acceptance for public e-services (Tan, Benbasat & Cenfetelli 2008; Susanto & Goodwin<br />

2010). Citizen trust is also deemed as a determinant of using e-voting system (Oostveen & Besselaar<br />

2005; Alvarez & Hall 2006). The underpinning rationale is that online environment is usually characterized<br />

by anonymity, uncertainty, and lack of control. These characteristics are simply stronger in a Web 2.0<br />

environment because Web 2.0 architecture diminishes centrality and control. User generated content<br />

becomes the core of a Web 2.0 service, and the service gets better as more people use it (O’Reilly 2005).<br />

The notion of relaxing control may bring about distrust in information authenticity and privacy protection. In<br />

turn, this study includes the perception of trust in the research model to explain the intention to use a Web<br />

2.0-based platform for public consultation. In sum, this study is composed of five constructs: (1) perceived<br />

ease of use, (2) perceived usefulness, (3) attitude toward Web 2.0-based public consultation platform, (4)<br />

trust, and (5) intention to use Web 2.0-based public consultation platform. Questionnaires were used to<br />

collect data and measure the five constructs. Structural Equation Modeling with LISREL 8.54 was used to<br />

analyze the research model.<br />

This paper is divided into four main parts: First, a review of the theoretical literature on Web 2.0 and the<br />

implication of citizen participation, and discussion on some of the experimental evidence in support of the<br />

theory. The second part describes the research method used in this paper, including the methodological<br />

approach, the variables used in the analysis, the sampling of cases and the questionnaire design. In the<br />

third part, data analysis and results are presented. Finally, a discussion of these results is provided along<br />

with description of some of the implications and future work to be done in this research area.<br />

2. Literature review<br />

2.1 Bureaucrat perception of Web 2.0 and participatory eGovernment<br />

The government ought to include public opinion in the political process by creating diverse participative<br />

mechanisms in order to build a responsive and legitimate “strong democracy” (Barber 1984). In the era of<br />

Web 2.0 that began in the early 2000s, the notion of e-governance has expanded to encompass<br />

e-citizenship and e-democracy that involve the general public in the policy process through e-engagement<br />

and e-participation (Misra 2008). The meaning of Web 2.0 may be diverse, but the notion is centered on<br />

the concept of “the Web as platform” on which all users including program developers and corporates<br />

interact with one another for pursuing their respective interests. Norris (2001) construed civic engagement<br />

from three aspects - political knowledge on public affairs, trust in the political system, and the impacts of<br />

participation on policy decisions. Web 2.0 applications are characterized by participation, collaboration<br />

and network effects. If the government effectively adopts the applications to connect with citizens, it will<br />

help reshape the governance structure and turn people from inert stakeholders to proactive designers and<br />

co-innovators of public policies (Tapscott & Williams 2006).<br />

Neutral information technologies can impact organizations and institutions through the hands of<br />

bureaucrats (Fountain 2001). The success of adoption depends on how organization members use it.<br />

Positive outcomes result from user acceptance and maturity of usage. For the full benefits of the<br />

interactive consultation platform to be realized, members within the supplying organizations must hold<br />

positive attitudes toward the platform. Therefore, e-participation is not an issue merely about the citizens.<br />

The attitude of the government employees who are responsible for operating the platform therefore is a<br />

crucial factor of successful adoption. Web 2.0 offers a new venue for public consultation, of which<br />

bureaucratic attitudes toward the venue is an important contingency.<br />

2.2 Attitude, trust and technology acceptance in using Web 2.0<br />

Since Davis (1989) provided the TAM as a theoretical foundation for analyzing behavioral intention, TAM<br />

has been widely used to empirically test and explain the use of information technology (Ma & Liu 2004).<br />

TAM theorizes that a person’s behavioral intention to adopt a new technology is subject to the person’s<br />

attitude toward the technology, and attitude is the function of perceived ease of use and perceived<br />

444


Ching-Heng Pan and Lichun Chiang<br />

usefulness. This model focuses on the attitudinal explanations of individual intentions to use a specific<br />

technology. TAM involves two primary predictors: perceived ease of use and perceived usefulness; the<br />

model uses the dependent variable of behavioral intention as a function of attitude toward use of a<br />

technology. In adopting new information technologies, user attitudes directly or indirectly affect their<br />

intention to use because only when a person holds a positive attitude toward the new technology would he<br />

or she have the intention to use (Davis et al. 1989).<br />

McKnight and Chervany (2001) argue that there are two categories of research on trust. One category<br />

focuses on the typology of trust construct such as attitudes, beliefs, behaviors and dispositions; the other<br />

refers to the object of trust such as someone or something. Warkentin et al. (2002) argue that trust in<br />

technology and trust in government are determinants of using electronic service offered by the<br />

government, which suggests that trust is a determinant of the intention to use. Carter and Bélanger (2005)<br />

investigate the factors of using eGovernment services among the citizens and find a positive relationship<br />

between the intention to use and level of trust in the system. It follows that trust also may be a determinant<br />

of the intention to use Web 2.0-based public consultation system.<br />

According to the TAM, the two important beliefs – perceived ease of use (PEU) and perceived usefulness<br />

(PU) – are instrumental in explaining the variance in intention (Agarwal & Prasad 1999; Kramer 1999; Li et<br />

al. 2004). Perceived Ease of use denotes the degree to which a potential adopter perceives using the<br />

referred technology to be relatively free of effort. Perceived usefulness denotes the extent to which a<br />

potential adopter views the referred technology as offering value over alternative ways of performing the<br />

same task (Davis et al. 1989; Gefen, Rose, Warkentin, & Pavlou 2005). In other words, perceived ease of<br />

use refers to the property of a technology that a user can operate without having to overcome a steep<br />

learning curve. Perceived usefulness means that a user believes in the existence of a positive relationship<br />

between use and performance (Davis 1989). The importance of perceived ease of use and perceived<br />

usefulness as determinants of user intention is indicated by their joint effects on attitude towards using the<br />

system, such as e-commerce, information technology, and voting system (Al-Gahtani & King 1999;<br />

Xenakis & Macintosh 2005).<br />

In sum, this study specifies the two determinants of a person’s behavioral intention (IN) to use Web<br />

2.0-based public consultation system: (1) perceived ease of use (PEU), denoting the belief of using the<br />

system without difficulties; (2) perceived usefulness (PU), denoting the belief that using Web 2.0-based<br />

consultation system would enhance one’s job performance. These beliefs affect user attitude and trust of<br />

the system. Specifically, attitude toward using the system (AT) express a person’s preference for the<br />

system, and trust in the system (TR) means that a person willingly accepts the consultation system.<br />

3. Research model and hypotheses<br />

It is commonly hypothesized that perceived ease of use impacts on enjoyment and perceived usefulness<br />

in the acceptance of information technology (Davis et al. 1989, 1993; Agarwal & Prasad 1999; Al-Gahtani<br />

& King 1999; Sa´nchez-Franco 2006). These postulations indicate that perceived ease of use is an<br />

antecedent to perceived usefulness. Furthermore, perceived ease of use and perceived usefulness<br />

influence attitudes toward using the system or IT adoption. The literature on the effect of attitude toward<br />

intention to adopt a technology appears to be indefinite. Yet, Sheppard, Hartwick, and Warshaw (1988) in<br />

their attitudinal research found strong support for using attitude to predict intentions. Chang and Cheung<br />

(2001) found that attitude plays a key mediating role or a partial mediator. These hypotheses are<br />

replicated in H1, H2 and H3.<br />

H1: Perceived Ease of use (PEU) will have positive influence on Perceived Usefulness (PU) in using Web<br />

2.0 for the purpose of public consultation.<br />

H2: Perceived usefulness (PU) will have positive influence on Attitudes (AT) in using Web 2.0 for the<br />

purpose of public consultation.<br />

H3: Attitudes (AT) will have positive influence on Behavioral Intention (IN) in using Web 2.0 for the purpose<br />

of public consultation.<br />

McKnight, Choudhury and Kacmar (2002) argue that people use whatever information they have, such as<br />

perceptions of a web site, to make trust inferences. The decision to engage in eGovernment transactions<br />

requires citizen trust in the government agency providing the service and citizen trust in the technology<br />

through which electronic transactions are executed (Lee & Turban 2001; McKnight et al. 2002). Therefore,<br />

445


Ching-Heng Pan and Lichun Chiang<br />

it is hypothesized that trust directly affects a person’s intention to use Web 2.0-based consultation while<br />

mediating attitude toward the intention to use, as shown in H4 and H5.<br />

H4: Attitudes (AT) will have positive influence on Trust (TR) in using Web 2.0 for the purpose of public<br />

consultation.<br />

H5: Trust (TR) will have positive influence on Behavior Intention (BI) in using Web 2.0 for the purpose of<br />

public consultation.<br />

Figure 1: Research model and hypotheses<br />

The research model and hypotheses are shown in Figure 1. The general form of the model is as follows:<br />

PU =γ1 EU<br />

IN = (ɵ1+ɵ2 β1+ ɵ3α1β1)PU<br />

where perceived usefulness (PU) is influenced by perceived ease of use (PEU). Attitude toward Web 2.0<br />

consultation (AT) reflects the influence of PU. Furthermore, trust in Web 2.0 consultation (TR) is<br />

influenced by AT. Then, γ1, β1, α1 and ɵ1, ɵ2, ɵ3 are correlation coefficients in the multiple regression<br />

analysis.<br />

4. Methodology<br />

4.1 Measures<br />

The study was conducted through a survey of a broad diversity of respondents from. The<br />

operationalization of each construct follows. Perceived Ease of use (PEU) is an indication of user belief in<br />

his/her capability of operating Web 2.0 consultation system without difficulties. PEU is measured by three<br />

question items: (1) Learning to use Web 2.0-based platform for public consultation would be easy for me;<br />

(2) I can easily adapted to the Web 2.0-based consultation system, and (3) It is comprehensible for me<br />

using Web 2.0-based platform for public consultation. Perceived usefulness (PU) is measured by three<br />

questions: (1) Using Web 2.0-based platform for public consultation is helpful to do my job; (2) Using Web<br />

2.0-based platform for public consultation may help improve my job performance; (3) Web 2.0-based<br />

public consultation is useful.<br />

Attitudes (AT) are captured in the following items: (1) Using Web 2.0-based platform for public<br />

consultation is a wise idea; (2) I will support the government to use Web 2.0-based platform for public<br />

consultation; (3) It is a good concept to use Web 2.0-based platform for public consultation.<br />

446


Ching-Heng Pan and Lichun Chiang<br />

Trust (TR) is measured by such questions as: (1) I believe that information or opinions on the public<br />

consultation website would be trustworthy; (2) I believe that most opinions offered in Web 2.0-based<br />

consultation are from people of goodwill; (3) I believe that a Web 2.0-based public consultation system is<br />

trustworthy.<br />

Intention (IN) is measured by the following items: (1) I am willing to use Web 2.0-based platform for public<br />

consultation in the future; (2) I will continue to use Web 2.0-based platform for public consultation in the<br />

future; (3) When I have access to the internet, I will use it for the purpose of public consultation as much as<br />

I possibly can. The question items of the survey were measured using a five-point Likert scale, with 1<br />

indicates strongly disagree and 5 indicates strongly agree.<br />

4.2 Samples<br />

The study adopted a non-probability sampling. The survey was administered in December 2010 to 250<br />

graduate students of the executive master in public administration (EMPA) programs in 10 different<br />

schools, of which the geographical locations are fairly dispersed in Taiwan. The majority of EMPA<br />

students are government employees, who are considered more aware of the issue of public consultation<br />

and capable of reflecting the perceptions of Web 2.0-based consultation from inside the government. Of<br />

the 250 administered questionnaires, 219 were completed and used in the analyses, including 117 males<br />

(53.40%) and 102 females (46.60%). The samples are evenly distributed among age groups, with the<br />

largest group of age 36 to 40 (25%). About 70 percent of the respondents consider themselves having<br />

about average knowledge or knowledgeable of the Internet. Table 1 shows the demographic data of the<br />

samples.<br />

Table 1: Demographic data<br />

Terms<br />

Sex<br />

Frequencies Percentage (%) N=219<br />

Male 117 53.40<br />

Female 102 46.60<br />

Total<br />

Age (Years Old)<br />

219 100<br />

25 and under 10 4.60<br />

26-30 34 15.50<br />

31-35 35 16.00<br />

36-40 55 25.10<br />

41-45 38 17.40<br />

46-50 34 15.50<br />

51-55 4 1.80<br />

Over 56 6 2.70<br />

Missing 3 1.40<br />

Total<br />

Knowledge of the Internet<br />

219 100<br />

Barely 1 0.50<br />

Some 61 27.90<br />

About average 127 58.00<br />

Knowledgeable 27 12.30<br />

Missing 3 1.40<br />

Total 219 100<br />

5. Results and findings<br />

The analytical procedures utilized a two-step approach; the first step used the analysis of the<br />

measurement model and the second step tested the structural relationships among latent constructs (Hair,<br />

Anderson, Tatham, & Black 1998). The aim of the two-step approach was to assess the reliability and<br />

validity of the measures before their use in the full model. The items for each dimension were measured<br />

through a 5-item scale from 1 (strongly disagree) to 5 (strongly agree). In discussing the threshold<br />

reliability of the measures, .60 is a recommended value for a reliable construct (Hu & Bentler 1995). As<br />

447


Ching-Heng Pan and Lichun Chiang<br />

Table 22 shows, the composite reliability values range from .81 to .89 (Cronbach’s α ≥ .60). Confirmatory<br />

Factor Analysis (CFA) was applied to assess the construct validity of the 5 scales (perceived ease of use,<br />

perceived usefulness, attitude, trust, and intention to use Web 2.0-based platform for public consultation)<br />

with LISREL. Each item was modeled as a reflective indicator of its latent construct in the CFA model.<br />

Table 2 presents the results of the CFA analysis. For the average variance extracted by a measure, a<br />

score of .5 indicates acceptability (Jöreskog & Sörbom 1989). Table 2 shows that the average variances<br />

extracted by these measures range from .60 to .75, which fall within the acceptable range.<br />

Table 2: Results of confirmatory factor analysis<br />

Variables Terms Composite Reliability AVE<br />

Perceived Ease of Use (PEU) 3 0.82 0.61<br />

Perceived Usefulness (PU) 3 0.81 0.60<br />

Attitude (AT) 3 0.81 0.61<br />

Trust (TR) 3 0.84 0.64<br />

Intention (IN) 3 0.89 0.75<br />

Note: N = 219, Cronbach’s α should exceed .60, the composite reliability values range from .81 to .89 (Hu<br />

& Bentler 1995), AVE (Average Variance Extracted) should be near .50 (Jöreskog & Sörbom 1989).<br />

As shown in Table 3, the structural model reflecting the assumed linear, causal relationships among the<br />

constructs is tested with the data collected from the validated measures (Bagozzi & Yi 1988; Bentler 1990;<br />

Hair et al. 1998; Hu & Bentler 1995). The model fit indexes are within accepted thresholds: χ 2 to degrees<br />

of freedom ratio of 1.89 (χ 2 = 164.24; df = 85), AGFI = .87, GFI = .91, CFI = .99 and RMSEA = .06. Except<br />

RMSEA that falls slightly below the recommended value, the indexes in general suggest adequate model<br />

fit.<br />

Table 3: Model fit indices for the structural model<br />

Fit indices Results Recommended value<br />

χ 2 (p-value) 160.24 (.01) P ≥ .05<br />

χ 2 /df 1.89 (df=85) P ≤ 3~5<br />

AGFI 0.87 P ≥ .80<br />

GFI 0.91 P ≥ .90<br />

CFI 0.98 P ≥ .80<br />

NFI 0.96 P ≥ .80<br />

RMSEA 0.06 P ≤ .10<br />

Note: GFI: Adjusted Goodness-of-Fit index, GFI: Goodness of Fit Index, CFI: Comparative Fit Index,<br />

NFI=Normed Fit Index, RMSEA: Root Mean Square Error of Approximation.<br />

The results of the analysis are shown in Figure 2. As shown in Figure 2, the ease of use presents a strong<br />

positive effect on perceived usefulness (t = 8.54, p ≤ .05). Thus, Hypothesis 1 is supported, agreeing with<br />

previous studies specifying perceived ease of use as antecedent of perceived usefulness. The perceived<br />

usefulness shows significant influences on attitude toward using Web 2.0 for public consultation (t = 8.12,<br />

p ≤ .05). Thus, Hypotheses 2 is also supported. Perceived usefulness shows significant mediation effects<br />

between ease of use and attitude toward using Web 2.0 for public consultation. The results of PEU and<br />

PU agree with the literature of TAM, confirming that perceived usefulness mediates perceived ease of use<br />

and is a determinant of attitude. Attitude and trust are both significant factors of intention to use Web<br />

2.0-based venue of public consultation (t = 6.79, p ≤ .05 and t = 2.96, p ≤ .05 respectively). Furthermore,<br />

attitude influences trust (t = 6.12, p ≤ .05), and trust also shows significant mediation effect of attitude on<br />

intention. Hypotheses 3, 4, and 5 are also supported. Consequently, this study found TAM suitable for<br />

explaining user intention of using Web 2.0 for public consultation. In terms of the measurement variables,<br />

the results suggest that ease of learning, operation, and use are three significantly influential factors to<br />

adopt web 2.0 for public consultation. Usefulness of web 2.0 for public consultation is helpful for<br />

completing respondents’ jobs and improving performance. Respondents agree that using web 2.0 for<br />

public consultation is a good and wise ideal. Based on the self-assessment of respondents’ knowledge of<br />

Web 2.0, they trust that Web 2.0-based public consultation will provide reliable and trustworthy<br />

information. In addition, respondents also believe that Web 2.0 is helpful for goodwill citizens to participate<br />

in online public consultation. In general, the results show that the respondents are willing to use Web 2.0<br />

technology for public consultation if the government launches such platforms in the near future.<br />

448


Figure 2: Path coefficients for the research model<br />

6. Conclusion<br />

Ching-Heng Pan and Lichun Chiang<br />

The statistical results show that the research model fits adequately. The specified variables all show<br />

significant effects on the postulated paths. The study also found that trust is not a dominant factor of the<br />

intention to use Web 2.0 for public consultation. In contrast, the basic predictors, i.e., perceived ease of<br />

use and perceived usefulness, are more salient in shaping the attitude toward using Web 2.0 for<br />

consultation. It seems to indicate that users concern more about the relationship between their use<br />

experience and efficiency, and pay relatively less attention to the trustworthiness of the innovative Web<br />

system. It is worth noting that the respondents were mostly government employees, and hold positive<br />

attitudes toward using new Web technologies for public consultation. As members from the supply side of<br />

public policies, government employees’ positive attitude toward Web 2.0 consultation platforms implies<br />

that engaging the constituents via innovative Web technologies is not some unrealistic speculation among<br />

the optimistic disciples of e-democracy. A few research limitations in this study should be noted. The<br />

model is a relatively reduced one. Other constructs such as perceived risk and service quality may also<br />

affect user confidence. The emotion constructs such as pleasure and fear, as opposed to such cognition<br />

constructs as belief and experience, might as well play a role in influencing behavioral intentions.<br />

Moreover, the theories of innovation diffusion may also have some insights to offer in understanding the<br />

adoption of Web 2.0-based public consultation. Future research can consider including these constructs.<br />

References<br />

Agarwal, R. and Prasad, J. (1999) “Are individual differences germane to the acceptance of new information<br />

technologies?”, Decision Sciences, Vol. 30, No. 2, pp.361–391.<br />

Al-Gahtani, S.S. and King, M. (1999) “Attitudes, satisfaction and usage: factors contributing to each in the acceptance<br />

of information technology”, Behaviour & Information Technology, Vol. 18, No. 4, pp.277–297.<br />

Alvarez, R.M. and Hall, T.E. (2006) “Controlling democracy: the principal-agent problems in election administration”,<br />

Policy Studies Journal, Vol. 34, No. 4, pp. 491–510.<br />

Bagozzi, R.P. and Yi, Y. (1988) “On the evaluation of structural equation models”, Journal of the Academy of<br />

Marketing Science, Vol. 16, pp.74–94.<br />

Barber, B.R. (1984) Strong Democracy: Participatory Politics for a New Age. Berkley University of California Press,<br />

Berkley, CA.<br />

Bentler, P.M. (1990) “Comparative fit indexes in structural models”, Psychological Bulletin, Vol. 107, pp.238–246.<br />

Cain, J. (2008) “Online social networking issues within academia and pharmacy education”, American Journal of<br />

Pharmaceutical Education, Vol. 72, No. 1, p. 1.<br />

Carter, L. and Bélanger, F. (2005) “The utilization of eGovernment services: citizen trust, innovation and acceptance<br />

factors”, Information Systems Journal, Vol. 5, pp. 5-25.<br />

449


Ching-Heng Pan and Lichun Chiang<br />

Chang, M.K. and Cheung, W. (2001) “Determinants of the intention to use Internet/WWW at work: A confirmatory<br />

study”, Information & Management, Vol. 39, pp. 1–14.<br />

Davis, F.D. (1989) “Perceived usefulness, perceived ease-of-use, and user acceptance of information technology”,<br />

MIS Quarterly, Vol. 13, No. 3, pp. 318–341.<br />

Davis, F.D., Bagozzi, R.P., and Warshaw, P.R. (1989) “User acceptance of computer technology: A comparison of<br />

two theoretical models”, Management Science, Vol. 35, pp. 982–1004.<br />

Davis, F.D., Bagozzi, R.P., and Warshaw, P.R. (1992) “Extrinsic and intrinsic motivation to use computers in the<br />

workplace”, Journal of Applied Social Psychology, Vol. 22, pp. 1111–1132.<br />

Fountain, J. (2001) Building the Virtual State: Information Technology and Institutional Change, Brookings<br />

Institution Press, Washington, D.C.<br />

Gefen, D. (2000) “E-Commerce: The Role of Familiarity and Trust”, Omega: The International Journal of Management<br />

Science, Vol. 28, No. 6, 725-737.<br />

Gefen, D., Rose, G.M., Warkentin, M., and Pavlou, P.A. (2005) “Cultural diversity and trust in IT adoption: a<br />

comparison of potential e-vote in the USA and South Africa”, Journal of Global Information Management, Vol. 13,<br />

No. 1, pp.54–78.<br />

Govani, T. and Pashley, H. (2005) “Student awareness of the privacy implications when using facebook”. Student<br />

Poster, Carnegie Mellon University, Pittsburgh.<br />

Hair, Jr. F., Anderson, R.E., Tatham, R.L. and Black, W.C. (1998) Multivariate Data Analysis, 5th ed., Macmillan,<br />

Basingstoke Hampshire, England.<br />

Hu, L. and Bentler, P.M. (1995) “Evaluating model fit”, in Hoyle, R.H. (ed.), pp. 76–99, Structural Equation Modeling:<br />

Concepts, Issues, and Applications, Sage, Thousand Oaks, CA.<br />

Jöreskog, K.G. and Sörbom, D. (1989) LISREL 7, SPSS Inc., Chicago.<br />

Koufaris, M. and Hampton-Sosa, W. (2004) “The Development of Initial Trust in an Online Company by New<br />

Customers”. Information and Management, Vol. 41, No. 3, pp. 377-397.<br />

Kramer, R.M. (1999) “Trust and distrust in organizations: emerging perspectives, enduring questions”, Annual<br />

Reviews Psychology, Vol. 50, pp.569–598.<br />

Lee, M. and Turban, E. (2001) “A trust model for internet shopping”, International Journal of Electronic Commerce, Vol.<br />

6, pp. 75–91.<br />

Li, X., Valacich, J.S., and Hess, T.J. (2004) “Predicting user trust in information systems: a comparison of competing<br />

trust models”, Paper read in The 37th Hawaii International <strong>Conference</strong> on System Sciences, University of Hawaii,<br />

Manoa, Hawaii, January<br />

Ma, Q. and Liu, L. (2004) “The technology acceptance model: a meta-analysis of empirical findings”, Journal of<br />

Organizational and End User Computing, Vol. 16, No. 1, pp. 59–74.<br />

McKnight, D.H. and Chervany, N.L. (2001) “Conceptualizing trust: a typology and E-commerce customer relationships<br />

model”, Paper read at The 34th Hawaii International <strong>Conference</strong> on System Sciences, Outrigger Wailea Resort,<br />

Maui, Hawaii.<br />

McKnight, D.H, Choudhury, V, and Kacmar, C 2002, ‘Developing and validating trust measures for e-commerce: an<br />

integrative typology’. Information Systems Research, Vol. 13, pp. 334–359.<br />

McKnight, H, Choudhury, V and Kacmar, C 2002, ‘Developing and validating trust measures for e-commerce: an<br />

integrative typology’. Information Systems Research, vol. 13, 334–359.<br />

Misra, D.C. (2008) “Ten guiding principles for e-civil service”, viewed 14 June 2009,<br />

http://egov-india.blogspot.com/2008/12/ten-guiding-principles-for-e-civil.html<br />

Norris, P 2001, Digital divide: Civic engagement, information poverty, and the internet worldwide, Cambridge<br />

University Press, New York.<br />

Oostveen, A.M. and Besselaar, P.V.D. (2005) “Trust, identity, and the effects of voting technologies on voting<br />

behavior”, Social Science Computer Review, Vol. 23, No. 3, pp 304–311.<br />

O’Reilly, T.E. (2005) What is web 2.0? viewed 18 December 2010,<br />

http://www.oreillynet.com/pub/a/oreilly/tim/news/2005/09/30/what-is-web-20.html<br />

Sheppard, B., Hartwick, J., and Warshaw, P. (1988) “The theory of reasoned action: A meta-analysis of past research<br />

with recommendations for modifications and future research”. Journal of Consumer Research, Vol. 15, pp<br />

325–344.<br />

Susanto, T.D. and Goodwin, R. (2010) “Factors Influencing Citizen Adoption of SMS-Based eGovernment Services”.<br />

Electronic Journal of eGovernment, Vol. 8, No. 1, pp 55–71.<br />

Tan, C.W., Benbasat, R.T., and Cenfetelli (2008) “Building Citizen Trust Towards eGovernment Services: Do High<br />

Quality Websites Matter?” paper read at the 41st Annual Hawaii International <strong>Conference</strong> on System Sciences.<br />

IEEE Computer Society <strong>Conference</strong> Publishing Services, pp 217-217.<br />

Tapscott, D. and Williams, A.D. (2006) Wikinomics: How mass collaboration changes everything, Penguin Books Ltd.,<br />

London.<br />

Venkatesh, V., Morris, M.G., Davis, G.B.. and Davis, F.D. (2003) “User acceptance of information technology: Toward<br />

a unified view”, MIS Quarterly, Vol. 27, No. 3, pp 425-478.<br />

Warkentin, M., Gefen, D., Pavlou, P.A., and Rose, G.M. (2002) “Encouraging Citizen Adoption of eGovernment by<br />

Building Trust”, Electronic Markets, Vol. 12, No. 3, pp 157-162.<br />

Xenakis, A. and Macintosh, A. (2005) “Trust analysis of the U.K. e-voting pilots”, Social Science Computer Review,<br />

Vol. 23, No. 3, pp 312–325.<br />

450


Combating Identity Fraud in the Public Domain: Information<br />

Strategies for Healthcare and Criminal Justice<br />

Marijn Plomp and Jan Grijpink<br />

Utrecht University, The Netherlands<br />

m.g.a.plomp@cs.uu.nl<br />

jan@grijpink.org<br />

Abstract: Two trends are present in both the private and public domain: increasing interorganisational co-operation<br />

and increasing digitisation. Nowadays, more and more processes within and between organisations take place<br />

electronically. These developments are visible on local, national and <strong>European</strong> scale. Research, strategy and policy<br />

often focus on the technological issues, whereas the organisational issues are complex and important as well. These<br />

issues prove to be difficult on a local scale and barely manageable on national and <strong>European</strong> scales, because the<br />

number of parties increases greatly and because of differences in culture, legislation and IT infrastructure. We<br />

introduce the theoretical framework of Chain-computerisation that explains large-scale chain co-operation as an<br />

answer to a dominant chain problem. Identity fraud proves to be the dominant chain problem in many chain cooperation<br />

situations. Therefore, our main research question is: what is a successful information strategy to combat<br />

identity fraud in the large-scale processes that constitute the public domain? Next, we demonstrate the problem of<br />

identity fraud using the example of the Dutch criminal justice chain, showing that a certain chain communication<br />

system enables to stop identity fraud using forensic biometrics. The second example is about healthcare. In the<br />

Netherlands, the government is introducing a national system of medical information exchange based on the national<br />

personal number as the sole identifier for recognition and linking. We show that people sometimes have interest in<br />

using somebody else’s number, to be treated in cases (s)he is not insured. This identity fraud can contaminate<br />

medical records on a national scale. We ponder about infrastructural elements that enable international exchange of<br />

medical information on a <strong>European</strong> scale and ask ourselves which additional safeguards will be necessary on this<br />

enormous scale. The examples are taken from our chain analysis programme that has an exploratory, empirical<br />

character. A chain analysis tests empirical findings against the theoretical framework of Chain-computerisation, to<br />

derive a suitable chain-specific information strategy. We use this novel approach which is specifically tailored to the<br />

peculiarities of large-scale situations, as opposed to the small-scale approach usually employed in these cases. The<br />

traditional authentication procedures do not take into account ‘wrong person’ identity fraud that causes fraud<br />

surreptitiously spreading from chain to chain. Therefore, in both cases, the problem of identity fraud presents a threat<br />

to the chain co-operation that has to be tackled with a large-scale approach and with person-oriented security<br />

procedures and instruments that are indeed able to prevent identity fraud from happening undetected. It is precisely<br />

this approach and this type of procedures and instruments that are explained here. This is a novel contribution to<br />

information science and to the security realm that still pivots only on traditional authentication frameworks. Taking<br />

into account that it is probable that the problem of identity fraud rises in many other domains and countries as well,<br />

we conclude that identity fraud is a major threat to the <strong>European</strong> society. Finally, we argue that an information<br />

strategy using basic, but chain-specific information systems, combined with random identity verification procedures<br />

enable combating identity fraud.<br />

Keywords: chain-computerisation, interorganisational information systems, chain co-operation, Information<br />

strategies within the public sector, Identity management<br />

1. Introduction<br />

Interorganisational co-operation is becoming increasingly important, as organisations are more and more<br />

interdependent. ICT can support the development of interorganisational relations through cost reduction<br />

and/or increasing possibilities for communication and coordination (Williams 1997). Since the internet has<br />

become mainstream, many organisations communicate with each other through this channel. This can be<br />

in the form of basic means like e-mail messaging, but nowadays also often takes place using advanced<br />

ICT applications like chain information systems. These developments are visible on local, national and<br />

<strong>European</strong> scales.<br />

Research, strategy and policy often focus only on technological issues, like standards for<br />

interorganisational information exchange. Organisational issues however, like who co-operates with<br />

whom, shares which information and why, are complex and important as well. It can therefore be argued<br />

that attention should be given to both dimensions (Plomp and Batenburg 2010). Both technological and<br />

organisational issues prove to be difficult on a local scale and barely manageable on national and<br />

<strong>European</strong> scales, because the number of parties increases greatly and because of differences in culture,<br />

legislation and IT infrastructure. For example, in the Netherlands processes in public sectors like<br />

healthcare and justice are digitised to a higher degree than in other <strong>European</strong> countries.<br />

451


Marijn Plomp and Jan Grijpink<br />

This example illustrates the difficulties and sensibilities that are encountered in the design of cross-border<br />

chain information infrastructures. Even when these large-scale communication initiatives are successfully<br />

deployed, there are many potential problems in their use that need to be taken into account. As<br />

interorganisational co-operation in the information age is becoming increasingly important, everyone<br />

working in (e-)government should be aware of its inherent risks. In this paper, we present those risks<br />

using two cases from the vital domains of criminal justice and healthcare. We argue that one of the main<br />

threats in these domains is identity fraud, and show the potential danger if this problem is not properly<br />

addressed.<br />

In this paper, we introduce the theoretical framework of Chain-computerisation that explains large-scale<br />

chain co-operation as an answer to a dominant chain problem (see §2). Identity fraud proves to be the<br />

dominant chain problem in many chain co-operation situations. Many people think that through further<br />

securing the authentication process, the risk of identity fraud can be reduced (e.g. Drogkaris,<br />

Geneiatakis, Gritzalis, Lambrinoudakis and Mitrou 2008). This basic security is necessary, but we claim<br />

that this is only sufficient for small-scale situations. Truly large-scale chain co-operation is much more<br />

complex and identity fraud proves to be hard to prevent in these situations. Therefore, our main research<br />

question is:<br />

What is a successful information strategy to combat identity fraud in the large-scale processes that<br />

constitute the public domain?<br />

In order to provide an answer to this question, the remainder of this paper is structured as follows. First,<br />

we present the theory of Chain-computerisation and the three components of its chain perspective. This<br />

provides the background against which we formulate our approach for combating identity fraud. We<br />

describe our research method and pay specific attention to the process of conducting a chain analysis<br />

and deriving an information strategy from that. Next, we present our two cases in which identity fraud<br />

plays a central role, and indicate how this phenomenon can be countered. We conclude with our main<br />

findings and suggest some topics for future research. Parts of this paper are based upon Grijpink<br />

(2010b).<br />

2. Chain-computerisation and its specific chain perspective<br />

Chain-computerisation (Grijpink 1999; 2010a) is a theoretical framework which explicitly focuses on<br />

social chains, not on logistical chains (the process of handling goods), nor on information chains (closely<br />

linked information systems). Examples of social chains are social security, criminal law enforcement or<br />

drug addicts’ healthcare: large-scale interorganisational processes that yield a social product such as<br />

income support, safety or survival.<br />

Central to the theory of Chain-computerisation is a specific chain perspective to better understand chain<br />

co-operation as large-scale processes and systems. This chain perspective consists of three<br />

components. The first component is the concept of a dominant chain problem; a problem that no party in<br />

the chain can solve on its own. The second component is the idea that a chain should be seen as a multilevel<br />

phenomenon, enabling a distinction between automation at the ‘base level’ and the ‘chain level’.<br />

The third component is the acknowledgement of irrational decision making at the collective chain level.<br />

The rationale of this chain perspective is recognising fallacies of the wrong level. They lead to invalid<br />

assumptions and unjustifiable expectations causing large-scale communication systems to fail or<br />

sometimes even backfire. We will now discuss these four central elements.<br />

2.1 The dominant chain problem as the trigger of chain communication<br />

In a social chain, thousands of organisations and professionals work together without a clear relationship<br />

of authority, in ever-changing combinations depending upon the actual case. However, co-operating with<br />

other organisations and professionals takes a great deal of effort, time and money. There must be a castiron<br />

reason for doing so. Chain partners only co-operate if they are forced to do so by a dominant chain<br />

problem. A dominant chain problem is one that none of the partners can solve on its own. It is only by<br />

effectively co-operating that chain partners can prevent the systematic failure of their own organisation<br />

and the entire chain. Because common interests are less pronounced than people usually think – and are<br />

also often unclear – the badly needed cohesion can only be provided by a pressing dominant chain<br />

problem. Only such a barely-manageable problem can create an interplay of forces which triggers largescale<br />

co-operation of so many organisations and individuals and promotes the development and<br />

maintenance of a large-scale chain communication system focused on the dominant chain problem.<br />

452


Marijn Plomp and Jan Grijpink<br />

However, in most chain co-operation situations, there is insufficient support for the large-scale exchange<br />

of information.<br />

2.2 The chain as a multi-level phenomenon<br />

The theoretical framework of Chain-computerisation sees a chain as a multi-level concept (see Figure 1).<br />

It makes a distinction between chain information systems at ‘chain level’ on the one hand, and intraorganisational<br />

information systems at the ‘base level’ of the chain, that can be linked to a chain<br />

information system, on the other hand. A chain information system automatically detects in which intraorganisational<br />

system relevant information can be found or, for instance, which organisation should be<br />

informed. This chain communication is brought about even when chain partners themselves do not know<br />

which organisations are involved in the case at hand. This distinction – for a better understanding of the<br />

problems inherent in large-scale co-operation and communication – can be applied to any large-scale<br />

phenomenon.<br />

Figure 1: Two distinct levels of analysis, with different types of information systems<br />

This analytic distinction is useful for two reasons:<br />

According to the theory of Chain-computerisation, only the critical details that are absolutely<br />

necessary for preventing the dominant chain problem should be available at the chain level.<br />

Irrational decision making takes place at the chain level, as will be explained next.<br />

2.3 Acknowledgement of irrational decision making at the collective chain level<br />

Because overall leadership or authority is absent, the chain is a difficult administrative domain in which<br />

decision making and information exchange proceed differently than within organisations. Rationality and<br />

efficiency are often hard to find at the collective chain level and, as a consequence, unpredictability and<br />

lack of control are the order of the day. A model of irrational decision making that fits well with the<br />

processes that take place at the chain level is the garbage can model of Cohen, March and Olsen (1972;<br />

March and Olsen 1976). This model states that the outcome of decision processes are a random<br />

selection of problems, solutions and decision makers. Often this concept of irrationality at the chain level<br />

is hard to grasp. The crux is that – as there is no single party in command – group processes at chain<br />

level are not rational, even if every individual professional and organisation acts rationally. Chaincomputerisation<br />

takes this lack of an overall co-ordinating and enforcing authority as its starting point.<br />

Large databases containing substantive data to be used by many independent organisations call for more<br />

authority and willingness to co-operate and pool resources than are usually present in chains. Collective<br />

decision making is chaotic and unpredictable. Therefore, chain solutions should be basic and noncomplex.<br />

A simple alert mechanism is often the maximum result that can be attained.<br />

453


2.4 Fallacies of the wrong level<br />

Marijn Plomp and Jan Grijpink<br />

In information science – as well as in management – we usually derive insights from small-scale<br />

situations such as a local information system, a small group experiment or a regional pilot. Thus, we have<br />

gained insights into the power of recording data and in management tools, such as time schedules and<br />

budgets. If we transpose such insights to large-scale situations without checking the validity of underlying<br />

assumptions at that level, we often make a ‘fallacy of the wrong level.’ This might partly explain why so<br />

many policy measures and large-scale systems unexpectedly produce poor results – or sometimes even<br />

backfire.<br />

The concept elaborated upon in the previous subsection provides a good example of such a fallacy of the<br />

wrong level. Expecting that chain decision making takes place in a rational fashion seems logical, as<br />

individual organisations behave largely rational. At the chain level however, this proves to be not the<br />

case. Another example is providing a single sign-on e-government architecture, as discussed by<br />

Drogkaris et al. (2008) for the Greek situation. Although this may seem convenient from the perspective<br />

of an individual user, it also means that once a malevolent person obtains the possibility to fraudulently<br />

sign on, (s)he has access to all e-government services. The notion that a person who provides the right<br />

credentials (e.g. username and password) does not necessarily imply that this is also the right person, is<br />

important in the respect. In small-scale situations, the focus is often only on optimizing the authentication<br />

procedure. In large-scale situations, the focus should also be on preventing malicious use of these<br />

authentication means by someone other than the authorised person.<br />

The theoretical framework of Chain-computerisation suggests several remedies against making fallacies<br />

of the wrong level, while taking into account the needs and preconditions of large-scale chain cooperation.<br />

One such remedy could be, for instance, taking a gradual approach to the development and<br />

implementation of large-scale systems. Most of all, we must stop treating large-scale communication<br />

systems as intra-organisational information systems with a somewhat larger group of users. This is a<br />

classic fallacy of the wrong level. Chain-computerisation features a chain approach providing<br />

professionals and researchers with a compass that is better suited for a working environment without a<br />

co-ordinating and enforcing authority.<br />

3. Chain-computerisation and its method of chain analysis<br />

Apart from the chain perspective, the theoretical framework of Chain-computerisation offers a specific<br />

method for chain analysis. The two examples that we present in the following two sections are case<br />

studies taken from the chain research programme at our university based upon this method. This<br />

programme has an exploratory, empirical character. A chain analysis tests empirical findings against the<br />

theoretical framework of Chain-computerisation, to derive a suitable chain-specific information strategy.<br />

By now, we have performed over 25 analyses of Dutch and international chains. For each chain analysis,<br />

desk and field research have been performed. Data collection took place from 2005 till 2010. By<br />

interviewing multiple stakeholders within a single chain, we try to obtain an accurate picture of a chain<br />

focused on the variables used in the chain analysis. Each chain analysis consists of constructing the four<br />

assessment profiles provided by the theory of Chain-computerisation: the mission, coordination,<br />

information, and co-operation profile. Completing these profiles entails, among other things, determining<br />

what the dominant chain problem is and what critical details are necessary to prevent the dominant chain<br />

problem from spoiling the result of the chain co-operation effort, assessing the required coordination<br />

forms in this specific chain and gauging the current level of chain-wide co-operation. An example of<br />

constructed assessment profiles for the chain analysis of the manic-depressive disorder chain-of-care<br />

can be found in a recent article in the Journal of Chain-computerisation (Grijpink, Visser, Dijkman and<br />

Plomp 2010, pp. 5-6). The results of this chain analysis, together with other input from the interviews,<br />

make it possible to formulate a workable information strategy. In the example mentioned above, this next<br />

step can also be seen (Grijpink et al. 2010, p. 7). In the future, more chain analyses based upon this<br />

method (Grijpink 2010a) will be published in the Journal of Chain-computerisation, thus enabling<br />

comparison of the chain analysis results of different chains and longitudinal analysis.<br />

The chain research programme at our university has resulted in a more realistic view of our<br />

interorganisational world and will in turn lead to better information strategies for large-scale information<br />

infrastructures supporting national or international public and private chain co-operation. We now turn to<br />

two cases studies to illustrate this point.<br />

454


Marijn Plomp and Jan Grijpink<br />

4. Identity fraud in the Dutch criminal justice chain<br />

Before describing the specific situation of the Dutch criminal law enforcement chain, we present a brief<br />

general introduction to the peculiarities of identity fraud. After indicating the Dutch problems and how they<br />

are dealt with, we look at some elements that come into play when we look at criminal law enforcement<br />

from a <strong>European</strong> perspective.<br />

4.1 Identity fraud: An introduction<br />

Identity fraud – using or stealing somebody else’s identity with malicious intent – is becoming a major<br />

issue in our information society. The real problem is that if an identity fraud succeeds, all clues and traces<br />

lead to the victim instead of the culprit. The culprit cannot be found afterwards and the victim<br />

subsequently has much difficulty proving his/her innocence. Identity fraud is difficult to detect while it is<br />

taking place unless special preventive tools and procedures are installed. This is usually not the case.<br />

Thus, identity fraud forms a major challenge.<br />

The chain perspective has provided a better understanding of the problem of identity fraud, revealing that<br />

its real damage will be the disruption of important large-scale communication systems. Once a person<br />

has fraudulently changed his/her identity, the new 'identity' can affect other situations along regular<br />

channels. In these situations it usually is no longer possible to see through the preceding fraudulent<br />

identity change.<br />

4.2 The situation in the Dutch criminal justice chain<br />

Because successful identity fraud cannot easily be detected and mostly goes unnoticed, only rarely can a<br />

successful fraudster be detected because (s)he is still there. One such situation where this is possible, is<br />

the prison cell. If a criminal finds someone willing to sit out his/her sentence in his/her place, we find<br />

his/her stand-in person in the cell. Alternatively, if the criminal has been successful in using the identity of<br />

someone else, we find the right person in the cell but with an identity that is not his/her own. If this identity<br />

fraud goes undetected, the criminal is untraceable after his/her release because the administrative details<br />

of the verdict – stored in the criminal registry for later use – point to someone else. This scenario could<br />

explain how a criminal sometimes succeeds in pursuing his/her career with a clean slate without links to<br />

his/her previous aliases.<br />

In 2004, more than 100,000 sets of criminal fingerprints linked to more than one administrative identity<br />

had been registered in the Dutch national forensic biometrics system HAVANK. The cleverest criminals<br />

had succeeded in using more than 50 aliases, implying that they had managed to get their criminal<br />

verdicts spread to as many criminal records of other persons (who may not be aware of this). Note that<br />

this volume of identity fraud may be even bigger because a fingerprint set linked to a single name does<br />

not guarantee that this name actually belongs to the criminal. This volume of aliases was the result of<br />

only fifteen years of automatic biometric fingerprint checking in only some criminal cases. Until October<br />

2010, the Criminal Procedure Law only allowed the use of forensic biometrics if necessary to prove<br />

someone’s involvement in the criminal case at hand. An immediate confession thus prevented biometric<br />

identity checking. For serious crimes, the Dutch Criminal Procedure Law now provides for compulsory<br />

biometrical identity checking.<br />

Apart from the HAVANK system, which is positioned at the base level of the chain, the criminal justice<br />

chain also has a chain information system, a reference index called VIP. This chain information system<br />

consists of a personal criminal number (the VIP-number) and a set of references pointing to criminal law<br />

enforcement agencies actually involved in this person’s criminal justice procedures. The VIP-number is<br />

issued to a criminal when (s)he is registered in the information system of one of the chain partners for the<br />

first time; it will never be re-issued to another person and will be used at every new contact with one of<br />

the chain partners during the rest of his/her life. By 2004 however, the VIP system had already<br />

administered more than 1.2 million VIP-numbers since the system was introduced in 1993. This amount<br />

of VIP-numbers suggested serious problems, because the Dutch population could not possibly account<br />

for so many criminals.<br />

The above two systems, HAVANK and VIP, illustrate the apparent pollution that is present in the<br />

information systems of the Dutch criminal justice chain, as a consequence of successful identity fraud. In<br />

the future, this can be prevented or at least reduced by improving identity checking of criminals (i) by the<br />

police and (ii) in prisons:<br />

455


Marijn Plomp and Jan Grijpink<br />

(i) The police perform identity checking at the beginning of the chain. They used to do this by asking for<br />

an identity document or for name and address which are then checked against the residents’ register of<br />

the relevant municipality. However, if name and address go together but belong to another person, this<br />

checking causes a wrong name mentioned in the official report as well as in the subsequent summons<br />

and criminal verdict. This way the criminal will be processed incorrectly throughout the entire chain. In the<br />

new procedure the police have to perform a biometric identity check first together with high resolution<br />

photographs, both taken simultaneously at the start of the procedure.<br />

(ii) Until recently, the detention process was only supported by an administrative information system.<br />

Nowadays, prison management can also use biometric details in order to check with every interaction<br />

whether there is a match.<br />

Still, we are left with the challenge of ensuring that older verdicts have been booked under the right<br />

name.<br />

4.3 Fading borders: The criminal justice chain at EU-level<br />

As criminals more frequently operate internationally, criminal justice will also need to operate across<br />

borders more often. Let us now see how extending this national scale to international complicates our<br />

national approach. Within the <strong>European</strong> Union, this chain co-operation takes place within the realm of<br />

intergovernmental co-operation. The difficulties that make national chain processes barely manageable<br />

hold even more for the <strong>European</strong> situation.<br />

An illustrative example of this increased complexity is the case of Michel Fourniret. This French moral<br />

delinquent was able to start with a ‘clean slate’ in Belgium and even work at a school there. Apparently,<br />

the Belgian police never questioned the French criminal registry. The Belgian education chain might have<br />

questioned the Belgian criminal registry because, in many EU member states, Fourniret’s job was<br />

considered sensitive enough to ask a job candidate for a so-called declaration of good conduct. However,<br />

consulting the Belgium criminal registry from the Belgian education chain would wrongly have produced a<br />

clean slate. To avoid this from happening in the future, criminal record information must be exchanged<br />

between two member states at the moment of a sensitive appointment of a person with another<br />

nationality. This communication will only be correct if two conditions are met:<br />

The national criminal law enforcement chain in every member state prevents identity fraud in its own<br />

criminal procedures.<br />

Each member state sends every criminal verdict to the convict’s member state of nationality while<br />

preventing identity fraud during this transfer.<br />

This implies a close co-operation among police forces within the EU, focused on the identity of their<br />

nationals in other EU-countries using the forensic biometrics procedures of the home country (i.e. the<br />

country of origin, not the country were the crime was committed). Chain-computerisation theory tells us<br />

that a physically centralised EU registry for criminal justice cannot be expected to work adequately at this<br />

enormous scale. Fortunately, at the moment, the efforts are being aimed at a bilateral exchange of<br />

criminal verdicts regarding member states’ nationals based on a central access system and the use of<br />

the national biometric identities. In line with the theory of Chain-computerisation, this will eventually lead<br />

to a distributed EU criminal registry based on biometric identities that might be able to prevent criminal<br />

cases such as Fourniret’s from happening again. At the moment, we are very far from this ideal situation,<br />

but much will already be gained if every transferred criminal verdict is accompanied by fingerprints and<br />

photographs, similar to the Dutch national solution.<br />

5. The importance of identity in Dutch medical chains<br />

We now shift our attention to another vital domain of our society where identity plays an important role:<br />

the healthcare sector. In the Netherlands, the government wants to introduce a national system of<br />

medical information exchange based on the national personal number as the sole identifier for<br />

recognition and linking. Recently, there has been much debate about the implementation of this<br />

Electronic Personal Record (Schäfer et al. 2010). With the chain perspective of Chain-computerisation in<br />

mind, it is clear that the small-scale doctor-patient relationship does not adequately represent the largescale<br />

field of forces in healthcare between more than half a billion EU-patients and the EU’s hundreds of<br />

thousands of medical service providers. A simple risk assessment might reveal, for instance, that some<br />

patients have a clear interest in using somebody else’s personal number to be treated in cases (s)he is<br />

not insured, or to hide his/her illness from other persons. This identity fraud can take many forms but<br />

456


Marijn Plomp and Jan Grijpink<br />

inevitably contaminates the medical record of the patient and of his/her victim. Identity fraud will probably<br />

surface in this large-scale healthcare chain as the dominant chain problem to be countered on national<br />

and international scales. This problem proves to be barely manageable on a regional scale and on a<br />

national scale many preventive measures are needed. We are very far from an ideal situation, but much<br />

will already be gained if any national linking of medical records would not be based on the patient’s<br />

personal number alone and – additionally – would also automatically present a clear picture of the patient<br />

on the doctor’s computer screen. In the near future, research should also establish which infrastructural<br />

elements and which additional safeguards are needed for the safe exchange of medical information on a<br />

<strong>European</strong> scale.<br />

One such infrastructural element – that is also relevant for computerisation on national level – is the<br />

consideration that not all medical chains are similar, and thus may benefit from different information<br />

infrastructures. In our chain research we have found differences between for example the diabetes<br />

control chain and the manic-depressive disorder chain-of-care (Grijpink et al. 2010). These two diseases<br />

require fundamentally different medical data in order to provide adequate treatment. Furthermore, for<br />

diabetes it is usually sufficient to share patient data regionally, whereas manic-depressive people tend to<br />

be less ‘sedentary’, so it may be wise to share their data on a larger scale. And there are more relevant<br />

variables that vary across medical chains: differences in speed required, differences in the role of the<br />

patient (active/passive) and differences in the nature of the process (e.g. monitoring an illness,<br />

discovering an illness). For instance, the aforementioned illnesses are both chronic, but it is not hard to<br />

see that the acute medical care chain has other requirements.<br />

Similar to the criminal justice example, we again see that a central – be it national or <strong>European</strong> –<br />

database for healthcare records is undesirable, as this facilitates identity fraud, makes it harder to keep<br />

all information up to date, and is more difficult from a privacy perspective.<br />

6. Conclusion and discussion<br />

Identity fraud/theft is easy and very profitable. In both cases discussed above, the dominant chain<br />

problem of identity fraud presents a threat to the relevant chain co-operation that has to be tackled with a<br />

large-scale approach and with person-oriented security procedures and instruments that are indeed able<br />

to prevent identity fraud from happening undetected. Taking into account that this problem exists in many<br />

other domains as well, we conclude that identity fraud is a major threat to our society. The main reason is<br />

that our social systems are not designed to prevent or detect identity fraud. Because committing identity<br />

fraud is not a seriously sanctioned criminal offence, the culprit can effectively evade such unpleasant<br />

consequences as long-term imprisonment. Often, the cost-benefit relationship is in his/her favour.<br />

Moreover, the interests and motivations of the target persons in a chain process vary greatly, depending<br />

on the dominant chain problem. We have seen that only preventive measures can protect against identity<br />

fraud. Our examples illustrate that the chain concept is a powerful tool in understanding how large-scale<br />

public information infrastructures can effectively tackle identity fraud, even on an enormous scale. The<br />

chain perspective and chain analysis have proven useful to uncover hidden aspects of large-scale social<br />

systems and to develop and deploy successful chain information systems geared to the dominant chain<br />

problem at hand. Therefore, we argue that basic, but chain-specific information systems, combined with<br />

random identity verification procedures enable combating identity fraud.<br />

An important contribution of this paper is that we have shown how the chain analysis method (Grijpink,<br />

2010a) is tuned towards the peculiarities of large-scale chain co-operation and the corresponding chain<br />

information infrastructures. The pressure of the dominant chain problem and irrational decision making at<br />

the collective level bring about that simply scaling up the usual authentication procedures and traditional<br />

defence measures working on the individual or organisational level is not good enough. This does not<br />

take into account identity fraud of the type of ‘wrong person’-situations that surreptitiously spread from<br />

chain to chain.<br />

Future research could focus on how identity fraud differs across various social chains. How do the<br />

severity of the consequences, the ease of detection and the available prevention methods differ? We<br />

have already seen in this paper that there are similarities but also great differences between identity fraud<br />

in the context of serving a sentence in a prison cell and receiving medical treatment at a hospital.<br />

Politicians and public managers like to simplify complicated interdependencies between and within largescale<br />

systems and produce simple measures. Our chain research has taught us that this is fruitless in the<br />

real world; we had better deal with the world as it really is. This does not exclude a simple solution, as<br />

457


Marijn Plomp and Jan Grijpink<br />

these two examples show. The example of the criminal law enforcement chain also applies to many other<br />

large systems at EU scale. If it proves to be that easy to use other people’s identity under the watchful<br />

guard of the criminal law enforcement officials, we must not delude ourselves about the future of identity<br />

fraud in less well-guarded public information infrastructures, such as employment, education or travel. If,<br />

in the future, we are not able to adequately counteract identity fraud – even, for example, in large-scale<br />

EU co-operation in the fields of identity management and healthcare – governments will ultimately lose<br />

much of their legitimacy.<br />

References<br />

Cohen, M.D., March, J.G. and Olsen, J.P. (1972) "A garbage can model of organizational choice", Administrative<br />

Science Quarterly, Vol. 17 No. 1, pp. 1-25.<br />

Drogkaris, P., Geneiatakis, D., Gritzalis, S., Lambrinoudakis, C. and Mitrou, L. (2008) "Towards an Enhanced<br />

Authentication Framework for eGovernment Services: The Greek Case", in Ferro, E., Scholl, J. and Wimmer, M.<br />

(Eds.), Proceedings of the 7th International <strong>Conference</strong> on Electronic Government, pp. 189-196.<br />

Grijpink, J.H.A.M. (1999) "Chain-computerisation for interorganisational public policy implementation: A new<br />

approach to developing non-intrusive information infrastructures", Information Infrastructure and Policy, Vol. 6<br />

No. 2, pp. 81-93.<br />

Grijpink, J.H.A.M. (2010a) "Chain Analysis for Large-scale Communication Systems: A Methodology for Information<br />

Exchange in Chains", Journal of Chain-computerisation, Vol. 1, pp. 1-32.<br />

Grijpink, J.H.A.M. (2010b) "Public information infrastructures and identity fraud", in Van der Hof, S. and Groothuis, M.<br />

(Eds.), Innovating Government: Normative, policy and technological dimensions of modern government, T.M.C.<br />

Asser Press/Springer, The Hague, The Netherlands.<br />

Grijpink, J.H.A.M., Visser, T., Dijkman, J.J. and Plomp, M.G.A. (2010) "Towards an Information Strategy for the<br />

Manic-Depressive Disorder Chain-of-care", Journal of Chain-computerisation, Vol. 1, pp. 1-11.<br />

March, J.G. and Olsen, J.P. (Eds.) (1976) Ambiguity and choice in organisations, Universitetsforlaget, Bergen,<br />

Norway.<br />

Plomp, M.G.A. and Batenburg, R.S. (2010) "Measuring chain digitisation maturity: An assessment of Dutch retail<br />

branches", Supply Chain Management: An International Journal, Vol. 15 No. 3, pp. 227-237.<br />

Schäfer, W., Kroneman, M., Boerma, W., Van den Berg, M., Westert, G., Devillé, W. and Van Ginneken, E. (2010)<br />

"The Netherlands: Health system review", Health Systems in Transition, Vol. 12 No. 1, pp. 1-229.<br />

Williams, T. (1997) "Interorganisational information systems: issues affecting interorganisational cooperation", The<br />

Journal of Strategic Information Systems, Vol. 6 No. 3, pp. 231-250.<br />

458


Approaching the eGovernment as a Strategic Driver for<br />

Improving the Ethical Model: An Empirical Analysis From<br />

Business Economics<br />

Massimo Pollifroni<br />

University of Turin, Italy<br />

pollifroni@econ.unito.it<br />

Abstract: The paper presents a research regarding the effective correlation between innovation (where the<br />

eGovernment processes are included) and ethical behaviour model. The final result applied in <strong>European</strong> Union<br />

States (approximately the final results is 0,90, as average value for the period of six years 2003-2008) shows us that<br />

is possible to approach the eGovernment as a strategic driver for improving the ethical model shared by the people in<br />

a nation, as well as in a business company or - in general terms - in a community.<br />

Keywords: business economics, eGovernment, ethics, innovation, information system<br />

1. Introduction to the research methodology<br />

The first part of the paper presents the research regarding the effective correlation between two clusters:<br />

innovation and ethical behaviour model : the empirical research studies the <strong>European</strong> Union States and<br />

covers a six years period (2003-2008). The innovation cluster includes eGovernment processes,<br />

Information Communication Technologies (ICT), Research & Development Expenditure, Education<br />

Investment, (etc.), while the second one (ethical behaviour model) contains elements such as e-<br />

Governance processes, ethical values, the observance of the law, merit rating system, social cohesion,<br />

(etc.). The research of the indicators was carried out by consulting the data sources offered by the<br />

following international bodies: <strong>European</strong> Commission, Eurostat, Transparency International, World Bank<br />

and Ethical Rating Agencies (Agenzia Europea di Investimenti Standard Ethics). The contribution of this<br />

research has had, as prerequisite, the identification in the current processes for improvement and<br />

development of models of eGovernment (Mofleh et al., 2009), where the crucial role is represented by the<br />

share of the underlying reference model value, measured by ethical parameters. In the model, the issue<br />

of governance (Power, 2010; Spirakis et al., 2010) and their criticality, has been pressing an action that<br />

often, as we have already registered, leading to inefficient results, or in some cases, insufficient demand,<br />

born spontaneously the reasoning above is whether there are other ways in addition to that legislation,<br />

the improvement of these imbalances: the alternative way (followed in this study) was designed to<br />

measure the level of innovation, cluster where the eGovernment processes are located. In a short period<br />

study the eGovernment processes represent a right way to introduce efficiency and effectiveness in the<br />

public sector management and innovation improve the ethical behaviour model; while in a long period<br />

study, it can be argued that there is an exchange on dependence between the two variables: the ethical<br />

behaviour model can improve the innovation level standard, including, therefore, also an optimization of<br />

the processes of eGovernment (Kumar et al., 2007). The first part of the paper presents the research<br />

regarding the effective correlation between two clusters: innovation and ethical behaviour model: the<br />

empirical research studies the <strong>European</strong> Union countries area and covers a six years period (2003-<br />

2008).<br />

To achieve the above mentioned goal, two baskets of indicators have been identified:<br />

The first basket (basket of innovation indexes) is the Summary Innovation Index (SII), that is an<br />

arithmetic weighted average of 33 innovation indexes (data sources: <strong>European</strong> Com-<br />

<br />

mission/Eurostat);<br />

The second basket (basket of ethical indexes) includes the following seven ethical indexes: 1) AEI<br />

Standard Ethics (data source: Agenzia Europea di Investimenti Standard Ethics); 2) Corruption<br />

Perception Index (CPI) (data source: Transparency International); 3) Control of corruption (data<br />

source: World Bank); 4)Voice and accountability(data source: World Bank); 5) Government<br />

effectiveness (data source: World Bank); 6) Political stability and absence of violence (data source:<br />

World Bank); 7) Regulatory quality (data source: World Bank) and 8) Rule of law (data source: World<br />

Bank).<br />

Each index has presented the following characteristics:<br />

Availability for the period 2003-2008;<br />

459


Massimo Pollifroni<br />

Applicability to almost all of the 27 <strong>European</strong> Union countries;<br />

Representativeness of the country;<br />

Possibility of comparison between them.<br />

1.1 Presentation of the basket of innovation indexes<br />

The basket of innovation indexes includes the Summary Innovation Index (SII), that is an arithmetic<br />

weighted average of 33 innovation indexes (data sources: <strong>European</strong> Commission/Eurostat). The indicator<br />

is composed of a basket of sub-indicators that vary over time. This composite index measures the<br />

“innovation performance” through three innovation inputs [A1) drivers of innovation, A2) creation of new<br />

knowledge, A3) innovation and entrepreneurship] and two innovation outputs [B1) applications, B2)<br />

intellectual property]: the sub-indicators considered for the purposes of this study have the characteristics<br />

specified below.<br />

A1) Drivers of innovation (7 indexes).<br />

• 0Graduates in science and engineering per 1,000 population (age group 20-29 years) - S & E<br />

graduates (% of population aged 20-29).<br />

• Population with tertiary education in the field (age 25-64) - Population with tertiary education (%<br />

of population aged 25-64).<br />

• Rate of broadband penetration (number of broadband lines per 100 inhabitants) - Broad-band<br />

penetration rate (number of broadband lines per 100 population).<br />

• Participation in a long training period (age 25-64) - Participation in life-long learning (% of<br />

population aged 25-64).<br />

• Level of education achieved at a young age (% of population aged 20-24 years who have<br />

completed university) - Youth education attainment level (% of population aged 20-24 having<br />

completed at least upper secondary education).<br />

• Internet Access or domestic - Level of Internet access of households.<br />

• Share or SMEs with a website - Level of Internet access of enterprises.<br />

A2) Creation of new knowledge (6 indexes).<br />

• Public expenditure on research and development (% of GDP) - Public R & D expenditures (% of<br />

GDP).<br />

• Private expenditure on research and development (% of GDP) - Business R & D expenditures (%<br />

of GDP).<br />

• Share of R & D in medium-high and high technology (% of expenditure in R & D in Industry) -<br />

Share of medium-high-tech and high-tech R & D (% of manufacturing R & D expenditures).<br />

• Proportion of firms that receive public funds for innovation - Share of enterprises receiving public<br />

funding for innovation.<br />

• University R & D financed by the private sector - University R & D expenditures financed by<br />

business sector.<br />

• Share of venture capital investments in High-tech venture capital (% of venture capital invested).<br />

A3) Innovation and entrepreneurship (6 indexes).<br />

• Industrial products and services, created in SMEs (% product and service).<br />

• Proportion of Early-stage venture capital (% of GDP).<br />

• SMEs innovating in cooperation (% product and service).<br />

• Expenditure on innovation - Innovation expenditures (% of turnover).<br />

• ICT expenditure (% GDP) - ICT expenditures (% of GDP).<br />

• Share of SMEs that do not change on a technical level - SMEs using non-technological change<br />

(% of SMEs).<br />

B1) Applications (7 indexes).<br />

• Employees in high-tech services (% of the workforce) - Employment in high - tech services (% of<br />

total workforce).<br />

460


Massimo Pollifroni<br />

• Employed in the production of high-or medium-high technological content (% Labour Force) –<br />

Employment in medium/ high and high - tech manufacturing (% of total work-force).<br />

• Exports of high technology products as a share of total exports.<br />

• Sales of new products (% of sales) - Sales on new market products (% of turnover).<br />

• Sales of new products for the firm, but not new to the market (% of turnover).<br />

• Value-added in high-tech manufacturing (% of manufacturing value-added).<br />

• SMEs Rate of volatility (sum of birth rate and death rate).<br />

B2) Intellectual property (7 indexes).<br />

• <strong>European</strong> habitants: this indicator brings together the number of high-tech patents validated by<br />

the <strong>European</strong> Patent Office, with the total population.<br />

• American habitants. (New) USPTO high-tech patents: this indicator is the U.S. equivalent, of the<br />

above described for Europe.<br />

• EPO patents: this indicator brings together the number of patents approved by the <strong>European</strong><br />

Patent Office (EPO) with the total population.<br />

• USPTO patents per million Americans: this indicator brings together the number of patents<br />

approved by the U.S. Patent Office (USPTO) with the total population.<br />

• New Triadic patent families per million population: this indicator brings together the number of<br />

patents of the “triad”, with the total population. A patent is the triad if and only if it was lodged with<br />

the <strong>European</strong> Patent Office (EPO), the Japanese Patent Office (JPO) and the U.S. Patent and<br />

Trademark Office (USPTO).<br />

• Number new domestic community trademarks (CTM) per million population.<br />

• Number of (new) domestic community industrial designs per million population.<br />

1.2 Presentation of the basket of ethical indexes<br />

The second basket (basket of ethical indexes) includes the following seven ethical indexes: 1) AEI<br />

Standard Ethics (data source: Agenzia Europea di Investimenti Standard Ethics); 2) Corruption<br />

Perception Index (CPI) (data source: Transparency International); 3) Control of corruption (data source:<br />

World Bank); 4)Voice and accountability(data source: World Bank); 5) Government effectiveness (data<br />

source: World Bank); 6) Political stability and absence of violence (data source: World Bank); 7)<br />

Regulatory quality (data source: World Bank) and 8) Rule of law (data source: World Bank).<br />

AEI Standard Ethics (data source: Agenzia Europea di Investimenti Standard Ethics). Evaluations in<br />

terms of ethical Rating (national or regional) have as a reference the concept of Ethics and Social<br />

Responsibility issued according to parameters set by international bodies like the UN, OECD and the<br />

<strong>European</strong> Union. The final evaluations of the EEA Ethics Standards are expressed in the form of a rating<br />

to eight levels (EEE, EEE-, EE+, EE, EE-, E+, E, E-). The rating is the result of statistical and scientific<br />

activity carried out with the intention of photographing the world of business in relation to ethical<br />

principles promoted by large international organizations.<br />

Corruption Perception Index (CPI) (data source: Transparency International). The index of perceptions of<br />

corruption in English Corruption Perception Index (CPI) is an indicator published annually since 1995 by<br />

Transparency International ordering the countries of the world on the basis of the level that the existence<br />

of corruption is perceived among public and political office.<br />

Control of corruption (data source: World Bank). The indicator provided by the World Bank measures the<br />

ability of the political, legal and judicial systems to prevent and combat corruption.<br />

Voice and accountability(data source: World Bank). This index provided by the World Bank measures the<br />

degree of civil liberties and political rights and influence of the effective population in the election of<br />

political leaders, so far, to the level of independence of the media from political pressure.<br />

Government effectiveness (data source: World Bank). The indicator published by the World Bank that<br />

measures the quality of public services, the credibility of the Government on the measures to be<br />

implemented, the quality of the bureaucracy and the independence of civil servants from political<br />

pressure.<br />

461


Massimo Pollifroni<br />

Political stability and absence of violence (data source: World Bank). The index published by the World<br />

Bank, which measures the perceptions of the likelihood that destabilize the government or be removed by<br />

unconstitutional or violent means, including domestic violence and terrorism.<br />

Regulatory quality (data source: World Bank). Indicator published by the World Bank, which measures<br />

the ability of the government to formulating and implementing policies that can enable and promote the<br />

development of the private sector.<br />

Rule of law (data source: World Bank). Indicator published by the World Bank, which captures<br />

perceptions of the extent to which agents have confidence in and abide by the rules of society, and in<br />

particular the quality of contract enforcement, property rights, the police, and the courts, as well as the<br />

likelihood of crime and violence.<br />

2. Standardization original data<br />

In order to compare these indexes, their values have been standardized, and traced back to a single<br />

scale in terms of cents: the process used is explained below.<br />

Innovation Indicators. Summary Innovation Index (SII) (data sources: <strong>European</strong> Commission/Eurostat).<br />

Summary Innovation Index standardization was obtained by multiplying by 100 the original data,<br />

according to the following proportion: Since the original: Given standardized (x) = 1:100.<br />

Ethics Indicators.<br />

AEI Standard Ethics (data source: Agenzia Europea di Investimenti Standard Ethics). Cents in the<br />

conversion of this quality indicator is obtained through the following conversion scale: EEE=100; EEE-=<br />

85.71428571; EE + =71.42857143; EE=57.14285714; EE-=42.85714286; E +=28.57142857;<br />

E=14.28571429 and E-=0.<br />

Corruption Perception Index (CPI) (data source: Transparency International). The indicator in question is<br />

represented by a scale from 0 to 10, its conversion into cents was realized through the following<br />

proportion: since the original: Given standardized (x) = 10:100. Control of corruption, Voice and<br />

accountability, Government effectiveness, Political stability and Absence of Violence, Regulatory quality<br />

and Rule of Law (data source: World Bank). The six indicators of the World Bank are expressed on a<br />

scale whose values range from -2.5 to +2.5. Cents in the conversion has been obtained through the<br />

following conversion scale: since normalized (x) = (as original + 2.5) * 20.<br />

For achieving the aim and the scope of the research, the calculation of the correlation was obtained by<br />

the following indicators:<br />

The independent variable “Innovation”: the indicator is calculated as a result of several sub-indicators<br />

and corresponds to the Summary Innovation Index;<br />

The dependent variable “Ethics”: the data used is the value that results from the average of the<br />

basket composed of the seven indicators described above;<br />

The values that derives from the process of normalization of the original data bases.<br />

In the following pages the research presents the tables “Calculation of correlation between “Innovation”<br />

(x) and “Ethics” (y), Years 2003, 2004, 2005, 2006, 2007 and 2008” (see Tables: 1, 2, 3, 4, 5 and 6):<br />

once completed these Tables the correlation index has been calculated, separately for each year, using<br />

the Pearson index model.<br />

Table 1: Correlation between “innovation” (x) and “ethics” (y) – year: 2003<br />

Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />

Austria 47 82,19 8,48 10,11 71,91 102,21 85,73<br />

Belgium 51 76,69 12,48 4,61 155,75 21,25 57,53<br />

Bulgaria 20 50,91 -18,52 -21,17 342,99 448,17 392,07<br />

Cyprus 29 67,77 -9,52 -4,31 90,63 18,58 41,03<br />

Denmark 68 89,40 29,48 17,32 869,07 299,98 510,59<br />

Estonia 35 68,60 -3,52 -3,48 12,39 12,11 12,25<br />

Finland 69 89,46 30,48 17,38 929,03 302,06 529,74<br />

France 48 74,94 9,48 2,86 89,87 8,18 27,11<br />

462


Massimo Pollifroni<br />

Germany 59 79,79 20,48 7,71 419,43 59,44 157,90<br />

Greece 26 63,80 -12,52 -8,28 156,75 68,56 103,67<br />

Ireland 50 79,89 11,48 7,81 131,79 61,00 89,66<br />

Italy 32 65,28 -6,52 -6,80 42,51 46,24 44,34<br />

Leetonia 16 61,34 -22,52 -10,74 507,15 115,35 241,86<br />

Latvia 23 63,89 -15,52 -8,19 240,87 67,08 127,11<br />

Luxemburg 50 84,65 11,48 12,57 131,79 158,00 144,30<br />

Malta 27 76,37 -11,52 4,29 132,71 18,40 -49,42<br />

Netherlands 50 84,96 11,48 12,88 131,79 165,89 147,86<br />

Poland 21 58,72 -17,52 -13,36 306,95 178,49 234,07<br />

Portugal 21 73,48 -17,52 1,40 306,95 1,96 -24,53<br />

United Kingdom 57 82,04 18,48 9,96 341,51 99,20 184,06<br />

Czech Republic 32 63,90 -6,52 -8,18 42,51 66,91 53,33<br />

Romania 16 45,91 -22,52 -26,17 507,15 684,87 589,35<br />

Slovakia 23 59,84 -15,52 -12,24 240,87 149,82 189,96<br />

Slovenia 32 68,49 -6,52 -3,59 42,51 12,89 23,41<br />

Spain 32 75,34 -6,52 3,26 42,51 10,63 -21,26<br />

Sweden 82 88,83 43,48 16,75 1890,51 280,56 728,29<br />

Hungary 24 66,60 -14,52 -5,48 210,83 30,03 79,57<br />

<strong>European</strong> Average 38,52 72,08 === === 310,69 129,18 174,06<br />

Correlation Index 0,87<br />

Table 2: Correlation between “innovation” (x) and “ethics” (y) – year: 2004<br />

Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />

Austria 46 82,79 7,63 11,09 58,22 122,99 84,62<br />

Belgium 49 78,66 10,63 6,96 113,00 48,44 73,98<br />

Bulgaria 21 51,63 -17,37 -20,07 301,72 402,80 348,62<br />

Cyprus 29 65,63 -9,37 -6,07 87,80 36,84 56,88<br />

Denmark 66 90 27,63 18,3 763,42 334,89 505,63<br />

Estonia 34 69,37 -4,37 -2,33 19,10 5,43 10,18<br />

Finland 68 89,59 29,63 17,89 877,94 320,05 530,08<br />

France 48 75,74 9,63 4,04 92,74 16,32 38,91<br />

Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />

Germany 59 80,16 20,63 8,46 425,60 71,57 174,53<br />

Greece 26 63,4 -12,37 -8,3 153,02 68,89 102,67<br />

Ireland 49 79,69 10,63 7,99 113,00 63,84 84,93<br />

Italy 33 63,53 -5,37 -8,17 28,84 66,75 43,87<br />

Leetonia 16 60,26 -22,37 -11,44 500,42 130,87 255,91<br />

Latvia 24 63,03 -14,37 -8,67 206,50 75,17 124,59<br />

Luxemburg 50 84,75 11,63 13,05 135,26 170,30 151,77<br />

Malta 27 74,2 -11,37 2,5 129,28 6,25 -28,43<br />

Netherlands 49 84,91 10,63 13,21 113,00 174,50 140,42<br />

Poland 21 56,72 -17,37 -14,98 301,72 224,40 260,20<br />

Portugal 24 72 -14,37 0,3 206,50 0,09 -4,31<br />

United Kingdom 57 82,36 18,63 10,66 347,08 113,64 198,60<br />

Czech Republic 33 62,93 -5,37 -8,77 28,84 76,91 47,09<br />

Romania 15 46,51 -23,37 -25,19 546,16 634,54 588,69<br />

Slovakia 22 60,59 -16,37 -11,11 267,98 123,43 181,87<br />

Slovenia 34 68,29 -4,37 -3,41 19,10 11,63 14,90<br />

Spain 31 74,19 -7,37 2,49 54,32 6,20 -18,35<br />

Sweden 80 88,8 41,63 17,1 1733,06 292,41 711,87<br />

463


Massimo Pollifroni<br />

Hungary 25 66,15 -13,37 -5,55 178,76 30,80 74,20<br />

<strong>European</strong> Average 38,37 71,70 === === 288,97 134,44 176,07<br />

Correlation Index 0,89<br />

Table 3: Correlation between “innovation” (x) and “ethics” (y) – year: 2005<br />

Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />

Austria 48 82,61 9,44 11,64 89,11 135,49 109,88<br />

Belgium 49 77,39 10,44 6,42 108,99 41,22 67,02<br />

Bulgaria 20 51,38 -18,56 -19,59 344,47 383,77 363,59<br />

Cyprus 30 66,17 -8,56 -4,8 73,27 23,04 41,09<br />

Denmark 65 88,88 26,44 17,91 699,07 320,77 473,54<br />

Estonia 35 69,03 -3,56 -1,94 12,67 3,76 6,91<br />

Finland 65 88,86 26,44 17,89 699,07 320,05 473,01<br />

France 48 75,69 9,44 4,72 89,11 22,28 44,56<br />

Germany 59 80,64 20,44 9,67 417,79 93,51 197,65<br />

Greece 26 62,23 -12,56 -8,74 157,75 76,39 109,77<br />

Ireland 50 80,59 11,44 9,62 130,87 92,54 110,05<br />

Italy 33 60,12 -5,56 -10,85 30,91 117,72 60,33<br />

Leetonia 17 60,6 -21,56 -10,37 464,83 107,54 223,58<br />

Latvia 24 62,89 -14,56 -8,08 211,99 65,29 117,64<br />

Luxemburg 53 83,3 14,44 12,33 208,51 152,03 178,05<br />

Malta 28 72,63 -10,56 1,66 111,51 2,76 -17,53<br />

Netherlands 49 83,69 10,44 12,72 108,99 161,80 132,80<br />

Poland 22 55,01 -16,56 -15,96 274,23 254,72 264,30<br />

Portugal 23 71,63 -15,56 0,66 242,11 0,44 -10,27<br />

United Kingdom 56 80,39 17,44 9,42 304,15 88,74 164,28<br />

Czech Republic 33 62,37 -5,56 -8,6 30,91 73,96 47,82<br />

Romania 16 46,86 -22,56 -24,11 508,95 581,29 543,92<br />

Slovakia 23 61,51 -15,56 -9,46 242,11 89,49 147,20<br />

Slovenia 34 67,37 -4,56 -3,6 20,79 12,96 16,42<br />

Spain 32 73,39 -6,56 2,42 43,03 5,86 -15,88<br />

Sweden 78 86,93 39,44 15,96 1555,51 254,72 629,46<br />

Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />

Hungary 25 63,97 -13,56 -7 183,87 49,00 94,92<br />

<strong>European</strong> Average 38,56 70,97 === === 272,77 130,78 169,41<br />

Correlation Index 0,90<br />

Table 4: Correlation between “innovation” (x) and “ethics” (y) – year: 2006<br />

Nations x y (x – mx) (y – my) (x – mx) 2 (y – my) 2 (x – mx)*(y – my)<br />

Austria 48 82,84 8,85 11,76 78,32 138,30 104,08<br />

Belgium 48 77,69 8,85 6,61 78,32 43,69 58,50<br />

Bulgaria 22 51,36 -17,15 -19,72 294,12 388,88 338,20<br />

Cyprus 32 67,54 -7,15 -3,54 51,12 12,53 25,31<br />

Denmark 64 89,33 24,85 18,25 617,52 333,06 453,51<br />

Estonia 37 70,46 -2,15 -0,62 4,62 0,38 1,33<br />

Finland 67 88,84 27,85 17,76 775,62 315,42 494,62<br />

France 48 75,19 8,85 4,11 78,32 16,89 36,37<br />

Germany 59 80,79 19,85 9,71 394,02 94,28 192,74<br />

Greece 25 61,93 -14,15 -9,15 200,22 83,72 129,47<br />

Ireland 49 80,74 9,85 9,66 97,02 93,32 95,15<br />

Italy 33 62,26 -6,15 -8,82 37,82 77,79 54,24<br />

Leetonia 18 62,11 -21,15 -8,97 447,32 80,46 189,72<br />

464


Massimo Pollifroni<br />

Latvia 26 61,97 -13,15 -9,11 172,92 82,99 119,80<br />

Luxemburg 57 79,53 17,85 8,45 318,62 71,40 150,83<br />

Malta 29 73,51 -10,15 2,43 103,02 5,90 -24,66<br />

Netherlands 48 83,41 8,85 12,33 78,32 152,03 109,12<br />

Poland 23 54,38 -16,15 -16,7 260,82 278,89 269,71<br />

Portugal 25 69,85 -14,15 -1,23 200,22 1,51 17,40<br />

United Kingdom 55 82,29 15,85 11,21 251,22 125,66 177,68<br />

Czech Republic 34 63,14 -5,15 -7,94 26,52 63,04 40,89<br />

Romania 17 48,33 -22,15 -22,75 490,62 517,56 503,91<br />

Slovakia 24 61,13 -15,15 -9,95 229,52 99,00 150,74<br />

Slovenia 36 68,51 -3,15 -2,57 9,92 6,60 8,10<br />

Spain 32 70,41 -7,15 -0,67 51,12 0,45 4,79<br />

Sweden 76 87,23 36,85 16,15 1357,92 260,82 595,13<br />

Hungary 25 64,27 -14,15 -6,81 200,22 46,38 96,36<br />

<strong>European</strong> Average 39,15 71,08 === === 255,76 125,59 162,71<br />

Correlation Index 0,91<br />

Table 5: Correlation between “innovation” (x) and “ethics” (y) – year: 2007<br />

Nations x y (x – mx) (y – my) (x – mx)2 (y – my)2 (x – mx)*(y – my)<br />

Austria 48,00 83,04 9,00 11,82 81,00 139,71 106,38<br />

Belgium 47,00 77,56 8,00 6,34 64,00 40,20 50,72<br />

Bulgaria 23,00 51,53 -16,00 -19,69 256,00 387,70 315,04<br />

Cyprus 33,00 67,49 -6,00 -3,73 36,00 13,91 22,38<br />

Denmark 61,00 89,53 22,00 18,31 484,00 335,26 402,82<br />

Estonia 37,00 70,31 -2,00 -0,91 4,00 0,83 1,82<br />

Finland 64,00 87,49 25,00 16,27 625,00 264,71 406,75<br />

France 47,00 74,59 8,00 3,37 64,00 11,36 26,96<br />

Germany 59,00 80,64 20,00 9,42 400,00 88,74 188,4<br />

Greece 26,00 61,45 -13,00 -9,77 169,00 95,45 127,01<br />

Ireland 49,00 81,49 10,00 10,27 100,00 105,47 102,7<br />

Italy 33,00 60,04 -6,00 -11,18 36,00 124,99 67,08<br />

Leetonia 19,00 59,11 -20,00 -12,11 400,00 146,65 242,2<br />

Nations x y (x – mx) (y – my) (x – mx)2 (y – my)2 (x – mx)*(y – my)<br />

Latvia 27,00 62 -12,00 -9,22 144,00 85,01 110,64<br />

Luxemburg 53,00 84,13 14,00 12,91 196,00 166,67 180,74<br />

Malta 29,00 73,49 -10,00 2,27 100,00 5,15 -22,7<br />

Netherlands 48,00 84,29 9,00 13,07 81,00 170,82 117,63<br />

Poland 24,00 59 -15,00 -12,22 225,00 149,33 183,3<br />

Portugal 25,00 69,65 -14,00 -1,57 196,00 2,46 21,98<br />

United Kingdom 57,00 81,59 18,00 10,37 324,00 107,54 186,66<br />

Czech Republic 36,00 63,09 -3,00 -8,13 9,00 66,10 24,39<br />

Romania 18,00 49,21 -21,00 -22,01 441,00 484,44 462,21<br />

Slovakia 25,00 61,52 -14,00 -9,7 196,00 94,09 135,8<br />

Slovenia 35,00 68,6 -4,00 -2,62 16,00 6,86 10,48<br />

Spain 31,00 70,31 -8,00 -0,91 64,00 0,83 7,28<br />

Sweden 73,00 88,45 34,00 17,23 1156,00 296,87 585,82<br />

Hungary 26,00 63,29 -13,00 -7,93 169,00 62,88 103,09<br />

<strong>European</strong> Average 39,00 71,22 === === 223,56 127,93 154,35<br />

Correlation Index 0,91<br />

465


Massimo Pollifroni<br />

Table 6: Correlation between “innovation” (x) and “ethics” (y) – year: 2008<br />

Nations x y (x – mx) (y – my) (x – mx)2 (y – my)2 (x – mx)*(y – my)<br />

Austria 53 82,71 10,33 11,83 106,78 140,04 122,28<br />

Belgium 51 76,21 8,33 5,33 69,44 28,45 44,45<br />

Bulgaria 22 51,23 -20,67 -19,65 427,11 386,02 406,05<br />

Cyprus 47 67,03 4,33 -3,85 18,78 14,80 -16,67<br />

Denmark 57 88,57 14,33 17,69 205,44 312,99 253,58<br />

Estonia 45 69,20 2,33 -1,68 5,44 2,82 -3,92<br />

Finland 61 85,70 18,33 14,82 336,11 219,67 271,73<br />

France 50 75,07 7,33 4,19 53,78 17,58 30,75<br />

Germany 58 80,10 15,33 9,22 235,11 85,03 141,40<br />

Greece 36 60,26 -6,67 -10,62 44,44 112,75 70,79<br />

Ireland 53 81,36 10,33 10,48 106,78 109,80 108,28<br />

Italy 35 58,85 -7,67 -12,03 58,78 144,76 92,24<br />

Leetonia 24 60,60 -18,67 -10,28 348,44 105,68 191,89<br />

Latvia 29 61,13 -13,67 -9,75 186,78 95,00 133,20<br />

Luxemburg 52 81,78 9,33 10,90 87,05 118,72 101,66<br />

Malta 33 71,17 -9,67 0,29 93,51 0,08 -2,77<br />

Netherlands 48 84,33 5,33 13,45 28,41 180,90 71,69<br />

Poland 30 61,86 -12,67 -9,02 160,53 81,33 114,27<br />

Portugal 36 70,32 -6,67 -0,56 44,49 0,32 3,74<br />

United Kingdom 55 79,50 12,33 8,62 152,03 74,33 106,30<br />

Czech Republic 40 64,11 -2,67 -6,77 7,13 45,89 18,09<br />

Romania 28 50,44 -14,67 -20,44 215,21 417,91 299,90<br />

Slovakia 31 62,85 -11,67 -8,03 136,19 64,50 93,73<br />

Slovenia 45 69,30 2,33 -1,58 5,43 2,50 -3,68<br />

Spain 37 69,42 -5,67 -1,46 32,15 2,14 8,30<br />

Sweden 64 87,77 21,33 16,89 454,97 285,32 360,29<br />

Hungary 32 62,76 -10,67 -8,12 113,85 65,89 86,61<br />

<strong>European</strong> Average 42,67 70,88 === === 138,30 115,38 114,97<br />

Correlation Index 0,91<br />

3. Research results and final conclusions<br />

The aim and the scope of this research has been to investigate - by a Business Economics approach -<br />

the potential correlation between two clusters (or variables): innovation and ethical behaviours related to<br />

the life standards in a country or inside a public institution. The first cluster (innovation) includes<br />

Information Communication Technologies (ICT), Research & Development Expenditure, Education<br />

Investment, (etc.); while the second one (ethical behaviours) contains elements such as ethical values,<br />

the observance of the law, education, meritocracy, (etc.) (Barzelay, 2000).<br />

In the public sector management it is necessary to introduce the related concepts of eGovernment and egovernance<br />

(or e-democracy) to improve the ethical model by innovation (Northrop, 2002). The concept<br />

of eGovernment (or e-administration) is referred to the use of modern Information and Communication<br />

Technologies (ICT) linked to the development of electronics and the Internet in the modernization<br />

process of the Public Administration (Rahm, 1999; Hood, 1983). The different processes of eGovernment<br />

may be analyzed with reference to the various models, that the Public Institution may adopt during the<br />

modernization process of the structure (Layne et al., 2001; Reschenthaler et al., 1996). The development<br />

of the eGovernment processes (conditioning processes or causes) determines an improvement in the<br />

governance processes of the Public Institution that – using highly technological solutions – now called egovernance<br />

processes (conditioned processes or effects) (United Nations, 2008). Consequently, the egovernance<br />

is the second aspect of technological innovation applied to Public Administration processes<br />

(Kettl, 2000; Aucoin, 1990): that is to say the possibilities to improve of the democratic participation<br />

processes offered by the new technologies (Milward et al., 1996; Pollifroni, 2003). In recent years, in<br />

addition to the implementation and development of technological innovation, it has been developed a<br />

466


Massimo Pollifroni<br />

parallel process of attention to ethics, as a related discipline (Landsbergen et al., 2001); some studies<br />

have sought to show how innovation is able to influence the ethical behaviour (Osborne et al., 1992).<br />

With reference to the EU Countries Area in the following pages the paper has tried to achieve this goal:<br />

measuring the possible correlation between the indicators that consider the level of innovation<br />

(independent variable) and ethical behaviours (dependent variable).<br />

The contribution of this research has had, as prerequisite, the identification in the current process of<br />

improvement and development of governance models of the crucial role of the underlying share<br />

represented by the reference model of values, measured by ethical parameters (Freeman, 1984).<br />

Looking at the Italian model the governance of the public institutions has been the subject of several<br />

actions that have often led to inefficient and inadequate results (the same problem concerns the private<br />

business sector): the question then arises spontaneously from the reasoning outlined here and if there<br />

are other ways, in addition to legislation, for the improvement of these imbalances: the alternative way<br />

followed in the present study was aimed at measuring the level of innovation.<br />

The final part of the paper is dedicated to comment the research result that shows the several actions of<br />

eGovernment processes. According to the empirical evidence outlined above it was possible to measure<br />

a significant positive correlation (ranging between 0.87 and 0.91, for the six years 2003-2008) between<br />

the values and ethical behaviour, and implementation of variable “innovation” of a Country. The results of<br />

the research have shown that in countries where the economy is more oriented to innovative practices<br />

(such as, for example, Sweden, Finland and Denmark) it is possible to find the highest ethical standards.<br />

These results lead us to theorize new profiles of analysis applicable to the concept of innovation (Chung,<br />

2002; Carter et al., 2004), such as, e.g.:<br />

The profile of innovation financing, which should be systematic, stable and continuous (strategic view<br />

of the resource in the long term) (Kim et al., 1994),<br />

System making (synergy in knowledge management, for example, between enterprises located in the<br />

same economic sector or between subjects located both in the public sector and the private one)<br />

(Rocheleau et al., 2002; Bajjaly, 1998).<br />

So it is possible to say that implementing innovation (defined above), may represent a right way for the<br />

growth of the ethical shared model; environmental sustainability and social responsibility (McWilliams et<br />

al. 2001; Orlitzky et al., 2011) are the areas of contact between the two variables considered and the<br />

corporate durability depends on them: innovation and ethics are thus highly correlated to each other,<br />

forming at the same time, essential “driver” for the durability of the public institution also oriented to<br />

environmental sustainability and social responsibility (Grimsley et al., 2008). The research results could<br />

shows the biphasic action of eGovernment processes (Chourabi et al., 2009): these processes represent<br />

a right way to introduce efficiency and effectiveness in the public sector management (Heeks, 1999;<br />

Moon et al., 2005) and eGovernment applications can have a useful effect on the ethical shared<br />

behaviours, such as tax evasion control, observance of the law, reengineering a public merit rating<br />

system, (etc.). It is also possible to observe various roles for eGovernment in addressing the ongoing<br />

world financial and economic crisis (United Nation, 2010). The United Nation eGovernment Survey 2010 -<br />

above mentioned - explains that: “(…) the ability of eGovernment to handle speed and complexity can<br />

also underpin regulatory reform. While technology is no substitute for good policy, it may give citizens the<br />

power to question the actions of regulators and bring systemic issues to the fore. Similarly, eGovernment<br />

can add agility to public service delivery to help governments respond to an expanded set of demands<br />

even as revenues fall short (…)”.<br />

In conclusion, following a Business Economic approach, the research result (the value of the correlation<br />

detected) shows us that it is possible to state that the implementation of the component of innovation (a<br />

cluster that includes Information Communication Technologies, Research & Development Expenditure,<br />

Education Investment, etc.) is one way to improve the ethical model shared by the people in a nation, as<br />

well as in a business company or - in general terms - in a community: on the other hand, the processes of<br />

eGovernment (included inside the innovation cluster) are also a strategic tool to contrast the present<br />

crisis, as the United Nation report (mentioned above) has explained us.<br />

References<br />

Aucoin, P. (1990) Administrative reform in public management paradigms, principles, paradoxes and pendulums,<br />

Governance, Vol. 3, No.2, pp 115-37.<br />

467


Massimo Pollifroni<br />

Bajjaly, S.T. (1998) Strategic information systems planning in the public sector, American Review of Public<br />

Administration, Vol. 28, No. 1, pp 197-212.<br />

Barzelay, M. (2000) The New Public Management: Improving Research and Policy Dialogue, University of California<br />

Press, Berkeley.<br />

Carter, L. and Belanger, F. (2004) The Influence of Perceived Characteristics of Innovating on e Government<br />

Adoption, The Electronic Journal of eGovernment, Vol. 2, No.1, pp 11 20.<br />

Chourabi, H., Mellouli, S. and Bouslama, F. (2009) Modeling eGovernment business processes: New approaches to<br />

transparent and efficient performance, Information Polity Journal, Vol. 14, No. 1,2, pp 91-109.<br />

Chung, S. (2002) Building a national innovation system through regional innovation systems, Technovation, Vol. 22,<br />

No. 8, pp 485-491.<br />

Freeman, E.R. (1984) Strategic Management. A Stakeholder Approach, Pitman, Boston.<br />

Grimsley, M. and Meehan, A. (2008) Attaining Social Value from Electronic Government, The Electronic Journal of<br />

eGovernment, Vol. 6, No.1, pp 31 42.<br />

Heeks, R. (1999) Reinventing Government in the Information Age, Routledge, New York.<br />

Hood, C. (1983) The Tools of Government. Macmillan, London.<br />

Kettl, D.F. (2000) The Global Public Management Revolution: A Report on the Transformation of Governance,<br />

Brookings, Washington, D. C.<br />

Kim, P.S. and Wolff, L.W. (1994) Improving government performance: Public management reform and the National<br />

Performance Review, Public Productivity & Management Review, Vol. 18, No. 1, pp 73-87.<br />

Kumar, V., Mukerji, B. and Butt, I. (2007) Factors for Successful e Government Adoption: a Conceptual Framework,<br />

Electronic Journal of eGovernment, Vol. 5, No.1, pp. 63-76.<br />

Landsbergen, D.Jr. and Wolken, G.Jr. (2001) Realizing the promise: Government information systems and the fourth<br />

generation of information technology, Public Administration Review, Vol. 61, No. 2, pp 206-220.<br />

Layne, K. and Lee, J. (2001) Developing fully functional eGovernment: A four stage model, Government Information<br />

Quarterly, Vol. 18, No. 2, pp 122-136.<br />

McWilliams, A. and Siegel, D. (2001) Corporate Social Responsibility: A Theory of the Firm Perspective, The<br />

Academy of Management Review, Vol. 26, No. 1, pp 117-127.<br />

Milward, H.B. and Synder, L.O. (1996) Electronic government: Linking citizens to public organizations through<br />

technology, Journal of Public Administration Research and Theory, Vol. 6, No. 2, pp 261-276.<br />

Mofleh, S., Wanous, M. and Strachan, P. (2009) Understanding national eGovernment: the role of central<br />

government, Electronic Government, an International Journal, Vol. 6, No.1, pp. 1-18.<br />

Moon, M.J. and Norris, D.F. (2005) Does managerial orientation matter? The adoption of reinventing government and<br />

eGovernment at the municipal level, Information Systems Journal, Vol. 15, pp 43–60.<br />

Northrop, A. (2002) Lessons for managing information technology in the public sector, Social Science Computer<br />

Review, Vol. 20, No. 2, pp 194-205.<br />

Orlitzky, M., Siegel, D.S. and Waldman, D.A. (2011) Strategic Corporate Social Responsibility and Environmental<br />

Sustainability, Business & Society, Vol. 50, No. 1, pp 6-27.<br />

Osborne, D. and Gaebler, T. (1992) Reinventing Government: How the Entrepreneurial Spirit is Transforming the<br />

Public Sector, Penguin Books, London.<br />

Pollifroni, M. (2003) Processi e modelli di eGovernment ed e-governance applicati all’azienda pubblica, Giuffrè,<br />

Milan.<br />

Power, A. (2010) EU Legitimacy and new Forms of Citizen Engagement, The Electronic Journal of eGovernment,<br />

Vol. 8, No.1, pp 45 54.<br />

Rahm, D. (1999) The role of information technology in building public administration theory, Knowledge, Technology,<br />

and Policy, Vol. 12, No. 1, pp 74-83.<br />

Reschenthaler, G.B. and Thompson, F. (1996) The information revolution and the new public management, Public<br />

Administration Research Theory, Vol. 6, No. 1, pp 125-143.<br />

Rocheleau, B. and Wu, L. (2002) Public Versus Private Information Systems, The American Review of Public<br />

Administration, Vol. 32, No. 4, pp 379-397.<br />

Spirakis, G., Spiraki, C. and Nikolopoulos, K. (2010) The impact of electronic government on democracy: edemocracy<br />

through e-participation, Electronic Government, an International Journal, Vol. 7, No.1, pp 75-88.<br />

United Nations (2008) EGovernment Survey 2008. From EGovernment to Connected Governance, Department of<br />

Economic and Social Affairs, United Nations, New York.<br />

United Nations (2010) EGovernment Survey 2010. Leveraging eGovernment at a time of financial and economic<br />

crisis, Department of Economic and Social Affairs, United Nations, New York.<br />

468


Public Procurement and Internet-purchasing: the Defence<br />

Sector Evidence<br />

Nataša Pomazalová and Zbyšek Korecki<br />

University of Defence, Brno, Czech Republic<br />

natasa.pomazalova@unob.cz<br />

zbysek.korecki@unob.cz<br />

Abstract: The defence sector uses both centralized and decentralized platforms for the acquisition and purchase of<br />

supplies, materials and services. The decentralised platform is eCommerce where the basic evaluation criterion for<br />

public tenders is the lowest price offered. The purpose of this research is to analyse purchase price variability of<br />

selected property in the observed years. The comparison of purchase of different property arrangements differs due<br />

to the material, the purchase amount, and other exogenous and endogenous factors. We found that the purchase<br />

price variability for materials for general use was over 11%. The purchase price variability for military transport and<br />

support services was lower than 10%. The achieved annual purchase prices of material for general use in observed<br />

years 2006 – 2009 were different.<br />

Keywords: eCommerce, price variability, property arrangements, defence sector<br />

1. Introduction<br />

Public procurement by Internet-purchasing is one of the more important governmental logistics activities.<br />

These activities have impact on decision making by citizens and companies. The task to purchase goods<br />

and services of high quality, with on-time delivery, at a low purchase price, and in accordance with public<br />

procurement law is a crucial eGovernment application accomplishment. ECommerce usage is also one of<br />

the possible solutions for improvement of public comprehension of government procurement as<br />

ECommerce procurement technology supports transparency and non-discrimination for commercial<br />

users.<br />

In the governmental sector of the Czech Republic, ECommerce usage was straightforwardly suggested in<br />

the Ministry of Defence (MoD), during the transformation processes of its acquisition system (2001 to<br />

2003). Barriers in the area of public procurement were identified and analyzed. It was determined that<br />

public procurement in the defence sector was not managed well enough to achieve the principles of<br />

effectiveness, efficiency, and economy (3E). It was also recognised that it was very difficult to complete<br />

and review information on public procurement at decentralized point. Other principles of public<br />

procurement were recognised as limited or at risk (transparency, discrimination, corruption during<br />

competition, etc.). Other aspects of the problem were based on organizational structure; complexity of<br />

procurement operations, processes and management; especially control system and formal control<br />

instruments, and also administrational supervision of written guidelines.<br />

This case has been important for policy decisions in the defence sector in the Czech Republic. An<br />

eCommerce instrument for automated purchasing – the Electronic Support System of Purchasing (ESSP)<br />

-- has been implemented in the defence sector to achieve the lowest prices, best quality and best time of<br />

delivery of material goods and services in accordance with 3E principles and also for better<br />

communication with companies offering products and services. ESSP is also designed to provide for<br />

transparent purchasing of property and services purchase (in the defined scope) within anti-corruption<br />

policy framework, and abolition of discrimination barriers. Legally, when ESSP is used as a decentralised<br />

platform for e-public procurement, the total amount of financial liability shall not exceed 2mil. Czech<br />

crowns (CZK) without value added tax. This tool was recently used in the defence department condition<br />

according to governmental tasks for support of e-public procurement (Government of the Czech<br />

Republic, 2006). ESSP selects the Czech military is continuing to learn from the private sector to<br />

automate and modernize military logistics. ESSP selects offers according to automatic evaluation<br />

procedure based on defined major purchase criteria for each responsible organizational part of MoD and<br />

Armed forces of the Czech Republic (ACR). However ESSP has some limitations on the side of<br />

exogenous and endogenous factors. ESSP remains a developing area with a critical sense for<br />

innovation.<br />

2. Literature review<br />

Zott et al. (2000) regarded the year 1999 as one of explosive growth and expansion of eCommerce in<br />

Europe which continued into the year 2000 despite worldwide high volatility in tech stocks. Global<br />

469


Nataša Pomazalová and Zbyšek Korecki<br />

eCommerce is based on structural conditions, which vary from country to country and even within country<br />

(Marcus and Soh, 2002). Global eCommerce activity is strongly formed by structural conditions –<br />

physical, social, and economic and also dimensions of national culture (Nakayama, 2009). The public<br />

and governmental sector has adopted, or modified as required, purchasing tools, new business<br />

marketing paradigms and marketing methods for purchasing, supported with usage of new information<br />

and communication technologies (eCommerce, e-marketplace, business to business, business to<br />

customer etc.) from the private sector.<br />

According to Stemberger and Jaklic (2007) e-business is enormously important in the private sector for<br />

business and business relationships and relationships with customers. ECommerce is regarded as<br />

a revolution that has transformed the structure of business and the mechanisms of economic systems.<br />

Hence at al. (2004) conducted research on price competition and strategic behaviours in eCommerce. It<br />

is also a new approach in governmental organizations as instrument with another function compare with<br />

business. In government specific conditions, this electronic instrument and related processes are referred<br />

to as eGovernment. It is possible to find many explanations of eGovernment. Some definitions of<br />

eGovernment note the technology for enhancing the access to and delivery of governmental information<br />

and services to citizens, businesses, government employees, and other agencies (Hernon at al., 2002).<br />

Usual use of eGovernment is conducted in combinations of political reforms and organisational changes<br />

to enact, support and drive profound transformations in the organisation of the public sector (Cordella and<br />

Iannacci, 2010). Governmental sector use the purchasing tools for the procurement of services and<br />

material goods for achieving effectiveness, efficiency and economy (3E). The e-procurement as<br />

commercial practice adopted from the private sector may provide cost-saving opportunities to both<br />

suppliers and the government (Erridge et al., 2001).<br />

The problems of the implementation of the new technologies for public purchasing are recognised and<br />

analysed in different public procurement literature from the points of view of public procurement process,<br />

e-procurement, managing public procurement processes, impacts of eCommerce usage to the<br />

organizational structures, and managing information and knowledge etc. (Vaidyanathan and Devaraj,<br />

2008). Hence, eCommerce technology can be defined as a technology that allows business transactions<br />

based on processing and transmission of digital data on the Internet, in contrast to the traditional<br />

business technology, the logistics of which are based on the physical environment (Dinlersoz and<br />

Pereira, 2006). Corbitt et al. (2003) explored the Internet which has become an essential business<br />

marketing paradigm related to the development of platform for trading, distributing and selling products<br />

between organisations, among organisations and consumers, and even between consumers where trust<br />

and trustworthiness play the key role. In their survey the trust relationship was established as the centre<br />

of technical systems of eCommerce. Trust is a centre and is fundamental for business relationships<br />

factors and for relationships between citizens and public organizations. Gunasekarana et al. (2002)<br />

focused on eCommerce as popular topic in the mass media and in informatics circles as well and argued<br />

that eCommerce is an emerging area that encompasses processes directly and indirectly related to the<br />

buying, selling and trading of products, services and information via computer networks – including the<br />

Internet (Oxley and Yeung, 2001).<br />

E-procurement has been viewed as an opportunity for efficiency in the governmental sector. Business-togovernment<br />

e-procurement, in the framework of eGovernment is understood as an instrument for cost<br />

reduction and has been developed due to the concentration on qualitative higher level of connections of<br />

government with the civilians and the companies (Towns, 2001). Hardy and Williams (2008) highlighted<br />

the information technology use to achieve better information, value for money, efficiencies, and maximize<br />

procurement effectiveness with respect to public and private sector. The goals of this usage in the case<br />

of public procurement are given by special needs of public and also defence sector and there are<br />

differences to private sector because of its focus on value, competitiveness, and accountability, it differs<br />

because of its social welfare implications (Panayiotou, Gayialis and Tatsiopoulos, 2004). Shu-Hsien at al.<br />

(2003) found implementing of eCommerce into the procedures of military organizations for electronic<br />

procurement and analysed benefits of e-procurement procedure for military organizations, diagnosing<br />

and preventing procurement faults for achieving procurement efficiency.<br />

The common further question of eCommerce in the defence sector is adapted, refined and built up nonconventional<br />

reliable approaches to the quality measurement of procurement processes and awareness<br />

evaluation of these processes, sharing complex knowledge and knowledge networks in according to the<br />

knowledge paradigm shifts.<br />

470


3. Research approach<br />

Nataša Pomazalová and Zbyšek Korecki<br />

The purpose of this paper is to analyze variability of purchase price of property arrangements (PA).<br />

Purchase prices of different PA have been based on ESSP. In all researched cases has been the lowest<br />

offered price as the major purchase criterion according to law order for public procurement and internal<br />

orders of defence sector.<br />

In this research was used the statistical analysis of average year purchase prices of goods from two<br />

different PA with different coding. Military transport and support technique are coded PA 2.3 and for<br />

analyse were selected two different types of detector tubes and special filter were selected and purchase<br />

prices of these goods were observed. Material for general use are coded PA 4.1 and in this sample here<br />

are flag, battery and drill.<br />

For study has been conducted comparison of two samples of different types of goods coded as PU 2.3<br />

and PU 4.1 to each other and the mean of prices in sample was also compared year to year. The sample<br />

number of observation for each coded observed PA was year to year as an annual means of prices and<br />

the sample was n=11 for each year. For the research were conducted t- tests and for multiple<br />

comparisons were used methods, such as Bonferron and F-test. Degrees of freedom (d.f. 22) and<br />

significance level (α = 0.05), Bonferron significance level is in our case 0.0125. Purchase prices of both<br />

chosen PA 2.3 and 4.1 were observed for each year 2006 – 2009. Data were collected in Distribution<br />

Centre in Pardubice. The measuring of purchase prices variability was based on available annual means<br />

of purchase prices of PA 2.3 and PA 4.1 were achieved via use of ESSP.<br />

For two sample t-test were measured average purchase prices of PA 2.3 in year 2006 for clarification,<br />

that average purchase prices of PA 2.3 are not otherwise in years 2007– 2009. In this study was<br />

expected, that the average purchase prices (means) are equal cause of usage of automatic instrument<br />

ESSP and the major criterion of the lowest offered price. The same procedure was used for average<br />

purchase prices of PA 4.1.<br />

For the case of PA 2.3: The null hypothesis H0: Considered annual purchase prices of PA 2.3 from<br />

observed in each year 2006 – 2009 are similar. Alternative hypothesis HA: Considered annual purchase<br />

prices of PA 2.3 from observed in each year 2006 – 2009 are different.<br />

For the case of PA 4.1: The null hypothesis H0: Considered annual purchase prices of PA 4.1 from<br />

observed in each year 2006 – 2009 are similar. Alternative hypothesis HA: Considered annual purchase<br />

prices of PA 4.1 from observed in each year 2006 – 2009 are different.<br />

According to limitations of this research on purchase price variability, here was not analysed on findings<br />

depending of purchase prices on the types of specifications, types of commercial subjects, socioeconomic<br />

circumstances and also crisis management and security in electronic environment (Nečas at<br />

al., 2006).<br />

4. Results and findings<br />

The results of purchase price variability analysis are presented in Table 1 using year-on-year data. The<br />

coefficient of variation of PA 2.3 is up to 10%, comparing PA 4.1, where is coefficient of variation 12% -<br />

70%. These findings show that the variability of purchased price of the PA 2.3 observations is<br />

concentrated around its mean. Goods contented in PA 4.1, however, scattered at a considerable distance<br />

from the mean. It may be expected for purchase prices of PA 2.3, here is less competitiveness between<br />

offered gaps of firms required goods. Hence, here are some specifics of this material, hygienic conditions<br />

etc. PA 2.3 is used in specifics conditions and quantity of purchased peaces is smaller than usage of PA<br />

4.1.<br />

For test of PA 2.3 in years 2006 and 2007 is t (22) = 0.96, p-value = 0.345 and F(11,11) = 0.46, p-value =<br />

0.208. The p-value for this test is over α = 0.05 and Bonferron significance level 0.0125. for years 2006<br />

and 2008 is t (22) = 1.38, p-value = 0.182, F(11,11) = 0.46, p-value = 0.228 and for years 2006 and 2009<br />

is t (22) = 1.23, p-value = 0.231 and F(11,11) = 1.65, p-value = 0.420 The p-value for these tests is over<br />

0.18 as a result with 95% confidence that the effect was not found to be statistically significant, thus the<br />

null hypothesis is not rejected.<br />

471


Nataša Pomazalová and Zbyšek Korecki<br />

Table 1: Purchase price variability of PA 2.3 and PA 4.1<br />

PA code and types<br />

PA 2.3<br />

Average<br />

pcs./CZK 2006-<br />

2009<br />

Range<br />

pcs./CZK<br />

Variance<br />

pcs./CZK S. d. pcs./CZK<br />

Detector tube I 63.73 3.25 0.81 0.90 1.47<br />

Detector tube II 53.87 42.80 10.70 3.27 6.07<br />

Filter 2123.28 36120.49 9030.12 95.03 4.48<br />

PA 4.1<br />

Flag 613.33 741884.55 185471.14 430.66 70.22<br />

Drill 4,98 1.35 0.34 0.58 11.67<br />

Accumulator 4,95 0.49 0.12 0.89 17.98<br />

Coefficient<br />

of variation %<br />

The case of PA 4.1, where for observed years 2006 and 2007 is t (22) = 5.32, p-value = 0.000, the<br />

statistics are F(11,11) = 22.68. The statistic is significant (p-value = 0.000). For years 2006 and 2008 is t<br />

(22) = 6.07, p-value = 0.000, F(11,11) = 485.72, p-value = 0.000 which is less than the critical value<br />

corresponding to α = 0.05 and Bonferron significance level 0.0125. The latter test, hence years 2006 and<br />

2009 is t (22) = 5.91, p-value = 0.000 and F(11,11) = 203.16, p-value = 0.000 for this test. Thus, the<br />

conclusion with 95% confidence is that the effect was not found to be statistically significant and the null<br />

hypothesis is rejected and the alternative hypothesis is supported.<br />

From the results of this analysis, it seems to purchase price levels vary according to kind and especially<br />

specification and purchased quantity of PA through ESSP – the null hypothesis for PA 2.3 is not rejected<br />

and for PA 4.1 is the alternative hypothesis supported as well. However, analysis has some limitations.<br />

Hence, limitations of this study cannot identify a set of endogenous and exogenous variables affected<br />

purchase price variability of PA 2.3 and PA 4.1.<br />

5. Discussion<br />

The need of usage ESSP tool is based on transformational processes in the Czech defence sector.<br />

Development of ESSP is also used for transmission of information from defence department to<br />

commercial users. Here is evidence that use of eGovernment is conducted in combinations of political<br />

reforms and transformation and processes changes in the organisation of the public sector (Cordella and<br />

Iannacci, 2010). Changes in ESSP use are based on new development on logistics support procedures<br />

and information technology improvement.<br />

MoD performs a methodical and legal assistance for military units in order to realization of e-public<br />

procurement. Usage of ESSP may perform professional activity in/out defence sector with many<br />

companies as well. ESSP is also tool for managing logistic support of ACR units on the Czech territory<br />

and missions abroad. The logistic support is realized in this case from the Czech Republic to National<br />

Support Elements. The responsible body for purchase conduct is the logistics division of the General<br />

Staff on strategic level and Support Command Headquarters on the operational level. The logistics group<br />

manages purchasing via eCommerce on the tactical level.<br />

This study has presented average purchase price variability of different property arrangements (PA 2.3<br />

and PA 4.1) through analysis. These prices are based on usage of automatic instrument ESSP as<br />

instrument of eCommerce used in the defence sector; in this case it is MoD of the Czech Republic.<br />

ECommerce could be understood as a toll of eGovernment (Hernon at al., 2002) and may support<br />

achieving governmental goals. Through ESSP commercial subjects offer their products or services which<br />

are required by organizational parts of MoD and units of ACR both on the Czech territory and in abroad in<br />

the conditions of foreign operation. The e-procurement is discussed as an instrument for cost-saving in<br />

the governmental side, but also for suppliers (Erridge et al., 2001).<br />

The results showed large purchase price variability of goods coded in PA 4.1 is over 11% and variability<br />

for PA 2.3 is lower 10%. Considered annual purchase prices of PA 2.3 from observed in each year 2006<br />

– 2009 are similar. According to result it seems considered annual purchase prices of PA 4.1 from<br />

observed in each year 2006 – 2009 are different.<br />

472


Nataša Pomazalová and Zbyšek Korecki<br />

The results have relevance in the current debate on the impact of the level of knowledge needs and<br />

practical experience of logistic experts as decision makers in daily routine analytic procedures for<br />

achieving operational goals reflecting governmental goals on one side and expectations of commercial<br />

partners on the market. The participation of private firms for achieving goals of the public procurement is<br />

assumed on this base much more attractive for suppliers of PA 4.1, than PA 2.3. But for suppliers of PA<br />

2.3 are on the other side also strength in usage of ESSP, cause of considering quality can be higher<br />

priced. This analytical result is supported by empirical evidence; those property arrangements with low<br />

sale cause of its specific tend to have higher price in the market.<br />

ESSP technology may make purchase price of property arrangements as military transport and support<br />

technique and material for general use lower and property arrangements comparisons of public<br />

procurement for defence sector. The idea of ESSP is to gradually increase the level of credibility and<br />

validity to give evidence to support procurement decision makers especially at the tactical level. Public eprocurement<br />

has somewhat uncomfortable with these ideas as political sensitivities, divergent viewpoints<br />

and different approaches for complex e-procurement planning process with many stages and<br />

interrelationships. ESSP in the future development may correct critical problems. ESSP as a tool shows<br />

some kind of improvement and optimize the procurement processes. However, in reality, there were<br />

many non-rational goals in the public procurement.<br />

These results bring understandings that permanently adjust ESSP, procurement knowledge needs to suit<br />

the needs of the end users in ACR and also for ACR planning processes. Public procurement<br />

methodology may reinforce competition between commercial organizations as suppliers of property<br />

arrangements – military transport and support technique and material for general use. This result is<br />

supported achieved findings.<br />

6. Conclusion<br />

Material support and supplies of property in the property arrangement groups and services and also<br />

procurement administration at decentralised subset is realised through an appropriate ESSP. ESSP<br />

addresses and ensures an effective dealing with financial means from the state budget, makes public<br />

purchasing professional and takes control over the public procurement activities.<br />

The key sense of ESSP for defence sector usage is reduction of expenditures, non-discrimination, and<br />

transparency of public procurement. Reasons for usage this tool is also on the side of processing of<br />

relationships defence sector with the commercial organizations as others governmental goals (Cordella<br />

and Iannacci, 2010). In addition the platform for achieving efficiency is expected on the side of strategy<br />

processes of allocation of resources and on innovation of ESSP and increasing of participation of<br />

commercial subjects and advantages for both public and private sector.<br />

Analysis of the dataset and a comparative analysis show the comparison of purchase prices of different<br />

property arrangements. The achieved annual purchase prices of material for general use in observed<br />

years 2006 – 2009 were different. We found that the purchase price variability for materials for general<br />

use was over 11% and the purchase price variability for military transport and support services was lower<br />

than 10%. These results may be interesting for achieving effective use of military and commercial<br />

capabilities in the logistics support process of the units located in the foreign countries, but also for<br />

entrepreneurs, companies and enterprises as suppliers of property arrangements.<br />

Possible direction for future research and methodology development is to investigate how to develop risk<br />

procurement strategy (exactly what defence department wants and can therefore estimate the value of<br />

items), new organisational structures with new information technologies and using various well-developed<br />

and accepted commerce principles. The same ways to deal with such complexity can be applied to<br />

standardisation of the use eCommerce in defence department and organizational levels. The possible<br />

way is description of complex logistic and procurement processes in the foreign operations for saving<br />

internal costs, improving e-procurement realization and increasing of e-purchase security.<br />

Acknowledgement<br />

The paper has arisen within the Research Projects of Organizational Development/Economic Laboratory<br />

No. 9079301010 of the Department of Economics, Faculty of Economics and Management of the<br />

University of Defence. Special thank to Distribution Centre in Pardubice.<br />

473


References<br />

Nataša Pomazalová and Zbyšek Korecki<br />

Amelinckx, I., Muylle, S. and Lievens, A. (2008) Extending electronic sourcing theory: An exploratory study of<br />

electronic reverse auction outcomes. Electronic Commerce Research and Applications 7, 119–133.<br />

Chun, S.H. and Kim, J.C. (2005) Pricing strategies in B2C electronic commerce: analytical and empirical approaches.<br />

Decision Support Systems 40, 375– 388.<br />

Corbitt, B.J., Thanasankit, T. and Yi, H. (2003) Trust and eCommerce: a study of consumer perceptions. Electronic<br />

Commerce Research and Applications 2, 203–215.<br />

Cordella, A. and Iannacci, F. (2010) Information systems in the public sector: The eGovernment enactment<br />

framework. Journal of Strategic Information Systems 19, 52–66.<br />

Czech Republic, Ministry of Defence and Armed Forces of the Czech Republic. (2010) SEPO<br />

http://www.army.cz/scripts/detail.php?id=7210 [online]. Prague: 2010, 09.01.<br />

Dinlersoz, E.M. and Pereira, P. (2007) On the diffusion of electronic commerce International. Journal of Industrial<br />

Organization 25, 541–574.<br />

Erridge, A., Fee, R. and McIlroy, J. (eds.) (2001) Best Practice Procurement: Public and Private Sector Perspectives.<br />

Gover Pub Co., Burlington, VT.<br />

Government of the Czech Republic (2006) Resolution no. 500/2006 on National Plan for the Introduction of<br />

Electronic Public Procurement Over the Period 2006 – 2010. Prague.<br />

Gunasekarana, A., Marrib, H.B., McGaugheyc, R.E. and Nebhwani M.D. (2002) ECommerce and its impact on<br />

operations management. International Journal of Production Economics 75, 185–197.<br />

Hardy, C.A. and Williams, S.P. (2008) EGovernment policy and practice: A theoretical and empirical exploration of<br />

public e-procurement. Government Information Quarterly 25, 155–180.<br />

Hernon, P., Reylea, H. C., Dugan, R. E., and Cheverie, J. F. (2002). United States government information: Policies<br />

and Sources. Westport.<br />

Koch, J.V. and Cebula, R.J. (2002) Price, quality and service on the internet: sense and nonsense. Contemporary<br />

Economic Policy 20 (1), 25–37.<br />

Markus, M. L. and Soh, Ch. (2002) Structural Influences on Global Ecommerce Activity. Journal of Global Information<br />

Management 10, (1), 5-12.<br />

Nakayama, Y. (2009) The impact of eCommerce: It always benefits consumers, but may reduce social welfare.<br />

Japan and the World Economy 21, 239–247.<br />

Nečas, P., Szabo, S. and Bučka, P. (2006) Crisis management and security in simulation environment. Science &<br />

Military. Vol. 1, No. 1, 33-37.<br />

Oxley, J. And Yeung, B. (2001) ECommerce Readiness: Institutional and International Competitiveness. Journal of<br />

International Business Studies, Vol. 32, No.4, 705-732.<br />

Panayiotou, N. A., Gayialis, S. P., and Tatsiopoulos, I. P. (2004). An e-procurement system for governmental<br />

purchasing. International Journal of Production Economics, 90, 79−102.<br />

Shu - Hsien Liao et al. (2003) A web-based architecture for implementing electronic procurement<br />

in military organisations. Technovation 23, 521–532.<br />

Stemberger, M.I. and Jaklic, J. (2007) Towards EGovernment by business process change – A methodology for<br />

public sector. International. Journal of Information Management 27, 221–232.<br />

Towns, S. (2001) Security blanket: Public key infrastructure unlocks eGovernment potential. Government Technology<br />

26–28, 32–33.<br />

Vaidyanathan, G. and Devaraj, S. (2008) The role of quality in e-procurement performance: An empirical analysis.<br />

Journal of Operations Management 26, 407–425.<br />

Zott, Ch., Amit, R. and Donlevy, J. (2000) Strategies for Value Creation in ECommerce: Best Practice in Europe.<br />

<strong>European</strong> Management Journal Vol. 18, No. 5, 463–475.<br />

474


Evaluating the Development of eGovernment Systems: The<br />

Case of Polish Local Government Websites<br />

Leszek Porębski<br />

AGH University of Science and Technology, Kraków, Poland<br />

leszekpo@agh.edu.pl<br />

Abstract: The evaluation of public institutions’ web sites in the context of eGovernment sophistication constitutes an<br />

important part of the literature on eGovernment. However, the decided majority of studies of this kind is focused on<br />

central administration (government, its agencies and state institutions coordinating public services delivery). This<br />

paper undertakes the issue of the major functions performed by public institutions’ web sites, in a different – much<br />

less developed – perspective. The focal point is local government web sites and their role in constructing new model<br />

of relations between government and citizens. The major part of the paper is the presentation of results of the<br />

empirical study carried out in the period of 2005-2009. The project comprised the analysis of the content of the<br />

official web sites of the Polish counties, which are the secondary level of the local government system in Poland.<br />

During the research, web sites of all 314 counties were analyzed. The evaluation of each web site was focused on<br />

the availability of specific type of information and/or online service. Therefore, the research depicts the “supply”<br />

aspect of eGovernment. The quantitative method of analysis, based on the concept of Website Attribute Evaluation<br />

System (WAES) was applied in the research. The analytical framework of the study is based on the assumption that<br />

there are four major functions performed by local government web sites. They are: information, promotion,<br />

consultation and service delivery. The results of the analysis prove that information delivery is the dominating<br />

function performed by local government web sites in Poland. It is so at the sacrifice of more sophisticated types of<br />

the Internet use (consultation and electronic service delivery). At the same time, a modest but stable progress can be<br />

observed in the number and variety of information and services offered by web sites of Polish local governments.<br />

Keywords: local government, eGovernment, eDemocracy, web site content, ICT<br />

1. Introduction<br />

Signs of rapid growth of information and communication technologies (ICT), often referred to as “the<br />

information revolution”, are evident in various aspects of everyday life. Mutual relations between citizens<br />

and political institutions are an important part of the realm of the ICT use in public domain. Originated<br />

during recent decades extensive literature of that field, deals with such range of problems as e-voting on<br />

one hand and Internet-based political communication on the other. An issue of eGovernment can be<br />

considered one of the most often debated aspects of political dimension of ICT use.<br />

Various elements of eGovernment can be emphasized when defining this notion. The focus could be the<br />

cost effectiveness of public service delivery (Carbo and Williams 2004), back office operations of<br />

administrative structures (Kunstelj and Vintar 2004) or the role of ICT in the formulation of the public<br />

policy (Bannister 2007). Nevertheless, each specific definition can be placed on a continuum, the<br />

extremes of which are set up by a “narrow” and a “broad” concept of eGovernment (Janssen, et al. 2004).<br />

The former model reduces the concept of eGovernment to: “the use of technology to provide electronic<br />

services to citizens, businesses and organizations” (Berntzen and Olsen 2009: 77). According to the<br />

latter, the notion of eGovernment should be associated with: “the entire range of government roles and<br />

activities, shaped by and making use of information and communications technologies” (Brown 2005:<br />

241). This paper adopts the broader definition of eGovernment, the one referring to the use of ICT by<br />

public bodies in their interactions with citizens and organizations. Such a wide-ranging approach makes<br />

the concept of eGovernment closely related to eDemocracy defined in descriptive (and not normative)<br />

terms. Thorough analysis of the scope and meaning of both terms goes beyond the subject matter of this<br />

paper but can be found in numerous studies (Sakowicz 2004, Holzer and Kim 2006, Schellong 2009).<br />

One of the most important planes of the analysis of eGovernment is the inquiry of the web sites of public<br />

institutions. Regardless of the emergence of new instruments employed to stimulate virtual contacts (e.g.<br />

social network services), web sites still play the role of the major channel used by public bodies for digital<br />

interactions with both individuals and organizations. Furthermore, in case of many local and/or small<br />

entities they remain the only tool used for institutional ICT-mediated activity. Consequently, various<br />

aspects of the analysis of web sites can be found in studies concerning eGovernment. They propose<br />

models of web sites evaluation (Henriksson, et. al. 2007), present international benchmarking reports<br />

(West 2006, 2007), or simply offer an in-depth assessment of a selected group of public bodies web sites<br />

in individual countries (Ferber, et. al. 2003; Stoica and Ilas 2009). This presentation can be included to<br />

the latter category of research.<br />

475


Leszek Porębski<br />

2. Polish local government system: The role of counties<br />

The current system of local government in Poland was introduced in January 1999 (following the law<br />

approved by the parliament in June 1998). It is based on the three-tier division of local government units.<br />

A primary level consists of 2478 municipalities (gmina), secondary level of 314 territorial counties and 65<br />

urban counties (powiat), while sixteen provinces (województwo) make up the third tier of local<br />

government system.<br />

Urban counties are cities, which are legally endowed with rights of counties. In this case the territory of<br />

the county is limited to the area of the single city – the county seat. Cities with population over one<br />

hundred thousand residents as well as some smaller ones (which used to be the seat of the province<br />

authorities prior to the local government reform in 1999) have the status of urban counties. Territorial<br />

counties consist of several rural and urban municipalities. The largest municipal city of the area usually<br />

takes the role of a seat of a county in addition to serving as an economic, cultural and educational centre<br />

of the region. The elected organ of the county is the council (its term of office is four years). The<br />

executive branch is represented by the county board, comprising four to six members and headed by the<br />

chair. The most important numerous statutory tasks of the county include: health care, social welfare,<br />

public transport and public roads maintenance, culture and tourism, education and building supervision.<br />

Territorial counties represent regions often linked with strong ties, rooted in distant history and based on<br />

traditions shared by local community. Thus, they are a good example of the local government unit, which<br />

is responsible not only for the everyday performance of public institutions but for the preservation and<br />

support for local identity as well.<br />

3. Scope and methodology of the research<br />

The purpose of the research presented in this paper was the assessment of the Polish local government<br />

web sites. The level of local government selected for the research was territorial counties. Urban counties<br />

were excluded from the study to ensure the internal cohesion of the sample and to allow for generalized<br />

conclusions. Cities with populations often close to or even greater than half a million inhabitants are very<br />

much different from the majority of territorial counties. The latter are typically rural and sparsely populated<br />

units, often – as mentioned above – founded around common history and enduring social ties. Therefore,<br />

the assumption that both types of counties are equal (and, consequently, including them within the same<br />

sample) would distort the results of the study.<br />

The main goal of the study was to create the comprehensive, broad profile of the Polish local government<br />

web sites and thus the quantitative method was selected for the purpose of this analysis. The<br />

questionnaire constructed for the study and applied in the research was based on the concept proposed<br />

by the Cyberspace Policy Research Group, known as the Website Attribute Evaluation System (WAES).<br />

The WAES, commonly used for the assessment of various aspects of web sites performance (see e. g.<br />

Ferber, et. al. 2003), is the binary tool. It analyses the content of the web site in the context of specific<br />

detailed criteria (types of information, services, web tools). The component in the content either exists or<br />

is absent. As a result, a score of either “0” or “1” is assigned to the specific criterion. The same formula<br />

was used in the research of Polish local governments.<br />

Online communication with citizens can lead to the accomplishment of various goals. The point of<br />

departure for the presented research project was: What is the role of web sites in everyday activity of<br />

local governments? Or, more precisely: What major goals are fulfilled by local governments through their<br />

web sites? Consequently, based on the preliminary qualitative study, four major functions performed by<br />

the analyzed web sites were identified. They were: information, promotion, consultation and service<br />

delivery.<br />

The information function is associated with the online publishing of basic data on local government<br />

bodies (e. g. personal composition of the county council and the county board) and their work, such as:<br />

office hours, texts of acts accepted by the council, county budget). This function includes also information<br />

concerning the broader context of the Polish local government system (e. g. links to the web sites of<br />

government institutions or municipalities located in the specific county). Promotion refers to the online<br />

presentation of the county assets, both from the perspective of possible individual visitors (touristic<br />

attractions of the region, accommodation) and the commercial viewpoint (investment offer). Availability of<br />

the web site content in foreign languages is also regarded as the element of the promotion function.<br />

Consultation is closely interrelated with interactive capability of the Internet and its ability to stimulate the<br />

476


Leszek Porębski<br />

public debate. Thus, this particular aspect of web sites’ content fulfills the essential aspect of<br />

eDemocracy. Several tools can be considered especially useful in this function. The basic one is the<br />

email address of the office and/or to the local government representatives. More sophisticated online<br />

devices include: a discussion forum on local problems, polls, chat or interactive service dedicated to the<br />

direct contact with members of the county board (often performed with the use of instant messaging<br />

applications). The degree of responsiveness of local authorities is also an important aspect of the<br />

consultation function. It can be measured by a reply received/not received to the message sent to the<br />

email address of the office placed on the web site. The last function, electronic service delivery, is<br />

tantamount to the narrowly defined notion of eGovernment. It refers to various aspects of relations<br />

between the office and the individual regarded as the consumer – the beneficiary of public services.<br />

Detailed criteria of this function performance reflect stages of eGovernment evolution and include:<br />

downloading of administrative forms, ability to apply online, electronic transactions with the office (e. g.<br />

paying parking tickets online). Regardless of four major functions the availability of a few additional<br />

services was assessed during the research. They were: accessibility of the web site for the disabled<br />

persons and presence of various types of multimedia content (pictures, audio and video materials).<br />

In the course of the research all the country’s 314 territorial counties’ web sites were examined. They<br />

were only the official sites, formally maintained by the county, as opposed to community portals or web<br />

sites of local NGOs. The research was carried out for five years, from 2005 to 2009, between April and<br />

May of each year.<br />

The questionnaire used in 2005 included 55 detailed criteria. After minor modifications introduced in 2006<br />

(a few criteria were substituted with new ones – e.g. the problem of online payments for public services<br />

was included in the questionnaire) the number of criteria was reduced to 54. This final version of the<br />

questionnaire was used in the research from 2006 to 2009.<br />

4. Research results<br />

4.1 eGovernment Advancement Index: Longitudinal trends<br />

Longitudinal research project provides the opportunity to both present the picture of the analyzed<br />

phenomena in the particular moment and reflect upon more general trends observable in the area of<br />

consideration. Research of Polish counties allows for a generalization of the transformation trends of the<br />

overall ICT use between 2005 and 2009 and the degree in which specific Internet tools and services are<br />

available on the local government web sites.<br />

Table 1 presents scores of The eGovernment Advancement Index of the county web sites in the<br />

consecutive years of the study. Depicted are results for each of four basic functions as well as the total<br />

score. The total raw score obtainable in the research was 54 (1 point for each criterion in the<br />

questionnaire). The eGovernment Advancement Index score represents the result of county web sites as<br />

the percent of the total number of points, which could be obtained in the whole research and within the<br />

particular function. Therefore, the maximum value of the index is 100. Results in the table illustrate the<br />

overall advancement of eGovernment use in Polish territorial counties, measured by means of the<br />

content of their web sites and perceived from the perspective of Internet users.<br />

Table 1: eGovernment Advancement Index: Websites of Polish counties (2005-2009)<br />

Total score<br />

Information<br />

Promotion<br />

Consultation<br />

Service Delivery<br />

2005 2006 2007 2008 2009<br />

40,00<br />

39,98<br />

44,21<br />

46,05<br />

47,76<br />

49,30<br />

46,86<br />

26,56<br />

19,33<br />

50,35<br />

43,86<br />

29,86<br />

11,50<br />

55,80<br />

47,14<br />

32,29<br />

17,00<br />

57,15<br />

48,00<br />

36,57<br />

19,00<br />

58,15<br />

48,00<br />

34,29<br />

28,75<br />

The index scores reveal that new options of communication with citizens opened by the Internet are<br />

exploited by Polish local governments at relatively low level. For 2005 results, in case of none of five<br />

analyzed aspects, the overall score was greater than 50. It means that less than half of various online<br />

resources, taken into account in the research questionnaire, was available for users of the analyzed web<br />

sites. Performance of two out of four functions (information and promotion) is visibly more advanced,<br />

while the remaining two (consultation and service delivery) are considerably lagging. The case of service<br />

delivery is especially striking. Its index score (19,33) in not only less than half of the total score of the<br />

whole index (40,00) but it also stays far behind results of all other functions. If the total score of the index<br />

477


Leszek Porębski<br />

in 2005 is considered to be 100, the same year scores of particular functions are the following:<br />

information – 123,2, promotion – 117,2, consultation – 66,4, service delivery – 48,32. In fact, in 2005 web<br />

sites of Polish territorial counties were based on the availability of information on the office activity and<br />

advantages of the region, while interactive potential of the net was hardly explored. The latter claim refers<br />

both to communication with individuals as citizens (consultation) and contacts with residents regarded as<br />

consumers (service delivery).<br />

The comparison of 2005 and 2009 results indicates that there is a gradual but steady increase in the use<br />

of the ICT by Polish counties. It refers to all the dimensions analyzed in the research, yet the magnitude<br />

of the growth is very much different in case of particular aspects of the web content. If scores of 2005 are<br />

taken as 100, the 2009 results illustrate these different rates of advancement (see table 2).<br />

Table 2: Growth of the eGovernment Advancement Index (2006-2009): Websites of Polish counties<br />

(2005 = 100)<br />

2006 2007 2008 2009<br />

Total score<br />

99,9<br />

110,5<br />

115,1<br />

119,4<br />

Information<br />

Promotion<br />

Consultation<br />

Service Delivery<br />

102,1<br />

93,6<br />

112,4<br />

59,5<br />

113,2<br />

100,6<br />

121,6<br />

87,9<br />

115,9<br />

102,4<br />

137,7<br />

98,3<br />

118,0<br />

102,4<br />

129,1<br />

148,7<br />

During five years the overall score increased only by about twenty percent, which does not seem to be a<br />

spectacular achievement, considering relatively low point of departure in 2005. Nonetheless, it is worth<br />

stressing that EGovernment Advancement Index, taken as a whole was growing at a very stable rate.<br />

Starting with 2006, it gained a few percentage points during each consecutive year of the study.<br />

Information and promotion, functions which were performed relatively well even in 2005, have not added<br />

to the general progress in the five year period. This refers especially to the use of web sites for the<br />

promotion of the county – the only function that failed to grow during five years of the research. Moreover,<br />

this remains to be true regardless of the fact that in 2009 the index score for the promotion function was<br />

only 48. Thus, there are still many online resources, which could be used for the promotion of the region<br />

but are unavailable on the web sites.<br />

Two remaining functions: consultation and service delivery, registered significant growth between 2005<br />

and 2009. Both of these aspects of online endeavors performed disappointingly low in 2005. Hence, ‘the<br />

lower you start, the higher you finish’ rule can be applied to explain the substantial progress in making<br />

use of various forms of e-consultation and e-delivery of public services. Service delivery function,<br />

improved by almost fifty percent between 2005 and 2009, in fact recorded the greatest progress only in<br />

the last year of the study. The enormous breakdown, which can be observed in service delivery between<br />

2005 and 2006 can be attributed to, as mentioned before, changes in the research questionnaire. The<br />

addition of the online payments criterion – the option barely accessible on web sites – remarkably<br />

lowered the overall performance of this function in 2006.<br />

This tendency of fast growth of interactive aspects of web sites content at the sacrifice of more passive,<br />

information-oriented features reflects the general characteristic of eGovernment expansion observed<br />

globally. Moreover, it represents the switch from the rudimentary stage of eGovernment maturity to no<br />

more than intermediate phase in the whole sequence of eGovernment development (see e. g. Capgemini<br />

2007, Hiba, et. al. 2009). It seems that in case of the Polish counties the moment of that transition<br />

occurred between 2005 and 2009 and it was identified by the research project presented in the paper.<br />

4.2 Resources available on web sites of Polish counties<br />

The overall picture of the eGovernment development on the level of Polish local governments should be<br />

supplemented by more detailed presentation of the web sites content. An Internet user, accessing a city<br />

or municipality official web site is not seeking ‘information content’ or ‘consultation tools’. He simply wants<br />

to verify office hours in the public transportation department or express an objection to the idea of new<br />

shopping center construction (next to his place of residence). Thus, from the perspective of a<br />

responsiveness of a local government to residents’ needs and expectations, online presence of the<br />

specific information and services is of great importance for the eGovernment analysis.<br />

478


Leszek Porębski<br />

Selected types of the content available on the web sites of Polish counties are presented in table 3.<br />

Beside tools, services and information assigned to four basic functions, some additional data collected in<br />

the research is displayed.<br />

Table 3: Selected services and information available on official web sites of Polish counties (%)<br />

Content 2005 2009<br />

Information<br />

Organization of the office<br />

Information on handling specific matters<br />

County budget<br />

EU and/or <strong>European</strong> funds availability information<br />

Searchable archive of the web site content<br />

Promotion<br />

Tourist attractions of the region<br />

Tourist amenities (restaurants, accommodation)<br />

Commercial investment offer<br />

Availability of at least part of web site content in a foreign language<br />

Consultation<br />

Email address to the office available on the web site<br />

Response to the message sent to the office was received<br />

Online discussion forum<br />

Online poll on local issues<br />

Interactive service for the direct contact with county officials<br />

Service delivery<br />

Downloading forms<br />

Ability to apply online<br />

Online transactions with the office*<br />

Possibility of tracking the individual matter handling<br />

Additional content<br />

Audio files accessible<br />

Video files accessible<br />

Web site accessible by persons with disabilities<br />

* Criterion not included in the 2005 questionnaire<br />

Regarding the information function, the growth of online accessibility of all presented information and/or<br />

services is noticeable. The role of electronic bulletin board is played effectively by the web site, yet<br />

general political information (e.g. concerning the EU) or information on the office itself are available more<br />

often than specific outcomes of the activity of the council (e. g. county budget). Internet is thus still not<br />

sufficiently perceived as the tool of local democracy reinforcement. Transparency of local power and its<br />

openness towards citizens appear to be values easily obtainable via Internet use. Nonetheless, in case of<br />

Polish local government they still await appreciation.<br />

Promotion is the only function of local government web sites, that is aimed mainly at visitors and not<br />

members of the local community. Almost all counties take advantage of opportunities produced by the<br />

Internet in the field of self-presentation and construction of the favorable image. So far this task is<br />

performed better with respect to potential individual tourists than possible commercial investors. The<br />

former can find online all types of information required for planning summer holidays, skiing weekend or<br />

participation in local folk fiesta. The offer for the latter is much more limited. Moreover, commercial<br />

investment solicitation is the only type of promotional material, which has diminished in the analyzed<br />

period. It is probably the result of the relocation of such information from the official web site to more<br />

specialized services. Promotion refers also to the presentation of at least basic information on the region<br />

in foreign languages. The number of county web sites offering such an option has increased from one<br />

third in 2005 to almost one half in 2009. The accession of Poland to the <strong>European</strong> Union (effective May<br />

2004) seems to be associated with these relatively large and still growing numbers. International<br />

cooperation and access to the EU funds is perceived more and more as the regular aspect of local<br />

community existence. Consequently, making the web site accessible in foreign languages becomes selfevident.<br />

English is the most popular foreign language on county web sites. In 2009 more than one third of<br />

all sites (36,3%) were accessible in English. German was only slightly less common (31,5%) while<br />

French (8,9%) followed by Russian (7,0%) took the third and fourth position, respectively.<br />

479<br />

89,2<br />

38,5<br />

24,5<br />

38,2<br />

54,1<br />

85,6<br />

63,1<br />

54,8<br />

32,8<br />

90,8<br />

21,3<br />

27,1<br />

15,6<br />

8,0<br />

46,2<br />

2,9<br />

-<br />

9,2<br />

3,8<br />

6,1<br />

0,3<br />

92,0<br />

49,4<br />

28,3<br />

62,4<br />

72,3<br />

90,1<br />

72,0<br />

42,4<br />

44,6<br />

95,6<br />

21,7<br />

13,7<br />

18,8<br />

16,9<br />

59,6<br />

28,7<br />

1,0<br />

25,5<br />

24,2<br />

25,5<br />

3,8


Leszek Porębski<br />

Consultation capacity of the Internet, implied by its interactive attributes, is of essential importance with<br />

respect to the stimulation and the strengthening of eDemocracy. It refers mostly to its deliberative<br />

dimension, regarding public debate and articulation of one’s views to be the very foundations of<br />

democracy. In this perspective web sites analyzed in the study are still in the beginning of the path<br />

leading to mature eDemocracy. The only interactive feature, which can be identified as common is an<br />

email address. Yet, this does not necessarily mean that electronic mode of contacts with local authorities<br />

is effective. Only around one fifth of county representatives emailed during the research replied to the<br />

message. Moreover, that number is stable and has not grown since 2005. Among tools, which enable<br />

real online debate, the most widespread – poll on local issues – can be found in less than one fifth of all<br />

web sites. Diminishing popularity of discussion forums goes together with prevalence of various forms of<br />

services facilitating direct contact with a particular member of local authorities. However, while online<br />

forums protect anonymity in case of more than half of interactive services constructed specially for<br />

debate, revealing personal data is required. It shows apparent tendency of local power holders to control<br />

online deliberation in a more rigorous way. Such aspirations do not seem to be the best forecast for the<br />

future of eDemocracy.<br />

Online delivery of public services still remains the weakest aspect of web sites content. Apart from the<br />

substantial progress during last five years, some tools are still hardly available. Primarily it refers to online<br />

transactions, which in 2009 could have been handled on no more than one percent of web sites. Delays<br />

in the introduction of mature e-services platform in Poland have many sources. The decisive one is<br />

perhaps the vague division of powers between various institutions of central administration and local<br />

government institutions. Where too many are responsible, no one can be blamed.<br />

An important feature of the Internet is its multimedia character. The analyzed web sites are slowly but<br />

gradually reaching the status of multimedia portals. Yet, it is worth stressing that in 2005, the point of the<br />

departure for the research project, any audio or video materials were hardly available on county web<br />

sites. Currently, about one fourth of all sites give access to various audio or video files. They are mostly<br />

promotional films or tourist guides but records of the county council meetings are also available. For the<br />

majority of web sites the only kind of multimedia file is pictures documenting local events or just<br />

presenting the chair of the county board who ‘welcomes all dear virtual visitors to our charming region’.<br />

The problem which still awaits its resolution is accessibility of web sites for the persons with disabilities. In<br />

2005 only one site (out of 314) applied some services facilitating the use by the handicapped. After five<br />

years, in 2009, that number has risen to twelve sites (3,8%) and two most popular services are: the<br />

possibility of enlarging characters on the site and audio transcript of selected texts.<br />

5. Conclusion<br />

Hopes for the spectacular democratic breakthrough, brought on by new technologies and promising real<br />

empowerment of citizens in their relations with the state and its representatives turned out to be an<br />

illusion. Nevertheless, eGovernment, defined as the use of the ICT by public institutions, is one of the<br />

most important instruments which modify the current meaning of democracy. Public bodies, while<br />

interacting online with citizens, make use of variety of tools, thus web sites are no longer the only channel<br />

of computer mediated communication. Yet, in many cases they still remain the basic means employed for<br />

that purpose. It refers especially to relatively small units of local government, in countries representing<br />

the intermediate level of economic development. They are often located far from urban regions and<br />

experience both drawbacks of technological infrastructure and shortage of funds for investments. Polish<br />

territorial counties appear to match that characteristic, hence the assessment of their web sites –<br />

presented in this paper – should be regarded as the preliminary step to the comprehensive account of the<br />

local dimension of Polish eGovernment model.<br />

Results of the study prove that the overall picture is very much changing and Polish counties portrayed in<br />

2005 differ considerably from those examined five years later. They are still focused on information<br />

delivery but interactive aspect of the ICT is emerging as an important part of their online offer. Step by<br />

step local governments recognize the value of the Internet. Nevertheless, however fast, this rate of<br />

transition will not put the Polish local government among the leaders of the race. Users of Polish counties<br />

web sites can already benefit from some signs of the information revolution. They still need a lot of time<br />

to enjoy the full flavor of it.<br />

480


Acknowledgments<br />

Leszek Porębski<br />

This work was funded by the Polish Ministry of Science and Higher Education (research project N N116<br />

331338).<br />

References<br />

Bannister, F. (2007) “The Curse of the Benchmark: An Assessment of the Validity and Value of eGovernment<br />

Comparisons”, International Review of Administrative Sciences, Vol. 73, No. 2, pp. 171-188.<br />

Berntzen, L. and Olsen M. (2009) “Benchmarking eGovernment: A Comparative Review of Three International<br />

Benchmarking Studies”, Proceedings of the Third International <strong>Conference</strong> on Digital Society, IEEE Computer<br />

Society, pp. 77-82.<br />

Brown, D. (2005) “Electronic Government and Public Administration”, International Review of Administrative<br />

Sciences, Vol. 71, No. 2, pp. 241-254.<br />

Capgemini (2007) “The User Challenge: Benchmarking the Supply of Online Public Services”, September 2007<br />

[online] http://ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/ egov_benchmark_2007.pdf<br />

Carbo, T. and Williams, J. (2004) “Models and Metrics for Evaluating Local Electronic Government Systems and<br />

Services”, Electronic Journal of eGovernment, Vol. 2, Issue 2, pp. 95-104.<br />

Ferber, P., Foltz, F. and Pugliese, R. (2003) “The Politics of State Legislature Web Sites: Making eGovernment More<br />

Participatory”, Bulletin of Science, Technology & Society, Vol. 23, No. 3, June, pp. 157-167.<br />

Henriksson, A., Yi, Y., Frost, B. and Middleton, M. (2007) “Evaluation Instrument for eGovernment Websites”,<br />

Electronic Government. An International Journal, Vol. 4, No. 2, pp. 204-226.<br />

Hiba, M., Tamara, A. and Amer, A. (2009) “eGovernment in Jordan”, <strong>European</strong> Journal of Scientific Research, Vol.<br />

35, No. 2, pp. 188-197.<br />

Holzer, M. and Kim S-T. (2006) Digital Governance in Municipalities Worldwide (2005): A Longitudinal Assessment of<br />

Municipal Websites thorough the World, National Center for Public Productivity.<br />

Janssen, D., Rotthier, S. and Snijkers, K. (2004) “If You Measure It They will Score: An Assessment of International<br />

eGovernment Benchmarking”, Information Polity, Vol. 9, pp. 121-130.<br />

Kunstelj, M. and Vintar, M. (2004) “ Evaluating the Progress of eGovernment Development: A Critical Analysis”,<br />

Information Polity, Vol. 9, pp. 131-148.<br />

Sakowicz, M. (2004) “How to Evaluate eGovernment? Different methodologies and Methods”, NISPACEE<br />

Occasional Papers in Public Administration and Public Policy, Vol. V, No. 2, Spring, pp. 18-26.<br />

Schellong, A. (2009) “EU eGovernment Benchmarking 2010+. General Remarks on the Future of Benchmarking<br />

Digital Government in the EU”, [online], http://www.iq.harvard.edu/blog/<br />

netgov/papers/schellong_2009_wp_eu_egovernment_benchmarking_future_methodology.pdf.<br />

Stoica, V. and Ilas, A. (2009) “Romanian Urban eGovernment. Digital Services and Digital Democracy in 165 Cities”,<br />

Electronic Journal of EGovernment, Vol. 7, Issue 2, pp. 171-182.<br />

West, D. (2006) “Global eGovernment 2006”, [online], www.insidepolitics.org/egovt06int.pdf.<br />

West, D. (2007) “Global eGovernment 2007”, [online], www.insidepolitics.org/egovt07int.pdf.<br />

481


Comparative Analysis of Information Security Governance<br />

Frameworks: A Public Sector Approach<br />

Oscar Rebollo 1 , Daniel Mellado 2 , Luis Enrique Sánchez 2 and Eduardo Fernández-<br />

Medina 2<br />

1<br />

Social Security IT Management, Ministry of Labour and Immigration, Madrid,<br />

Spain<br />

2<br />

GSyA Research Group, University of Castilla-La Mancha, Spain<br />

orebollo@gmail.com<br />

damefe@esdebian.org<br />

LuisE.Sanchez@uclm.es<br />

Eduardo.FdezMedina@uclm.es<br />

Abstract: Security awareness has spread inside many organizations leading them to tackle information security not<br />

just as a technical matter, but from a corporate point of view. Information Security Governance (ISG) provides<br />

enterprises with means of dealing with the security of their information assets in a comprehensive manner, involving<br />

every stakeholder through the whole governance and management processes. Boards of Public Entities cannot<br />

remain unaware of this development and should make efforts to include ISG in their business processes. Realizing<br />

this relevant role, scientific literature contains a variety of proposals which define different frameworks to foster ISG<br />

inside any corporation. In order to facilitate the adoption of any of them by the public sector, this paper compiles<br />

existing approaches, highlighting the main contributions and characteristics of each one. Senior executives and<br />

security managers may need support on their decisions about adopting one of these frameworks, so a comparative<br />

analysis is performed. Although some comparative reviews are found in literature, they lack a systematic and<br />

repeatable methodology, ignore recently published contributions or focus on specific areas, making results biased<br />

and inappropriate for general use in corporations and the public sector. This paper tries to guarantee an objective<br />

comparison through a set of comparative criteria that have been defined and applied to every proposal, so that<br />

strengths and weaknesses of each one can be pointed out. These criteria have been selected from a deep analysis<br />

of existing ISG papers, including both governance and management aspects. As results show, each proposal<br />

focuses on different aspects of ISG giving priority to some of the defined criteria, and none of them covers the entire<br />

required spectrum. Most of the selected frameworks can be used by any public organization as a starting point<br />

towards integrating security into their processes, but this paper helps managers to be aware of their limitations and<br />

the gaps which need to be covered in order to achieve a complete integration. Consequently, more investigation is<br />

needed to fulfill detected gaps and define an ISG framework that organizations can rely on, and which offers security<br />

guarantees of covering every information asset of the company. Public sector´s idiosyncrasy must be taken into<br />

account in this development, resulting in a general framework eligible for adoption by both public and private<br />

companies.<br />

Keywords: information security governance, security governance, comparative analysis, review, governance<br />

framework<br />

1. Introduction<br />

Information Technology (IT) security can no longer be considered as a technical issue that can be<br />

assessed through hardware implementations, but it is a process that involves the whole company<br />

(Pasquinucci, 2007). It is widely accepted that security needs to reach the governance level so that<br />

senior directors understand the risks and the opportunities, and have assurance that these are being<br />

properly and continuously managed (Williams, 2001). The motivations to introduce IT in the corporate<br />

executive agenda is twofold: many countries have developed legislation to hold responsibilities for<br />

security breaches (BSA, 2003, Hardy, 2006), and achieving a higher security degree may become a<br />

competitive advantage to the organization (Humphreys, 2008, Johnston and Hale, 2009).<br />

Public entities are also involved with these considerations, as higher IT security usually strengthens the<br />

trust relationship between Administrations and their citizens. A recent <strong>European</strong> Union research shows<br />

existing gaps related to security and privacy concerns that need to be fulfilled in the field of electronic<br />

governance and policy modelling (Crossroad, 2010).<br />

All these objectives may be achieved through Information Security Governance (ISG) which is an<br />

overarching category directly affecting the entire policy management process (Knapp et al., 2009). There<br />

is not a unique definition of ISG, but among the most widespread conceptions it is generally accepted<br />

that ISG consists of the leadership, organizational structures and processes that safeguard information<br />

(ITGI, 2006b). ISG can also be defined more specifically as the process of establishing and maintaining a<br />

482


Oscar Rebollo et al.<br />

framework and supporting management structure and processes to provide assurance that information<br />

security strategies are aligned with and support business objectives, are consistent with applicable laws<br />

and regulations through adherence to policies and internal controls, and provide assignment of<br />

responsibility, all in an effort to manage risk (Bowen et al., 2006). Finally, focusing on the stakeholders’<br />

roles, ISG consists of the frameworks for decision-making and performance measurement that Board of<br />

Directors and Executive Management implement to fulfil their responsibility of providing oversight, as part<br />

of their overall responsibility for protecting stakeholder value, for effective implementation of Information<br />

Security in their Organization (Rastogi and Solms, 2006).<br />

In order to secure their information assets, companies need to adopt an ISG framework that assures<br />

effective implementation and makes process operational (Corporate Governance Task Force, 2004).<br />

Although there exist a variety of proposed frameworks, organizations neither know which one to adopt<br />

nor which one tailors to their own necessities. To help managers in their decisions, the following three<br />

comparative reviews have been found: (Rastogi and Solms, 2006) provide existing guidance on ISG and<br />

use four frameworks to propose a new definition of ISG; (Park et al., 2006) develop a literature review to<br />

look for ISG definitions and use this research to find which security management approaches cover<br />

governance success factors, and to know their limitations; (Mahncke et al., 2009) offer a literature review<br />

of approaches to measure ISG, and evaluate their suitability to general medical practice.<br />

Existing literature reviews do not compare the proposals in a systematic comprehensive manner, so an<br />

additional effort has been performed, presenting the results in this paper. This analysis will show the most<br />

relevant ISG frameworks, their characteristics, and the gaps that need to be filled in by future research.<br />

Achieved results may help security professionals identify the proposal that best suits their organizations;<br />

and lay the foundations of new researches focused on the thorough development of these frameworks.<br />

The research has lead to a set of criteria that allow performing an objective comparison and the<br />

repeatability of the results. These criteria have been selected from existing ISG definitions through the<br />

extraction of compulsory and desirable features that every framework should accomplish.<br />

During the process, specific and differentiating characteristics of the public sector are taken into account.<br />

While E-government is subject to the same threats as e-business, E-government operates within different<br />

constraints(Stibbe, 2005). Government entities exist for the purpose of serving society, while commercial<br />

firms exist for the benefit of their shareholders (Conklin and White, 2006); therefore the resulting security<br />

implementation must have specific considerations. Public organizations may be bound to security<br />

considerations according to applicable legislation, but an ISG framework can complement them or even<br />

be a substitute in case of lack of regulation (Ozkan and Karabacak, 2010).<br />

This paper is structured as follows: next section offers a brief description of the nine frameworks that<br />

have been studied; section 3 presents the comparative criteria that have been defined and the analysis<br />

performed; finally, our conclusions and future work are set out in section 4.<br />

2. Information security governance approaches<br />

A literature review has been carried out in depth to locate existing ISG frameworks. The nine most<br />

relevant ones are summarized in this section.<br />

2.1 A practical guide to implement and control Information security governance<br />

In (de Oliveira Alves et al., 2006), authors propose a framework for implementing ISG. It focuses on<br />

selecting metrics and indicators to track information security evolution, and also on measuring the<br />

maturity level of information security inside the organization.<br />

The approach considers the integration of corporate governance indicators, such as Balance Scorecard,<br />

with IT and security governance best practices, such as those included in COBIT and ISO/IEC 17799.<br />

The practical guide to implement ISG is composed of five stages, which are divided into activities,<br />

detailing the actions to be taken and who is responsible for performing each one.<br />

2.2 Business Software Alliance<br />

The Business Software Alliance (BSA) formed the Information Security Governance Task Force whose<br />

goal is to frame a response in terms that organizations can understand and implement. This Task Force<br />

483


Oscar Rebollo et al.<br />

has resumed in two white papers many ideas and concepts contained in other reports, legislation and<br />

guidelines.<br />

Firstly, in (BSA, 2003), authors state that there is already a legislative and regulatory regime around IT<br />

security and it must be enough so that companies stop treating security as a technology issue and start<br />

dealing with it as a corporate governance issue. They recommend adopting best practices and standard<br />

procedures such as ISO/IEC 17799 (later included in ISO/IEC 27000 family) and recognize the lack of an<br />

ISG framework that organizations can adopt. The Task Force proposes a framework where each<br />

management role knows what its functions are, how to accomplish its objectives and how to measure and<br />

audit the activities performed.<br />

Secondly, the proposal (Corporate Governance Task Force, 2004) expands the framework formerly<br />

introduced detailing the functions and responsibilities of every stakeholder involved in security. To<br />

implement this framework, authors propose the IDEAL model which is based on five steps: Initiating,<br />

Diagnosing, Establishing, Acting and Learning. Finally, tools are provided for the assessment, verification<br />

and compliance of the corresponding implementation.<br />

2.3 Information security policy: An organizational-level process model<br />

The proposal (Knapp et al., 2009) focuses on the policy side of ISG. Following a different approach from<br />

other studies, authors’ methodology includes data collection from security experts and some interviews<br />

and questionnaires with security professionals. The result is an information security policy model based<br />

on a set of interrelated processes that can be implemented in a repeatable cycle.<br />

Similar to other governance proposals, the model considers the impact of external and internal<br />

influences, as well as the role of corporate governance. Also, there is a great emphasis on training and<br />

awareness of developed policies through out the whole cycle.<br />

2.4 Information security governance (Von Solms)<br />

Authors have been researching the field of ISG, and as a result they have published a wide variety of<br />

papers and a compendium book.<br />

In (Posthumus and Solms, 2004), authors introduce the reason why information security should be<br />

considered as a corporate governance issue. They propose an information security framework clearly<br />

distinguishing between the governance and management sides.<br />

The approach (Posthumus and Solms, 2006) gives more detail on ISG and Information Security<br />

Management, as a part of corporate governance; and describes the tasks, roles and responsibilities of<br />

any key individual in an organization.<br />

As stated in (Solms and Solms, 2006), considering that Corporate Governance can be modelled using<br />

the Direct-Control Cycle, the same model is applied to Information Security Governance. Each of the<br />

steps of this cycle is analyzed through the three management levels: strategic, tactical and operational.<br />

All these results are compiled in the book (Solms and Solms, 2009), where authors describe ISG as part<br />

of Corporate Governance and also sharing some aspects of IT Governance. The Direct-Control Cycle<br />

anticipated in the previous paper is applied to a group of dimensions of information security and is<br />

combined with COBIT and ISO/IEC 27000 as best practices. Also, a methodology of 14 steps is<br />

developed to establish an ISG environment.<br />

2.5 ISACA<br />

The Information Systems Audit and Control Association (ISACA) has proposed (ISACA, 2009), where<br />

they define a generic model to tackle Information Security within a corporation. The model is based on<br />

systems theory and, therefore, consists of processes with inputs and outputs viewed holistically as a<br />

complete function unit.<br />

The model has the structure of a tetrahedron with four elements situated in its vertexes and six dynamic<br />

interconnections between them that link the elements together. The four elements are:<br />

Organization Design and Strategy<br />

484


People<br />

Process<br />

Technology<br />

The six dynamic interconnections are:<br />

Governing<br />

Culture<br />

Enabling and support<br />

Emergence<br />

Human factors<br />

Architecture<br />

Oscar Rebollo et al.<br />

2.6 ISO/IEC standards<br />

The International Organization for Standardization (ISO) has a wide portfolio of standards. Among these,<br />

the ISO/IEC 27000 family is dedicated to Information Security Management Systems, which can be used<br />

by organizations to develop and implement a framework for managing the security of their information<br />

assets and prepare for an independent assessment applied to the protection of their information. These<br />

standards provide guidelines to protect information assets through defining, achieving, maintaining, and<br />

improving information security; what is achieved implementing suitable controls and treating<br />

unacceptable information security risks.<br />

Although at first instance, it may seem that this publication only deals with management issues, there are<br />

some proposals to integrate them with information security governance. The paper (Solms, 2005)<br />

recognizes the broader scope of COBIT, as it covers the whole field of IT Governance, but states that<br />

COBIT focuses on what to do but without giving details on how to do it. Here is where the ISO/IEC 27000<br />

family has a chance, as it focuses on Information Security and gives more detail on how to do things.<br />

Both frameworks complement each other as shown in (ITGI, 2006a). Standard ISO/IEC 27014, currently<br />

under development, pretends to be a proposal on an ISG framework. Its scope includes defining ISG<br />

clarifying its relationship with corporate and IT governance; and developing a framework establishing its<br />

objectives, principles, and processes. The ISO/IEC 38500 family (ISO/IEC, 2008), which is related to<br />

Corporate Governance of information technology, can also be taken into consideration when dealing with<br />

ISG. The governance framework proposed in this standard, can be exported to information security<br />

implementations.<br />

2.7 ITGI<br />

The IT Governance Institute (ITGI), established in 1998 by the ISACA to focus on original research on IT<br />

governance and related topics, has developed COBIT (ITGI, 2007), which is a framework for IT<br />

Governance. COBIT 4.1 introduces a set of 34 processes grouped into four domains; detailing the control<br />

objectives, metrics, maturity models and other management guidelines for each of these processes.<br />

Although COBIT is mainly focused on IT Governance, four of its processes are more related to ISG,<br />

namely:<br />

PO6—Communicate management aims and directions<br />

PO9—Assess and manage IT risks<br />

DS4—Ensure continuous service<br />

DS5—Ensure systems security<br />

Surrounding COBIT, there are a group of products which complement it beyond the main framework (i.e.<br />

implementation guide, assurance guide, value of IT investments, etc). The most relevant ones in relation<br />

to ISG are the following guides:<br />

In (ITGI, 2006b) ITGI describes what ISG is and why it is important; details what the Board of<br />

Directors and Senior Executives should do, how it can be implemented and what, as consequence,<br />

can be achieved.<br />

The proposal (ITGI, 2008b) is based on the foundations presented in the previous one. It provides<br />

more detail on the definition of Information Security Objectives, and the strategies and action plans<br />

485


Oscar Rebollo et al.<br />

that can be used to reach them. Furthermore, critical success factors and metrics are introduced to<br />

monitor and measure Information Security, showing that this guide is directed to a lower<br />

management level than the aforementioned one.<br />

2.8 NIST<br />

The National Institute of Standards and Technology (NIST), an agency of the U.S. Department of<br />

Commerce, has published many guidelines related to Information Security. The guide (Bowen et al.,<br />

2006) has its second chapter dedicated to ISG.<br />

According to this book, there are five components of ISG:<br />

Strategic Planning<br />

Organizational Structure<br />

Roles and Responsibilities<br />

Enterprise Architecture<br />

Policies and Guidance<br />

All of these components of governance must be linked to the current implementation of security through<br />

on-going monitoring. In order to achieve this result, a description of activities and supporting processes to<br />

perform this monitoring is offered. In another NIST publication, (Bowen et al., 2007), the focus points<br />

towards developing an Information Security Program, so the key activities of this task are detailed.<br />

Among these activities, ISG is highlighted. Also, applicable laws and regulations to security programmes,<br />

from the U.S. point of view, are resumed.<br />

2.9 Software engineering institute<br />

The Software Engineering Institute, from the Carnegie Mellon University, has published the guide (Allen<br />

and Westby, 2007), as part of the Computer Emergency Response Team (CERT) programme. This guide<br />

defines governance for enterprise security and what the characteristics of effective ISG are so that<br />

readers can distinguish between effective and ineffective security governance. To succeed on ISG, the<br />

guide proposes the definition of an Enterprise Security Program within the corporation. This programme<br />

involves personnel at all levels throughout the organization, so different roles are identified pinpointing<br />

their functions and responsibilities. Each role has associated a set of activities with their correspondent<br />

outputs and supporting documents, which are described in a sequential way.<br />

3. Comparative analysis<br />

This section contains a comparative analysis of the most relevant approaches to Information Security<br />

Governance described previously. There is not any standardized framework to compare this kind of<br />

proposals so a set of criteria from different research fields will be utilized. These criteria have been<br />

selected taking into account the wide variety of existing literature definitions related to ISG. Most of these<br />

definitions place this subject as closely linked with IT Governance, Corporate Governance and<br />

Information Security, among other areas. Considering these three points of view, a comprehensive group<br />

of criteria has been defined, which covers both governance and management aspects.<br />

Selected criteria facilitate performing an objective analysis of the nine identified frameworks. With the<br />

proposed comparison topics, the whole spectrum of desirable characteristics related to ISG that can be<br />

found in literature is taken into account. To achieve unbiased results, some of the criteria are subdivided<br />

into different sub-criteria as a second aggregation level, so that each proposal may be easily classified.<br />

Furthermore, besides these three comparison groups, which are shared by every organization, public<br />

sector distinct characteristics have been considered. This constitutes a fourth criterion, which reflects the<br />

fact that governance processes have their own peculiarities within institutional units. Therefore, the<br />

comparative analysis will be based on the criteria detailed in the following subsections.<br />

3.1 IT governance criteria<br />

The literature review shows that there are many definitions of IT Governance. Papers such as (Webb et<br />

al., 2006) and (Dahlberg and Kivijärvi, 2006) analyze more than a dozen definitions and highlight five<br />

elements, which provide the foundations of IT Governance. These elements are:<br />

486


Oscar Rebollo et al.<br />

Strategic Alignment: information security must be aligned with business strategy towards the goals of<br />

the organization.<br />

Delivery of business value through IT: optimization of security investments delivering the promised<br />

benefits.<br />

Performance Management: monitoring security strategies to ensure reaching the organization´s goals<br />

in time.<br />

Risk Management: security risk awareness, identifying threats, vulnerabilities and impacts to control<br />

and reduce risks over the whole enterprise.<br />

Control and Accountability: every person in the organization needs to be involved in the security<br />

controls and has to know the responsibilities he owns inside the defined framework.<br />

3.2 Corporate governance criteria<br />

As a part of Corporate Governance, the following domains taken from (Simonsson and Johnson, 2006)<br />

will be considered:<br />

Goals: strategy decisions, development of information security policies and guidelines, and controls<br />

to monitor whether the goals are achieved.<br />

Processes: implementation and management of information security processes, with their related<br />

activities and procedures.<br />

People: structure within the organization; defining roles and responsibilities of the different<br />

stakeholders.<br />

Technology: link between Information Security Governance and the physical IT assets that the<br />

organization manages (inside and outside).<br />

3.3 Security criteria<br />

Information Security Governance is obviously related to the Information Security field, so a set of security<br />

criteria have been selected:<br />

Standards integration: some proposals refer to controls and best practices included in security<br />

standards (i.e. ISO/IEC 27000).<br />

Information Security Management: policies and procedures defined on the governance side can be<br />

linked to the management and operative side of information security.<br />

Tools and techniques: usually frameworks utilize tools to facilitate their implementation, such as<br />

metrics to measure the degree of compliance or maturity models to enable benchmarking between<br />

organizations.<br />

Practical implementation guidelines: theoretical approaches may be distinguished from practical<br />

ones; the latter involve detailing implementation activities, including case studies and even practical<br />

examples.<br />

3.4 Public sector suitability<br />

Although every identified ISG framework may be adapted to a public organization, some of them include<br />

differentiating characteristics that make them more suitable for the public sector. These particularities<br />

range from the compliance with specific laws, policies and regulations to requirements originated from<br />

multiple governing bodies; going through funding limitations in budgets and investments. Public<br />

institutions need to consider security beyond technical aspects in four domains: social, political, cultural<br />

and legal (Wimmer and Bredow, 2002). This fourth criterion evaluates these domains so that it may help<br />

boards in their decisions, avoiding unnecessary efforts in tailoring an ISG framework to a public entity.<br />

3.5 Analysis results<br />

The former defined criteria have been applied to the nine frameworks presented in section 2. The results<br />

are summarized in Table 1, which has been elaborated assigning three levels of conformance (high,<br />

medium and low) to each of the criteria.<br />

487


Table 1: Comparison of ISG frameworks<br />

Public Sector Suitability<br />

low<br />

medium<br />

low<br />

low<br />

low<br />

low<br />

low<br />

high<br />

low<br />

Practical implementation guidelines<br />

medium<br />

high<br />

low<br />

medium<br />

medium<br />

high<br />

low<br />

medium<br />

medium<br />

Tools and techniques<br />

high<br />

high<br />

medium<br />

low<br />

low<br />

high<br />

medium<br />

low<br />

low<br />

Information Security Management<br />

medium<br />

low<br />

medium<br />

high<br />

low<br />

high<br />

medium<br />

medium<br />

medium<br />

Standards integration<br />

high<br />

medium<br />

low<br />

high<br />

low<br />

high<br />

low<br />

high<br />

medium<br />

Security<br />

Technology<br />

high<br />

low<br />

medium<br />

medium<br />

high<br />

medium<br />

low<br />

low<br />

medium<br />

People<br />

high<br />

high<br />

low<br />

high<br />

high<br />

medium<br />

medium<br />

high<br />

medium<br />

Oscar Rebollo et al.<br />

Processes<br />

high<br />

high<br />

high<br />

high<br />

high<br />

high<br />

high<br />

high<br />

high<br />

Goals<br />

medium<br />

medium<br />

high<br />

medium<br />

high<br />

medium<br />

high<br />

high<br />

high<br />

488<br />

Corporate Governance<br />

Control and Accountability<br />

medium<br />

low<br />

medium<br />

high<br />

low<br />

medium<br />

high<br />

low<br />

high<br />

Risk Management<br />

high<br />

high<br />

high<br />

high<br />

low<br />

high<br />

high<br />

high<br />

high<br />

Performance Management<br />

low<br />

medium<br />

medium<br />

medium<br />

medium<br />

high<br />

high<br />

medium<br />

low<br />

Delivery of business value through<br />

IT<br />

medium<br />

low<br />

low<br />

low<br />

medium<br />

low<br />

high<br />

low<br />

medium<br />

Strategic Alignment<br />

medium<br />

medium<br />

high<br />

medium<br />

high<br />

medium<br />

high<br />

high<br />

high<br />

IT Governance<br />

Criteria<br />

A practical guide to<br />

implement and<br />

control Information<br />

Security Governance<br />

Business<br />

Software<br />

Alliance<br />

ISG Frameworks<br />

Information<br />

security policy:<br />

An<br />

organizationallevel<br />

process<br />

model<br />

Information<br />

Security<br />

Governance<br />

(Von Solms)<br />

ISACA<br />

ISO<br />

Standards<br />

IT<br />

Governance<br />

Institute<br />

NIST<br />

Software<br />

Engineering<br />

Institute


Oscar Rebollo et al.<br />

Table results can be analyzed from two different perspectives. On the one hand, horizontally, some of the<br />

proposed criteria are more widespread over the ISG frameworks than others. Among the governance<br />

criteria, nearly all of the proposals deal with strategic alignment, risk management, goals and processes;<br />

however, delivery of business value through IT is only deeply developed by the IT Governance Institute<br />

on the Val IT Framework (ITGI, 2008a), and technology relations with physical IT implemented assets are<br />

seldom considered. Generally speaking, security criteria seem to be less relevant than the previous ones,<br />

as authors tend to offer high level solutions, distant from implementation details.<br />

On the other hand, vertically, three of the frameworks seem to be more aligned with the groups of criteria<br />

and could be considered as reference starting points. Namely: IT Governance Institute focuses on IT<br />

Governance, ISACA is mainly related to Corporate Governance, and ISO Standards deal principally with<br />

Security criteria. The rest of the approaches are situated in intermediate positions, leveraging the<br />

importance each one gives to every comparative aspect.<br />

With respect to public sector suitability, most of the frameworks do not detail the specific implications of<br />

implementing ISG into a public entity. The guidelines proposed by the NIST are the main exceptions<br />

which take into account these considerations, but they are much localized as a consequence of having<br />

their foundations based on US regulations and laws. Therefore, additional efforts are needed when<br />

adapting this framework to other country´s organizations. Also, some guidance is included in BSA´s<br />

proposal, which offers some key notes when adopting information security by educational and non-profit<br />

institutions.<br />

Public organizations are usually bound to a specific regulatory framework which results in different<br />

governance processes. This is the consequence of the application of the corresponding legislation which<br />

emanates from various level authorities (national, regional, etc). In most cases, the selected ISG proposal<br />

needs to be localized to the regulations where the organization resides.<br />

4. Conclusions and future work<br />

The security of any organization´s assets must involve every stakeholder from senior executives to<br />

operational personnel. Information Security Governance helps to carry out this task providing a<br />

framework which can be adopted by enterprises. The board of governance of any company that relies on<br />

this methodology should be confident about compliance with a wide set of security measures and even<br />

regulation requirements; furthermore, information security becomes a process inside the organization<br />

covering all of the information assets and provides alignment with business strategy.<br />

The nine most relevant ISG frameworks existing in the literature have been reviewed in this paper,<br />

performing a comparative analysis between them using a comprehensive set of conformance criteria.<br />

The performed review has shown that none of the approaches, not even the most recent ones, fulfil every<br />

necessity field that organizations need to tackle. Although these proposals include desirable features,<br />

their main lacks have been highlighted.<br />

Special attention has been paid to public sector suitability, but most ISG proposals are more focused on<br />

private corporations than public organizations. This issue may be considered by the directors of any<br />

public institution when adopting one of these methodologies.<br />

Additional research work is needed to develop a general ISG framework which fills the detected gaps.<br />

Either taking any of the approaches included in the comparative study as a starting point, or building it<br />

from scratch, it is imperative that such a task is undertaken. Future work will follow this line,<br />

complementing existing proposals to reduce their weaknesses as well as to achieve a comprehensive<br />

framework that can be systematically extended to any organization.<br />

Acknowledgements<br />

This research is part of the following projects: MEDUSAS (IDI-20090557), financed by the Centre for<br />

Industrial Technological Development (CDTI), ORIGIN (IDI-2010043(1-5)) financed by the CDTI and the<br />

FEDER, BUSINESS (PET2008-0136) awarded by the Spanish Ministry for Science and Technology and<br />

SEGMENT (HITO-09-138) and SISTEMAS (PII2I09-0150-3135) financed by the Council of Education<br />

and Science of the Castilla-La Mancha Regional Government.<br />

489


References<br />

Oscar Rebollo et al.<br />

Allen, J. H. & Westby, J. R. (2007) Governing for Enterprise Security Implementation Guide, Software Engineering<br />

Institute - CERT.<br />

Bowen, P., Chew, E. & Hash, J. (2007) Information Security Guide For Government Executives, National Institute of<br />

Standards and Technology.<br />

Bowen, P., Hash, J. & Wilson, M. (2006) Information Security Governance. Information Security Handbook: A Guide<br />

for Managers. National Institute of Standards and Technology.<br />

BSA (2003) Information Security Governance: Toward a Framework for Action.<br />

Conklin, A. & White, G. B. (2006) e-Government and Cyber Security: The Role of Cyber Security Exercises.<br />

Proceedings of the 39th Annual Hawaii International <strong>Conference</strong> on System Sciences.<br />

Corporate Governance Task Force, T. (2004) Information Security Governance: A Call to Action.<br />

Crossroad (2010) Updated Gap Analysis Report. A Participative Roadmap for ICT Research in Electronic<br />

Governance and Policy Modelling.<br />

Dahlberg, T. & Kivijärvi, H. (2006) An Integrated Framework for IT Governance and the Development and Validation<br />

of an Assessment Instrument. Proceedings of the 39th Hawaii International <strong>Conference</strong> on System Sciences.<br />

de Oliveira Alves, G. A., Rust da Costa Carmo, L. F. & Ribeiro Dutra de Almeida, A. C. (2006) Enterprise Security<br />

Governance: A practical guide to implement and control Information Security Governance. Business-driven IT<br />

Management.<br />

Hardy, G. (2006) Using IT governance and COBIT to deliver value with IT and respond to legal, regulatory and<br />

compliance challenges. Information Security Technical Report, 11, 55-61.<br />

Humphreys, E. (2008) Information security management standards: Compliance, governance and risk management.<br />

Information Security Technical Report, 13.<br />

ISACA (2009) An Introduction to the Business Model for Information Security.<br />

ISO/IEC (2008) ISO/IEC 38500:2008 Corporate governance of information technology.<br />

ITGI (2006a) COBIT Mapping to ISO/IEC 17799:2000 With COBIT.<br />

ITGI (2006b) Information Security Governance: Guidance for Boards of Directors and Executive Management (2nd<br />

Edition).<br />

ITGI (2007) Control Objectives for Information and related Technology (COBIT 4.1).<br />

ITGI (2008a) Governance of Investments, The Val IT Framework 2.0.<br />

ITGI (2008b) Information Security Governance: Guidance for Information Security Managers.<br />

Johnston, A. C. & Hale, R. (2009) Improved Security through Information Security Governance. Communications of<br />

the ACM, 52, 126-129.<br />

Knapp, K. J., R. Franklin Morris, Thomas E. Marshall & Byrd, T. A. (2009) Information security policy: An<br />

organizational-level process model. Computers & Security, 28, 493-508.<br />

Mahncke, R. J., McDermid, D. C. & Williams, P. A. H. (2009) Measuring Information Security Governance Within<br />

General Medical Practice. Proceedings of the 7th Australian Information Security Management <strong>Conference</strong>.<br />

Ozkan, S. & Karabacak, B. (2010) Collaborative risk method for information security management practices: A case<br />

context within Turkey. International Journal of Information Management, 30, 567-572.<br />

Park, H., Kim, S. & Lee, H. J. (2006) General Drawing of the Integrated Framework for Security Governance. Lecture<br />

Notes in Computer Science, 4251, 1234-1241.<br />

Pasquinucci, A. (2007) Security, risk analysis and governance: a practical approach. Computer Fraud & Security, 12-<br />

14.<br />

Posthumus, S. & Solms, R. v. (2004) A framework for the governance of information security. Computers & Security,<br />

23, 638-646.<br />

Posthumus, S. & Solms, R. v. (2006) A Responsibility Framework for Information Security. International Federation<br />

for Information Processing.<br />

Rastogi, R. & Solms, R. v. (2006) Information Security Governance - A Re-Definition IFIP International Federation for<br />

Information Processing, 193, 223-236.<br />

Simonsson, M. & Johnson, P. (2006) Assessment of IT Governance - A Prioritization of Cobit. Proceedings of the<br />

<strong>Conference</strong> on Systems Engineering Research.<br />

Solms, B. v. (2005) Information Security governance: COBIT or ISO 17799 or both? Computers & Security, 24, 99-<br />

104.<br />

Solms, R. v. & Solms, S. H. B. v. (2006) Information Security Governance: A model based on the Direct–Control<br />

Cycle. Computers & Security, 25, 408-412.<br />

Solms, S. H. v. & Solms, R. v. (2009) Information Security Governance, Springer.<br />

Stibbe, M. (2005) E-government security. Infosecurity Today, 2, 8-10.<br />

Webb, P., Pollard, C. & Ridley, G. (2006) Attempting to Define IT Governance: Wisdom or Folly? Proceedings of the<br />

39th Hawaii International <strong>Conference</strong> on System Sciences.<br />

Williams, P. (2001) Information Security Governance. Information Security Technical Report, Vol 6, No. 3, 60-70.<br />

Wimmer, M. & Bredow, B. v. (2002) A Holistic Approach for Providing Security Solutions in e-Government.<br />

Proceedings of the 35th Hawaii International <strong>Conference</strong> on System Sciences.<br />

490


Web 2.0 on the Mexican State Sites: An Overview<br />

Rodrigo Sandoval Almazán 1 , Gabriela Díaz Murillo 2 , Ramón Gil-Garcia 3 , Luis<br />

Luna-Reyes 2 and Dolores Luna-Reyes 2<br />

1 Universidad Autónoma del Estado de México, Toluca, México<br />

2 Universidad de las Américas Puebla, México<br />

3 Centro de Investigación y Docencia Económicas, México<br />

rsandovala@uaemex.mx<br />

gabriela.diaz@udlap.mx<br />

joseramon.gil@cide.edu<br />

luisf.luna@udlap.mx<br />

dolorese.luna@udlap.mx<br />

Abstract: The use of Web 2.0 features to increase the number of users on e-commerce sites is a trend that is even<br />

expanding to government sites. Web 2.0 features, such as blogs, wikis, forums, RSS, podcasts and videocasts, as<br />

well as social markers such as Del.icio.us, Technorati, Facebook and Digg have reached government sites. The<br />

purpose of this research is to assess the impact of this tendency on Mexican local government sites by asking the<br />

following question: To what extent have local eGovernment sites in Mexico adopted Web 2.0 tools? As a result of an<br />

evaluation of Mexican local government sites in 2009, we found that several Web 2.0 characteristics are being used;<br />

however, we also found that not all features are as equally well-developed or used on the local sites. Web 2.0 is only<br />

a starting point for innovation in eGovernment sites. This paper is organized into four sections: The first section<br />

introduces the trend of Web 2.0 over internet sites and how it is different from Web 1.0 and Web 3.0. The second<br />

section is dedicated to discussing the link between eGovernment and Web 2.0 according to the evolutionary model<br />

proposed by the authors. The third section describes the methodology used to collect data from local states in<br />

Mexico and the eGovernment ranking where this data was collected. The fourth and final section describes the<br />

findings of Web 2.0 and discusses the future of this trend in eGovernment sites.<br />

Keywords: Web 2.0, eGovernment, websites, twitter, social media<br />

1. Introduction<br />

Web 2.0 represents an evolution in Internet applications and sites for presenting unidirectional content<br />

and information through to the creation of applications that facilitate higher levels of interaction between<br />

Web content users. These applications promotes collaboration and provide services which seek to<br />

replace traditional processes for creating content. Specifically, Web 2.0 refers to a new version of the<br />

Web based on the creation of content produced and shared by the very same users of a Web site. In<br />

other words, consumers of information have become “prosumers” or producers of part of the information<br />

that they consume (Tapscott, 2006).<br />

This way, Web 2.0 applications may be considered as the next step in the development of technologies<br />

related to the Internet. Some of these applications are the so-called social networks, micro-formats,<br />

social labels, RSS (content syndication), blogs, videoblogs, podcasts, wikis and forums, etc. Examples of<br />

commercial websites that implement these applications include Technorati, Digg, Facebook, Flickr,<br />

YouTube, MySpace, Twitter and Del.icio.us, amongst others. Some government sites are also starting to<br />

include some of these applications. Part of this study evaluated the use of Web 2.0 tools on state sites.<br />

Specifically, we noted the use of Blogs, Wikis, Forums, RSS, APIs (such as Google Maps), Podcasts,<br />

Videocasts, Social Markers (such as Del.icio.us, Technorati, Facebook or Digg) and social networks.<br />

All of these applications, despite the fact that their purpose and make-up appear to be very different,<br />

share certain characteristics, such as the generation and classification of information and content in a<br />

collective manner, the integration of communities, and the production and consumption of knowledge<br />

distributed socially. These common characteristics allow them to be catalogued as Web 2.0 tools and<br />

applications. These tools have proven themselves to be efficient mechanisms for developing political<br />

activism (perhaps the most well-known case in the world is that of the Barack Obama presidential<br />

campaign in the United States), as tools for handling relationships with the media, as in the case of<br />

Twitter, and as an alternative ways of disseminating content, like the case of YouTube, in the face of<br />

social problems or political crises, such as the recent elections in Iran or the coup d’état in Honduras, and<br />

the deposition of the Tunisian President.<br />

491


Rodrigo Sandoval Almazán et al.<br />

For government sites Web 2.0 applications have the potential to generate greater interaction between<br />

different social actors, and as a consequence, greater citizen participation in government processes,<br />

which have recently been labeled as Government 2.0. These applications are beginning to be used at all<br />

three levels of government and within diverse public policy areas. A recent study revealed that Mexicans<br />

between the ages of 18 and 28 years were dissatisfied with the level of communication established<br />

between them and the government, and suggests that Web 2.0 tools could be an effective mechanism for<br />

opening alternative channels of communication (Deloitte, 2009). However, the use of these tools is still in<br />

its early stages, and we know little about the outcomes reached by these social experiments, given the<br />

scarcity of research on this field. Furthermore, despite signs that some Mexican state sites already have<br />

working Web 2.0 tools, a significant number of users are unaware about how these tools work. Based on<br />

measurements of these technologies taken from Mexican state sites in 2008, this paper will show the<br />

extent to which they are currently used, and in which areas of state government sites are used more<br />

frequently.<br />

Web 2.0 Internet Sites and Tools<br />

The term Web 2.0 has yet to be fully defined in a manner widely accepted by experts in the field. It was<br />

coined by O’Reilly in 2005 (O'Reilly, T. 2005) who defines it as: “the web as a platform that extends to all<br />

connected devices”, although these devices are not just limited to being interconnected, instead much of<br />

their functionality rests on the fact that they use technologies that allow users to build the content and<br />

format of sites. Table 1 shows a comparison made by O’Reilly (O'Reilly, T. 2005) between Web 2.0<br />

applications and traditional applications.<br />

Table 1: Comparison between Web 1.0 and Web 2.0<br />

Web 1.0 Web 2.0<br />

Double click Google AdSens<br />

Ofoto Flickr<br />

Akamai BitTorrent<br />

mp3.com Napster<br />

Encyclopedia Britannica Online Wikipedia<br />

Personal Web sites Blogging<br />

Screen scraping Web services<br />

Page views Cost per Click<br />

Domain name speculation Search engine optimization<br />

Directories (taxonomy) tagging ('folksonomy')<br />

Publishing Participation<br />

Content management systems Wikis<br />

Stickiness Syndication<br />

Source: O’Reilly, 2005<br />

O’Reilly says that Web 2.0 is a mechanism for social cohesion and cooperation. More recent works, such<br />

as that undertaken by Tapscott and Williams (Tapscott and Williams, 2006) describe the phenomenon as<br />

follows: “The new web is fundamentally different in both its architecture and applications. Instead of a<br />

digital newspaper, it is a canvas where every splash of paint contributed by a user enriches the tapestry;<br />

whether people are creating, sharing or socializing, the new Web is about participating rather than<br />

passively receiving information” (p. 37).<br />

Web 2.0 reveals itself as a revolutionary way of gathering, organizing and sharing information. Some of<br />

its better-known examples include: Google, Weblogs, Wikipedia, YouTube, Twitter and Second Life.<br />

Other authors have mentioned that it is a standard platform or model for current websites, and is not an<br />

improved version of the earlier Web 1.0. Zappen and his colleagues (Zappen, M. Harrison and David<br />

Watson, 2008) point out some differences:<br />

Web 2.0 facilitates flexible design, creative reuse and updating,<br />

It offers the user an enriched and interactive interface,<br />

It facilitates collaboration for creating and modifying content,<br />

492


Rodrigo Sandoval Almazán et al.<br />

It allows new applications to be created by reusing and combining different data and sources,<br />

It establishes social networks between people who have the same interests, and<br />

It supports cooperation in gathering collective intelligence.<br />

Web 2.0 is a social network platform because its content is user-generated –as if it were a collective<br />

intelligence— converting into co-producers of content and not just passive subjects who only receive the<br />

information. Interaction plays a vital role in this platform. This capacity for interaction is vital and to<br />

achieve it; governments must consider this type of tool very seriously (Woods, 2007), not just to enable<br />

the bureaucracy to reduce its costs and allow a greater flow of information, but as a way of approaching<br />

citizens and making sure their participation enriches government efforts.<br />

Although relatively new, Web 2.0 tools and applications have been used on government websites in such<br />

countries as Germany where De Kool and Van Wamelen (2008) proposed six categories for analyzing<br />

electronic government using Web 2.0, gathering case studies in their country to demonstrate the use of<br />

Web 2.0. It has also been suggested as a way of solving problems related to information transparency in<br />

governments. Kubicek, who submited those ticket systems used for providing services, suggested that<br />

this tool could also be employed to improve transparency and rendering of accounts, through the use of<br />

social networks (Kubicek, 2008). Lastly, Eliason and Lundberg focused their attention on investigating the<br />

specific use of Web 2.0 in designing municipal websites using gender as a tool to reduce the complexity<br />

of sites and better organize content (Eliason, 2006).<br />

Currently, the notion of open government (o-government) or transparent government has begun to use<br />

Web 2.0 tools to interact with the citizenry and request their opinions on just how open federal<br />

government should be to its citizens. This initiative from the United States’ President, Barack Obama<br />

(Memorandum of Transparency and Open Government), and the White House website which invites<br />

citizens to participate in this initiative through discussion forums whose purpose is to establish principles<br />

(United States Government, 2009) and come up with proposals for law reform (United States<br />

Government, 2009) are clear examples of how these technologies can be used by government (United<br />

States Government, 2009).<br />

Even though the usefulness of Web 2.0 in governments is promising, the great question that prevails is<br />

whether public sector organizations are able to commit to this new way of interrelating with their citizens,<br />

and improving user-experience and their perceptions of public services. Some of the risks that may arise<br />

from the use of Web 2.0 tools and applications are: data isolation, exclusion of content, privacy issues<br />

and the risk of improper use of the information (de Kool and Wamelen, 2008).<br />

2. Electronic government and Web 2.0<br />

There are different definitions for electronic government but all contemplate the use of Information and<br />

Communication Technologies (ICT) in carrying out the activities of governments (Gil-García and Luna-<br />

Reyes, 2008). In Mexico, in addition to the Federal Government’s significant presence on the Internet,<br />

occupying the 56 th place on the last UN classification (UNPAN, 2010), all state governments and a<br />

significant number of municipal governments have a presence on the Internet. Internet sites are now one<br />

of the primary means of providing information, dealing with applications and services, and interacting with<br />

different government dependencies. Web 2.0 tools have the potential to take these relationships to the<br />

next level and change interaction schemes between citizens and their participation in government<br />

processes and decision making (Yáñez, 2009).<br />

Electronic Government and Web Sites<br />

There is still not an unified vision of the Electronic Government term. From analysis made from the<br />

literature on the topic, Gil-García and Luna-Reyes (2008) concluded to define electronic government as<br />

“the selection, implementation and use of information and communication technologies in government to<br />

provide public services, improve the effectiveness of administration and promote democratic values and<br />

mechanisms, as well as to create a legal framework that facilitates the development of intensive<br />

initiatives for the use of information resources and promote the development of the knowledge society”.<br />

State government sites are just one example of the application of electronic government. The<br />

development of these applications are applicable not only to pressure from the public to receive the same<br />

service it receives from the private sector, but also the perception of a multitude of potential benefits to<br />

public administration (Luna-Reyes, Hernández-García and Gil-García, 2009). A government site is<br />

493


Rodrigo Sandoval Almazán et al.<br />

understood as “an access point integrated into a state government Internet site which provides both<br />

external entities and government personnel with a single online access point to state resources and<br />

information” (Gant-Burley, Gant and Craig-Johnson, 2002).<br />

Government Sites as Communication Systems<br />

State websites can be considered government-citizen communication systems via the computer and<br />

Internet. This communication system via computers is characterized by the integration of different media<br />

and its interactive potential. Multimedia, as Castells puts it (Castells, 1998), extends the reach of<br />

electronic communication to every aspect of life (from home to the workplace, from schools to hospitals,<br />

from entertainment to trips).<br />

In this sense, state sites are immersed in a new multimedia system which includes and covers all<br />

expressions of culture. In this new kind of society, all types of messages work in a binary fashion:<br />

presence/absence, whereby presence enables the communicability and socialization of the message.<br />

While the function of communicability is present in all state websites, socialization is only present in some<br />

given that not all have the tools and applications for this (socialization) to take place between users and<br />

government. From a society perspective, communication based on electronic means (typographic,<br />

audiovisual or via computer) is communication (Castells, 1998). This means that the media –in this case,<br />

the site–, is immersed in this multimedia universe, fulfills the role of communicating Government<br />

information.<br />

The evolution of Sites and Models for Communication and Socialization<br />

There are different models that explain the processes of development and evolution of Internet sites<br />

(Layne and Lee, 2001). A few years ago, and taking these evolutionary models as a base, an evaluation<br />

was carried out of state government sites in Mexico (Sandoval Almazán, Gil-Garcia and Luna-Reyes,<br />

2007 and 2008). The stages of Information, Interaction, Transaction, Integration and Participation were<br />

proposed as complementary, but not mutually exclusive components, which can be used to characterize<br />

the development of government sites. Furthermore, this reference framework can be reinterpreted from a<br />

theoretical standpoint in relation to the communication systems included in the previous section. The<br />

communication that arises from the interaction between government and citizens can take place in<br />

different ways, which are explained below.<br />

The Information stage. The characteristics of the sites that belong to the information stage are<br />

comprised by those that only display information on the activities of public administration. Examples of<br />

these characteristics include news or announcements about events, as well as services available to<br />

citizens. The communication that takes place between the Government and Citizens at this stage is one<br />

of sender to receiver, which is horizontal and one way. In this, as well as other levels of site development,<br />

the receiver plays both roles mentioned by Castells (1998). They can be interactors by choosing their<br />

communication path, deciding and selecting the topic, and the knowledge they hope to obtain, as well as<br />

the media; or they can be interacted, users that, within their own capabilities and possibilities, select and<br />

seek out knowledge from inside a media which provides them with limited options. Nevertheless, the<br />

inherent characteristics of the information stage limit the users’ capacity to interact, relegating them to the<br />

position of interacted.<br />

The Interaction Stage. Characteristics inherent to sites in the interaction stage include applications that<br />

allow interaction between citizens and the government, such as forms for asking questions and making<br />

enquiries, forums or automated applications like virtual public servers. Communication between Citizens<br />

and the Government at this stage is two-way, from the sender to the receiver and vice versa, establishing<br />

channels for interaction, such as electronic mail or those mentioned previously. At this stage of two-way<br />

communication, there are more opportunities for interactors to choose their means of communication.<br />

The Transaction Stage. Characteristics of Internet sites at the transaction stage mainly include what<br />

have been electronic commerce topics. The main difference between this and the interaction stage is the<br />

interchange of services and application processes with a well defined cycle and on many occasions, the<br />

fees payments. Nevertheless, since these are services with clearly defined cycles and processes, it is<br />

more common to find an interest in obtaining feedback on how they have performed. One example is<br />

online services that can be carried out by citizens.<br />

494


Rodrigo Sandoval Almazán et al.<br />

The Integration Stage. Characteristics inherent to the integration stage make reference to the capability<br />

of the site to present itself as a single window for providing services to the citizen and making it<br />

transparent which agency or agencies are in charge of delivering the services or information. At this<br />

stage, not only does communication take place between the Government and Citizen, but also between<br />

Government dependencies which in turn, communicate this information to the citizen and provide<br />

feedback from the government to the citizen, the citizen to the government and between government<br />

dependencies. For example, municipal government sites that make it easy to obtain construction permits<br />

and licenses needed to start a business on the same site, requiring different agencies that participated in<br />

this process and that were coordinated in order to offer this service to the citizen. This coordination can<br />

be achieved in different ways from using an agent to process all the applications submitted by the<br />

citizens through the technical integration of data and processes between different agencies that enabled<br />

them to offer the service without the need for an agent.<br />

The Participation Stage. Government sites that show characteristics of the participation stage offer the<br />

citizen the ability to socialize and get this way to a full interaction. At this stage, communication is most<br />

extensive, taking place between Government and Citizen, between dependencies, between citizens and<br />

providing feedback.<br />

Communication produced through the use of Web 2.0 tools takes place according to the type of<br />

population and media they choose to obtain information from. In the case of interactors, as mentioned by<br />

Castells (1998), Web 2.0 tools are useful applications for obtaining information without the need to<br />

search for it, which simplifies the job for the user. As for the interacted population, searching for and<br />

finding information within media is made easier by the introduction of these tools on the site. But it is not<br />

only important depending on the type of population that uses the media, it is important because Web 2.0<br />

is implementing applications that make communication possible between different actors within a site, in<br />

which communication takes place in settings where citizens and government communicate between each<br />

other.<br />

3. Methodology<br />

This section describes the data collection methods and the procedures followed to analyze them. The<br />

target population for this analysis is the sites of the 31 Mexican states and the Federal District. Sites were<br />

viewed by three independent observers during the first half of 2008. Observers used a guide to evaluate<br />

the state sites and record the inclusion of Web 2.0 tools, as well as the sections of the site that used<br />

these tools. Data from these observations were collected by each observer and collected by one of them.<br />

In order to get to results related to the use and the frequency of Web 2.0, it was first determined whether<br />

the Web 2.0 tools were used, followed by their frequency. In other words, the number of times a tool in<br />

the sections of the different state sites was used.<br />

To complement this initial measurement in 2008, a second one was undertaken for the 32 state sites<br />

which only looked at Web 2.0 tools linked to the Twitter and Facebook social networking sites in order to<br />

understand what impact this social media technology has on the web pages of state governments. More<br />

specific questions include: How do these governments currently use social media tools? Which state<br />

governments use Facebook and Twitter to raise awareness?<br />

Once the sample from the 32 states and the two social networking platforms were chosen, the procedure<br />

that followed was: Each platform was visited to find out whether the government web pages had valid<br />

accounts –Twitter or Facebook– which were validated by entering them and verifying that they did in fact<br />

belong to the elected government and not a fictitious or erroneous name, or one from another country.<br />

During this validation, data provided by the websites were noted down, such as: followers, individuals<br />

that follow twitter and lists in the case of Twitter, and the number of “friends” in the case of Facebook.<br />

This information was collected during the months of May and October, 2010, using the web browsers<br />

Firefox and Safari, and a broadband Internet connection.<br />

4. Findings and discussion<br />

This section contains a summary of the data collected during the first evaluation of the use of Web 2.0<br />

tools by Mexican state government sites for both the 2008 and the 2010 measurements. Figure 1 shows<br />

the use of the different tools evaluated expressed as a percentage. The most commonly used tools are<br />

APIs at 65% of all Mexican state government sites which use this tool to display dynamic content to<br />

users. The next most used tools are Podcasts (40.6%) and Videocasts (37.5%). It is worth noting that, for<br />

this first evaluation, Podcasts or Videocasts were considered as any sequence of audio or video content<br />

495


Rodrigo Sandoval Almazán et al.<br />

posted on the site, regardless of whether it was tourism-related, general information or simply promoted<br />

the state or the incumbent governor. Only 34.4% of state government sites used RSS to distribute<br />

content related to news items or events. The least used mechanisms were forums (25%), wikis (15.6%),<br />

social markers and social networks (6.3%), and only 3.1% of all sites evaluated used blogs. It is clear that<br />

state government electronic sites focus mostly on displaying informative content in text, video and audio<br />

format (Podcasts, Videocasts and RSS) rather than on applications that allow easy communication<br />

between public officials and citizens.<br />

Figure 1: Percentage use of tools by state sites 2008<br />

Regarding to the frequency with which these Web 2.0 tools from the different sections of the sites are<br />

employed, we found that tools located in the Citizens section generally received the most use, followed<br />

by the Government and Tourism sections. The most commonly used tool in the Citizens section was<br />

APIs, which suggests that states are interested in creating interactive applications in this section of the<br />

site. The Government section demonstrates the greatest diversity of tool use, which reflects wide-ranging<br />

interest on the part of the states in terms of the type of communication they seek to create with their<br />

citizens through this section. The tourism section showed a pattern for including multimedia information in<br />

audio and video format. This same pattern was observed in the culture section, albeit with less<br />

frequency. It is interesting to note that only a couple of sites used content syndication services (RSS) in<br />

the press area.<br />

Table 2: Sections where Web 2.0 tools were found<br />

Tools/Section<br />

s<br />

Governme<br />

nt<br />

Citizen Tourism Culture<br />

Application<br />

s and<br />

Services<br />

Transparency Press Othe<br />

rs<br />

Podcasts 1 1 6 2 1 0 0 2<br />

RSS 3 4 0 1 0 0 2 0<br />

Blogs 1 0 0 0 0 0 0 0<br />

Forums 1 1 0 0 0 0 0 0<br />

Videocasts 1 0 4 2 0 1 1 0<br />

Chat 1 1 0 0 1 0 0 0<br />

API 4 17 0 0 0 0 0 0<br />

Red Social 0 1 0 0 0 0 0 1<br />

TOTAL 12 25 10 5 2 1 3 3<br />

496


Rodrigo Sandoval Almazán et al.<br />

2 nd Observation of Twitter and Facebook on state sites 2010<br />

Data collected reveals that 16 states, in other words 50 percent, have Twitter and Facebook. Only three<br />

states (9%) have a Facebook account and only five states have Twitter. Eight states (25%) do not have<br />

accounts with either social networking platform.<br />

Facebook<br />

Several Mexican states show no potential growth in the number of registered friends. The states of<br />

Morelos, Durango, Colima, State of Mexico, Sonora, Hidalgo, Baja California, Campeche and Quintana<br />

Roo have remained the same in each case. Morelos and Durango stand out from the others with more<br />

than three thousand friends each one.<br />

States that have shown growth in the number of “friends” or followers on this platform are: Jalisco and<br />

Guerrero. Jalisco increased from 13 to 3611, growing 27 times. As for Guerrero, it is also noteworthy that<br />

it began with 46 individuals and has now 2973. Nuevo León also experiences a sustained growth going<br />

from 2150 to 4972, an increase of 131 percent. States, such as the Federal District –the capital–<br />

Zacatecas, Chihuahua, Michoacán and Guanajuato, show the same trend. (See Append 1)<br />

Twitter<br />

One of the components of Twitter is its followers. Without doubt, this is one of the most interesting<br />

categories as it relates to the number of individuals or institutions that want to have a link with the<br />

government using this technological tool. Followers of the web page of the president, standing out with a<br />

growth of more than 10 times, going from eight thousand followers to more than one hundred thousand in<br />

six months (see Append 2). This however, is exceeded by Querétaro, Sinaloa and Chiapas –which grew<br />

20 times– and Guanajuato -69 times– amongst others. States experiencing more modest growth<br />

included: the Federal District, the State of Mexico and Baja California.<br />

The phenomenon related to increases in the number of followers is explained in the section individual<br />

followers. Nevertheless, it should be added that it is also dependent on the viral effect (Boynton, 2009),<br />

the replication and spread of links among citizens and government officials promoting the page, which<br />

can lead to a significant explosion in the number of followers in just a few days.<br />

5. Conclusions<br />

Web 2.0 tools and applications seem to be an important alternative for governments and their websites in<br />

the not too distant future. The so-called Government 2.0 has the potential to bring governments and their<br />

citizens closer together simple and effective way. These types of tools will allow greater citizen<br />

participation and enable government dependencies to transmit more and better information. However, it<br />

is also clear that these tools and applications are currently receiving little use on state government sites.<br />

This evaluation reveals some preliminary data on the use of Web 2.0 by state government sites in<br />

Mexico. Given the speed at which Web 2.0 tools change and their availability on the Internet, many sites<br />

could be using them already. Nevertheless, this initial data offers up a first look at this phenomenon and<br />

serves as the grounds for future studies on the topic.<br />

A next stage for the Mexican states that have connected using these tools is for them to hold a dialog<br />

(Boyd, Golder, & Lotan, 2010) –an exchange of tweets and retweets– between users to bring about a<br />

citizen-government collaboration (Honeycutt & Herring, 2008) using Facebook or Twitter. Twitter can help<br />

to both exchange information and recommend news, data or relevant information (Phelan, McCarthy, &<br />

Smyth, 2009). In recent research into the impact of Twitter on the government, Wigand (2010) tried to<br />

analyze the participation of Twitter in the government using four theories: Diffusion and Innovation; Social<br />

Influence, Social Presence and Collective Intelligence Theories through which social networking tools<br />

can interact with the government.<br />

We can conclude that the evaluated Mexican states are beginning to use social networking tools in a<br />

rudimentary fashion. More research is needed to observe the level of interaction with the citizens, their<br />

use to generate value within an organization –and that they’re not just a waste of time– as well as to<br />

determine whether these technologies are useful for improving local government practices and the<br />

relationship with citizens.<br />

497


Rodrigo Sandoval Almazán et al.<br />

Finally, the use of Web 2.0 tools on electronic government sites is not just limited to posting the tool.<br />

Including tools and applications on the sites is just the first step; there needs to be a strategy and clear<br />

approach as to what they are expected to achieve. Government 2.0 has great potential to transform and<br />

improve relations between government, citizens, companies and other interest groups, but these tools<br />

must be combined with a clear vision and effective strategies if their effects are to be valuable and<br />

meaningful to governments and citizens alike, as well as to society as a whole. We hope that this first<br />

look at the topic proves useful and arouses greater interest in these types of applications, and leads us in<br />

the near future to internet sites that can really be considered shining examples of Government 2.0.<br />

6. Appendix 1: Evolution of Facebook friends on state websites<br />

Government March 2010 October 2010 Numerical Dif. % Dif.<br />

Presidency 0 83067 83067 8306700,0<br />

Morelos 0 5003 5003 500300,0<br />

Querétaro 2628 7225 4597 174,9<br />

Durango 0 3927 3927 392700,0<br />

Jalisco 13 3611 3598 27676,9<br />

Colima 0 2958 2958 295800,0<br />

Guerrero 46 2973 2927 6363,0<br />

Nuevo León 2150 4972 2822 131,3<br />

State of Mexico 0 2602 2602 260200,0<br />

Sinaloa 0 2023 2023 202300,0<br />

Hidalgo 0 1930 1930 193000,0<br />

Federal District 1121 2751 1630 145,4<br />

Zacatecas 882 2360 1478 167,6<br />

Chihuahua 543 1280 737 135,7<br />

Michoacán 211 948 737 349,3<br />

Guanajuato 182 456 274 150,5<br />

Baja California 0 256 256 25600,0<br />

Campeche 0 215 215 21500,0<br />

Quintana Roo 0 118 118 11800,0<br />

Aguascalientes 0 0 0 0,0<br />

Baja California Sur 0 0 0 0,0<br />

498


Rodrigo Sandoval Almazán et al.<br />

Chiapas 0 0 0 0,0<br />

Coahuila 292 292 0 0,0<br />

Nayarit 0 0 0 0,0<br />

Oaxaca 0 0 0 0,0<br />

Puebla 0 0 0 0,0<br />

San Luis Potosí 0 0 0 0,0<br />

Sonora 0 0 0 0,0<br />

Tabasco 0 0 0 0,0<br />

Tamaulipas 0 0 0 0,0<br />

Tlaxcala 0 0 0 0,0<br />

Veracruz 0 0 0 0,0<br />

Yucatán 0 0 0 0,0<br />

7. Appendix 2: Twitter followers on Mexican local government websites<br />

Government Followers March Followers October Numerical Dif. % Dif.<br />

Presidency 8990 100849 91859 1021,8<br />

Federal District 6605 19506 12901 195,3<br />

Queretaro 910 11110 10200 1120,9<br />

Hidalgo 0 9135 9135 913500,0<br />

Chiapas 448 9500 9052 2020,5<br />

Guanajuato 127 8890 8763 6900,0<br />

Sinaloa 329 8837 8508 2586,0<br />

Yucatan 0 8039 8039 0,0<br />

Nuevo León 928 8467 7539 812,4<br />

499


Rodrigo Sandoval Almazán et al.<br />

Durango 273 7094 6821 2498,5<br />

Colima 0 6470 6470 647000,0<br />

Baja California Sur 0 5695 5695 569500,0<br />

State of Mexico 2781 6347 3566 128,2<br />

Jalisco 502 3401 2899 577,5<br />

Guerrero 346 1730 1384 400,0<br />

Sonora 20 1386 1366 6830,0<br />

Nayarit 0 1352 1352 135200,0<br />

Baja California 426 1471 1045 245,3<br />

Michoacán 219 1206 987 450,7<br />

Morelos 0 942 942 94200,0<br />

Zacatecas 46 738 692 1504,3<br />

Puebla 0 527 527 52700,0<br />

Quintana Roo 0 51 51 5100,0<br />

Aguascalientes 0 0 0 0,0<br />

Campeche 0 0 0 0,0<br />

Chihuahua 0 0 0 0,0<br />

Coahuila 0 0 0 0,0<br />

500


Rodrigo Sandoval Almazán et al.<br />

Oaxaca 0 0 0 0,0<br />

San Luis Potosi 0 0 0 0,0<br />

Tabasco 0 0 0 0,0<br />

Tamaulipas 0 0 0 0,0<br />

Tlaxcala 0 0 0 0,0<br />

Veracruz 0 0 0 0,0<br />

References<br />

Boyd, D., Golder, S., & Lotan, G. (2010). Tweet, Tweet, Retweet: Conversational Aspects of Retweeting on Twitter.<br />

Paper presented at the System Sciences (HICSS), 2010 43rd Hawaii International <strong>Conference</strong> on, Honolulu, HI.<br />

Burley-Gant, D., Gant, J. P. & Johnson, C. L. 2002. "State Web Sites: Delivering and Financing E-Service.".<br />

Castells, M. 1998. La Era De La Informacion (Vol.1): Economia, Sociedad Y Cultura. La Sociedad Red, Madrid,<br />

España, Alianza Editorial.<br />

Eliason, E. & Lundberg, J. Year. The Appropriateness Of Swedish Municipality Web Site Designs. In: Proceedings of<br />

the 4th Nordic conference on Human-computer interaction: changing roles, 2006 Oslo, Norway. ACM, 48-57.<br />

Gil-Garcia, J. R. & Luna-Reyes, L. F. 2008. Una Breve Introducción Al Gobierno Electrónico: Definición, Aplicaciones<br />

Y Etapas. 11th Annual International Digital Government Research <strong>Conference</strong> on Public Administration Online:<br />

Challenges and Opportunities 49-73.<br />

Honeycutt, C., & Herring, S. C. (2008). Beyond Microblogging: Conversation and Collaboration via Twitter. Paper<br />

presented at the 42nd Hawaii International <strong>Conference</strong> on System Sciences, Waikoloa, Big Island, Hawaii<br />

Kubicek, H. Year. Next Generation Foi Between Information Management And Web 2.0. In: Proceedings Of The<br />

2008 International <strong>Conference</strong> On Digital Government Research, 2008 Montreal, Canada. Digital Government<br />

Society Of North America, 9-16.<br />

Layne, K. & Lee, J. 2001. Developing Fully Functional Egovernment: A Four Stage Model. Government Information<br />

Quarterly, 18, 122-136.<br />

Luna-Reyes, L. F., García, J. M. H. & Gil-García, J. R. 2009. Hacia Un Modelo De Los Determinantes De Éxito De<br />

Los Sites De Gobierno Estatal En México. Gestión Y Política Pública, Xviii No. 2, 307-341.<br />

O'Reilly, T. 2005. What Is Web 2.0 | O'reilly Media %U Http://Oreilly.Com/Pub/A/Oreilly/Tim/News/2005/09/30/What-<br />

Is-Web-20.Html [Online]. O'Reilly. Available: http://Oreilly.Com/Pub/A/Oreilly/Tim/News/2005/09/30/What-Is-<br />

Web-20.html [Accessed Mayo 4, 2009 2009].<br />

Phelan, O., Mccarthy, K., & Smyth, B. (2009). Using Twitter To Recommend Real-Time Topical News. Paper<br />

Presented At The Proceedings Of The Third Acm <strong>Conference</strong> On Recommender Systems, New York, New<br />

York, Usa.<br />

Sandoval-Almazán, R., J. Ramón, G. G. & Reyes, L. F. L. 2007. 2007 State Site Ranking (In Spanish: Ranking De<br />

Sitees Estatales, La Medición 2007). Politica Digital Mexico Df: Grupo Nexos.<br />

Sandoval-Almazán, R., J. Ramón, G. G. & Reyes, L. F. L. 2008. Ranking Estatal 2008 De Sitees .Gob. Politica<br />

Digital Mexico Df: Grupo Nexos.<br />

Tapscott, D. & Williams, A. D. 2006. Wikinomics: How Mass Collaboration Changes Everything, Portfolio Hardcover.<br />

Wigand, F. D. L. (2010, 12-14 April 2010). Twitter In Government: Building Relationships One Tweet At A Time.<br />

Paper Presented At The Information Technology: New Generations (ITNG), 2010 Seventh International<br />

<strong>Conference</strong> On, Las Vegas, Nv.<br />

Woods, E. 2007. Web 2.0 And The Public Sector - Public Sector - Breaking Business And Technology [Online].<br />

Silicon.Com Driving Business Through Technology. Available:<br />

http://Www.Silicon.Com/Publicsector/0,3800010403,39168737,00.htm [Accessed].<br />

Yáñez, A. 2009. El Gobierno Y La Generación Y La Revolución De Su Relación. Available:<br />

http://Www.Deloitte.Com/Assets/Dcom-Mexico/Local%20assets/Documents/Mx%28es-Mx%29gobierno-<br />

Generacionyfinal_270609.pdf.<br />

Zappen, J. P., Harrison, T. M. & Watson, D. Year. A New Paradigm For Designing Egovernment: Web 2.0 And<br />

experience design. In: Proceedings of the 2008 international conference on Digital government research, 2008<br />

Montreal, Canada. Digital Government Society of North America, 17-26.<br />

501


eGovernment in Serbia: Prospects and Challenges<br />

Laslo Šereš and Ivana Horvat<br />

University of Novi Sad, Serbia<br />

laci@ef.uns.ac.rs<br />

ivana.horvat@ef.uns.ac.rs<br />

Abstract: eGovernment is a great opportunity for every country to improve the efficiency of public administration<br />

and to gain a competitive edge. Despite the early recognition of the information society importance, Serbia is, like<br />

many other transitioning countries, struggling with the transformation of its legacy bureaucratic and administrative<br />

processes. This document describes a short history of eGovernment in Serbia, gives an overview of current state<br />

of eGovernment services, and proposes guidelines that would help future eGovernment deployment in Serbia.<br />

Through comparison of Serbian eGovernment solutions with those implemented in a number of EU countries,<br />

some of the strengths and weaknesses of the eGovernment deployment in Serbia are pointed out. The empirical<br />

research conducted in this paper reveals the areas which are crucial in terms of greater public access to<br />

information, and a more efficient, cost-effective government. In this sense, the paper particularly emphasizes the<br />

need to: a) strengthen the legislative framework and the institutional capacity related to the use of eGovernment<br />

within the Serbian public administration; b) support the implementation of public administration reforms necessary<br />

for the further development of eGovernment; c) provide assistance to the development of a National<br />

Interoperability Framework; d) create and/or further develop basic public services to citizens through the use of<br />

eGovernment. In order to develop citizen-centered interoperable eGovernment services, all these areas require<br />

adequate strategy and action plans. This paper aims to analyze different areas and their concepts in order to<br />

define and elaborate guidelines that would initiate evolving of eGovernment in Serbia. The findings and<br />

implications of this survey could contribute to better understanding of conditions and determining the priorities of<br />

further eGovernment development in Serbia.<br />

Keywords: eGovernment, eServices, Serbia, public administration<br />

1. An overview of eGovernment evolution in Serbia<br />

Serbia (as a part of former Yugoslavia) recognized the importance of the information society in the<br />

late 80’s, when regulatory activities and organizational preparations in this area started. The first step<br />

was the adoption of The Guidelines for Developing and Adoption of the Governmental Institutions<br />

Information System Projects by the Executive Council of Serbia Parliament in October 1989. Since<br />

then, there is more or less continuous work on institutionalization and development of governmental<br />

institution’s information systems. Some of the most important acts adopted in the 90’s, which defined<br />

the guidelines for development, were: The Legal Act on Securing and Protecting of Governmental<br />

Institutions Information Systems (1990), Law on Information System of Republic of Serbia (1996),<br />

Legal Act on Program of Information System Development of Republic of Serbia (1997), etc. From the<br />

middle of ‘90s, the realization of several important projects started, but only a few of them were<br />

applied: The Project of Database for IT Standards (1996), Project of Database for Codes and<br />

Classification in Governmental Institutions (1997), Project of Common Computer-Telecommunication<br />

Network of Governmental Institutions (1998) and others. Over time the number of projects with<br />

successful implementation increased: in 2000/01 the Project of Information System about Personal<br />

Status of Citizens was adopted, along with the program system which involves three functional<br />

subsystems: Master register, Electorate and Citizens. In the same year the Project of Unique Register<br />

of Streets and Home Numbers in the Republic of Serbia was adopted and a program system for<br />

maintaining the registry was developed.<br />

Significant results in realization of important eGovernment projects were visible from 2002, when<br />

technological prerequisites were satisfied for intensive and efficient development. An important<br />

milestone in these efforts was the signing of the eSEE Agenda for Information Society Development<br />

in 2002 as a basic document for development of information society in the region. The aim of<br />

Electronic South Eastern Europe (eSEE) Initiative is the better integration of SEE countries into the<br />

global, knowledge-based economy by regionally supporting the development of Information Society.<br />

In order to prove the commitment to the Agenda, in 2004, the Government of Serbia has adopted a<br />

Strategy of the State Administration Reform with the aim of public administration modernization. The<br />

Strategy defined three basic stages according to which the modernization of the Serbian<br />

administration should be implemented. The first stage includes analysis within which is necessary to<br />

analyze the current state of existing infrastructure and currently used information systems as well as<br />

the impact and necessary extents of laws and regulations. The second stage deals with integration<br />

and implementation of international standards in the design and development of state bodies<br />

502


Laslo Šereš and Ivana Horvat<br />

communication infrastructure, while the third stage consists of introducing e-services to citizens and<br />

commercial subjects on the levels of both central and local government. In order to establish<br />

appropriate legal surroundings the following laws have been adopted: Law on Electronic Signature<br />

(2004), Law on Free Access to Information of Public Significance (2004), Criminal Code (2005), Law<br />

on the Organization and Jurisdiction of State Organs against High-Tech Crime (2005), Law of<br />

Ministries (2007) – upon which the Republic Office for Informatics and Internet as a special<br />

organization appointed by the Ministry of Telecommunications and Information Society was formed,<br />

Law on Personal Data Protection (2008), Law on e-Commerce (2009), Law on Electronic Documents<br />

(2009).<br />

At the end of this brief overview of important events that signified the development of eGovernment in<br />

Serbia, it is necessary to point out three documents adopted in 2009 & 2010 which will determine<br />

further development: the Strategy of Development of eGovernment in the Republic of Serbia in the<br />

Period 2009-2013 (2009), Strategy of Development of the Information Society in the Republic of<br />

Serbia from 2010 to 2020 (2010) and the Strategy of Development of Electronic Communications in<br />

the Republic of Serbia from 2010 to 2020.<br />

2. Comparative analysis of eGovernment usage: Serbia, Croatia, Austria and<br />

Germany<br />

In order to provide the most accurate information on eGovernment implementation in EU countries,<br />

we used the results of EU eGovernment benchmark conducted in 2009. This benchmark comprises<br />

31 <strong>European</strong> countries (Cap 2009), whereas four of them are non-EU countries - Croatia, Iceland,<br />

Norway and Switzerland. 12 services for citizen and 8 services for business were tested, as it used to<br />

be a practice in earlier benchmarks. In this benchmark we focused to Austria, Germany and Croatia<br />

while comparing them to Serbia.<br />

2.1 Institutional framework<br />

Austria claimed the State Secretary in the Federal Chancellery to be in charge for eGovernment. The<br />

federal CIO represents “a personal function (i.e. not an institution) supporting coordination of<br />

eGovernment activity, advising the government and representing Austria abroad” (Cap 2009). The<br />

central forum for eGovernment in Austria is a platform ‘Digital Austria’, which comprises<br />

representatives of the federal government, regions, cities, municipalities, private and public sector<br />

bodies. This platform represents an institution that has to do everything with all present activity in<br />

eGovernment, and ensures interconnection among all government levels and stakeholders. It is<br />

chaired by the federal CIO and contains a number of task forces and thematic working groups.<br />

Furthermore, the ICT Strategy Unit does coordination at the federal level. Each ministry and agency<br />

carries out its’ own projects, even though the strategy is overall directed toward binding and<br />

coordinating.<br />

In 2003 Germany launched eGovernment strategy Deutschland-Online, which remained mostly<br />

unchanged. The BundOnline2005 Programme was launched in 2000 at the federal level, and later<br />

was followed by the EGovernment 2.0 Programme. In order to downsize the bureaucracy, and involve<br />

e(participation) as much as providing public services delivery over the Internet, Germany developed a<br />

very comprehensive eGovernment programme. In parallel, this programme focuses on integration of<br />

different levels of government and management of legacy systems. Germany introduced the new<br />

Federal IT Steering System in 2008. This system has governance provided by the Federal CIO<br />

system and the new IT Planning Council. It has deployment that “is largely decentralized, following<br />

Germany’s federal structure. Different states are responsible for piloting new services” (Cap 2009).<br />

In 2003, Croatia has incepted the eGovernment as a part of the general ICT strategy eCroatia. In<br />

2009, it has gained more prominence after a dedicated eGovernment strategy was adopted, which<br />

was primarily focused on separating the development and delivery of services by putting each in<br />

place. Inspired by bid for EU membership, Croatia’s eGovernment activities are strongly aligned with<br />

EU’s policies. Many well organized practices can be found here. On the other hand, due to its’<br />

complex administrative structure, achieving progress might seem a little bit out of limits. Sharing<br />

knowledge, experience and technical know-how with developed countries could speed up this<br />

process. In favor of this “the updated joint national eGovernment strategy (2010-2015) of the federal<br />

states and municipalities level encourages a more streamlined development” (Cap 2009). Croatia has<br />

recently identified eGovernment as a specific policy area, which is under a jurisdiction of the Prime<br />

503


Laslo Šereš and Ivana Horvat<br />

Minister, who is appointed by the Central Administrative Office. Furthermore, this office is responsible<br />

for the eCroatia programme, rationalization of the ICT investments and international cooperation.<br />

Decentralized governance that has some involvement of non-government actors (mixed National<br />

Council for the Information society) advises the government about issues being related to the<br />

Information society development as a whole. In Serbia eGovernment has become a part of the<br />

national strategy of administrative reform in 2004. Similar to Croatia, it gained a much greater<br />

significance in 2009 when a separate eGovernment strategy was established. Operations of<br />

eGovernment administration and tasks are under jurisdiction of Ministry of Telecommunications and<br />

Information Society (MTIS), National Information Technology and Internet Agency, and Office for<br />

Common Operations of Government Institutions. The Ministry performs the role of national<br />

certification body for electronic signature, which is different from the majority of EU and South Eastern<br />

Europe countries, where the practice is that this body (Root CA) is independent from the executive<br />

authorities. Serbia is much more centralized than the above mentioned countries and the<br />

eGovernment development is largely under the patronage of central state organs. In terms of effective<br />

development, the large number of government institutions participating in this development can be an<br />

obstacle.<br />

2.2 eGovernment portals<br />

In Austria the Federal Computing Centre is the leading eGovernment service provider with solutions<br />

like: ELAK, MOA Services, eDemocracy, eDK, and help.gv.at. “Combining a document management<br />

system with a workflow system, workgroup applications and an archive, ELAK is designed to enable<br />

administrative units to electronically record, save, find and re-work information, thereby supporting the<br />

transfer of paper files to electronic files for all inter-ministerial processes at federal level.” (PoA 2010)<br />

The government agency’s help site HELP.gv.at offers information necessary for living and working in<br />

Austria. At the moment, many of the connecting links are available only in German (some of them in<br />

English, too). This type of linked portals builds a solid basis for cooperation and collaboration.<br />

Germany has a portal www.bund.de whose main purpose is to provide services and online<br />

information of the German Federal Administration and other public services. This portal represents the<br />

basic component of eGovernment in Federal Government initiative – BundOnline 2005. “The aim of<br />

this initiative, launched at the Expo 2000, was to render all eGovernment services accessible by<br />

2005. The web portal bund.de is an active partner of Deutschland-Online and is involved in the<br />

implementation of harmonization and networking aims.” (PoG 2010)<br />

In order to provide eGovernment to citizens and business users, Croatia developed portal<br />

“MojaUprava“ (http://mojauprava.hr/) which serves as a gateway to various kinds of eGovernment<br />

services and information. This portal gives valid information about every matter in state administration<br />

for all users, both citizens and business users.<br />

The central portal of eGovernment in Serbia “e-Uprava“ (http://www.euprava.gov.rs/) was created in<br />

2007 in order to obscure citizens and business users with relevant information, so they could easily<br />

carry out the administration processes. The most important contents of the portal are: electronic<br />

services, the latest news, FAQ etc. Electronic services can be searched by several criteria - life<br />

situation, initial letter, as well as the competent authority in charge of service implementation. The<br />

execution of certain electronic services is available only to users registered with an electronic<br />

certificate. As a result of the e-Procurement project (2007) a public procurement web portal is<br />

established too (www.ujn.gov.rs). At this moment there is no infrastructure on governmental level for<br />

knowledge management in Serbia.<br />

2.3 Quality of eGovernment services<br />

Considering eGovernment availability “Austria has held a leading position in eGovernment in the EU<br />

for the last few years”. eGovernment as a service is a “fully integrated aspect of government, which is<br />

demonstrated by 100% level of services on line” (Cap 2009). Both government and stakeholders are<br />

taking care of improving strategy and implementation of eGovernment. Germany, on the other hand,<br />

accomplished expansion of broadband access as much as the Internet availability but still keeping<br />

availability and usage stagnated, particularly in business. Croatia has just started to develop<br />

eGovernment and has not reached the maturity level yet. A certain efforts were made to increase<br />

availability of online services, as much as to deliver those services in user-friendly manner. Serbia, as<br />

a country that is by economical, social and geographical position the most similar to Croatia, is at the<br />

504


Laslo Šereš and Ivana Horvat<br />

maturity level of eGovernment that is the closest to Croatia. There are many services delivered online<br />

which are user-friendly, but the level of usage is low, due to broadband access and readiness of users<br />

to use eGovernment services, as well to invest in ICT.<br />

Analysis of eGovernment as a service shows that Austria has a fully integrated solution that reduces<br />

administration business for both sides – citizens/business and public administration, primarily taking<br />

care of their users. On the other hand, even if it has 100% services offered online (like Malta, Portugal<br />

and the United Kingdom), there is a minor negligence from citizens, partly due to the rear use of<br />

Internet as well as broadband unavailability. When it comes to online sophistication, Austria achieves<br />

99%, the 3 rd best result in Europe right behind Malta and Portugal. Austria sets an example for Userfocused<br />

Portal Design by scoring over the average of the EU27+, while below the average for<br />

Usability and One-Stop-Shop Approach. “Germany scores 74% on full online availability. In terms of<br />

User Experience, Germany obtains 39% on Usability, 24% on User Satisfaction Monitoring, 70% on<br />

One-Stop-Shop Approach and 71% on User-focused Portal Design.” (Cap 2009) Croatia has userfocused<br />

portal design which scores 100% and One-Stop-Shop Approach reaching even 80%. “On<br />

usability, Croatia scores 34% while 24% of the screened web sites score positively on the User<br />

Satisfaction Monitoring metric.” (Cap 2009) When this benchmark was conducted, usability of<br />

eGovernment services in Serbia was 12.9%, while in 2010 it slightly arose and scores 13.2%. Figures<br />

1 and 2 compare full online availability of eGovernment services for citizen’s and business in Austria,<br />

Germany, Croatia and Serbia in 2009 (Eur 2010, Ins 2009). These figures point out that eGovernment<br />

services designed for citizens have lower availability in Serbia than in any other of compared<br />

countries. On the other hand, in G2B segment Serbia accomplished better results than Croatia,<br />

almost equal to the results of Germany, but still lagging behind Austria.<br />

Figure 1: Full online availability of eGovernment<br />

services – citizens 2009<br />

Figure 2: Full online availability of<br />

eGovernment services –<br />

business 2009<br />

According to Capgemini’s benchmark (Cap 2009), sophistication of 20 basic services in EU 27+ was<br />

76% in 2007 and 83% in 2009. Total sophistication level of eGovernment in Serbia scores 38% in<br />

2007 and 46% in 2009 (Ins 2009). These results show a great backlog of Serbia when compared to<br />

EU countries and justify giving a wakeup call to government and IT society to develop strategy that<br />

would ensure future success in this segment and undertake an appropriate action Plan.<br />

Figure 3: Comparison of eGovernment sophistication<br />

505


Laslo Šereš and Ivana Horvat<br />

3. Strengths and weaknesses of eGovernment in Serbia<br />

For several years the Statistical Office of Serbia conducts researches concerning information and<br />

communication technologies usage. In 2010 the research is conducted with 2400 households<br />

(including the individuals that were 16 to 74 years old) sample that was two-phase stratified, in<br />

accordance with the Eurostat methodology. This research was divided in two separate studies: the<br />

first one relates to the citizens, both households and individuals, while the second one is concerned<br />

with the business companies. According to the data provided by these studies, it can be noticed that<br />

there is a constant growth in the number of computers as well as in a number of internet access<br />

points in the last five years.<br />

The research results for 2010 (Sta 2010) showed that more than 50% of households in Serbia had a<br />

computer and 39% of them had an internet access. Analysis of the household data for the last five<br />

years shows that there is a constant growth both, in the number of computers and internet access<br />

points, while the ratio of Internet access points and computer owners is more or less unchanged -<br />

about 80% of computer owners have Internet access (Figure 4).<br />

Figure 4: Percentage of households in Serbia with computer and internet accessIt would be rational<br />

to expect that the trend of computer owner’s growth will continue until it reaches a saturation point, at<br />

the level of 70-80% of households with a computer, which is expected in a few years’ time.<br />

Concerning the usage of eGovernment it is important to note that there is a significant increase in the<br />

number of households with a broadband connection: 47.3% of households have DSL (ADSL)<br />

connection, while 24.5% use cable internet.<br />

In order to get an adequate insight, the results for business companies are also shown here. Based<br />

on a sample of 1400 business companies it was found that in 2010 almost 98% of the Serbian<br />

companies owned a computer, 97% of them had Internet access, and over 90% of them used a<br />

broadband connection.<br />

The research conducted in 2010 (Sta 2010) also included the analysis of users readiness to use<br />

eGovernment services that has provided very interesting results (Figure 5).<br />

It is obvious that there is a significant stratum of citizens who are interested in using the eGovernment<br />

services but many of them are missing the technical prerequisites needed for it. The proportion of<br />

those who use or are interested in the use of eGovernment services is over 60% of the population<br />

while less than 40% of the population has internet access. Another question is why only a third of<br />

citizens with Internet connection are using eGovernment services.<br />

506


Laslo Šereš and Ivana Horvat<br />

Figure 5: Readiness of the citizens of Serbia to use eGovernment services<br />

Another survey conducted (Ins 2009) showed similar results: slightly above 40% of citizens with<br />

Internet connection were using eGovernment services both in 2007 and 2009 (Figure 6), while this<br />

percentage is growing in the case of companies.<br />

Figure 6: Percentage of eGovernment services users in Serbia calculated in relation to the number of<br />

internet connection owners<br />

These facts indicate that there is still much work to do in Serbia to increase citizen’s willingness to<br />

adopt eGovernment. In order to develop “citizen-centered” eGovernment services that provide citizens<br />

with accessible, relevant information and quality services the government agencies should pay much<br />

more attention on the factors that influence citizen adoption of this innovation. The maturity model<br />

from the 2009 benchmark is used in order to provide an adequate description of strengths and<br />

weaknesses of eGovernment in Serbia. This model differ five different stages which define the level of<br />

sophistication and online availability of some services. The stages are defined as follows:<br />

Stage 0 the service provider doesn’t have a publicly accessible website or it doesn’t qualify for<br />

any of the four levels.<br />

Stage 1 (information) all information is available on website which is accessible. The website is<br />

managed by the service provider.<br />

Stage 2 (one-way interaction) provides a user to obtain a necessary paper in non electronic way.<br />

Stage 3 (two-way interaction) gives an opportunity to electronic intake with an official electronic<br />

form.<br />

Stage 4 (transaction) offers the possibility to completely keep track of a process via the website.<br />

There is no other formal procedure for applicant.<br />

Stage 5 (targetization) the provider of the service is already familiar with the user’s data, provides<br />

him/her with regulations for data protection and brings up a certain level of personalization.<br />

507


Laslo Šereš and Ivana Horvat<br />

Figure 7: Five-stage maturity model used in benchmark (Cap 2009)<br />

The table below gives a detail overview of online availability and sophistication stage of 20 basic<br />

services and their current stage of maturity (Ins 2009). All table data are gathered from the research<br />

conducted by Republic Office for Informatics and Internet. The research was conducted according to<br />

the Capgemini’s methodology including both, the republic authority, at the highest level of service<br />

suppliers, and the local authority, at the lowest level. The level of sophistication was calculated as an<br />

average value of local authority values. In order to evaluate strength of these services, a maximum<br />

stage is supplied.<br />

Table 1: Sophistication stage of 20 basic government services in Serbia (2009)<br />

Service name Current Max.<br />

Service name Current Max.<br />

stage stage<br />

stage stage<br />

Citizen service Business service<br />

Job search 4 4 Corporate tax 3 5<br />

Social security benefits 2 4 Building permission and<br />

environment-related permits<br />

1 5<br />

Personal document 1 5 Electronic cadastre and property<br />

registries<br />

2 4<br />

Car registration 1 5 Health-related services and social 2 4<br />

contributions<br />

Public libraries 4 5 Company registration 3 4<br />

Certificates 1 4 Registration of company revenue 3 4<br />

Enrolment in higher education 1 4 VAT 2 4<br />

Announcement of moving 1 4 Customs declaration 4 4<br />

Registration of foreign trade 1 4<br />

transactions<br />

Public procurement 3 4<br />

Registry of legal persons mortgage 4 5<br />

Statistical data 2 5<br />

The most developed services are those related to budget inflow, while the services connected with<br />

licenses and certificates are less developed. In 2008 the sophistication level of eGovernment in<br />

Serbia was 47%, while in 2009 it reached 51%. This increase is a consequence of higher<br />

sophistication levels of some services: Electronic cadastre and property registries, Register of legal<br />

persons mortgage, Social security benefits and Public libraries.<br />

Observing the sophistication stage of services it is obvious that great part of them, 7 of 20 services<br />

are developed to match the first stage. Five services are at the second stage, 4 are at the third stage<br />

and only 4 of them achieved the forth level. The lowest sophistication of all services is measured in<br />

the Personal documents group (birth certificates). There is a (bit strange) sophistication level downfall<br />

– from stage 2 in 2008 to stage 1 in 2009. Although the average has fallen, 34% of local governments<br />

508


Laslo Šereš and Ivana Horvat<br />

supply service at the third stage. Considering that the forth level implies electronic signature and<br />

document this is a really good result. Considering that the use and exchange of electronic documents<br />

in certain areas (customs, accounting jobs, banking and others) becomes a reality, the achieved<br />

results can be assessed as partial. In order to achieve better results it is necessary to eliminate or at<br />

least reveal obstacles that tie down further development. The existing situation in this area is featured<br />

by:<br />

Insufficiently developed shared computing;<br />

Underdevelopment of official records in electronic form, as the core data necessary for the<br />

development of electronic government;<br />

Inevitability of paper documents in almost every proceeding;<br />

Lack of standardization and coordination of authority’s information systems;<br />

Lack of competent personnel.<br />

Although the weaknesses are much more widespread there are a few bright sides:<br />

Strong political commitment in terms of eGovernment development;<br />

Experience gained through successful development of solutions in other areas of e-business.<br />

4. Guidelines for future development of eGovernment in Serbia<br />

The strategy of eGovernment development in Serbia is compatible with the objectives of the Action<br />

Plan for implementation of priorities from eSEE Agenda+ for the Information Society in South Eastern<br />

Europe in the period 2007-2012. It is based on the condition of legislative regulation of this area and<br />

results achieved in implementation of legislative solutions. In this context the significance of<br />

implementation of the Law on Electronic Signatures is particularly emphasized (TGS 2010). The<br />

strategy is based on the results of ongoing projects, such as the introduction of electronic government<br />

sessions, electronic cadastre, initial results in the introduction of electronic services for some tasks<br />

and others. It is very important to raise the motivation of all participants in order to intensify activities<br />

in this field and establish an institutional framework for managing and coordinating the development of<br />

eGovernment at the strategic and operational levels.<br />

The realization of the vision and general objectives of eGovernment should be guided by the following<br />

principles:<br />

User satisfaction - it is crucial to identify main adoption factors (perceived usefulness, relative<br />

advantage, compatibility, etc.) in order to raise users’ intention to use online government services.<br />

Single access point (one stop shop).<br />

Public information availability in electronic form - without charge or other conditioning.<br />

Electronic services availability - free access for all users, including people with disabilities, by<br />

using open and widely accepted standards.<br />

Not neglecting the classical forms of service delivery - all users should benefit from the<br />

eGovernment development, regardless of whether they use electronic means to access services.<br />

New ICT based services - public services should be provided through different communication<br />

channels.<br />

Avoiding technological dependence - technological foundation for the development and<br />

exploitation of electronic public services related to computers, software solutions and<br />

communication network should be independent from suppliers of goods and services as much as<br />

possible.<br />

Information security - security and reliability of eGovernment must be in accordance with<br />

established standards of information security and protection of personal data.<br />

Staffing - electronic public services must be supported by professionally trained officers.<br />

The priorities of eGovernment development could be grouped into the following pillars:<br />

Establishment of key levers;<br />

Process automation;<br />

Establishment of electronic public services;<br />

509


Human resources development<br />

4.1 Establishment of key levers<br />

Laslo Šereš and Ivana Horvat<br />

The first pillar of eGovernment includes system solutions which are essential for an effective<br />

development of eGovernment. It includes the following priorities:<br />

ICT infrastructure<br />

− Communication infrastructure that enables computer-based connectivity between authorities<br />

and Internet connection;<br />

− Computer centers with servers and other information and communication resources –<br />

database servers, application servers, etc.;<br />

− Infrastructure at different locations, including local area networks.<br />

Electronic identity, electronic signature and electronic document<br />

It is necessary to ensure reliable and secure authentication of electronic documents signatories<br />

and electronic services users. It is also necessary to achieve the electronic document being used<br />

as the original.<br />

Electronic official records.<br />

In addition to keeping records in electronic form, it is necessary to ensure efficient and secure<br />

electronic access to this data by officers conducting proceedings, to eliminate the need for a party<br />

in the proceedings to obtain fact’s evidence from the records.<br />

Standardization in the field of ICT implementation and coordination of ICT projects in government.<br />

Standardization and coordination could contribute to the rationalization of resources, security,<br />

interoperability, and a simpler and better implementation of individual projects.<br />

4.2 Process automation<br />

The second pillar of eGovernment should substantially contribute to better execution of business<br />

processes by using ICT, along with improving efficiency and streamlining of costs. The introduction of<br />

electronic documents speeds up communication and retrieval of the documents, but does not<br />

necessarily change the processing of the documents. Electronic documents can be created in the<br />

same way the paper documents were previously prepared with a computer, but instead of delivering a<br />

printed document on paper, it is delivered in electronic form. Any processing of such documents still<br />

includes the need to be read by someone, which is essentially not an automated processing.<br />

Electronic documents should be produced, stored and delivered in a form which is suitable for further<br />

automated processing, in other words as a structured electronic document (which enables<br />

independently developed information systems to communicate via standard protocols and formats of<br />

structured electronic documents).<br />

4.3 Establishment of electronic public services<br />

This pillar includes the following priorities:<br />

eGovernment portals and shared electronic services<br />

Portal is a single point of access to multiple electronic public services. Shared electronic services<br />

are important for the realization of many electronic public services (central authentication system,<br />

electronic payment, electronic forms, etc.).<br />

Electronic public services.<br />

4.4 Human resources development<br />

It is necessary to improve the official staff’s competence as information systems and electronic<br />

services users, as well as the competence of ICT experts’ responsible for functioning of technical<br />

systems and their improvement. Main priorities of this pillar are:<br />

Computer literacy and skills of officers<br />

It is necessary to raise the general IT literacy of employees in state administration, as well as<br />

skills in using specific IT solutions.<br />

510


Employment of ICT professionals<br />

Laslo Šereš and Ivana Horvat<br />

In favor of sustainable ICT solutions needed for eGovernment development, it is necessary to<br />

provide adequate ICT support. In addition, special attention should be paid to the formation of<br />

expert teams who provide ICT services.<br />

4.5 Abbreviated action plan for the period 2011-2012<br />

In order to achieve defined objectives and realize priorities listed above it is necessary to define an<br />

action plan. Some of the most important activities that should be implemented in the next two years<br />

are listed in table 2 (TGS 2010).<br />

Table 2: Abbreviated action plan of eGovernment development in Serbia for the period 2011-2012<br />

Year of<br />

Priority Activities<br />

implement.<br />

State network establishment 2011<br />

ICT Infrastructure<br />

Standardization in the field of ICT<br />

implementation and coordination<br />

of ICT projects in public<br />

administration<br />

Exchange of structured<br />

documents and inter-agency<br />

process automation<br />

Process automation<br />

eGovernment portals and shared<br />

Establishment of electronic official records Data Dictionary 2011<br />

Plan for EU identifiers (passwords, identity or registration<br />

numbers, codes, etc.) in various official records<br />

2011<br />

Development of the National Interoperability Framework 2012<br />

Development of a plan for structured documents exchange<br />

establishment in individual transactions and process<br />

automation<br />

General administrative procedure reform in order to adapt to<br />

prevailing use of electronic communication and process<br />

automation capabilities.<br />

2011<br />

2012<br />

Establishment of a national Geoportal 2012<br />

e-Services Initiation of electronic payment services 2011<br />

Realization of single electronic counter for taxpayers 2012<br />

Realization of electronic service for issuing environmental<br />

licenses<br />

2012<br />

Implementation of electronic services related to building<br />

permits issuance<br />

2012<br />

Realization of electronic real estate and real estate rights<br />

Realization of e-services related to health and pension<br />

2012<br />

insurance of employees (full e-service in filing returns,<br />

payments and obtaining information on the state tax<br />

2011<br />

Individual e-Services<br />

liabilities and tax laws change)<br />

Realization of e-service application for corporate income tax 2011<br />

Realization of e-service application for value added tax<br />

Establishing a single electronic counters for foreign trade in<br />

2011<br />

accordance with the recommendations of UN Economic 2011<br />

Commission for Europe<br />

Realization of electronic services for the achievement of<br />

statutory rights in the field of social protection and financial<br />

support to families with children<br />

Realization of electronic services related to the issuance of<br />

identity documents (identity card, passport and driving<br />

license)<br />

Realization of e-services of motor vehicle registration (new,<br />

used and imported) that do not require a physical visit of<br />

citizens in case of an extension of vehicle registration<br />

Public libraries (realization of e-accessibility of catalogs and<br />

search tools publications)<br />

Realization of e-services for issuing birth and death<br />

certificates and citizenship certificates<br />

Realization of e-services related to citizens annual income<br />

tax<br />

Realization of e-services related to provision of health<br />

services (interactive advice on the availability of services,<br />

scheduling of examinations, ... )<br />

511<br />

2012<br />

2011<br />

2011<br />

2011<br />

2012<br />

2011<br />

2011


5. Conclusion<br />

Laslo Šereš and Ivana Horvat<br />

Investment in ICT by governments in the SEE countries has increased dramatically in recent years.<br />

Most SEE countries are adopting ICTs primarily to modernize and increase internal effectiveness as<br />

well as to improve service delivery. They consider eGovernment applications as an enabling tool to<br />

increase efficiency, enhance transparency, collect more revenue and facilitate public sector reform.<br />

Observing the results of the adoption of eGovernment concepts in Serbia, it can be noticed that a lot<br />

has been done with regard to the legislative regulation in the last few years, but there is much to be<br />

done in the field of implementation, for instance - e-signatures. Although Serbia lags behind most<br />

<strong>European</strong> countries in terms of eGovernment adoption, there are many similarities: the sophistication<br />

level as well as the full online availability of eGovernment services is much higher in the business<br />

area than it is in the citizen.<br />

According to the reached level of sophistication (51%), eGovernment in Serbia reached the stage of<br />

two-way interaction which implies the ability to send completed forms via the Internet. The situation is<br />

considerably better in the case of services used by business, while in terms of citizen services<br />

sophistication the average level is closer to one-way interaction. When compared to particular<br />

domains, the highest level of sophistication is related to the Registry of legal person’s mortgage,<br />

Customs declaration and Job search, while the lowest level is achieved in Permits and documents. In<br />

contrast to EU countries (27+) where, on average, more than a half of services are fully available<br />

online, in Serbia none of the eGovernment segments is on the level that can completely replace direct<br />

or written communication.<br />

As extracted from the results presented in this paper, a substantial obstacle in creating a fully<br />

computerized eGovernment in Serbia is the lack of appropriate internet infrastructure and the low<br />

level of internet penetration. Serbia should allocate budgetary funds and create the ideal conditions<br />

that will boost the development of modern communication networks. In parallel, stimulation of public<br />

awareness on the availability and potential benefits of eGovernment services is vital towards<br />

reinforcing democracy, improving public services, and strengthening economic and business<br />

development. In addition to the current strong political commitment, Serbia needs to ensure active<br />

involvement of the entire society in eGovernment and IS development. By following the best practices<br />

of other countries, planning realistic eGovernment projects and identifying issues of technical and<br />

human capacity Serbia has an opportunity to catch up and reach the goal of modern eGovernment.<br />

References<br />

Capgemini (2009) 8th Benchmark Measurement of <strong>European</strong> eGovernment services, [online],<br />

www.capgemini.com/insights-and-resources/by-publication/2009-egovernment-benchmark<br />

Carter, L. and Belanger, F. (2004) “Citizen Adoption of Electronic Government Initiatives”, Proceedings of the 37 th<br />

Hawaii International <strong>Conference</strong> on System Sciences - 2004, pp 1-10.<br />

Eurostat (2010) EGovernment usage by enterprises (demand side) (NACE Rev. 1.1), [online],<br />

http://appsso.eurostat.ec.europa.eu/nui/show.do?dataset=isoc_si_egov&lang=en<br />

Graafland-Essers, I. and Ettedgui, E. (2003) Benchmarking eGovernment in Europe and the US, [online], RAND,<br />

www.rand.org/pubs/monograph_reports/MR1733.html<br />

Institute for Informatics and Internet of Republic of Serbia (2009) Current state of eGovernment development -<br />

2009, [online], www.rzii.gov.rs/FileSystem/SiteDocuments/publikacije/Stanje razvoja eUprave u RS -<br />

2009.pdf<br />

Leith, P. (2002) Legal Issues in eGovernment, [online], www.lri.jur.uva.nl/~winkels/eGov2002/Leith.pdf<br />

Lilić, S. and Stojanović, S. (2009) “E-Governemnt and Administrative Reform in Serbia”, Journal of Law and<br />

Technology, Vol. 2, No. 2, pp 127-136.<br />

Millard, J. (2010) “Open Governance – The Role and Impact of ICT in Engaging Citizens”, Selected Proceedings<br />

of the Second International <strong>Conference</strong> on eGovernment and eGovernance, Antalya-Turkey, Vol. 1, pp 29-<br />

42<br />

Portal of Federal Computing Centre of Austria (2010), [online],<br />

www.brz.gv.at/Portal.Node/brz/public/content/home-en/17622.html<br />

Portal of eGovernment – Germany (2010), www.bund.de/EN/Home/homepage_node.html<br />

Statistic Institute of Republic of Serbia (2010), ICT usage in Republic of Serbia, [online],<br />

http://webrzs.stat.gov.rs/axd/dokumenti/ict/2010/Saop2010.pdf & http://rzii.gov.rs/News/?id=138<br />

The Government of Republic of Serbia (2009) Strategy of eGovernment Development in Republic of Serbia<br />

2009-2013, [online], www.mtid.gov.rs/upload/documents/konsultacije/seu/strategija-euprava-2009-06-29.pdf<br />

512


An Organizational Framework for Managing eGovernment<br />

Systems in Developing Countries: The Case of Kurdistan<br />

Region of Iraq<br />

Shareef Shareef, Elias Pimenidis, Hamid Jahankhani and J. Arreymbi<br />

University of East London, UK<br />

s.shareef@uel.ac.uk<br />

e.pimenidis@uel.ac.uk<br />

Hamid.jahankhani@uel.ac.uk<br />

J.Arreymbi@uel.ac.uk<br />

Abstract: This paper aims at proposing an organizational framework for implementing eGovernment in developing<br />

countries. Furthermore a management process to meet the modernization goals of government based on a proposal<br />

by Heeks (2006), in his work on managing eGovernment systems, is specified. The challenges that affect the<br />

implementation and management of eGovernment systems are critically analysed and the authors expect<br />

practitioners and authorities to find the results useful in the planning and implementation of new eGovernment<br />

systems.<br />

Keywords: KRG, KRI, eGovernment, centralize, decentralize, hybrid approach, management process.<br />

1. Introduction<br />

Information and Communication Technologies (ICT) are utilized as tools of eGovernment aiming to<br />

decrease the load of public administration and enhance performance in service provision to the<br />

community. Additional benefits include the expected decrease in the gap between the urban and rural<br />

area population in terms of access to service provision (Kamar, and Ongo’ndo, 2007). The mission to<br />

initiate and implement eGovernment is inspired by policies aiming at increased accountability, efficiency,<br />

effectiveness and improved transparency; thus enhancing governance tools and practice (Grant & Chau<br />

2005). This paper investigates the above desired qualities of governance based on literature review and<br />

proposes an organizational framework for managing the eGovernment sector and its operation with the<br />

confines of a regional government structure.<br />

The Kurdistan Regional Government (KRG) in Iraq focuses on the role of new technology to develop<br />

public administration and at the same time improve the government’s capability to supervise key activities<br />

in the re-construction of Kurdish social life, infrastructure, services, increased political freedom and<br />

tangible improvements in the people’s daily lives. The electronic government strategic plan is a national<br />

initiative for KRG (see www.KRG.org). It aspires at improving effectiveness and efficiency in government<br />

services by improving the quality of service delivery to its citizens and businesses through ICT adoption,<br />

and the potential of multi-channel delivery of services. To carry out this plan, the IT department of the<br />

council of ministries of KRG has been established, in order to prepare eGovernment initiatives and their<br />

implementation in collaboration with various stakeholders, and also to plan the way for Kurdistan and its<br />

citizens would become competitive members of the global economy and information society.<br />

The rest of the paper is organized as follows: the next section discuses the need for an organizational<br />

framework of eGovernment. Section three discuses the proposed organizational structure for the<br />

eGovernment sector in developing countries. The fourth section explains the current state of affairs of<br />

KRI, while section five discusses the proposed management approach as applied to the eGovernment<br />

sector in the IT department of a regional government in a developing country, namely the KRG. Before<br />

concluding, section six provides the authors’ views on challenges and dilemmas in managing<br />

eGovernment systems.<br />

2. Need for organizational framework of eGovernment<br />

eGovernment is a dynamic form of continuous service provision process which makes availability of<br />

services to the community electronically via multiple channels of delivery; such as the Internet, telephone,<br />

wireless devices, and other communication systems, through an effective management process (Shareef,<br />

et al. 2010). Managing eGovernment is vital in attaining and sustaining a high level of service provision,<br />

because eGovernment could fail due to weak implementation and poor management (Heeks, 2006).<br />

Without good management it would be impossible to make good decisions continuously and egovernance<br />

will not be able to succeed and provide services effectively and efficiently, and as a<br />

513


Shareef Shareef et al.<br />

consequence the system will be abandoned and will fail. Therefore, to implement a successful<br />

eGovernment, a robust and rigorous managing process is essential. In order to understand how to<br />

manage eGovernment sector, it’s also necessary to understand the concept of management.<br />

Many governments face troubles and problems when undertaking large ICT projects for implementing<br />

eGovernment systems. Budgets and completion deadlines are often exceeded, and progress is out of<br />

control, often resulting in the quality of the resulting services being compromised and possibly falling<br />

behind the project’s targets at the conception stage (Goepp et. al., 2006; Wang et al. 2004).<br />

Investment in ICT is not always synonymous to success in eGovernment; even in the case of Saudi<br />

Arabia which has seen massive investment in ICT and has seen considerable improvements in<br />

infrastructure (Al-Kamali, 2005). Despite all the above investment, Saudi Arabia was still ranked number<br />

70 in the world in terms of eGovernment readiness two years ago and has not seen any significant<br />

changes since (UN 2008). Heeks (2006) believes that the potential failures of eGovernment systems can<br />

be attributed to the wide divide between system design and institutional reality. That implies the gap<br />

between the current situation of government and the assumptions built into the design of the system.<br />

The success and failure of eGovernment relies on the extent of the divide that exists between the current<br />

state of affairs and the design of eGovernment systems employed. The root cause of eGovernment<br />

failure has not been well captured and analyzed by literature so far. In order to overcome eGovernment<br />

failure, a proper and robust management process is essential.<br />

2.1 Management forms<br />

According to literature there are various concepts, applications, and models used to manage<br />

eGovernment systems; the prevailing emphasis is on consumer requirements and consumer information.<br />

In one of the most predominant amongst these words, Arif (2008) has applied (Jaworski and Kohli<br />

1993)’s model to eGovernment management. This model measures the consumer orientation and<br />

comprises three mechanisms; the first mechanism is institution-wide generation, the second is diffusion,<br />

and the last mechanism is institution-wide-responsiveness. The simplicity and ease of this model make it<br />

easily adaptable to varying situations and hence could be adapted to any special situation such as the<br />

specific requirements of a regional government. The versatility of this model has been proven by a<br />

number of researchers by having been applied to a wide range of application domains; supply chain<br />

(Saiguaw et al, 1998), hospitality and tourism (Sin et al, 2005; Qu et al, 2005), manufacturing (Singh and<br />

Ranchodd, 2004), new product development (Kahn, 2001), and construction (Dulaimi, 2005).<br />

Coursey, et al. (2007) explain the two different trends of eGovernment systems, as such conventional<br />

public information management and institutional. The first trend concentrates on organizational approach<br />

such as politics, application features, and resources. This type of trend comes from authors and public<br />

administration researchers, in which they are more trained in conventional public IT research and not<br />

eGovernment. The second trend concentrates on more common political features, such as government<br />

structure.<br />

Wang et al. (2004) have proposed an information knowledge management model and refer to some<br />

missing links in the managing of eGovernment IT infrastructure. Firstly, lack of the essential software and<br />

the fundamental systems and mechanism information for design, implementation, and deployment<br />

stages. Secondly, lack of tools for providing precise and up-to-date information regarding the hard or<br />

physical IT environment. Thirdly, the lack of system that plans for the large amount of data into a<br />

collected knowledge-based to support and decision analysis. Fourthly, the lack of process for<br />

systematically dealing with IT functions.<br />

Heeks (2006) categorized eGovernment management into three approaches namely; Centralized,<br />

Decentralized and Hybrid. In the first category decision making is performed by upper, senior or central<br />

level decision makers. Decision making being the responsibility of lower level, under senior level or<br />

individual institution staff and individual work unit, is the format of the second category. Finally the third<br />

category involves both lower level and senior level staff in the decision making process, either alone or in<br />

an integrated mode.<br />

The method proposed in this paper is based on Heek’s third category. The details of the model are<br />

discussed in details in section five.<br />

514


3. Proposed framework<br />

Shareef Shareef et al.<br />

This section discusses the proposed organizational framework for the eGovernment sector in developing<br />

countries. The structure of the proposed framework is depicted in figure 1.<br />

Electronic Government Director General<br />

E-council Deputy Director General<br />

E-Gov. planning centre<br />

Includes: Web designer, Database, Programmer,<br />

Language Interpreter, and Implementation<br />

Networking Centre<br />

Includes; Wiring and Installation, Technological<br />

equipment maintenance, Hardware and Software.<br />

Computer applications & Training Centre<br />

Includes; ICT skills, Citizen and Stakeholder<br />

awareness programme<br />

Financial Centre<br />

Includes; Business Analysts<br />

E-Gov. Support Centre: Includes; Analysis<br />

E-Gov. service development Centre<br />

Includes; Data management, Testing,<br />

Quality Assurance, and Production<br />

Security Centre; Confidentiality, Integrity,<br />

and Availability<br />

Figure 1: Structural framework for eGovernment sector<br />

The proposed framework is based on Arif’s (2008) IT project management model, but the focus is on<br />

eGovernment and its management in general rather than a specific project.<br />

In order to implement a proposed integrated eGovernment model it is essential to derive an<br />

organizational framework of the eGovernment system in terms of implementation and management.<br />

Moreover, the initial pace towards eGovernment is to digitize and develop back-office processes in order<br />

to empower government employees to conduct citizens’ transaction effectively and efficiently.<br />

In the proposed framework the electronic government sector comprises seven centres, all of which are<br />

managed by an electronic council, and the sector will be managed by a Director of General (DG). The<br />

director general should be thoroughly knowledgable and experienced in ICT managment at strategic<br />

level, preferably by exposure to knowledge management (Berce, et al. 2008; Rodriguez & Edwards,<br />

2007). The responsibilities of the DG will range from critically assessing employees in terms of IT<br />

competences to evaluating whether the current methods of using technology and the tools used (wireless<br />

devices, SMS, kiosks, and others) are adequate to ensure acceptance of eGovernment technologies<br />

amongst citizens (Andersen, 2006). The Deputy Director of General (DDG) will be in charge of an<br />

electronic council. This will be responsible for developing the vision and direction of eGovernment<br />

applications and practices. Membership of this council will comprise the corporate directors of all other<br />

515


Shareef Shareef et al.<br />

centres in the sector. The main responsibilities of the proposed structure of the eGovernment sector can<br />

be considered as a five main responsibilities.<br />

A. Plan, design, monitor, control, upgrade, supervise, manage, develop, support all computer<br />

networks of eGovernment system and respond to any risks facing the system.<br />

B. Systematize, recognize the technical standards, and criteria relevant to the development of<br />

eGovernment.<br />

C. Train government staff and other stakeholders in order to be able to upgrade and develop the<br />

system. Furthermore to promote, and encourage citizens to utilize eGovernment services by raising<br />

awareness.<br />

D. Organize all the ICT units in government institutions and ministries in order to cooperate and<br />

contribute to the development of the eGovernment system.<br />

E. Financially manage, organize, and control budgets and projects for eGovernment implementation.<br />

The above tasks will be carried out by seven main centres in eGovernment sector as follows:<br />

3.1 eGovernment planning centre<br />

This centre deals with the planning and designing of the eGovernment system with short, medium, and<br />

long term objectives embedded into the strategic plan (Arif, 2008). Furthermore it is responsible for web<br />

design, programming, creating databases, interpreting the information into various languages such as;<br />

national and international language, in order to facilitate understanding of information and services to the<br />

stakeholders(Moore, 2005; Jaeger and Thompson, 2003).<br />

3.2 Networking centre<br />

This deals with the design and maintenance of networks. It is also involved with the operation of external<br />

and internal computer networks. Finally it is responsible to wiring and installing all the peripheral<br />

equipment, also technological component maintenance such as hardware and software.<br />

3.3 Computer application and training centre<br />

The centre manages the web site and the eGovernment system. Further responsibilities include training<br />

employees and other stakeholders in terms of ICT skills, aiming at reducing the effects of the digital<br />

divide (Ke, and Wei, 2004).<br />

Finally the centre is responsible for creating and managing citizen and stakeholder awareness<br />

programmes, aiming to enhance the relations with stakeholders; namely citizens, business, and<br />

employees (Weerakody, 2009; Carter, and Belanger, 2005).<br />

3.4 Financial centre<br />

The centre manages financial issues such as budget setting and its monitoring process. It is also<br />

responsible for funding sources to support the projects and the day to day running of the eGovernment<br />

systems (Gant, 2002).<br />

3.5 eGovernment support centre<br />

It addresses the need for technical and economical support to the sector, and supports any technical<br />

principles and values for development. It also studies all the trends of the system in terms of regulatory<br />

units at government institutions in order to construct the suitable decision. This centre is analysing the<br />

services in terms of coding and programming. The services will be prepared and send to the<br />

development centre.<br />

3.6 eGovernment service development centre<br />

This centre deals with the flow and type of services provided to the community, through gathering<br />

information and researching in order to improve and develop services. It guarantees that the information<br />

and services that provided to the community are in a good order (Jaeger and Thompson, 2003). Finally, it<br />

is responsible to test the flow of services, and to evaluate the various aspects of the services in terms of<br />

human resource, quality assurance and the quality of services (Nygren, 2009; Wang and Liao, 2008;<br />

DeLone and McLean, 2003).<br />

516


3.7 Security centre<br />

Shareef Shareef et al.<br />

This centre is responsible for security of the system in general and the gateway or web site in particular.<br />

This centre is vital to guarantee and facilitate citizen’s transaction, make citizens’ information safe; secure<br />

their privacy and confidentiality of information network (Reddick and Frank, 2007). Moreover, is<br />

responsible to protect the system from any inter and intra hackers and theft of information.<br />

4. Current state of affairs of Kurdistan Region of Iraq (KRI)<br />

Kurdistan is a federal region of Iraq. It is a secular and democratic region with a parliamentary system of<br />

Government. It comprises three cities, namely; Erbil (capital), Sulaymani, and Duhok with Kurdish<br />

inhabitants around five million (KRSO, 2007). The new Iraqi constitution recognizes the KRG as the legal<br />

government of the Kurds, and lets it to continue to live within the new federal country. The KRG vision of<br />

its IT department is to transform government and to act in a customer oriented approach as an effective<br />

and accountable entity, instead of being a bureaucratic institution. This was a major hypothesis of the IT<br />

department administration found during the interview that the leading author has had with the head of the<br />

IT department. Given the above context, the government has managed to sign an agreement with Price<br />

Water House Cooper UK (PWCUK) in order to create an IT strategy for Kurdistan Regional Government,<br />

which will facilitate the initiative of eGovernment system in the region. In addition, the KRG has launched<br />

the IT academy on 10th September 2009 as a centre for training government employees in diverse topics<br />

such as, IT skills, managing, human resource, capacity-building and others (www.krg.org). The strategic<br />

plan is essential for the success of eGovernment implementation, and the organizational framework is<br />

expected to contribute to this (Heeks 2006). Therefore, for the purpose of this research it is essential to<br />

consider the proposed framework of an eGovernment implementation in regional governments in<br />

developing countries. In addition, this proposal precisely could be applied to the IT department in the<br />

council of ministries in the KRG, within the management process of the sector. Therefore, this will<br />

contribute to the effective and efficient integration of customer requirements into service design.<br />

5. Proposed management process<br />

To manage the proposed integrated eGovernment system, a robust and professional management<br />

process is essential. Heeks (2008) revealed in his study that, most eGovernment implementation projects<br />

fail. 35% of eGovernments are total failures, in which the implementation were abandoned or the system<br />

were never implemented such as East Africa. 50% can be measured to be partial failures, in which main<br />

goals of the implementation were not attained such as Eastern Europe. Merely, approximately 15% are<br />

successes, where most of the aims of the stakeholders were achieved. However, eGovernment initiatives<br />

could be successful if the government authority identifies community requirements and takes them into<br />

account (Savvas et al. 2009).<br />

In addition, the discipline and rigor of system management can considerably contribute to the overall<br />

success of the eGovernment system (Rose and Grant 2010). In other words, proper management will<br />

enhance the success of eGovernment implementation. Each part of the eGovernment sector will perform<br />

a distinct function if managed correctly. In order to improve and enhance the management process, the<br />

entire staff working in eGovernment sector should have ICT skills, and the directors should have<br />

management knowledge.<br />

Furthermore, should meet on regular bases in order to share and exchange information and to work as a<br />

team, which is a critical success factor (Milis and Mercken, 2002). The ability of all staff to cooperate with<br />

each other and the ability of a formal mechanism of performing that, if not that will create a lack of<br />

knowledge sharing. Heeks (2006) mentioned three main approaches regarding eGovernment<br />

management namely; centralized, decentralized, and hybrid approach.<br />

5.1 Centralized approach<br />

This approach is an effective and efficient approach that makes an institution more independent. It makes<br />

lots of staff and consumers depending on a single management unit and larger dependence on a staff<br />

that plan, expand, and organize eGovernment. This approach suffers from various problems such as;<br />

many changes should take place in terms of information system (IS) in government institutions, such as<br />

IS architecture, new hardware, software, and new process to perform decisions. Such changes will<br />

consume time and money to gather information from decentralized institutions as an input to centralized<br />

decision, and also need more time to distribute this information to the down institutions. That will affect<br />

the delay of system process development such as in social security systems in the UK (Margetts, 1999).<br />

517


5.2 Decentralized approach<br />

Shareef Shareef et al.<br />

This approach is recognized as introducing fewer gaps between the user of the system and system<br />

developer and, this system is likely to be faster in terms of development. Other features of the system<br />

include operation, troubleshooting, implementation and maintenance, with a possibility of being<br />

completed faster under this approach. In addition, this approach presents lower costs compared to the<br />

centralized one. This is due to faster progress, greater focus on buying software packages rather than<br />

progressing software in-house and greater focus on smaller computers.<br />

However, this approach also suffers from diverse problems and constraints such as high initial cost<br />

investment on IT, lack of skills in government institutions employees to support decentralized decision<br />

making, and work on the eGovernment implementation system. In other words buying computers for<br />

information collection, staff training to system maintenance and operation, these will increase, cost, and<br />

duplicate efforts.<br />

Data sharing in this approach also is one of the main dilemmas facing eGovernment management. In<br />

other words the same data distributed amongst various institutions with different formats, name, and<br />

codes. Sharing other resources, for instance if an institution wants to create its own eGovernment<br />

system, that may be difficult to replace software and hardware. However, each system needs a unique<br />

set of skills for system operation, implementation, and evolution.<br />

5.3 Hybrid approach<br />

This approach is the most effective approach for eGovernment management, because the decision is<br />

executed by both senior level and lower level officials and would be a combination of both centralized and<br />

decentralized approach into some type of compromise. The Canadian government has used the hybrid<br />

approach of a federated architecture, in which it allows institutions to make their own networks together,<br />

communications integrate a computing architecture to allow the technology to connect together, and data<br />

exchanged through common information architecture (D’Auray, 2003).<br />

The authors propose this approach as a main principle to manage eGovernment sector in regional<br />

governments in developing countries. This approach has also been used by various federal governments<br />

in different countries such as Germany, and the USA. The idea is to create a single portal that links to<br />

sub-portals with users being free to access the main portal or the sub-portals. The responsibilities of main<br />

data management are reserved at sub-portal level, and managed by individual ministries and institutions<br />

(Curtin et al. 2003).<br />

Furthermore, this approach involves division of labour or division of responsibilities such as, recognizing<br />

particular types of eGovernment system as appropriate for central evolution, and others appropriate for<br />

end user/decentralized evolution. The hybrid approach is better than both centralized and decentralized<br />

approaches, “because it can simultaneously provide the control necessary to share key resources<br />

(including data), to avoid duplication, and to achieve economies of scale; and the freedom necessary to<br />

meet user needs, and to overcome blocks to IT usage and system development” (Heeks, 2006, p 29).<br />

Nevertheless, the hybrid approach is not easy to implement and is not panacea. It can suffer from some<br />

of the disadvantages and shortfalls encountered in the other two approaches.<br />

To succeed, any system should be evaluated and monitored in order to be able to consider its potential<br />

for implementation. The core of ICT evaluation requires consideration of internal managerial behaviours<br />

and external interactions such as citizen responses (Hackney, et al. 2005). Literature demonstrates that a<br />

wide range of approaches and methodologies have been used to evaluate eGovernment systems. The<br />

Analytic Hierarchy Process & Grey (AHP-Grey) method uses multi-criteria to perform a comparative<br />

assessment between new and existing systems (Ji, 2009; Wang, et al. 2007). The consideration of key<br />

performance indicators (KPI), consumer satisfaction surveys and other monitoring and evaluation (M&E)<br />

tools to a different way of testing the success of eGovernment systems (infoDev, 2008). Furthermore, the<br />

Strength, Weakness, Opportunities and Threats (SWOT) analysis method can also be used to evaluate<br />

the proposed framework against best practice frameworks in developing countries (Backus, 2001;<br />

Kahraman, et al. 2007; Mousavi, et al. 2010; UN, 2010).<br />

518


Shareef Shareef et al.<br />

In addition, there are a variety of methodologies that have been deployed to evaluate IT projects such as<br />

Real Option Valuation (ROV) by Paul & Evan (2007), Return on management (ROM) and also Multi-<br />

Objective and Multi Criteria (MOMC) by Remenyi et al. (1999).<br />

The above mentioned methodologies can also be applied to evaluate the eGovernment sector. This<br />

research is ongoing and its next phase will address the evaluation of eGovernment systems, allowing the<br />

authors for more close focus on evaluation models and methodologies.<br />

6. Challenges<br />

Information technologies play a vital role in the running of every institution across the globe.<br />

Nevertheless, three out of five IT projects fail in terms of satisfying user requirements (Goepp et. al.,<br />

2006). Furthermore, most of the above also fail by exceeding their completion deadlines and/or budgets.<br />

Such failings represent a substantial financial loss for the organizations involved (Sauer et al., 2001).<br />

EGovernment projects face the same challenges as any other IT project (Arif, 2008). Literature contains<br />

the results from various researches on the challenges in developing eGovernment systems such as the<br />

lack of awareness (Reffat, 2003), bureaucratic culture, lack of government support (Karunanada &<br />

Weerakody, 2006), lack of usability of websites, trust, human resource, and capacity building. All of the<br />

above can also be considered as key risks in IT projects of diverse types. Overcoming such challenges<br />

would therefore be the fundamental tests for citizens and government for any country planning to<br />

implement eGovernment.<br />

Currently, most local, regional, federal, and state governments face severe dilemmas in managing<br />

eGovernment, both in developing and even developed countries. As far as literature is concerned, most<br />

of such challenges arise not from the application, but from the complexity of the infrastructure itself<br />

(Wang, et al. 2004). Furthermore, another key factor of failure in eGovernment management is that of<br />

poor management process inherent within the organization (Heeks, 2008).<br />

Proper management will enhance the success of an eGovernment initiative. Lack of discipline and rigor<br />

of system management can also considerably contribute to the failure of the eGovernment system (Rose<br />

and Grant 2010). Another factor that can impact on eGovernment systems is the lack of interoperability<br />

among government institutions (Moore, 2005; Ogilvie, 2005), where each institution sets up their own<br />

system without sharing data or information with the others. In addition, misunderstanding and lack of<br />

collaboration between the services and ICT may cause tension (Socitm, 2003).<br />

The interference of politicians in public management may contribute to the failure of systems, particularly<br />

in developing countries. Politicians should support the development process in order to implement<br />

successful systems (Reddick & Frank, 2007). The lack of direct contact can result in multiple iterations,<br />

weak leadership and poor IT skills employed in the eGovernment sector will also invoke failures in the<br />

eGovernment system (Prybutok, et al. 2008).<br />

Moreover, lack of participation from business, employees, citizens, and others of different ICT means and<br />

capabilities may influence failure in eGovernment systems (Brown & Schelin, 2005; Carter & Bélanger,<br />

2005; Jaeger & Thompson, 2003; Moore, 2005; Löfstedt, 2007). The cooperation of all stakeholders<br />

therefore is a key factor for a successful eGovernment system.<br />

7. Conclusion<br />

In developing countries and particularly in the Kurdistan Region of Iraq (KRI) both government sector and<br />

private sector are commonly technology-based rather than information-based, in terms of service<br />

provision. That may cause significant divide between the evolving program in the private sector and the<br />

expectation of the government. Therefore, the authors propose an organizational framework for the<br />

eGovernment sector. A management process that focuses on the effect of citizens’ orientation and the<br />

cooperation of all stakeholders for successful eGovernment initiative. Thus, senior managers and chief<br />

executives should consider these issues in the context of implementing eGovernment. A hybrid concept<br />

for managing eGovernment system for IT department relevant to the initiative of an eGovernment for<br />

KRG has been proposed. This framework can be applied to other regional governments in developing<br />

countries. The authors believe that the hybrid approach of managing eGovernment implementation is<br />

very useful as it combines both centralized and decentralized features in managing the eGovernment<br />

sector. The above framework fulfils the key requirement of considering the organizational aspect as an<br />

equally important factor while managing IT projects for eGovernment implementation. Environmental and<br />

519


Shareef Shareef et al.<br />

societal challenges might have a significant effect on eGovernment failure and, should be considered to<br />

allow for success in the sector.<br />

References<br />

Al-Kamali, A. (2005) ‘Opening Address’, the 11th GCC eGovernment Forum, Dubai, UAE, May 21-25<br />

Andersen, K. V., (2006) ‘eGovernment: Five Key Challenges for Management’, the Electronic Journal of<br />

eGovernment, 4(1), pp.1-8.<br />

Arif, M. (2008) ‘Customer Orientation in eGovernment Project Management: a Case Study’, the Electronic Journal of<br />

eGovernment, 6(1), pp1–10.<br />

Backus, M. (2001) ‘E-governance and developing Countries: Introduction and examples’, research report, available<br />

at: http://www.ftpiicd.org/files/research/reports/re port3.pdf, (Accessed: 16 August 2010)g.<br />

Berce, J., Lanfranco, S. and Vehovar, V. (2008) ‘e-Governance a new Challenge After e Government’, Proceedings<br />

of the 8th <strong>European</strong> <strong>Conference</strong> on eGovernment, Ecole Polytechnique, Lausanne,Switzerland,10-11 July 2008<br />

Brown, M. M. Schelin, S. (2005) ‘American local governments: Confronting the EGovernment challenge’, by D.<br />

Helmut (Ed.), Local electronic government: A comparative study, London: Routledge.<br />

Carter, L. and Belanger, F. (2005) ‘the utilization of EGovernment services: Citizen trust, innovation and acceptance<br />

factors’, Information Systems Journal, 15(1), pp. 5−25.<br />

Coursey, D. Yang, K. Kasserkert, A. and Norris, D. (2007) ‘E-Gov Adoption in U.S. Local Governments: Bridging<br />

Public Management and Institutional Explanations in a Pooled Time Series Model’, Paper prepared for the 2007<br />

Public Management Research <strong>Conference</strong>, Tucson, Arizona, Available at: http://www.pmranet.org/conferences,<br />

(Accessed:16 January 2010), pp. 1-27.<br />

Curtin, G. G. Sommer, H. M. and Vis- Sommer, V. (2003) The world of e- government’, Haworth press, New York,<br />

pp. 107-126.<br />

D’Auray, M. (2003) ‘the dual challenges of integration and inclusion: canada’s experience with government online’, in<br />

G.G. Curtin, M. H. Sommer and V. Vis-Sommer (eds), The world of e government. New York: Haworth press,<br />

pp 31-40.<br />

DeLone, W. H. and McLean, E. R. (2003) ‘The DeLone and McLean model of information systems success: A ten<br />

year update’. Journal of Management Information Systems, 19(4), pp. 9−30<br />

Dulaimi, M.F. (2005) ‘The Challenge of Customer Orientation In The Construction Industry’, Construction Innovation,<br />

5(1), pp. 3-12.<br />

Gant, J. P. and Gant, D. B. (2002) ‘Web portal functionality and state government eservice’, Proceedings of the 35th<br />

Annual Hawaii International <strong>Conference</strong> on System Sciences, IEEE 2002, Available at:<br />

http://www.albany.edu/~hjscholl/MSI522_2002/pdfs/Gant_et_al_2002.pdf, (Accessed: 05 March 2010), pp.<br />

1627−1636.<br />

Goepp, V., Kiefer, F. and Geiskopf, F. (2006) ‘Design of Information System Architectures Using A Key-Problem<br />

Framework’, Computers in Industry, 57(2) pp. 189-200<br />

Grant, G. and Chau, D. (2005) ‘Developing a Generic Framework for eGovernment’, Journal of Globalb Information<br />

Management, 13(1), Issue 1, pp.1-30<br />

Hackney, R., Jones, S. and Irani, Z. (2005) ‘EGovernment information systems evaluation: conceptualising ‘customer<br />

engagement’, eGovernment Workshop ’05 (eGOV05), September 13 2005, Brunel University, West London<br />

UB8 3PH, UK<br />

Heeks, R. (2006) Implementing and managing eGovernments, an international text, SAGE publication Ltd, ISBN,<br />

0761867915.<br />

Heeks, R. (2008) ‘Success and Failure Rates of eGovernment in Developing/ Transitional<br />

Countries: Overview’, Last updated on 19 October, 2008. Available at: http://www.egov4dev.org/success/sfrates.s<br />

html, (Accessed: 23 October 2009).<br />

InfoDev, (2008) ‘The Introduction to EGovernment’, Chapter 10: Monitoring andEvaluation, available at:<br />

http://egov.infodev.org/en/Section.110.html, (Accessed: 08 September 2010).<br />

Jaeger, P. T. and Thompson, K. M. (2003) ‘EGovernment around the world: Lessons,challenges, and future<br />

directions’, Government Information Quarterly,20(4), pp. 389−394.<br />

Jaworski, B.J. and Kohli, A.K. (1993) ‘Market Orientation: Antecedents and Consequences’, Journal of Marketing,<br />

57(1), pp. 53-70.<br />

Ji, Z. (2009) ‘The Research on the Evaluation of EGovernment System’, International <strong>Conference</strong> o Industrial and<br />

Information Systems, April 24-April 25, ISBN: 978-0-7695-3618-7.<br />

Kahn, K.B. (2001) ‘Market Orientation, Interdepartmental Integration and Product Development Performance’,<br />

Journal of Product Innovation Management, 18(3) pp. 314-323.<br />

Kahraman, C., Demirel, C. N. and Demirel, T. (2007) ‘Prioritization of e Government strategies using a SWOT-AHP<br />

analysis: the case of Turkey’, <strong>European</strong> Journal of Information Systems, 16(1), pp. 284-286.<br />

Kamar, N., Ongo’ndo, M. (2007) ‘Impact of eGovernment on management and use of Government Information in<br />

Kenya’, Government Informationand Official Publication, Available at:http://archive.ifla.org/IV/ifla73/papers/119-<br />

Kamar_Ongondo-en.pdf, (Accessed: 04 March 2010).<br />

Karunanada, A. and Weerakody, V. (2006) ‘eGovernment implementation in Sri-Lanka: lesons from the UK’, 8 th<br />

International Information Technology conference, Colombo, Sri-Lanka.<br />

Ke, W. and Wei, K. K. (2004) ‘Successful EGovernment in Singapore’, Communications of the ACM, 47(6), pp.<br />

95−99<br />

KRG, (2010) ‘Kurdistan Regional Government’, Available at: www.krg.org, (Accessed: 10 March 2009).<br />

520


Shareef Shareef et al.<br />

KRSO, (2007) ‘Kurdistan Regional Statistics Office’, available at:<br />

http://www.krso.net/detail.aspx?page=statisticsbysubjects&c=sbsPopulationLabor&id=361, (Accessed: 05<br />

August 2009).<br />

Löfstedt, U. (2007) ‘EGovernment services in local governments—a study of development in Swedish municipalities’,<br />

Journal of Organisational Transformation & Social Change, 4(2), pp.157−176<br />

Margetts, H. (1999) ‘information technology in government: Britain and America’, London: Routledge, 11New Fetter<br />

Lane, London EC4P.<br />

Milis, K., and Mercken, R. (2002) ‘Success Factors Regarding the Implementation of ICT Investment Projects’,<br />

International Journal of Production Economics, Vol. 80, No1, pp 105-117<br />

Moore, A. (2005) ‘Implementing EGovernment portals, technical and organizational issues: Montgomery county<br />

(USA) portal’, Proceedings of the E-Gov VC Series Under Joint Economic Research Program of the<br />

Government of Kazakhstan, available at: http://web.worldbank.org , (Accessed: 02 February 2010).<br />

Mousavi, A. S. Pimenidis, E. Jahankhani, H. (2010) ‘Five Stage Development Framework for Electronic Government’,<br />

The Proceedings of the 10th <strong>European</strong> <strong>Conference</strong> on eGovernment, University of Limerick, Ireland 17-18 June<br />

2010.<br />

Nygren, G. K. (2009) ‘the Rhetoric of eGovernment management and the reality of eGovernment work: the Swedish<br />

action plan for eGovernment considered’, International Journal of Public Information Systems, 2(1), pp. 135-<br />

146.<br />

Ogilvie, M. (2005) ‘Implementing EGovernment portals, technical and organizational issues: Service New Brunswick<br />

(Canada) portal’, Proceedings of the E-Gov VC SeriesUnder Joint Economic Research Program of the<br />

Government of Kazakhstan, available at: http://web.worldbank.org , (Accessed: 05 February 2010).<br />

Paul, R. S. Evan, J. D. (2007) ‘Valuing technology investments: use real options thinking but forget real options<br />

valuation’, International Journal of Techno entrepreneurship. 1(1), pp. 58-77.<br />

Prybutok, R.V., Zhang, S.X. Ryan, D. (2008) ‘Evaluating leadership, IT quality, and net benefits in an eGovernment<br />

environment’, Information and Management, 45(3), pp. 143–152<br />

Qu, R., Ennew C. and Sinclair, M.Y. (2005) ‘The Impact of Regulation And Ownership Structure On Market<br />

Orientation In The Tourism Industry In China’, Tourism Management, 26(8), pp. 939-950.<br />

Reddick, C. G. and Frank, H. A. (2007) ‘The perceived impacts of EGovernment on U.S. cities: A survey of Florida<br />

and Texas city managers’, Government Information Quarterly, 24(3), pp. 576−594.<br />

Reffat, R. (2003) ‘developing a successful eGovernment’, Working paper, school of agriculture, Design Science and<br />

Planning, University of Sydney, Australia Rodrigues, A. S., Patrício, A. C. L., Silva.<br />

Remenyi, D. Money, A. and Bannister, F. (1995) ‘Effective Measurement and Management of ICT Costs and<br />

Benefits’, Butterworth, Heinemann.<br />

Rodriguez, E. and Edwards J.S. (2007) Knowledge management applied to enterprise risk management: Is there any<br />

value in using KM for ERM? In Proceedings of 8th <strong>European</strong> <strong>Conference</strong> on Knowledge Management (Remenyi<br />

D, Ed), pp 813-820. <strong>Academic</strong> <strong>Conference</strong>s Limited, Reading, UK, Limerick, Ireland.<br />

Rose, R. R. Grant, G. G. (2010) ‘Critical issues pertaining to the planning and implementation of EGovernment<br />

initiative’, Government Information Quarterly, 27(1), pp. 26–33<br />

Sauer, C. Liu, L. Johnston. K. (2001) ‘Where Project Managers Are Kings’, Project Management Journal, 32(4), pp.<br />

39-49.<br />

Siguaw, J. Simpson, P. and Baker, T. (1998) ‘Effects of Supplier Market Orientation on Distributor Market Orientation<br />

and the Channel Relationship: The Distributor Perspective’, Journal of Marketing 62(2) pp.99-111.<br />

Savvas, I., Pimenidis, E. and Sideridis, A. (2009) ‘mapping eGovernment stakeholder requirements to public<br />

administration operational needs ‘, IADIS International Journal on WWW/Internet, 7(1) pp. 152-165.<br />

Shareef, M. S., Arreymbi, J. Jahankhni. H. and Pimendis, E. (2010) ‘mutli-channel delivery of services: initial pace<br />

towards m-government: the case of Kurdistan region of Iraq’, proceedings of the Advances in Computing and<br />

Technology, January2010, pp54-63, ISBN: 978-0-9564747-0-4.<br />

Sin, L.Y.M., Tse, A.C.B. Heung, V.C.S, and Yim, F.H.K. (2005) ‘An Analysis Of The Relationship Between Market<br />

Orientation And Business Performance In The Hotel Industry’, Hospitality Management, 24(6), pp. 555-577.<br />

Singh and Ranchodd, (2004) ‘Market Orientation and Customer Satisfaction: Evidence From British Machine Tool<br />

Industry’, Industrial Marketing Management, 33(2), pp. 135-144.<br />

Socitm (2003)’managing eGovernment-a discussion paper’, Insight publication, Available at:<br />

http://unpan1.un.org/intradoc/groups/public/documents/UNTC/UNPAN011528.pdf, (Accessed: 23 January<br />

2010).<br />

United Nations (2008) ‘eGovernment Survey, from eGovernment to Connected Governance’, Department of<br />

Economic and Social Affairs Division for Public Administration and Development Management, pp1-225<br />

UN, (2010) ‘eGovernment Applications’, United Nations Asian and Pacific Training Centre for Information and<br />

Communication Technology for Development (APCICT), Briefing Note No. 3, (Accessed: 11 April 2010).<br />

Wang, J., Cao, J. Leckie, O. J. and Zhang, S.S. (2004) ‘Managing EGovernment IT Infrastructure: An approach<br />

combining Autonomic Computing and Awareness Based collaboration’, Proceeding of the Fourth International<br />

<strong>Conference</strong> on Computer and Information Technology, pp 998 - 1003<br />

Wang, Y-S., and Liao, Y-W (2008) ‘Assessing eGovernment systems success: A validation of the DeLone and<br />

McLean model of information systems success’, Government Information Quarterly, 25(4), pp. 717–733.<br />

Wang, M., Liu, P. and Ou, G. (2007) ‘TheEvaluation Study of Customer Satisfaction Based on Gray –AHP Method for<br />

B2C Electronic-Commerce Enterprise’, Engineering letters, Vol. 15, Issue 1, pp 1-6.<br />

Weerakody, V. Janssen, M. and Dwivedi, K. Y. (2009) ‘Handbook of Research on ICT-Enabled Transformational<br />

Government: A Global Perspective. IGI Global; 1 st edition<br />

521


Outsourcing of IT Projects in the Public Sector – Sustainable<br />

Solution or Erosion of the Public Sector?<br />

Dalibor Stanimirovic and Mirko Vintar<br />

University of Ljubljana, Slovenia<br />

dalibor.stanimirovic@fu.uni-lj.si<br />

mirko.vintar@fu.uni-lj.si<br />

Abstract: While the number of outsourcing projects in the last ten years has been growing exponentially in Slovenia,<br />

sourcing strategies seem to be one of the core factors in creating a sustainable while effective and efficient public<br />

sector, at the same time. Outsourcing projects ought to reduce costs and help organizations to focus on core<br />

business processes which should consequently improve service provision and quality. Past experience and recent<br />

research carried out in the public sector show that outsourcing can indisputably bring many benefits to the<br />

organizations which master the art of devising, deploying, and maintaining outsourcing relationships, but for many<br />

organizations, these benefits remain elusive. The research focuses on in-depth analysis of the essential factors<br />

within the concept while examining the current situation in the field of outsourcing in the Slovenian public sector and<br />

eventually presents research findings on outsourcing of information technology projects (IT-projects) at the municipal<br />

level. According to some experts and rough estimates, the amount of outsourcing projects in the Slovenian public<br />

sector have doubled in recent years and during the present economic and financial crisis, reach tens of millions of<br />

Euros. The article analyzes the methodological, substantive, procedural and other relevant factors within the process<br />

of outsourcing and summarizes the results of our own empirical research on outsourcing of IT-projects in the<br />

Slovenian public sector. Paper finally provides a set of relevant criteria and guidelines for critical evaluation of such<br />

projects and eventually presents the conceptual design of sustainable model for quality selection as well as effective<br />

and efficient implementation of outsourcing projects in the public sector.<br />

Keywords: IT outsourcing, public sector, outsourcing criteria, sustainable outsourcing model<br />

1. Introduction<br />

Concept of New Public Management has had undoubtedly a major impact on development and<br />

functioning of Slovenian public sector in the last more than one decade, however it should be noted that<br />

apart from positive results, many negative, unexpected effects have been experienced as well. The first<br />

phase of its implementation was very promising in the field of improving the effectiveness and efficiency<br />

of public sector, which was indisputably true to some extent. Problems came later when the euphoria<br />

gave way. New Public Management started straying to the growing and increasingly less justified<br />

outsourcing of public services, leading to a completely opposite effect than expected and desired.<br />

Despite the high expectations, subsequent experience has shown that outsourcing cannot be a panacea<br />

for the majority of problems in the public sector, which most frequently occur due to poor long term<br />

strategy, or even lack of it. While on the other hand, regardless of the long term strategies and goals,<br />

public sector often acts uncontrollably, indiscriminately and non-critically while implementing and<br />

pursuing somehow non-reflectively set objectives.<br />

Furthermore, significant problems are charted in movement to the wholesale use of competitive tendering<br />

and positioning outsourcing as a strategic tool of public management. Over the last two decades external<br />

provision of IT projects (outsourcing) has become a principle in most parts of public sector, which caused<br />

uncontrolled “brain drain’’, outflow of vital professional knowledge and loss of core competencies in public<br />

sector. It is evident that situation has escalated to the point that some government departments<br />

completely lost control over preparation, development and realization of planned projects, which<br />

consequently results in weak control over increasing costs and reduced accountability for services.<br />

Furthermore outsourcing very often means absolute dependence on external providers. This issue is<br />

currently a very hot topic and represents one of the fundamental problems of cost-effective while longterm<br />

successful and user-oriented public sector.<br />

Objective evaluation of outsourcing projects should be based on formalised methods and tools rather<br />

than intuitive, often political criteria, used in many countries today. The latter statement provides a basis<br />

for the main hypothesis in this research paper which argues that future planning, implementation and<br />

evaluation of outsourcing projects should be based on formalised multi-criteria models supported by<br />

information tools, which could significantly facilitate and improve decision making process while<br />

minimizing risk and reducing project costs.<br />

522


Dalibor Stanimirovic and Mirko Vintar<br />

Thus the main objective of this paper is to highlight implications of outsourcing on achieving long-term<br />

goals, human resources management, provision of quality public services and cost effectiveness of public<br />

sector organizations. Given the theoretical foundations of foreign and domestic authors and the results of<br />

our own empirical research, the paper is focusing primarily on the following research questions:<br />

Organizations in the Slovenian public sector are largely unaware of the long-term implications of<br />

outsourcing of IT-projects to their continued operation and reorganization of human resources.<br />

Decision making process on outsourcing of IT-projects in Slovenian public sector organizations is<br />

conducted largely without the use of formalized multi-criteria methods and models.<br />

Is it possible to develop relatively simple and practically applicable multi-criteria decision making<br />

model for selection and implementation of IT outsourcing projects in Slovenian public sector?<br />

The following paper is based on various theoretical issues, our own empirical research and presents a<br />

conceptual design for creation of a structured and balanced model for the selection and implementation<br />

of outsourcing projects in the public sector. Development of sustainable multi-criteria model for effective<br />

decision-making process, planning and implementation of outsourcing projects in the public sector<br />

inevitably requires a multidisciplinary approach and involvement of different stakeholders in all stages of<br />

development and decision making process.<br />

After a brief introduction, the second chapter of this paper presents the concept of outsourcing and an<br />

overview over the relevant literature while outlining its contextual considerations and implications of<br />

sourcing alternatives. The third chapter reveals the characteristics of our own outsourcing research, its<br />

results and their synthesis, as well as offers guidelines for successful implementation of outsourcing<br />

strategy. The fourth chapter describes the development of a comprehensive approach when deciding to<br />

outsource IT-projects in the public sector, based on a set of selected quantitative and qualitative criteria<br />

and presents an integral approach in developing a conceptual model of outsourcing, while at the end of<br />

the chapter we are respectively presenting our own solution to support decision making process in this<br />

field. The fifth chapter contains the evaluation of the presented model, discussion on its practical<br />

applicability and description of its positive features and limitations, and subsequently submits the final<br />

arguments and observations regarding the described approach.<br />

2. Outsourcing - the conceptual definition, implications and literature review<br />

Ellram and Maltz (1997) argue that outsourcing is a contractual transfer of organizational activities and<br />

responsibilities to other (external) business entity. They emphasize that the volume of outsourced<br />

activities depends on their content and the needs of the parent organization. Kubr (2002) defines<br />

outsourcing as a contractual elimination and transfer of the activity, for which the organization decides not<br />

to perform it itself in future, to the external business entities. Such an operating strategy in his view,<br />

allows the efficient allocation of resources. Literature presents a wide range of different definitions,<br />

ranging from the most consistent and accurate up to superficial and partial definition of the phenomenon.<br />

We think that the most useful and versatile is its most widespread and widely accepted definition, which<br />

reads as follows: Outsourcing is a contractual transfer of certain activities and business processes from<br />

the parent organization to the external contractor (Greaver, 1999).<br />

Outsourcing within the concept of New Public Management since 1980’s can be seen as a business<br />

strategy in which the organization is striving to improve business performance and primarily cut back<br />

costs as well as focus on its core functions and core activities. Non-critical and over abundant<br />

implementation of outsourcing projects has led to some unforeseen problems in public sector. Slovenia<br />

has encountered problems with outsourcing especially in the last five years and ongoing financial and<br />

economic crisis just revealed its magnitude. Seeking short-term solutions on account of the New Public<br />

Management philosophy and lack of experience in this field as well as neglecting all other organizational<br />

aspects except costs (even cost-effectiveness of some outsourcing projects is very doubtful in the long<br />

run) has led some public sector organizations to the unenviable situation. Because of a variety of<br />

negative implications caused by outsourcing, some public sector organizations found themselves in a<br />

vicious circle. In fact, their continued operation is no longer possible without external contractors, while on<br />

the other hand, outsourcing is undermining their organizational foundations such as control over costs,<br />

human resources and future development.<br />

Considering the above assumptions and international research (Bongard, 1994, Chapman and Andrade,<br />

1997, Greaver, 1999, Jensen, 2007) as well as our own, the potential negative consequences of<br />

outsourcing are highlighted as they follow:<br />

523


Loss of core competencies,<br />

“Brain drain”,<br />

Dalibor Stanimirovic and Mirko Vintar<br />

Loss of control over the most important organizational functions,<br />

Reduced quality of services,<br />

Reduce accountability for services,<br />

Complete dependence on external contractor,<br />

Collusive tendering and other tendering problems.<br />

The continuation of this paper will present up to date literature and research concerning the outsourcing<br />

phenomenon, which have been trying to resolve the problems addressed above and facilitate more<br />

objective and sustainable decision making in this field of public sector.<br />

2.1 Overview of the literature and recent research<br />

Most literature does not illuminate the complex and multidimensional strategy of outsourcing through a<br />

wider perspective. Authors are most often focusing on a rather narrow perspective, usually costs and<br />

other particularly financial benefits, but do not provide sufficiently comprehensive answers regarding the<br />

advantages and disadvantages of outsourcing strategy. Public sector is particularly at risk here, because<br />

meeting broader societal needs cannot easily be passed to the outside (private) contractor for cost<br />

reductions and other somewhat controversial reasons. Nevertheless, because of its complexity,<br />

pervasiveness and its broad implications, number of outsourcing researchers has been rising in recent<br />

years.<br />

The first systematic and scientific research of outsourcing can be found in the late 80’s and early 90’s of<br />

the last century (Ford and Farmer 1986, Due, 1992, Willcocks and Lacity, 1995 etc.). Thorough scientific<br />

studies of the impact and importance of outsourcing are still rare. Experts in this area (Corbett, 2004,<br />

Jensen, 2007) claim that the phenomenon of outsourcing gained so much importance over the last<br />

twenty years due to global social change and transformation as well as the booming public sectors<br />

worldwide.<br />

Previous research of outsourcing (Quinn and Hilmer, 1994, Johnson, 1997, Lonsdale and Cox, 1997,<br />

Wasner, 1999, Jacobides, 2005) is largely exploring the financial implications of outsourcing and mainly<br />

presents parent organizations dissatisfaction with the ongoing projects which are often terminated before<br />

expected (Kavcic and Tavcar, 2008). Despite the growing interest in the phenomenon of outsourcing,<br />

which have recently raised increasing attention among researchers in the most propulsive economies<br />

over the past few years, namely the authors in India (Pandey and Bansal, 2003) and China (Choy et al.,<br />

2005), it is difficult to trace a comprehensive strategy for preventing or resolving problems of outsourcing<br />

projects. Studies (Thoms, 2004, Schniederjans et al., 2005, Taylor, 2006) often reveal the hidden costs<br />

as the most problematic segment of outsourcing, in which problems usually occur when organizations are<br />

already heavily involved in the outsourcing projects and the termination of contract in that phase would<br />

inflict large financial losses for both sides. Surprisingly, research is rarely dealing with the other negative<br />

consequences that may pose a potential threat.<br />

On the other hand, outsourcing literature (Barney 1991, Peteraf, 1993, Nellore and Soderquist, 2000)<br />

deals with separate aspects of the parent organization and the external contractor and rarely addresses<br />

the outsourcing projects in an integrated manner in which attention is focused to the whole project, rather<br />

than individual business entities within the project (Kavcic and Tavcar, 2008). Here it should be noted that<br />

the substantive and formal criteria presented by the most literature, which should form the basis for<br />

quality decision making in the process of selection and implementation of outsourcing projects, are<br />

extremely vague and arbitrary and consequently prevent organizations to adopt comprehensive and<br />

objective evaluation of such projects. Previous research (Kern et al., 2002, Linder, 2004, Power et al.,<br />

2006) is mainly focused on a small number of criteria, which consider only short-term and partial aspects<br />

of business cooperation and do not address long-term, strategic implications of outsourcing projects.<br />

Presented study exceeds the weaknesses and limitations of previous research, since it is exploring the<br />

implications of outsourcing on different organizational aspects and conducting substantive analysis of<br />

decision making criteria in the broader perspective. As seen in previous surveys, the studies are<br />

predominantly unilateral and focused primarily on short-term cost indicators that highlight mainly the<br />

524


Dalibor Stanimirovic and Mirko Vintar<br />

financial background of the whole problem, which makes it impossible to adopt quality and<br />

comprehensive decision.<br />

In analyzing the suitability and viability of outsourcing strategy, multidisciplinary method which includes<br />

structured and balanced approach in addressing the overall problem, is essential. The presented<br />

empirical study used the Balanced Scorecard (Balanced scorecard, Kaplan and Norton, 2001) to achieve<br />

conceptual and long-term solutions. Balanced Scorecard facilitates analysis of dynamic criteria and<br />

quantifies the important strategic elements of organization. The method used will help generate effective<br />

long-term strategy and align organizational goals with four perspectives: Financial, Customer, Internal<br />

Business Processes and Learning and Growth.<br />

3. Research of outsourcing projects at the municipal level<br />

The survey was conducted during the first six months of 2010 at the Institute for Informatization of<br />

Administration at the Faculty of Administration (University of Ljubljana), in a sample of 85 municipalities<br />

(212 municipalities in Slovenia, which means that the sample covered 40.09% of all municipalities). 64<br />

municipalities responded to the survey (75.3% response rate of the sample, which means that the<br />

realized sample amounted 30.18% of the total number of municipalities in Slovenia). The questionnaire<br />

consisted of qualitative and quantitative indicators, adjusted for objective and comprehensive ex ante<br />

evaluation of the outsourcing projects in public sector organizations.<br />

The purpose of the research is thorough and comprehensive analysis of the situation in the field of<br />

outsourcing at the municipal level in Slovenia, with special emphasis on the analysis of organizational<br />

factors within the Balanced Scorecard. Methodology within the survey focuses particularly on the<br />

financial, organizational, developmental and human resources perspective. The findings obtained will<br />

enable the development of concrete guidelines and recommendations for an integrated outsourcing<br />

strategy and the development of a sustainable model for outsourcing of IT-projects in the Slovenian<br />

municipalities.<br />

3.1 Results of empirical research and their synthesis<br />

The results of empirical study presented below provide answers to two research questions, while the<br />

answer to the third question, which addresses a construction of multi-criteria decision making (MCDM)<br />

model for selection and implementation of outsourcing projects in the public sector, is offered in the next<br />

chapter. Paper focuses on a comprehensive and systematic classification of the results and in-depth<br />

content analysis. The survey results, which are directly related to the first research question showed that<br />

as many as 51 (80%) surveyed municipalities believe that outsourcing cannot negatively affect the<br />

organization and its human resources. The study has also revealed that 64% of the surveyed<br />

municipalities are not familiar with the long-term impacts of outsourcing which are directly linked to loss of<br />

competencies, quality human resources and staffing problems, and are consequently unaware of<br />

potential risks which they are exposed to, when signing an outsourcing contract. Furthermore, the results<br />

showed that 37 (57.82%) municipalities believe that the financial sector is most exposed to potential<br />

negative impacts of outsourcing in the long run, 10 (15.63%) municipalities believe that human resources<br />

and development are compromised because of outsourcing, while 7 (10.92%) municipalities believe that<br />

outsourcing poses the biggest threat to the organizational aspect of municipalities (Figure 1).<br />

The latter results directly reveal the need for better strategies, more responsible decision making and in<br />

particular, a better understanding of this complex phenomenon, whose negative consequences,<br />

especially in the long run, affect almost all aspects of organizational performance.<br />

Concerning the second research question, results revealed that the municipalities do not use formal<br />

multi-criteria decision making models in the process of decision making on outsourcing projects,<br />

thereafter, it was confirmed that their decisions to outsource are based primarily on short-term financial<br />

benefits. The latter was confirmed, while as many as 46.90% of municipalities surveyed, identified<br />

financial reasons as the main argument for the selection of external providers (Figure 2).<br />

The survey also revealed that 60 (94%) municipalities do not have comprehensive long-term strategy in<br />

the field of outsourcing (Figure 3). In addition, research showed the vast majority of surveyed<br />

municipalities (80%) have no actual evaluation framework, including objective criteria or a system of<br />

indicators to measure the eligibility of outsourcing decisions (Figure 3). The latter results indicate that the<br />

municipalities’ decisions on outsourcing are mainly based on intuition and the inertia of previous years,<br />

525


Dalibor Stanimirovic and Mirko Vintar<br />

rather than pre-established objective criteria and measurable indicators. This kind of decision making<br />

allows a multitude of speculation. The issue requires a comprehensive and sustainable solution, which is<br />

not possible without considering modern concepts of management in public sector organizations and<br />

professional attitude of the management.<br />

Figure 1: Potential negative impacts of outsourcing on certain organizational aspects<br />

Figure 2: Reasons for outsourcing<br />

Figure 3: Long term strategy and indicators for outsourcing<br />

526


Dalibor Stanimirovic and Mirko Vintar<br />

3.2 Guidelines on conducting outsourcing projects in the public sector<br />

In surveyed municipalities following problem areas can be identified and highlighted:<br />

Non-defined core and non-core activities in municipalities.<br />

The excessive and indiscriminate outsourcing and lack of strategy in the field of outsourcing.<br />

Unawareness of the potential long-term negative implications of outsourcing projects.<br />

Utilization of human and other resources and the synergies within the public sector organizations.<br />

Lack of vision and strategic objectives of organizations within the public sector, exceeding a period of<br />

government mandate.<br />

Unfortunately, research results cannot always be easily transferred into action, especially when the poor<br />

performance of the organization is related to several areas. Such situation requires a detailed analysis<br />

and preparation of solutions, which often necessitate a radical systemic change in the organization.<br />

Bellow will be presented guidelines that could bring improvement to the areas of particular concern and<br />

risk, which were disclosed by the results of the survey:<br />

Definition of core and non-core activities in the functioning of municipalities.<br />

Formulation of outsourcing strategy, creation of formal multi-criteria decision making models and<br />

indicators for decision making in outsourcing processes.<br />

Assessment of the potential long-term negative implications of outsourcing projects.<br />

Utilize human and other resources as well as hidden potential and synergy within numerous public<br />

sector organizations.<br />

Formulate a vision, strategic objectives, and precise tactics as well as provide funds for achieving<br />

long-term organizational goals, beyond a period of government mandate.<br />

Next chapter presents the development of a sustainable MCDM model for quality selection and<br />

implementation of outsourcing projects, presented model is also an answer to the third research question.<br />

4. Development of sustainable decision making model for outsourcing in the<br />

public sector<br />

Development of sustainable MCDM model to decide on outsourcing of IT-projects in the public sector<br />

inevitably requires balancing several different factors, such as: economic, social, political, regulatory and<br />

technological. This requires the inclusion of numerous stakeholders with different priorities and objectives<br />

in all phases of development and hence decision making process. Given the above arguments, the paper<br />

focuses on the selection of appropriate criteria and suggests the possible construction of MCDM model<br />

which will assist decision makers in setting priorities and making enhanced decisions in the field of public<br />

sector outsourcing.<br />

4.1 Criteria selection<br />

Selection of the criteria is the most critical step in decision making process. Structure of the entire<br />

decision making process should be limited only to the relevant factors that reveal the certain implications<br />

on the problem. We must make sure that the whole procedure does not stray in over excessive dissection<br />

of the problem, because it can blur the important issues and lead to lower quality decisions. Effective use<br />

of the MCDM model requires a thorough understanding of the problem and a balanced application of data<br />

for objective weighting of selected criteria. Over abundance of the criteria may lead to the devaluation of<br />

relations among the criteria, while lack of relevant criteria may preclude a consideration of all relevant<br />

aspects and provide an unbalanced and partial solution to the problem, as it does not include all the<br />

relationships between elements and their mutual correlations (Saaty, 1988). Determining criteria<br />

therefore requires accuracy, consistency and detailed knowledge of the nature of the problem. Criteria on<br />

which the outsourcing decisions should be based are rarely studied in the wider context. Some of the<br />

researchers who deal with such topics are listed below.<br />

The most prominent experts and researchers of outsourcing and its wider socio-economic implications<br />

(Bongard, 1994, Chapman and Andrade, 1997, Greaver 1999, Willcocks et al., 1999, Jensen, 2007 etc.)<br />

emphasize the complexity of this phenomenon, which is reflected in the extremely multifaceted and<br />

complicated evaluation of its numerous effects, while the long-term implications of outsourcing are often<br />

527


Dalibor Stanimirovic and Mirko Vintar<br />

very well concealed. Evaluation criteria, which represent the core substantive aspect in the process of<br />

decision making, should be based on organisational strategies, goals and objectives with strict regard to<br />

organization’s strategic, tactical and operational considerations. Considering the numerous studies and<br />

our own research in Slovenian public sector as well as the complexity of the entire field of outsourcing,<br />

we selected the following criteria to be deployed in the practical utilization of constructed model (Figure<br />

4):<br />

1. Costs<br />

2. Competencies<br />

3. Quality<br />

4. Customer satisfaction<br />

5. Risk<br />

6. Organization<br />

7. Development<br />

8. Innovation<br />

It should be noted here that criteria selection, their absolute and relative weighting and their division into<br />

sub criteria should be made on the basis of decision maker’s preferences and must be subordinated and<br />

adapted to the organization’s core business, its needs and long-term goals.<br />

4.2 Model design<br />

Sustainable MCDM model for outsourcing requires integration of both substantive and formal aspects in<br />

order to facilitate a structured and quality decision making (Figure 4). Evaluation criteria represent the<br />

core substantive aspect in the process of decision making, while the formal aspect includes the market<br />

analysis and specifications of project requirements as well as legal compliance with the set of strict<br />

procedural regulations. Only the integration of both aspects in the comprehensive MCDM model can<br />

represent a useful tool for quality decision making in the process of selection and implementation of<br />

outsourcing projects.<br />

The structure of the model (Figure 4) allows the weighting of the criteria according to their importance,<br />

taking into account their impact on strategies, goals and objectives of the organization. However, the<br />

selection of the most relevant criteria and their optimum weighting classification usually represent the<br />

biggest problem which are the users of MCDM models exposed to. Thus, when criteria are selected and<br />

structured according to their importance, the use of the presented model is rather uncomplicated.<br />

5. Conclusion<br />

The obtained results of the survey indicate only a partial, but a valuable insight into the outsourcing of ITprojects<br />

in the Slovenian public sector. Partial, because the survey sample covered only 85 municipalities<br />

of the 212 municipalities in Slovenia, this is 40.09% of the total population. 64 municipalities responded to<br />

the survey, which represents 30.18% in terms of the total population. Relatively small sample precludes<br />

generalization and prevents application of the obtained results to the entire public sector, but is<br />

nevertheless a good indication of the particular problems faced by municipalities and, consequently, the<br />

entire public sector.<br />

Presented multi-criteria decision support model allows the integration of a large number of relevant<br />

factors, which subjected to certain substantive and procedural requirements, provide quality and<br />

comprehensive, while still “easy to use” approach in decision making and offer a good basis for objective<br />

analysis of possible alternatives, as well as highlight some of the hidden aspects and potential problems<br />

that may arise in the phase of selection and implementation of outsourcing projects. Accounting the<br />

results of our own research as well as other relevant studies and literature dealing with the outsourcing<br />

issues, we selected eight quantitative and qualitative criteria, which are in our view, the most relevant.<br />

528


Dalibor Stanimirovic and Mirko Vintar<br />

PROJECT GOAL<br />

Costs Competencies Quality<br />

Customer<br />

satisfaction<br />

Risk Organization Development Innovation<br />

Solution Outsourcing In house provision<br />

Market analysis and identifying potential<br />

providers<br />

Preparation of the request for proposal<br />

Conducting the request for proposal<br />

Comparing and evaluating proposals<br />

Selection of the provider<br />

Signing the contract<br />

Figure 4: Sustainable model for outsourcing in the public sector<br />

Analysis and specification of project<br />

requirements<br />

Clearly presented multi-criteria decision making model do not represent universal solution to important<br />

problems addressed in this paper in the self-sufficient form. However, on the other hand, developed<br />

model may offer due to its simplicity of use and selection of sufficiently objective criteria as well as their<br />

appropriate weighting, a lot of help in setting realistic goals and priorities. It can also provide help in<br />

allocation of project management resources as well as facilitate decision making and reduce risk in<br />

implementation of outsourcing projects. Despite some shortcomings, which can be seen mainly in noncritical<br />

selection of the criteria and their weighting, along with the objective limitations of political,<br />

regulatory and organizational nature within the public sector, such decision support models could become<br />

a standard in the operating and decision making procedures at the municipal level. Application of<br />

sustainable outsourcing MCDM model, despite required upgrading and adaptation to the specific area of<br />

use, could become a novelty within the decision making procedures in the public sector. Even more, the<br />

objective and critical approach to the selection and evaluation of outsourcing projects should, regarding<br />

the context and magnitude of given problems, receive greater support from all stakeholders and become<br />

a necessity. Current practice in this area is based on inertia, intuitive decisions and primarily on the<br />

fabrication of studies evaluating such decisions much unilaterally and without regard to long-term effects<br />

of such strategies in public sector organizations.<br />

The scale of the studied area and numerous factors that affect the quality of decision making confirm the<br />

multiplicity and complexity of outsourcing and its implications in many areas of organizational activity. The<br />

latter substantiates the need for broader and deeper insight into the background and content of overall<br />

business strategy of Slovenian municipalities. Search of primarily short-term solutions and inadequate<br />

business strategy as well as uncritical approaches in recent years have brought municipalities in a very<br />

complex situation, so it is high time for more critical reflection on their role in the future and mechanisms<br />

that will have to ensure selection of appropriate business strategies, effective spending of budget funds<br />

and the successful achievement of long-term goals.<br />

529


References<br />

Dalibor Stanimirovic and Mirko Vintar<br />

Barney, J. (1991) Firm resources and sustained competitive advantage. Journal of Management, 17 (1): 99–120.<br />

Bongard, Stefan (1994) Outsourcing - Entscheidungen in der Informationsverarbeitung. Entwicklung eines<br />

computergestützten Portfolio-Instrumentariums. Wiesbaden. Deutscher Universität Verlag, str. 480.<br />

Corbett, Michael F. (2004) The Outsourcing Revolution: Why It Makes Sense and How to Do It Right. Kaplan<br />

Business, Washington.<br />

Chapman, Robert B., Andrade, Kathleen R. (1997) Insourcing after the Outsourcing: MIS Survival Guide. AMACOM.<br />

Choy K.L., Lee W.B., Lau H.C.W., Choy L.C. (2005) A knowledge-based supplier intelligence retrieval system for<br />

outsource manufacturing, Knowledge-Based Systems, 2005; 18:1-17.<br />

Due, Richard T. (1992) The Real Costs of Outsourcing. Information Systems Management, 9 (1), str. 78-81.<br />

Ellram, Lisa, Maltz, A. (1997) Outsourcing: Implications for Supply Management. CAPS Research. Tempe.<br />

Ford, David, Farmer, David (1986) Make or buy: a key strategic issue. Long Range planning, Vol. 19, str. 54-62.<br />

Greaver, Maurice F. (1999) Strategic Outsourcing: A Structured Approach to Outsourcing Decisions and Initiatives.<br />

AMACOM.<br />

Jacobides, M., G. (2005) Industry change through vertical disintegration: how and why markets emerged in mortgage<br />

banking. Academy of Management Journal, 48 (3), 465–498.<br />

Jensen, Paul H. (2007) Public Sector Outsourcing Contracts - The Impact of Uncertainty, Incentives and Transaction<br />

Costs on Contractual Relationships. VDM Verlag, Dr. Mueller e. K., Saarbrücken.<br />

Johnson, Mike (1997) Outsourcing in Brief. Butterworth-Heinemann, Oxford.<br />

Kaplan, R. S., Norton, D. P. (2001) Stratesko usmerjena organizacija: prakticna uporaba uravnotezenega sistema<br />

kazalnikov v novem poslovnem okolju. GV Zalozba, Ljubljana.<br />

Kavcic, Klemen, Tavcar, Mitja I. (2008) Interesi in razmerja moci med udelezenci outsourcinga: studija primerov.<br />

Organizacija, letnik 41. Razprave, st. 1, str. 2.<br />

Kern, Thomas, Willcocks, Leslie P., van Heck, Eric (2002) The winner's curse in IT outsourcing: Strategies for<br />

avoiding relational trauma. California Management Review, 44 (2), str. 47-69.<br />

Kubr, M. (2002) Management consulting a guide to the profession. Geneva: International Labour Organization.<br />

Linder, C., Jane (2004) Outsourcing for Radical Change: A Bold Approach to Enterprise Transformation. AMACOM,<br />

1st edition, New York.<br />

Lonsdale, Chris, Cox, Andrew (1997) Outsourcing: risk and rewards. Supply Management, Vol. 2, str. 32-34.<br />

Nellore, R., in K. Soderquist (2000) Strategic outsourcing through specifications. Omega, 28 (5): 525–40.<br />

Pandey, Vivek, Bansal, Veena (2003) A Decision-Making Framework for IT Outsourcing using the Analytic Hierarchy<br />

Process.<br />

Peteraf, M. A. (1993) The cornerstones of competitive advantage: a resource- based view. Strategic Management<br />

Journal, 14 (3): 179–191.<br />

Power, Mark J., Desouza, Kevin, Bonifazi, Carlo (2006) The Outsourcing Handbook: How to Implement a Successful<br />

Outsourcing Process. Kogan Page, Chicago.<br />

Quinn, James B., Hilmer, Frederick G. (1994) Strategic Outsourcing. Sloan Management Review, Vol. 35, 4, str. 43-<br />

55.<br />

Saaty, Thomas L. (1988) The Analytic Hierarchy Process. RWS Publications, Pittsburgh.<br />

Schniederjans, Marc J., Schniederjans, Ashlyn M., Schniederjans, Dara G. (2005) Outsourcing and Insourcing in an<br />

International Context. M. E. Sharpe, London.<br />

Taylor, H. (2006) Critical risks in outsourced IT projects: the intractable and the unforeseen. Communications of the<br />

ACM. Vol. 49, (11), str. 75-79.<br />

Thoms, Brian (2004) Outsourcing: Inside Out and Outside in. Stevens institute of technology, Hoboken, New Jersey.<br />

Wasner, R. (1999) The outsourcing process: strategic and operational realities. Doctoral Dissertation, Linköping<br />

University.<br />

Willcocks, Leslie P., Lacity, Mary C. (1995) Information systems outsourcing in theory and practice. Journal of<br />

Information Technology, 10 (4), str. 203-207.<br />

Willcocks, L. P., Fitzgerald, G., Lacity, M. (1999) To outsource IT or not? Research on economics and evaluation<br />

practice. In Beyond the IT productivity paradox. Wiley, Chichester.<br />

530


Closing the Digital Divide gap in <strong>European</strong> Union: A Unique<br />

Solution for Different Tiers?<br />

Virgil Stoica and Andrei Ilas<br />

Alexandru Ioan Cuza University of Iasi, Romania<br />

virgilstoica@gmail.com<br />

andan_i@yahoo,com<br />

Abstract: Over the last two decades, eGovernance has rapidly advanced on the public agendas as it promised to<br />

offer miraculous solutions of quickness and transparency to classic governing dilemmas. While some societies or<br />

parts of them fully embarked for this adventure, others preferred a limited use of the new technologies. The term<br />

“digital divide” has been coined to describe the newly appeared gap in access to or use of information and<br />

communications technology (ICT) devices. As <strong>European</strong> Commission established in 2010 a Digital Agenda and<br />

announced a significant spending on strategic ICT research, a question arises: is it appropriate to develop a unique<br />

strategy for all <strong>European</strong> Union countries or rather a set of strategies to be differently applied for each society or<br />

segment of it? Using a comparative method, our research describes the digital differences between the 27 <strong>European</strong><br />

members based on 2009 year data. The starting point is represented by the observation that in the least<br />

electronically developed <strong>European</strong> states only a part of those having internet access is also using eGovernment. This<br />

would suggest that the mere presence of ICT devices is not enough to trigger a “digital revolution”. Hence, in a<br />

specific social framework, a moderate presence of electronic governance could be determined by other factors such<br />

as: the lack of education, mistrust or absence of a real need. Consequently, the present paper is mapping the digital<br />

divide within the <strong>European</strong> Union as a rapport between ICT devices, their use, and the relevant characteristics of<br />

each society. The findings suggest that the societies under scrutiny are not in the same need of digital services and<br />

closing the digital gap should not be the final goal. Instead, the resources could be directed towards meeting the<br />

specific needs of one society. However, further country in-depth researches are needed to confirm our findings.<br />

Keywords: digital divide, eGovernance, ICT devices, digital agenda, EU countries<br />

1. The age of digital divide?<br />

It is largely accepted today that the information and communications technology (ICT) is reshaping the<br />

world we knew. Under its influence, even the most conservative areas are rapidly transforming (Susskind,<br />

2008) while the very nature of industrial production is changed by users taking part in the products<br />

making or adapting to their needs (Bruns, 2008).<br />

Over the last two decades, eGovernance has rapidly advanced on the public agendas as it promised to<br />

offer miraculous solutions of quickness and transparency to classic governing dilemmas. However, there<br />

is no agreement on the long-term results of this process or on its benefits. On another hand, the change<br />

may be radical and may happen at a very fast pace. For instance, the eGovernance could led to a “reordering<br />

of the state’s administrative structures and of government itself” (Lanzara, 2009) and, depending<br />

on specific socio-political realities, a country may be able to make impressive eGovernment progresses in<br />

a very short period of time (Misuraca et al., 2010).<br />

In analyzing this phenomenon, one should keep in mind that the changes are not determined only by the<br />

ICT mere presence. Thus, the current features of administrations around the world had been drawn by<br />

the fiscal crisis of the 70’s who invited the governments to “work better and cost less” (Denhardt, 2008).<br />

This finally led to the development of the New Public Management (NPM) that focused on providing<br />

public services using a business approach. Recently, the shortcomings of the NPM and the opportunities<br />

offered by ITC encouraged scholars to announce the NPM’s death (Dunleavy et al, 2006) soon to be<br />

replaced by an ‘e-paradigm’. To that, we can confidently add that the current economic crisis will also<br />

take its toll and force further changes on the administrative systems as they are interconnected with the<br />

economic ones.<br />

The eGovernance is actually only one phenomenon in a much larger technological revolution that is<br />

transforming the very structure of our societies. While some societies fully embarked for this new<br />

‘industrial’ adventure, others seem to prefer a limited use of the new technologies. As it has been the<br />

case throughout the entire modern history in the advent of new technologies, new disparities among<br />

societies are created. A new term, digital divide, has been coined to describe the newly appeared ”gap<br />

between individuals, households, businesses and geographic areas at different socio-economic levels<br />

with regard both to their opportunities to access information and communication technologies and to their<br />

531


Virgil Stoica and Andrei Ilas<br />

use of the Internet for a wide variety of activities”(OECD, 2001). Put differently, the digital divide is about<br />

opportunities created or missed by having or using the new technology.<br />

No doubt that in the ”knowledge era” the ICT access is vital, but one should not fall in the trap of a<br />

technological determinism when explaining the digital divide (Malecki and Moriset, 2008). Indeed, when<br />

approaching the digital divide one should not overlook the classic discussion on social inequalities. In<br />

fact, the literature studying the ICT related evolutions has proved that the same ‘old’ factors are playing<br />

the significant in this phenomenon too. For instance, having internet connections at home is influenced by<br />

income, education, age, race and ethnicity (Mossberger, 2003). Also, while the gender is not reflected<br />

into an Internet access divide, the men tend to use more the Internet than the women (Fallows, 2005).<br />

The traditional difference between rural and urban is also reflected especially in developing countries<br />

where the rural access to Internet represents a problem (Mahan, 2007).<br />

Out of the above literature review we may assert at a theoretical level that the tendency should be for the<br />

digital divide to mirror the social inequalities within a society and the differences between societies. This<br />

is why we should probably agree that if the digital divide do not create, perpetuate or exacerbate social<br />

inequalities, the government intervention should not be considered a necessity (Rooksby and Weckert,<br />

2004). In other words, closing the digital divide should be not possible without diminishing other<br />

persistent inequalities.<br />

From this perspective, a comprehensive research on digital divide should always try to correlate the<br />

digital inequalities with other social inequalities. Also, in-depth analyses of digital divides within the<br />

countries are meaningful when explaining this phenomenon. However, none of these types of analyses is<br />

provided by the present paper. Our established goal is to present some of the digital divides between<br />

<strong>European</strong> Union (EU) states from an eGovernance perspective. This should allow us to evaluate if a<br />

unique solution for all <strong>European</strong> states is possible or if the same results may be achieved throughout a<br />

common action plan such as the recently released 2010 Digital Agenda. For a better understanding we<br />

will next briefly present the EU from an administrative point of view and the 2010 Digital Agenda.<br />

2. The targets of the 2010 Digital Agenda<br />

With the Lisbon Treaty EU finally stepped up from the status of an international form of cooperation to an<br />

international organization. Rooted in the three Communities build up in the ‘50s, the creation of the EU<br />

has always been a pragmatic and economic process with envisaged political consequences. Its main<br />

purpose of preventing a new devastating war between <strong>European</strong> nations has been achieved through<br />

innovative solutions. When compared to other similar structures EU is arguably quite different being<br />

comprised of both supranational and inter-governmentalist ingredients. But the complicated EU structure<br />

comes with a cost of an unstable equilibrium in institutional terms, not likely to be change in the near-by<br />

future (Nugent and Paterson, 2010). Being a mixture of rational choices and political compromises, EU<br />

cannot be described from a unitary theoretical perspective. One has to look very close to understand how<br />

things work in a particular area.<br />

This allegation stands true for the <strong>European</strong> administrative system. Even if it has large policies and a<br />

huge amount of legislation, within the EU does not exist a common system of public administration.<br />

Indeed, the EU policies are delivered, to a large extent, by the national administrations of member states.<br />

Without strong central agencies the EU cannot impose a generalized control across its governing system<br />

as a whole. The consequence is that sometimes the public policies do not enjoy the same type of<br />

implementation or results. The gap that appears between an EU policy and its implementation it is<br />

known as the ‘implementation gap’. To bridge this gap within the Union there is a continuous exchange of<br />

formal and informal between various actors.<br />

Still, the EU situation is not entirely unknown for the science of public administration. In fact, any federal<br />

or unitary state with bureaucratically independent regions encounters the same problem of multilevel<br />

governance (Münch, 2010). It has been argued that, in order to be efficient, two related sets of<br />

preconditions should be in place: “(1) administrative capacity in terms of management, programming,<br />

monitoring, evaluating; and (2) political factors in terms of political interference, stability and<br />

accountability” (Milio, 2010).<br />

Unlike the nation-states, the EU lacks the homogeneity brought by the same language, ethnicity, social<br />

ethos, traditions or history. The diversity stands not only in the <strong>European</strong> logo, but also as a fact even if<br />

we look only at the 6 founder states that now have more than fifty years of close interactions. Moreover,<br />

532


Virgil Stoica and Andrei Ilas<br />

19 out of the 27 member states are small states and they have to cope with structural disadvantages in<br />

their day-to-day relations with the big states (Panke, 2010).<br />

The only way to harmonize the different interests and perspectives within an EU without an <strong>European</strong><br />

identity (Vignon, 2008) was to include all the states in the process of the decision making. The key has<br />

always been the simultaneous negotiation of several decisions that finally turned into package deals<br />

(Nedergaard, 2007). However, once a decision is taken it has to be implemented by all states using the<br />

same or different methods but always to achieve similar results.<br />

Precisely about methods and results in closing the digital divide in EU is the communication document<br />

launched in 2010 by the <strong>European</strong> Commission (EC) and entitled A Digital Agenda for Europe (hereafter<br />

Agenda) (EC, 2010). The digital problems identified in this document are: the fragmentation of the digital<br />

markets, the lack of interoperability, the rising cybercrime and risk of low trust in networks, the lack of<br />

investment in networks, the insufficient research and innovation efforts, the lack of digital literacy and<br />

skills and the missed opportunities in addressing societal challenges. The methods and results pursued<br />

by EC in its Agenda are grouped in ‘seven pillars of development’: a digital single market, an increase in<br />

interoperability and standards, an enhanced cyber security, a fast and ultrafast internet access for<br />

citizens, more investments in research and innovation, an enhanced digital literacy, skills and inclusion<br />

and ICT-enabled benefits for EU society.<br />

It is useful to note that in its Europe’s Digital Competitiveness Report 2010 the EC recognized that, on<br />

average:<br />

(...) R&D [Research and Development] investment in relation to GDP is lower in the EU<br />

compared to its main international competitors, and there are large differences between<br />

Member States, with the Nordic countries and Austria and Germany clearly the top EU<br />

investors (in relation to GDP) and most Eastern Member States and Greece having the<br />

lowest ratios.<br />

So the broader result to be achieved through the Agenda would be to close the gap between the EU and<br />

‘its main international competitors’ and between the member countries. Leaving aside the extra-EU gap,<br />

the observation we could make starting from the above theoretical observations is that the digital divide<br />

cannot or should not be bridged if the other divides between <strong>European</strong> countries remain. A more realistic<br />

objective of the Agenda would be to promote the presence and use of ICT to a larger extent in all the<br />

member states. From a different perspective, one could argue that if the gap is too big the goal is not to<br />

make it disappear but rather to shrink it to a size similar to other inequalities between member states.<br />

Taking into the consideration the <strong>European</strong> realities, our research question can be refined as follows:<br />

what kind of digital divide gap exists within EU? In order to respond to this we will examine the digital<br />

divide only from an eGovernance perspective. The assumed goal of our research is both explorative and<br />

descriptive. The goal is explorative from a methodological point of view: the methodology we developed<br />

covers both the demand and the offer related to eGovernance. Hence, the digital divide is the difference<br />

between ‘eGovernance markets’. The goal is also descriptive in the sense that we present the 2009<br />

eGovernance data on EU countries.<br />

3. Methodology<br />

Measuring eGovernance performance in a relevant and reliable way can offer crucial explanations for<br />

digital divide. Despite this, there is no international consensus about how to do it. There are several<br />

measurement instruments developed by public and private sector organizations to meet their own needs<br />

for assessing the state of eGovernance development (UN 2009). Many of these assessments include an<br />

evaluation of governmental e-services, combined with data from national/international statistics.<br />

However, most of the statistics are developed only from supply side indicators and often by websites<br />

assessment alone.<br />

The measurement techniques are also diverse. For example, the United Nations eGovernment<br />

Readiness Index uses a composite formula comprising a web measure index, a telecommunications<br />

infrastructure index and a human capital index (UN EGovernment Survey 2008). International<br />

Telecommunication Union created the ICT Development Index, which has three sub-indices regarding<br />

access, use and skills (ITU 2010).<br />

533


Virgil Stoica and Andrei Ilas<br />

Table 1: Examples of Indexes created for eGovernment evaluation<br />

Index Sub-indices Indicators<br />

United Nations<br />

eGovernment<br />

Readiness<br />

Index<br />

ICT<br />

Development<br />

Index<br />

The Web Measure Index<br />

Telecommunication<br />

Infrastructure Index<br />

Human Capital Index<br />

ICT Access Index<br />

ICT Use Index<br />

ICT Skills Index<br />

Responses on a questionnaire based on the presence/absence<br />

of specific facilities/services of governmental sites<br />

Internet Users/100 persons<br />

PCs/100 persons<br />

Main Telephones Lines/100 persons<br />

Cellular telephones/100 persons<br />

Broad banding/100 persons<br />

Adult literacy rate<br />

Primary, secondary and tertiary gross enrolment ratio<br />

Fixed telephone lines/100 inhabitants<br />

Mobile telephone subscriptions/100 inhabitants<br />

International Internet bandwidth/100 users<br />

Proportion of household with a computer<br />

Proportion of household with Internet access at home<br />

Internet users/100 inhabitants<br />

Fixed broadband Internet subscribers/ 100 inhabitants<br />

Mobile broadband subscriptions/ 100 inhabitants<br />

Adult literacy rate<br />

Secondary gross enrolment ratio<br />

Tertiary gross enrolment ratio<br />

One problem of this kind of measurement relates to the technological innovations. For instance,<br />

indicators such as “fixed telephones lines” or “mobile telephone subscriptions” are considered, even if<br />

they are not directly connected with eGovernance. On the other hand, the introduction of high-speed<br />

mobile Internet access could further boost the number of Internet users and, therefore, “mobile<br />

broadband subscriptions” seems a more adequate indicator in order to catch the technological<br />

innovation.<br />

A second problem relates to the reduced amount of information available on the demand side of<br />

eGovernance. “Adult literacy rate” and “gross enrolment ratio” offer an image of the population degree of<br />

education. However, these indicators are not appropriate measures of digital skills. Computer and<br />

Internet literacy are different concepts from usual literacy, and should be evaluated in a different way.<br />

A third problem of eGovernance measurement relates the total lack of information about citizens’<br />

behavior regarding Internet or about their trust in Internet as a tool that can solve some of their problems.<br />

As we argued, digital divide, as well as eGovernance, is a multifaceted concept, much larger than the<br />

simple “access” to ICT infrastructure. It is also about the citizens’ will and ability to use the infrastructure<br />

and web pages that government and/or market offer them. For this reason we consider that digital divide<br />

should be measured both in terms of offer and demand (Ferr et al, 2005). A single indicator cannot track<br />

different progress in eGovernance development process, thus requiring the construction of a composite<br />

index. Therefore, considering the problems previously mentioned regarding eGovernance measurement,<br />

we are proposing a new indicator, named the Digital Governance Index.<br />

Based on our conceptual framework, the Digital Governance Index is divided into the following four subindices<br />

(Table 2):<br />

Digital Infrastructure Index: reflects the access dimensions and incorporates four indicators (Internet<br />

subscriptions/100 inhabitants, Fixed Broadband subscriptions/100 inhabitants, Mobile Broadband<br />

subscriptions/100 inhabitants, PCs/100 inhabitants).<br />

Governmental Websites Performance Index: reflects the governmental offer in terms of e-services<br />

and incorporates two indicators (EGovernment on-line availability and Web Measure Index).<br />

Digital Skills Index: reflects the citizens’ ability in using computers and access Internet, and<br />

incorporates two indicators (Individuals’ level of computer skills and Individuals' level of Internet skills)<br />

534


Virgil Stoica and Andrei Ilas<br />

Digital Behavior Index: reflects the citizens’ habitude in using Internet and incorporates three<br />

indicators (Individuals regularly using the Internet, Individuals having ordered/bought goods or<br />

services for private use over the Internet, and Individuals using the Internet for interaction with public<br />

authorities).<br />

We note that the offer and the demand sides have an equal influence in the Digital Government Index.<br />

The four sub-indices have also an equal weight, as well as the indicators for the sub-indices.<br />

The source of indicators which reflect the infrastructure has been International Telecommunication Union<br />

while the 2010 United Nations eGovernment Survey has been the source for the “Web Measure Index”.<br />

The web measure survey assessments were based on a questionnaire, which allocated a binary value to<br />

the indicator based on the presence/absence of specific electronic facilities/services available. The<br />

primary site was the national portal or the official government home page. The Survey assessed the<br />

same number of functionalities of the same or similar sites in each country; these are the<br />

Ministries/Departments of Health, Education, Social Welfare, Labor, and Finance, which are<br />

representative of the government services citizens require most. In order to calculate Governmental<br />

Websites Performance Index, this indicator was combined with “eGovernment on-line availability”, which<br />

shows the percentage of the 20 basic services which are fully available online i.e. for which it is possible<br />

to carry out full electronic case handling.<br />

All the information for the demand side of the Index has been collected from Eurostat. “Level of basic<br />

computer skills” is measured using a self-assessment approach, where the respondent indicates whether<br />

he/she has carried out specific tasks related to computer use, without these skills being assessed, tested<br />

or actually observed. Six computer-related items were used to group the respondents into levels of<br />

computer skills in 2006, 2007 and 2009: copy or move a file or folder; use copy and paste tools to<br />

duplicate or move information within a document; use basis arithmetic formula (add, subtract, multiply,<br />

divide) in a spreadsheet; compress files; connect and install new devices, e.g. a printer or a modem; write<br />

a computer program using a specialized programming language. The indicator has been generated by<br />

adding the percentages of respondents which declared 1-2, 3-4, or 5-6 computer abilities. The same<br />

procedure has been used in order to compute “Individuals' level of Internet skills”. Level of internet skills<br />

is measured using also a self-assessment approach, where the respondent indicates whether he/she has<br />

carried out specific tasks related to internet use, without these skills being assessed, tested or actually<br />

observed. Six Internet-related items were used to group the respondents into levels of Internet skills in<br />

2005, 2006 and 2007: use a search engine to find information; send an e-mail with attached files; post<br />

messages to chatrooms, newsgroups or any online discussion forum; use the Internet to make telephone<br />

calls; use peer-to-peer file sharing for exchanging movies, music etc.; create a web page.<br />

“Individuals regularly using the Internet” represent the percentage of persons that use the Internet at least<br />

once a week on average within the last three months before the survey. “Individuals having<br />

ordered/bought goods or services for private use over the Internet” measures these actions within the last<br />

twelve months before the survey, and “Individuals using the Internet for interaction with public authorities”<br />

evaluate any kind of interaction within the last three months before the survey.<br />

In order to have the same unit of measurement for all the indicators, we used a normalization of data: the<br />

country having the highest score was considered the reference measure, and it received 100 points. The<br />

other countries received rescaled scores proportionally with their performances. The sub-indices and the<br />

Digital Governance Index were computed by adding each indicator, using the weights presented in Table<br />

2.<br />

This digital divide analysis follows the methodology proposed by Orbicom (2003). The digital divide was<br />

measured as the relative difference in countries’ Digital Governance Index, benchmarked against EU 27<br />

– obtained as the simple average of all 27 countries members of <strong>European</strong> Union. Those that performed<br />

above-average were assigned a positive number, and those that performed below-average were<br />

identified by a negative number. The same procedure was used for al four sub-indices, in order to<br />

measure the gap in terms of infrastructure, governmental sites, digital skills, and digital behaviors.<br />

4. Data<br />

Applying the methodology explained above, we obtained a ranking of EU countries in terms of<br />

eGovernance quality. Figure 1 shows the scores of member states regarding the Digital Governance<br />

Index. Leader is Denmark, with a score of 89.1, closely followed by Sweden (88.2), Netherlands (86.5),<br />

Luxembourg (83.6), and United Kingdom (80.1). The average of the 27 EU countries stands at a score of<br />

535


Virgil Stoica and Andrei Ilas<br />

60.6. At the other end of the scale stand Cyprus (46.2), Poland (44.7), Greece (38.4), Bulgaria (33.2) and<br />

Romania (31.5). The performance of Denmark is almost three times higher than Romania’s.<br />

Table 2: Digital governance Index and its components<br />

Dimensions Sub-indices Weight Indicators Weight Source of<br />

data<br />

Internet subscriptions/100<br />

inhabitants<br />

25% ITU<br />

Digital<br />

Infrastructure 25%<br />

Fixed Broadband<br />

subscriptions/100 inhabitants<br />

25% ITU<br />

Supply side<br />

Index<br />

Mobile Broadband<br />

subscriptions/100 inhabitants<br />

25% ITU<br />

Digital Government Index<br />

Digital Government Index<br />

Demand side<br />

100,0<br />

90,0<br />

80,0<br />

70,0<br />

60,0<br />

50,0<br />

40,0<br />

30,0<br />

20,0<br />

Denmark<br />

Sweden<br />

Netherlands<br />

Luxembourg<br />

United Kingdom<br />

10,0<br />

0,0<br />

Governmental<br />

Websites<br />

Performance<br />

Digital Skills<br />

Index<br />

Digital Behavior<br />

Index<br />

Finland<br />

France<br />

Austria<br />

Germany<br />

Estonia<br />

Ireland<br />

Belgium<br />

EU (27 countries)<br />

Figure 1: Digital governance index<br />

PCs/100 inhabitants 25% ITU<br />

EGovernment on-line availability 50% Eurostat<br />

25% Web Measure Index<br />

50% UNPAN<br />

25%<br />

Individuals' level of computer<br />

skills<br />

Individuals' level of Internet<br />

skills<br />

50%<br />

50%<br />

Eurostat<br />

Eurostat<br />

Individuals regularly using the<br />

Internet<br />

Individuals having<br />

33,3% Eurostat<br />

25%<br />

ordered/bought goods or<br />

services for private use over the<br />

Internet<br />

Individuals using the Internet for<br />

33,3% Eurostat<br />

interaction with public<br />

authorities<br />

33,3% Eurostat<br />

Spain<br />

Slovenia<br />

Malta<br />

Slovakia<br />

Portugal<br />

Hungary<br />

Italy<br />

Latvia<br />

Czech Republic<br />

Cyprus<br />

Poland<br />

Greece<br />

Bulgaria<br />

Romania<br />

The differences between <strong>European</strong> Union countries can be more easily observed in Figure 2. Twelve<br />

countries are above average, with positive scores in terms of digital divide. The remaining 15 countries<br />

are below average with the biggest gap between Denmark and Romania: 57.6 points.<br />

As it may be observed, the group of countries for which the digital divide takes positive values comprises<br />

the Nordic countries (Denmark, Sweden, and Finland), the Western Europe (United Kingdom, Ireland,<br />

France, Belgium, and Luxembourg) and Central Europe countries (Germany and Austria). The only<br />

"intruder" in this group is Estonia. The lagging behind group comprises the Southern <strong>European</strong> countries<br />

(Spain, Portugal, Italy, Greece, Cyprus and Malta) and the former communist countries.<br />

536<br />

Lithuania


-27,4<br />

-29,1<br />

-22,2<br />

-8,9<br />

-11,7<br />

-11,9<br />

-12,2<br />

-13,6<br />

-14,4<br />

-15,9<br />

Virgil Stoica and Andrei Ilas<br />

Denmark<br />

Sweden<br />

Netherlands<br />

Luxembourg<br />

United<br />

Finland<br />

France<br />

Germany<br />

Austria<br />

Estonia<br />

Ireland<br />

Belgium<br />

EU (27<br />

-0,6 Spain<br />

-0,7 Slovenia<br />

-4,0 Malta<br />

-6,1 Slovakia<br />

-8,1 Portugal<br />

Hungary<br />

Italy<br />

Latvia<br />

Czech Republic<br />

Lithuania<br />

Cyprus<br />

Poland<br />

Greece<br />

Bulgaria<br />

Romania<br />

3,9<br />

3,1<br />

1,9<br />

0,0<br />

28,5<br />

27,6<br />

25,9<br />

23,0<br />

19,5<br />

15,7<br />

12,9<br />

12,0<br />

12,0<br />

-40,0 -30,0 -20,0 -10,0 0,0 10,0 20,0 30,0 40,0<br />

Figure 2: <strong>European</strong> Union digital divide 2009<br />

These data suggest at least two possible explanations. The first is related to the level of economic<br />

development: the most developed EU countries almost invariably belong to the first group. Economic<br />

prosperity has led to the development of digital infrastructure, a high level of education of the population,<br />

to its trust in the Internet both as a medium for economic transactions and as a medium of interaction with<br />

the government. A second possible explanation involves the existence of a socio-cultural factor. In the<br />

countries with a high social capital there is a greater confidence in the Internet as a new way for<br />

strengthening communities while the countries lacking social trust are at the bottom of the list. Of course,<br />

these hypotheses need to be tested.<br />

The analysis of the Digital Government Index components shows a slightly different picture from the<br />

global one. In terms of infrastructure (Figure 3), the same four countries are the leaders, but in a different<br />

order: Luxembourg (87.5), Netherlands (79.4), Sweden (78.3) and Denmark (73.4). The EU infrastructure<br />

average is 50.7. Romania is no longer in last place with a score of 28.9, being up the Czech Republic<br />

(28.6), Poland (27.2) and Bulgaria (24.5).<br />

The highest difference in terms of infrastructure divide is between Luxembourg and Bulgaria: 63 points<br />

(Figure 4).<br />

The <strong>European</strong> average of Governmental Websites Performance Index is 68.3 (Figure 5). Malta, with a<br />

score of 86.3, joins Sweden (96.7) and Denmark (92.0) for the first three places in the rank. The last<br />

places are occupied by Bulgaria (44.2), Romania (43.2) and Greece (43.2). The digital divide’s amplitude<br />

on this index is of 53.5 points (Figure 6).<br />

537


Infrastructure Index<br />

100,0<br />

90,0<br />

80,0<br />

70,0<br />

60,0<br />

50,0<br />

40,0<br />

30,0<br />

20,0<br />

10,0<br />

Luxembourg<br />

Netherlands<br />

Sweden<br />

Denmark<br />

United Kingdom<br />

0,0<br />

France<br />

Germany<br />

Austria<br />

Figure 3: Digital infrastructure index<br />

-10,5<br />

-11,7<br />

-14,2<br />

-14,5<br />

-15,6<br />

-19,6<br />

-21,8<br />

-22,1<br />

-23,5<br />

-26,2<br />

Virgil Stoica and Andrei Ilas<br />

Finland<br />

Ireland<br />

Belgium<br />

Luxembourg<br />

Netherlands<br />

Sweden<br />

Denmark<br />

United Kingdom<br />

France<br />

Germany<br />

Austria<br />

Finland<br />

Ireland<br />

Belgium<br />

Italy<br />

Spain<br />

EU (27 countries)<br />

-0,4 Slovenia<br />

-0,8 Estonia<br />

-5,2 Cyprus<br />

-6,7 Malta<br />

Portugal<br />

Greece<br />

Slovakia<br />

Hungary<br />

Latvia<br />

Lithuania<br />

Romania<br />

Czech Republic<br />

Poland<br />

Bulgaria<br />

Italy<br />

Spain<br />

EU (27 countries)<br />

3<br />

0,7<br />

0,4<br />

0<br />

Slovenia<br />

Estonia<br />

Cyprus<br />

Malta<br />

Portugal<br />

Greece<br />

4,8<br />

9,7<br />

7,6<br />

15,8<br />

13,2<br />

Hungary<br />

Latvia<br />

Lithuania<br />

Romania<br />

Slovakia<br />

22,7<br />

20,9<br />

Czech Republic<br />

28,7<br />

27,6<br />

-30 -20 -10 0 10 20 30 40<br />

Figure 4: Digital infrastructure divide<br />

538<br />

Poland<br />

Bulgaria<br />

36,8


Governmental Websites Performance<br />

100,0<br />

90,0<br />

80,0<br />

70,0<br />

60,0<br />

50,0<br />

40,0<br />

30,0<br />

20,0<br />

10,0<br />

0,0<br />

Sweden<br />

Denmark<br />

Malta<br />

United Kingdom<br />

Austria<br />

France<br />

Estonia<br />

Portugal<br />

Netherlands<br />

Virgil Stoica and Andrei Ilas<br />

Finland<br />

Ireland<br />

Spain<br />

Slovenia<br />

EU (27 countries)<br />

Figure 5: Governmental websites performance index<br />

-24,1<br />

-25,1<br />

-25,1<br />

Sweden<br />

Denmark<br />

Malta<br />

United Kingdom<br />

Austria<br />

France<br />

Estonia<br />

Portugal<br />

Netherlands<br />

Finland<br />

Ireland<br />

Spain<br />

Slovenia<br />

EU (27 countries)<br />

-2,5Germany<br />

-3,9 Luxembourg<br />

-5,9 Hungary<br />

-6,0 Czech Republic<br />

-6,4 Belgium<br />

-7,7 Italy<br />

-7,9 Lithuania<br />

-13,4<br />

Latvia<br />

-14,9<br />

Poland<br />

-17,1<br />

Slovakia<br />

-19,4<br />

Cyprus<br />

Bulgaria<br />

Romania<br />

Greece<br />

0,0<br />

Germany<br />

Luxembourg<br />

Hungary<br />

Czech Republic<br />

Belgium<br />

Italy<br />

18,0<br />

16,3<br />

15,0<br />

13,2<br />

12,3<br />

11,6<br />

10,7<br />

7,8<br />

7,0<br />

6,7<br />

4,3<br />

-30,0 -20,0 -10,0 0,0 10,0 20,0 30,0 40,0<br />

Figure 6: Governmental websites performance divide<br />

539<br />

Lithuania<br />

Latvia<br />

23,7<br />

Poland<br />

Slovakia<br />

28,4<br />

Cyprus<br />

Bulgaria<br />

Romania<br />

Greece


Virgil Stoica and Andrei Ilas<br />

The highest digital divide is on digital behavior: 77.7 points (Figure 8). Compared to a score of 93.9 for<br />

Denmark, Romania (16.2), Bulgaria (22.2) and Greece (25.3) stand out in a negative way with extremely<br />

low percentages in terms of those who regularly use the Internet, buy goods or services or interact with<br />

public authorities over the Internet (Figure 7).<br />

Digital Behavior<br />

100,0<br />

90,0<br />

80,0<br />

70,0<br />

60,0<br />

50,0<br />

40,0<br />

30,0<br />

20,0<br />

10,0<br />

0,0<br />

Denmark<br />

Netherlands<br />

Sweden<br />

Luxembourg<br />

United Kingdom<br />

Figure 7: Digital behavior index<br />

-36,5<br />

Finland<br />

Germany<br />

Austria<br />

France<br />

Belgium<br />

Estonia<br />

Ireland<br />

EU (27 countries)<br />

Denmark<br />

Netherlands<br />

Sweden<br />

Luxembourg<br />

United Kingdom<br />

Finland<br />

Germany<br />

Austria<br />

France<br />

Belgium<br />

Estonia<br />

Ireland<br />

EU (27 countries)<br />

-2,5 Slovakia<br />

-3,9 Malta<br />

-6,3 Slovenia<br />

-7,6 Spain<br />

-12,9 Czech Republic<br />

-13,0 Latvia<br />

-13,0 Hungary<br />

-13,2 Poland<br />

-16,8 Cyprus<br />

-18,5 Lithuania<br />

-20,2 Portugal<br />

-23,4<br />

Italy<br />

-27,4<br />

Greece<br />

-30,5<br />

Bulgaria<br />

Romania<br />

Slovakia<br />

4,2<br />

2,1<br />

1,2<br />

0,0<br />

Malta<br />

Slovenia<br />

Spain<br />

Czech Republic<br />

11,1<br />

10,3<br />

Hungary<br />

Latvia<br />

Poland<br />

Cyprus<br />

Lithuania<br />

Portugal<br />

19,1<br />

Italy<br />

Greece<br />

Bulgaria<br />

Romania<br />

41,2<br />

36,2<br />

34,9<br />

32,8<br />

27,5<br />

25,6<br />

-50,0 -40,0 -30,0 -20,0 -10,0 0,0 10,0 20,0 30,0 40,0 50,0<br />

Figure 8: Digital behavior divide<br />

540


Virgil Stoica and Andrei Ilas<br />

Things are not better for the three Balkan countries regarding the digital skills, at about the half the<br />

<strong>European</strong> average of 71.1, and far away from the <strong>European</strong> leader, Netherlands (98.8) (Figure 9). The<br />

digital divide’s amplitude on this index is of 61 points.<br />

Digital Skills<br />

100,0<br />

90,0<br />

80,0<br />

70,0<br />

60,0<br />

50,0<br />

40,0<br />

30,0<br />

20,0<br />

10,0<br />

Netherlands<br />

Denmark<br />

Luxembourg<br />

Finland<br />

Sweden<br />

0,0<br />

Figure 9: Digital skills index<br />

-25,0<br />

-29,1<br />

-33,3<br />

Germany<br />

United Kingdom<br />

Austria<br />

France<br />

Slovakia<br />

-8,4<br />

-9,0<br />

-12,5<br />

-13,7<br />

-14,3<br />

-16,7<br />

-16,7<br />

Belgium<br />

Estonia<br />

EU (27 countries)<br />

Slovenia<br />

Ireland<br />

Hungary<br />

Spain<br />

-0,7<br />

-1,2<br />

-2,5<br />

-2,5<br />

-6,0<br />

1,7<br />

0,0<br />

Latvia<br />

Czech Republic<br />

12,9<br />

11,7<br />

11,7<br />

8,8<br />

6,4<br />

Lithuania<br />

Poland<br />

Portugal<br />

Malta<br />

Italy<br />

Cyprus<br />

27,7<br />

26,0<br />

25,9<br />

21,2<br />

18,9<br />

17,7<br />

-40,0 -30,0 -20,0 -10,0 0,0 10,0 20,0 30,0 40,0<br />

Figure 10: Digital skills divide<br />

Netherlands<br />

Denmark<br />

Luxembourg<br />

Finland<br />

Sweden<br />

Germany<br />

United Kingdom<br />

France<br />

Austria<br />

Slovakia<br />

Belgium<br />

Estonia<br />

EU (27 countries)<br />

Slovenia<br />

Ireland<br />

Spain<br />

Hungary<br />

Latvia<br />

Czech Republic<br />

Lithuania<br />

Poland<br />

Portugal<br />

Malta<br />

Cyprus<br />

Italy<br />

Greece<br />

Bulgaria<br />

Romania<br />

541<br />

Greece<br />

Bulgaria<br />

Romania


Virgil Stoica and Andrei Ilas<br />

We obtain a more nuanced image by grouping the EU states in a square matrix, depending on their<br />

performance on the two dimensions (Figure 11). We will have thus not only a group of leaders, with high<br />

scores on both the demand and the offer and one of the laggards with low scores on those dimensions,<br />

but also two intermediate groups. One of these groups is composed of Belgium and Slovakia, countries<br />

that scores well in demand (population educated in terms of confidently using digital and internet), but<br />

weak in the government offer dimension. The second group of countries characterized by generous offer,<br />

but with reduced demand, consists of Spain, Portugal, Slovenia, and Malta. The existence of this latter<br />

group seems to support the hypothesis of cultural factor: well-developed infrastructure and official<br />

websites combined with a lack of confidence and of digital skills are triggering a modest eGovernance<br />

performance.<br />

Demand<br />

High scores<br />

Low scores<br />

Supply<br />

High scores Low scores<br />

Sweden<br />

Denmark<br />

Netherlands<br />

Luxembourg<br />

United Kingdom<br />

Finland<br />

Belgium<br />

France<br />

Slovakia<br />

Austria<br />

Germany<br />

Ireland<br />

Estonia<br />

Malta<br />

Spain<br />

Slovenia<br />

Portugal<br />

Italy<br />

Hungary<br />

Cyprus<br />

Lithuania<br />

Czech Republic<br />

Latvia<br />

Greece<br />

Poland<br />

Romania<br />

Bulgaria<br />

Figure 11: EU countries classification according their score on the offer and demand<br />

The differences between the best <strong>European</strong> country in terms of eGovernance, Denmark, and the worst,<br />

Romania, may be seen in Figures 12 and 13. In terms of infrastructure, the divide between the two<br />

countries is 44.5. This difference increases to 48.8 for government websites performance and to 59.3 for<br />

digital skills and becomes huge for the digital behavior, reaching 77.7 points.<br />

Figure 12 presents the four indexes that are making up the Digital Governance Index, while Figure 13<br />

provides a detailed picture of all the 11 indicators. Thus we can see that the smallest difference (6.9<br />

points) between the first and last rank is on Mobile Broadband subscriptions/100 inhabitants – the most<br />

dynamic factor that measures the technological innovation. And the biggest differences are on the factor<br />

measuring the number of individuals that ordered goods or services for private use over the Internet (82.8<br />

points) and especially of individuals that used the Internet for interaction with the public authorities (91<br />

points). These differences suggest that technological differences may be more easily recovered than the<br />

cultural one and points to the trust as a fundamental influence on the eGovernance development.<br />

In Figure 14 we observe the relative homogeneity of the scores obtained by leaders for the 11 indicators.<br />

Only the Mobile Broadband subscriptions performance of Luxemburg subscriptions is to be noted. The<br />

data are more heterogeneous for last countries in the rank (Figure 15). The lowest scores, shared by all<br />

four countries are in the number of PCs per 100 inhabitants, for individuals having ordered/bought goods<br />

or services for private use over the Internet, and individuals using the Internet for interaction with public<br />

authorities. If for Romania and Bulgaria the poverty could be a reason for the reduced number of<br />

computers, this explanation does not seem very appropriate in the case of Greece. The lack of interest in<br />

buying PCs may be related to the fact that they are not used to buy goods on the Internet or to interact<br />

with government. This again points to the importance of the cultural factor in the development of<br />

eGovernance.<br />

542


Digital Skills<br />

Virgil Stoica and Andrei Ilas<br />

Infrastructure Index<br />

100,0<br />

80,0<br />

60,0<br />

40,0<br />

20,0<br />

0,0<br />

Digital Behavior<br />

Figure 12: The four component indexes for Denmark, EU, and Romania<br />

Individuals' level of Internet<br />

skills<br />

Individuals' level of Internet<br />

skills<br />

20,0<br />

0,0<br />

Denmark<br />

EU (27 countries)<br />

Romania<br />

Governmental websites<br />

performance<br />

Internet subscriptinos/100<br />

Individuals regularly using<br />

the Internet<br />

Individuals having<br />

inhabitants<br />

100,0<br />

80,0<br />

60,0<br />

Fixed Broadband<br />

subscriptions/100<br />

inhabitants<br />

Mobile Broadband<br />

ordered/bought goods or<br />

40,0<br />

subscriptions/100<br />

services over the Internet<br />

inhabitants<br />

Individuals using the Internet<br />

for interaction with public<br />

authorities<br />

Figure 13: The eleven indicators for Denmark, EU, and Romania<br />

543<br />

Denmark<br />

PCs/100 inhabitants<br />

E-government on-line<br />

availability<br />

Web Measure Index<br />

EU (27 countries)<br />

Romania


Virgil Stoica and Andrei Ilas<br />

Sweden<br />

Internet subscriptinos/100<br />

inhabitants<br />

Netherlands<br />

Individuals regularly using the<br />

100,0<br />

Fixed Broadband<br />

Internet<br />

80,0<br />

subscriptions/100 inhabitants<br />

Individuals having<br />

ordered/bought goods or<br />

services over the Internet<br />

Individuals using the Internet<br />

for interaction with public<br />

authorities<br />

Individuals' level of Internet<br />

skills<br />

Individuals' level of Internet<br />

skills<br />

60,0<br />

40,0<br />

20,0<br />

0,0<br />

Mobile Broadband<br />

subscriptions/100 inhabitants<br />

PCs/100 inhabitants<br />

E-government on-line<br />

availability<br />

Web Measure Index<br />

Figure 14: The eleven indicators for Denmark, Luxembourg, Sweden, and Netherlands<br />

40,0<br />

20,0<br />

0,0<br />

Denmark<br />

Luxembourg<br />

Internet subscriptinos/100<br />

Poland<br />

Bulgaria<br />

Individuals regularly using the<br />

inhabitants<br />

80,0<br />

Fixed Broadband<br />

Romania<br />

Internet<br />

60,0<br />

subscriptions/100 inhabitants<br />

Individuals having<br />

ordered/bought goods or<br />

services over the Internet<br />

Individuals using the Internet<br />

for interaction with public<br />

authorities<br />

Individuals' level of Internet<br />

skills<br />

Individuals' level of Internet<br />

skills<br />

Mobile Broadband<br />

subscriptions/100 inhabitants<br />

PCs/100 inhabitants<br />

E-government on-line<br />

availability<br />

Web Measure Index<br />

Figure 15: The eleven indicators for Greece, Poland, Bulgaria and Romania<br />

544<br />

Greece


5. Conclusions<br />

Virgil Stoica and Andrei Ilas<br />

The data presented in this research show without doubt that the digital divide is a complex reality in the<br />

EU and cannot be bridged using the same tools across the whole territory.<br />

From an eGovernance point of view, we identified two large groups of countries: the leaders –the Nordic<br />

and Western countries and the laggards – Southern and ex-communist countries. However, while the<br />

differences regarding the infrastructure and the performance of governmental websites are significant,<br />

those related to digital skills and digital behavior are even bigger. The smallest digital difference is in<br />

terms of Governmental Websites Performance where the distance between Sweeden and Greece is of<br />

only 53.5 points. The biggest digital difference is scored in terms of Digital Behavior between Denmark<br />

and Romania: 77.7 points. This suggests that the Agenda should rather concentrate on developing skills<br />

and changing behaviors in the second group of countries.<br />

This observation becomes extremely important if the goal is to make eGovernment accessible to the<br />

majority and not only to an elite. The differences in the governmental sites performance seem the easiest<br />

to overcome because it requests only a technical intervention. The gap between infrastructures could be<br />

also diminished as the smallest difference on this indicator is for the most dynamic factor, Mobile<br />

Broadband subscriptions/100 inhabitants, and that measures the technological innovation. The<br />

Governments may take initiatives in this respect but it’s probably for the market to finally influence the<br />

improvements in performances.<br />

However, closing the gap on only the two mentioned dimensions would probably lead to a greater digital<br />

divide inside the lagging states of our study between those few confidently and adroitly using the Internet<br />

and the others. Hence, a governmental initiative that aims to increase the interconnectivity and the<br />

interoperability of the administration will only improve the best area of these states. Based on our results<br />

we would rather suggest that measures should be taken in order to improve the population’s<br />

eGovernment related literacy and trust.<br />

From a different perspective, it is surprising to find old and developed EU countries like Greece, Italy,<br />

Portugal and Spain within the group of lagers. In our opinion, this finding points to the influence that<br />

social and cultural factors may have on eGovernance development. If this hypothesis is to be confirmed<br />

by future researches then the Agenda should be adapted according to each country cultural and social<br />

environment. In this vein, the lack of an <strong>European</strong> administration could be an advantage in the sense that<br />

the national authorities are better positioned to take the proper actions. But some authorities could lack<br />

the interest of taking steps and in this respect the Agenda could play the major role of transmitting a<br />

much needed initial push.<br />

Out of the ‘seven pillars of development’ of the Agenda only two are targeting the human resources: the<br />

enhanced digital literacy and the skills and inclusion and ICT-enabled benefits for EU society. If the<br />

results of the present research are pointing into the right direction then these two “pillars” should be the<br />

main ones if it is to build a non digitally divided Europe.<br />

Acknowledgments<br />

This work was supported by the strategic grant POSDRU/89/1.5/S/62259, Project „Applied social, human<br />

and political sciences. Postdostoral training and postdoctoral fellowships in social, human and political<br />

sciences” cofinanced by the <strong>European</strong> Social Fund within the Sectorial Operational Program Human<br />

Resources Development 2007 – 2013.<br />

References<br />

Bruns, Axel (2008), Blogs, Wikipedia, Second Life, and Beyond, New York, Peter Lang.<br />

Denhardt, Robert B. (2008), Theories of Public Organization, 5 th edition, Belmont, Thomson Wadsworth.<br />

Dunleavy, P., Margetts H., Bastow S. &Tinker J. (2006), Digital Era Governance: IT Corporations, the State, and<br />

EGovernment. New York: Oxford University Press.<br />

Ferr Enrico, Marco Cantamessa, Emilio Polucci (2005), “Urban Versus Regional Divide: Comparing and Classifying<br />

Digital Divide”. In Michael Bohlen, Johann Gamper, Wolfgang Polasek, Maria Wimmer (eds.) EGovernment:<br />

Towards Electronic Democracy, Proceedings of TCGOV, Springer, Berlin<br />

Fallows, Deborah (2005), How Women and Men use the Internet. Available at<br />

http://www.pewinternet.org/Reports/2005 (accessed November 19, 2010).<br />

545


Virgil Stoica and Andrei Ilas<br />

Lanzara G.F. (2009), “Building digital institutions: ICT and the rise of assemblages in government”. In F. Contini &<br />

G.F.Lanzara (Eds.) ICT and innovation in the public sector. <strong>European</strong> studies in the making of eGovernment,<br />

New York: Palgrave Macmillan.<br />

Nedergaard, Peter (2007), <strong>European</strong> Union Administration: Legitimacy and Efficiency, Leiden, Martinus Nijhoff<br />

Publishers.<br />

Mahan, Amy (2007), “Conclusion: ICT and Pro-poor Strategies and Research”. In Hernan Galperin & Judith Mariscal<br />

(Eds.) Digital Poverty. Latin American and Caribbean Perspectives, Ottawa, International Development<br />

Research Center.<br />

Malecki, Edward J. & Bruno Moriset (2008) The Digital Economy. Business organization, production processes, and<br />

regional developments, London, Routledge.<br />

Milio, Simona (2010) From Policy to Implementation in the <strong>European</strong> Union. The Challenge of a Multi-level<br />

Governance System, London, Tauris <strong>Academic</strong> Studies.<br />

Misuraca, G, Rossel P. & Glassey, O. (2010), “Overcoming barriers to innovation in eGovernment. The Swiss way”.<br />

In P.G. Nixon, V.K. Koutrakou & Rawal R. (Eds.) Understanding eGovernment in Europe. Issues and<br />

challenges, New York, Routlegde.<br />

Mossberger, K., C. Tolbert & M. Stansbury (2003), Virtual Inequality: Beyond the Digital Divide, Washington, DC,<br />

Georgetown University Press.<br />

Münsch, Robert (2010), <strong>European</strong> Governmentality. The Liberal drift of multilevel governance, London, Routledge.<br />

Nugent, Neil & William E. Paterson (2010), “The <strong>European</strong> Union’s Institutions”. In Michelle Egan, Neil Nugent<br />

&William E. Paterson, Research Agendas in EU Studies, Basingstoke, Palgrave Macmillan.<br />

OECD (2001) Understanding the Digital Divide, Paris, Organisation for Economic Co-operation and Development.<br />

Panke, Diana (2010) Small States in the <strong>European</strong> Union. Coping with Structural Disadvantages, Farnham, Ashgate.<br />

Rooksby, Emma & John Weckert (2004), “Digital Divides : Their Social and Ethical Implications”. In Linda L. Brennan<br />

& Victoria E. Johnson, Social, Ethical and Policy Implications of Information Technology, Hershey, Information<br />

Science Publishing.<br />

Susskind, Richard (2008) The End of Lawyers? Rethinking the Nature of Legal Services, Oxford, Oxford University<br />

Press.<br />

Vignon, Jérôme (2008), “Après Lisbonne: encore Lisbonne?” In Philippe Herzog (Ed.) À la recherche de l’intérêt<br />

européen, Paris, Éditions Le Manuscrit.<br />

*** (2010) - A Digital Agenda for Europe, <strong>European</strong> Commission, Brussels. Available at http://eur-lex.europa.eu<br />

(Accessed November 19, 2010).<br />

*** (2010) - Europe’s Digital Competitiveness Report 2010 <strong>European</strong> Commission, Brussels. Available at<br />

http://ec.europa.eu/information_society/digital-agenda (Accessed November 19, 2010).<br />

*** (2008) - United Nations eGovernment Survey 2008. From eGovernment to Connected Governance. United<br />

Nations, New York<br />

*** (2009) - Report of the Expert Group Meeting the EGovernment Survey; Getting to the next level. New York:<br />

United Nations, Department of Economics and Social Affaires<br />

*** (2010) – Measuring the Information Society. International Telecommunication Union, Geneva<br />

*** (2003) - Monitoring the Digital Divide … And beyond, Orbicom, Montreal.<br />

546


Towards Estimating Users’ Opinion Strength in Forum Texts<br />

Regarding Governmental Decisions<br />

George Stylios 1, 2 , Christos Katsis 2, Vasiliki Simaki 1 , Sofia Stamou 1 and Dimitris<br />

Christodoulakis 1<br />

1<br />

University of Patras, Greece<br />

2<br />

Technical Educational Institute of Ionian Islands, Lefkada, Greece<br />

gstylios@yahoo.gr;<br />

ckatsis@teiion.gr;<br />

simaki@ceid.upatras.gr;<br />

stamou@ceid.upatras.gr;<br />

dxri@upatras.gr<br />

Abstract: The growth of Web 2.0 has facilitated interactive information sharing and interoperability on the World<br />

Wide Web, allowing users not only to retrieve information, but also the opportunity to interact or articulate their<br />

opinions on different topics. Numerous works on various social and political objectives devoted to the formation of<br />

open Internet sources of information monitoring systems, in order to prepare digests and reports on keywords as well<br />

as thematic queries regarding opinions on government decisions. Moreover, analysis of rubrics associations as well<br />

as primary semantic and statistical interpretation of the texts is usually carried out. Therefore experts can accomplish<br />

an intellectual data analysis and forecast. On the other hand, it is rather difficult to get punctual predicts and estimate<br />

sufficiency forum users’ opinion strength. In this work we present a methodology in order to automatically estimate<br />

the strength of users’ opinions on text forums regarding governmental decisions. According to our methodology,<br />

quantitative features are automatically extracted from forum posts and then passed to a Support Vector Machine<br />

based classifier where the users’ opinion strength is estimated. The proposed methodology has been validated in<br />

real data. The initial experimental results are presented. Our schema could also be used in a wide range of<br />

applications such as: scenario analysis of important events for political, social, and commercial tasks, public opinion<br />

monitoring, forecasting of tendencies of public opinion and marketing research.<br />

Keywords: eGovernment, knowledge extraction, linguistic analysis, machine learning, opinion strength mining,<br />

support vector machines.<br />

1. Introduction<br />

Electronic government, or eGovernment, is correlated with the use of digital technology in the<br />

management and delivery of public services, by enhancing the efficiency of the public sector and<br />

developing more personal, customized relations between citizens and their government. EGovernment<br />

indicates that management services and functions are transferred onto the internet. Thus, it is a way for<br />

governments to use the most innovative information and communication technologies to offer citizens<br />

efficient access to information and services (Hayat 2009). The Semantic Web plays a crucial role in<br />

automatic delivery of customized eGovernment services. It extends the existing Web by providing a<br />

framework for technologies that give meaning to data and applications for automatic processing. (Gribble<br />

D.S.et al., 2000). Web 2.0 enhances the creativity, collaboration, information sharing and functionality of<br />

the web. Wikis, social networking and folksonomies are often focused on personal life, and many on<br />

professional life. In the professional or business environment, both private and public sectors are very<br />

interested in offering the best services to the users. (Decman, 2009). With the explosion of the Web 2.0<br />

platforms such as blogs, discussion forums, peer to peer networks, and various other types of social<br />

media citizens have at their disposal a soapbox of unprecedented reach and power by which to share<br />

their experiences and opinions positive or negative, regarding any product or service. (Zabin and<br />

Jefferies, 2008).<br />

It is well known that “What other people think” has always been an important piece of information for most<br />

of us during the decision making process. Long before awareness of the World Wide Web became<br />

widespread, many of us asked our friends who they were planning to vote for in local elections, requested<br />

reference letters regarding job applicants from colleagues, or consulted Consumer Reports to decide<br />

which product to buy. But the internet and the Web have now (among other things) made it possible to<br />

find out about the opinions and the experiences of those in the vast pool that are neither our personal<br />

acquaintances nor well known professional critics – that is, people we have never heard of. And<br />

conversely, more and more people are making their opinions available to strangers via the internet.<br />

(Pang and Lee, 2008). On the other hand, businesses firms have used data mining, for years, to analyze<br />

customer demographics and transaction history to better target direct marketing efforts. Recent advances<br />

547


George Stylios et al.<br />

in computer speed and the collecting of data by many businesses have inspired the improvement of<br />

software to achieve today’s mining abilities. As parallel processing and the use of artificial intelligence<br />

have met with improvements in software and growing business awareness of the benefits of database<br />

analysis, DM and related fields, based on both statistical tools and computer science, have emerged.<br />

Opinion mining has recently become a topic of interest trying to combine statistics, Artificial Intelligence<br />

and Data Mining technologies in a unified framework. (Pang and Lee, 2008). Negative and positive<br />

opinions can be used as guidelines for companies to change their strategies toward specific target<br />

groups, customers to decide on the purchase of a product or destination place for their holidays and<br />

lately for governments to improve services, launch campaigns etc (Ku et al, 2007). Traditionally opinion of<br />

the people was acquired through Gallup polls and questionnaires. The latest trend however is to extract<br />

public opinion expressed in text documents in the web (blogs, forums), information that might be more<br />

objective since it is expressed without any “pressure”. On the other hand the tendency of a person for or<br />

against an argument, a product etc is not as easily extracted as in the case of specific questionnaires. It<br />

is therefore somewhat subjective posing an extra difficulty in the analysis of this information.<br />

2. Related work<br />

As is well known, opinions matter a great deal in politics. Some work has focused on understanding what<br />

voters are thinking, whereas other projects have as a long term goal the clarification of politicians’<br />

positions, such as what public figures support or oppose, to enhance the quality of information that voters<br />

have access to. The field of web opinion mining and sentiment analysis is well-suited to various types of<br />

intelligence applications e.g. Government intelligent. Web opinion mining aims to extract, summarize, and<br />

track various aspects of subjective information on the Web. Ku, (Ku et al, 2007) applied web mining<br />

techniques to mine positive and negative sentiment words and their weights on the basis of Chinese word<br />

structures. Xu (Xu and Ramnath, 2009) proposed a system for opinion mining using poll results on the<br />

web dealing with opinion answering question, opinion mining on a single object and opinion mining on<br />

multiple objects. Furuse (Furuse et al., 2007) developed a search engine that can extract opinion<br />

sentences relevant to an open-domain query -based not only on positive or negative measurements but<br />

also on neutral opinions, requests, advice, and thoughts- from Japanese blog pages. Miao (Miao et al,<br />

2009) proposed AMAZING, a sentiment mining and retrieval system which mines knowledge from<br />

consumer product reviews by utilizing data mining and information retrieval technology based on a<br />

ranking mechanism taking temporal opinion quality and relevance into account to meet customers’<br />

information needs. Zhai (Zhai et al, 2011) developed Opinion Observe to compare consumer opinions of<br />

different products based on online reviews, while Sun (Sun et al., 2006) created BlogHarvest which is a<br />

blog mining and search framework that extracts the interests of the blogger, finds and recommends blogs<br />

with similar topics and provides blog-oriented search functionality. An opinion utility named Jodange was<br />

builted in the Leveraging Cornell University. Jodgane identifies opinion holders on issues, organizations,<br />

or people of interest. It can track the impact of an issue via publication, region, opinion holder, tonality or<br />

any other measurement, uncover important sentiment trends on key issues and correlate opinions<br />

against specific outcomes. VIStology's IBlogs (http://www.vistology.com/about/about.html) project, funded<br />

by the Air Force Office of Scientific Research’s Distributed Intelligence provides blog analysts a tool for<br />

monitoring, evaluating, and anticipating the impact of blogs by clustering posts by news event and<br />

ranking their significance by relevance, timeliness, specificity and credibility, as measured by novel<br />

metrics. This technology allows analysts to discover, from the bottom up, the important/critical issues in a<br />

local blogosphere, by providing measurements particular to that locale alone. The need for identifying<br />

opinions has motivated a number of automated methods for detecting opinions or other subjective text<br />

passages (Wiebe, Bruce, & O’ Hara, 1999; Hatzivassiloglou & Wiebe 2000; Wiebe 2000; Wiebe et al<br />

2002; Yu & Hatzivassiloglou 2003) and assigning them to subcategories such as positive and negative<br />

opinions (Pang, Lee, & Vaithyanathan 2002; Turney 2002; Yu & Hatzivassiloglou 2003). A variety of<br />

machine learning techniques have been employed for this purpose, generally based on lexical cues<br />

associated with opinions. However, current approaches share a common pattern. They focalize on an<br />

entire document (Pang, Lee, & Vaithyanathan 2002; Turney 2002) or an complete sentences (Wiebe,<br />

Bruce, & O’Hara 1999; Hatzivassiloglou & Wiebe 2000).<br />

Although all the above mentioned research deals with web opinion extraction, according to our<br />

knowledge there is no previous work reported regarding automated assessment of blog or post user’s<br />

opinion strength. Apparently, it is of great importance not only to extract someone’s opinion (positive or<br />

negative), but also to estimate if someone supports his/hers opinion with arguments or epicheiremas (i.e<br />

opinion strength). In the following sections, initially we describe our methodology which automatically<br />

estimates post/blog users opinion strength. The proposed methodology is validated using real data<br />

548


George Stylios et al.<br />

coming from the website of a newspaper. The initial results are provided next in the experimental<br />

evaluation section. Finally, our conclusions and future work are described in the concluding remarks<br />

section.<br />

3. Proposed methodology<br />

Text materials from many web sources (e.g., posts, blogs) usually mix facts and opinions. Automatically<br />

determining posts provided from users using arguments to support their personal opinion (positive<br />

opinion strength) would help in selecting the appropriate type of information given an application and in<br />

organizing and presenting that information. In this work, we provide a methodology that automatically<br />

classifies user’s opinion strength into two classes, high or low, using quantitative features being extracted<br />

from posts or blogs. For that reason a Support Vector Machine (SVM) classi er is employed (Vapnik,<br />

1995) A classification task based on SVM usually involves training and testing data, which consist of a<br />

number of data instances. Each instance in the training set contains one ‘‘target value’’ (class labels) and<br />

several ‘‘attributes’’. The goal of the SVM is to produce a model, that predicts a target value of data<br />

instances in the testing set in which only the attributes are given. Let a training set of instance-label pairs<br />

be<br />

(xi, yi ), i = 1, . . ., p (1)<br />

where xi is the training vector of original data belonging to one of two classes (high opinion strength, low<br />

opinion strength), p is the number of the blogs/posts and indicates the (one of the two) class<br />

of xi . The support vector machine requires the solution of the following optimization problem:<br />

subject to ,<br />

(2)<br />

(3)<br />

where b is the bias term, w is a vector perpendicular to the hyperplane , ξ the factor of classification<br />

error and c>0 is the penalty on parameter of the error term. The training vectors xi are mapped into a<br />

higher dimensional space by the function , where is a feature space where the data are<br />

separable. SVM finds a separating hyperplane with the maximal geometric margin and minimal empirical<br />

risk in this higher dimensional space. is defined as<br />

where is the decision function defined as<br />

, (4)<br />

(5)<br />

with (6)<br />

being the kernel function, the weighting factors and the bias term. In our case the kernel is a radial<br />

basis function (RBF), which is defined as<br />

where<br />

, , (7)<br />

(σ is the standard deviation) is a parameter on the kernel. The RBF kernel non-linearly maps samples<br />

into a higher dimensional space, so it can handle cases when the relation between class labels and<br />

attributes is non- linear. The parameters γ and C were defined heuristically. In our application we have<br />

used the SVM training algorithm provided by the LIBSVM library (Chang and Lin, 2001).<br />

In order to increase our classification results, a Correlation Feature Selection (CFS) procedure is used to<br />

rank the extracted features. The CFS algorithm, proposed by Hall (Hall, 2001) is based in the central<br />

hypothesis that good feature sets contain features that are highly correlated with the class (valid, not<br />

valid), yet uncorrelated with each other. CFS is a filter approach independent of the classification<br />

algorithm by considering the individual predictive ability of each feature along with the degree of<br />

549<br />

(8)


George Stylios et al.<br />

redundancy between them. Subsets of features that are highly correlated with the class while having low<br />

intercorrelation are preferred.<br />

4. Experimental evaluation<br />

To evaluate the proposed methodology we have gathered data derived from 297 users’ comments<br />

(posts) published on the Nafteboriki newspaper’s blog (http://www.naftemporiki.gr/debates/). The<br />

comments were written about a certain subject about the issue of publishing the names of people who<br />

don’t pay their taxes or not, and they concern a two months time period, during which the Greek<br />

government would decide if the decision would be implemented. A comment can be added by any user,<br />

anonymously or not, even when he is not a subscriber for the newspaper. An experienced sociologist<br />

after reading carefully all posts, annotated each one of the as “high opinion strength” if the user support<br />

his/her opinion using arguments or “low opinion strength” otherwise. The expert’s opinion is used as a<br />

golden standard for our classification schema. A freely available tagger software initially created by<br />

¨Natural Language Processing Group Department of Informatics - Athens University of Economics and<br />

Business (http://nlp.cs.aueb.gr/software.html), is used to characterize every part of each post as noun,<br />

adjective, verb or punctuation symbol. This software automatically tags nouns, adjectives, articles, verbs,<br />

conjunctions and adverbs using different colors as shown in Figure. 1a<br />

Figure 1: (a) The Tagger software automatically tags nouns, adjectives, articles, verbs, conjunctions and<br />

adverbs using different colors. (b) A script is used to count the total number of nouns,<br />

adjectives, verbs and punctuation symbols per post<br />

In order to count (for every post) the total number of nouns, adjectives, verbs and punctuation symbols a<br />

script is prepared (Figure. 1b). Finally, word count of Microsoft office Word software is used to count the<br />

number of words in each post. Using the above described procedure the following features are extracted<br />

for each post (Table 1):<br />

The constructed dataset consists of the above mentioned features extracted for 297 posts. 186 of them<br />

are classified by the expert as “high opinion strength” and 111 are classified as “low opinion strength”.<br />

Having applied the RBF kernel SVM algorithm in our dataset the initial classification accuracy is 73.06%.<br />

The confusion matrix of the classification problem is provided in Table 2.<br />

550


Table 1: Extracted features<br />

George Stylios et al.<br />

Feature # Feature description<br />

1. # of words per comment.<br />

2 # of nouns divided by the # of words per comment.<br />

3 # of adjectives divided by the # of the words per comment.<br />

4 # of verbs divided with the # of the words per comment.<br />

5 The spelling mistakes divided with the # of the words per comment.<br />

6 Usage of uppercase letters or not (usage designated as 1, where lack of usage was designated as<br />

0).<br />

7 Usage of punctuation symbols i.e. dots, commas, interrogation marks etc (usage designated as 1,<br />

where lack of usage was designated as 0).<br />

Table 2: Confusion matrix produced using all available features<br />

Class Classified as<br />

low opinion strength<br />

Classified as<br />

high opinion strength<br />

Low opinion strength 62 49<br />

High opinion strength 31 155<br />

To enhance our classification results we have applied the CFS feature selection algorithm. The best<br />

ranked features are shown in Table 3.<br />

Table 3: Best ranked features according to CFS algorithm<br />

Ranking # Feature<br />

1 # of words per comment.<br />

2 # of nouns divided by the # of words per comment.<br />

3 # of verbs divided with the # of the words per comment.<br />

4 Usage of uppercase letters or not<br />

After selecting only the top ranked features we apply again the SVM classifier. The obtained accuracy is<br />

78.11%. Table 4 provides the new classification problem confusion matrix. Finally Figure 2 provides a<br />

graphical representation of the two classification schemas comparative results in terms of accuracy.<br />

Table 4: Confusion matrix produced using CFS selected features<br />

Class Classified as<br />

low opinion strength<br />

Classified as<br />

high opinion strength<br />

Low opinion strength 65 46<br />

High opinion strength 19 167<br />

5. Concluding remarks<br />

We have presented an innovative methodology that is able to automatically extract quantitative features<br />

from text web sources (e.g blogs) and classify the user’s opinions strength as “high” if the user supports<br />

his opinion using arguments or “low” otherwise. To validate the proposed methodology we have<br />

constructed a database consisting of seven features (described in Table 1) extracted of 297 posts arising<br />

from a Greek newspaper blog. A Radial Basis Function kernel Support Vector Machine algorithm has<br />

been trained and tested with the above mentioned database. To minimize bias error we have used 10<br />

fold cross validation. The overall classification accuracy achieved from the RBF-SVM was 73,06%. To<br />

increase the classification results we have applied a CFS feature selection method, which provided the<br />

features describe best the classification problem (Low opinion strength, High opinion strength). The best<br />

ranked features according to CFS algorithm are provided in Table 3. The RBF-SVM algorithm overall<br />

classification results using the CFS selected features is 78.11%. Our future works includes the<br />

enrichment of our dataset, the employment of more advanced classifiers in order to increase our<br />

551


George Stylios et al.<br />

classification accuracy and the testing of our methodology into real world posts dealing with different<br />

topics.<br />

Figure 2: Classification comparative results in terms of accuracy.<br />

References<br />

Chih-Chung Chang and Chih-Jen Lin, 2001, LIBSVM : a library for support vector machines.<br />

Decman. Mitja, 2009. “Web 2.0 in eGovernment: The challenges and opportunities of Wiki in Legal Matters”.<br />

Proceedings of the 9th <strong>European</strong> <strong>Conference</strong> on eGovernment, pp 229-236.<br />

Furuse O., Hiroshima N. Yamada S.and Kataoka R., 2007, “Opinion sentence search engine on open-domain blog”,<br />

Proceedings of the 20th international joint conference on Artifical intelligence in Hyderabad, India, pp.2760-<br />

2765<br />

Gribble D. S.et al., 2000 “Scalable, Distributed Data Structures for Internet Service Construction,” Proc. 4th Symp.<br />

Operating Systems Design and Implementation, Usenix Assoc., pp. 319–332.<br />

Hall M.A., 1998, “Correlation-based Feature Subset Selection for Machine Learning” Hamilton, New Zealand, 1998.<br />

Hatzivassiloglou, V., and Wiebe, J. 2000. “Effects of adjective orientation and gradability on sentence subjectivity.” In<br />

proceedings of the <strong>Conference</strong> on Computational Linguistics.<br />

Hayat. Ali, Linda Macaulay and Liping Zhao. 2009. “A Collaboration Pattern Language for e-Participation”:A Strategy<br />

for Reuse”. Proceedings of the 9th <strong>European</strong> <strong>Conference</strong> on eGovernment, pp 29-39.<br />

Jian-Tao Sun, Xuanhui Wang, Dou Shen, Hua-Jun Zeng, and Zheng Chen. 2006 “Cws: A comparative web search<br />

system.” In International <strong>Conference</strong> on World Wide Web (WWW), 2006<br />

Ku LW Chen H.H 2007 “Mining opinions from the Web: Beyond relevance retrieval Source”, Journal of the American<br />

Society for Information Science and Technology Volume 58, Issue 12,October 2007<br />

Pang Bo and Lee Lillian, 2008. “Opinion Mining and Sentiment Analysis.” Foundations and Trends in information<br />

Retrieval. Vol 2 Nos. 1-2, pp1-135. DOI:10.1561/1500000001.<br />

Pang, B.; lee, L.; and Vaithyanathan, S. 2002. “Thumps up? Sentiment classification using machine learning<br />

techniques”. In Proceedings of the 2002 <strong>Conference</strong> on Empirical Methods in Natural Language Processing<br />

(EMNLP-02)<br />

Qingliang Miao, Qiudan Li and Ruwei Dai, 2009 “AMAZING: A sentiment mining and retrieval system”, Expert<br />

Systems with Applications<br />

Turney, P. 2002. “ Thumps up or thumbs down? Semantic orientation applied to unsupervised classification of<br />

reviews. In Proceedings of the 40th Annual Meeting of the association for Computational linguistics.<br />

V. Vapnik,1995, “The nature of statistical learning theory”, Springer, New York.<br />

Wiebe, J., Wilson, T.; Bruce, R.; Bell, M.; and Martin, M 2002. “Learning subjective language.” Technical Report TR –<br />

02-100, Department of Computer Science, university of Pittsburgh, Pittsburgh, Pennsylvania.<br />

Wiebe, J.; Bruce, R.; and O’Hara, T. 1999. Development and use f a gold standard data set for subjectivy<br />

classifications. In Proceedings of the 37th Annual Meeting of the Association for Computational Lingyistics<br />

(ACL-99), 246-253.<br />

Wiebe, J.2000. “Learning subjective adjectives from corpora”. In Proceedings of the 17th National <strong>Conference</strong> on<br />

Artificial Intelligence (AAAI -2000).<br />

Xu Z.and R. Ramnath, 2009 “Mining Opinion from Poll Results in Web Pages,” WWW2009, April 20-24, 2009, Madrid<br />

Spain<br />

Yu, H., and Hatzivassiloglou, V 2003. “Towards answering opinion questions: Separating facts from opinions and<br />

identifying the polarity of opinion sentences”. In Proceedings of the <strong>Conference</strong> on empirical Methods in Natural<br />

language Processing<br />

Zabin J and Jefferies A, 2008 “Social media monitoring and analysis: Generating consumer insights from online<br />

conversation”, Aberdeen group Benchmark Report.<br />

Zhongwu Zhai, Bing Liu, Hua Xu and Peifa Jia, 2011 "Clustering Product Features for Opinion Mining." to appear in<br />

Proceedings of Fourth ACM International <strong>Conference</strong> on Web Search and Data Minin, Hong Kong, China.<br />

552


An Efficient, Effective eGovernment Enterprise Resource<br />

Planning Model<br />

John Douglas Thomson<br />

RMIT University, Melbourne, Australia<br />

doug.thomson@rmit.edu.au<br />

Abstract: The purpose of this empirical research by two public servants over twelve months was to develop an<br />

efficient and effective generic ERP database model and to minimize its impact on their agency. The ERP database<br />

so developed met agency performance requirements, did not require adjustment of agency structures, systems or<br />

processes, or any additional resources, change management or special training. The model, which may be suitable<br />

for adoption by others (particularly developing countries), was based on the agency’s existing data across almost all<br />

industry sectors over a period of six financial years. Contrary to vendor developed and imposed ERP models, the<br />

impact of this model on the agency was minimal.<br />

Keywords: ERP; agency; performance; impact<br />

1. Introduction<br />

The purpose of this empirical research by two public servants over twelve months was to develop an<br />

efficient and effective generic Enterprise Resource Planning (ERP) database model and to minimize its<br />

impact on their agency. The ERP database so developed met agency performance requirements, did not<br />

require adjustment of agency structures, systems or processes, or any additional resources, change<br />

management or special training. The model, which may be suitable for adoption by others (particularly<br />

developing countries), was based on the agency’s existing data across almost all industry sectors over a<br />

period of six financial years. Contrary to vendor developed and imposed ERP models, the impact of this<br />

model on the agency was minimal.<br />

ERP is an agency wide computer software system used to manage and coordinate all the resources,<br />

information and functions of a business from shared data stores (Esteves and Pastor, 2004). An ERP<br />

system can facilitate the smooth flow of common functional information and reduce cycle times. However,<br />

without top management support and an appropriate business strategy, plan and vision, the reengineering<br />

of business processes, effective project management, user involvement and education and<br />

training, eGovernment agencies cannot embrace the full benefits of such complex systems. The risk of<br />

failure might be at a high level (Al-Fawaz, Zahran and Tillal, 2008). Due to the complexities of most ERP<br />

systems and the negative consequences of a failed ERP implementation, most ERP vendors have<br />

included ‘best practice’ in their software. These are what the ERP vendor may deem as the most efficient<br />

way to carry out a particular business process in an integrated enterprise-wide system (Monk and<br />

Wagner, 2009) – that is, from the ERP vendor’s point of view and not necessarily from an agency’s point<br />

of view.<br />

Most ERP vendor systems were initially designed to be used by discrete manufacturing companies rather<br />

than for government (Khosrow-Pour 2006). While this is changing, agencies have variously struggled with<br />

different ERP vendors to modify core ERP vendor programs to their needs (Khosrow-Pour 2006).<br />

Vendors have only recently begun to offer specially tailored ERP application sets, but there is still much<br />

customization work to do (Khosrow-Pour 2006). Packaged applications now target agencies including<br />

higher education (Khosrow-Pour 2006). Thus it is necessary for agencies to perform a thorough business<br />

process analysis before selecting an ERP vendor and undertaking ERP implementation. Such analysis<br />

should map current structures, systems and operational processes to enable the selection of an ERP<br />

vendor whose standard modules are most closely aligned with the established agency’s (King 2005;<br />

Yusuf, Gunasekaran and Abthorpe, 2004). ERP implementation is difficult and can be politically charged.<br />

Agencies are often structured into nearly independent functions, each having different processes,<br />

business rules, data semantics, authorization hierarchies and decision centres (Daneva and Wieringa,<br />

2008). ERP implementation can cause significant centralization of arrangements, such that once<br />

implemented may then limit the freedom and flexibility of agencies to adapt quickly to environmental<br />

changes without incurring significant costs, lengthy duration delays, significant change management and<br />

agency turmoil.<br />

While the adoption of ERP has been viewed as a means of reducing costs, in practice such<br />

implementation often increases costs (Cordella & Simon 97, Cordella 2001, Cordella 2006). Such costs<br />

553


John Douglas Thomson<br />

vary from agency to agency. The ICT Development Index provides IT benchmarking information across<br />

nations indicating that ‘large disparities remain among countries’ (ITU, 2009). Low income countries are<br />

low on the index, with an important element being ‘the cost of ICT services’ (ITU, 2009).<br />

ERP data is often spread throughout different agency functions such as accounting, project management,<br />

purchasing and procurement, and supply logistics. Wittmann & Cullen (2000) suggest that such data is a<br />

key value driver. In many agencies it remains an untapped source of core government business data. It<br />

could be that this is because its value is not recognised or is deliberately obsfuscated by agencies (eg<br />

recent anti-corruption initiatives by the UK government), or that some or all of these functions have been<br />

outsourced to an external provider and so have become opaque to an agency’s management. Whilst it<br />

may be an attractive option, outsourcing such core functions may lead to becoming dependent upon<br />

external, often rent seeking, ERP vendors. Such rent seeking can take the form of demands for system<br />

and software adoption and subsequent upgrades, specialist training for staff, ongoing license fees on a<br />

per user basis (so limiting the number of users within the agency because of the cost per user),<br />

consultancy fees, special service fees and so on. Once committed to such ERP arrangements, it is<br />

difficult for an agency to break out of such contracts without suffering heavy costs. But to remain in the<br />

arrangement is also very costly – it becomes a most effective monopoly for the ERP vendor.<br />

It is critical for agencies to determine if their way of doing business will fit a standard ERP vendor<br />

package (Khosrow-pour, 2006) before contracts are signed. There are options – agencies can change<br />

their business structure, systems and processes to accommodate the ERP vendor software, or they can<br />

modify the software to fit their structure and processes. ERP vendors argue that modifying their software<br />

will ‘slow down the project, introduce dangerous bugs into the system and make upgrading the software<br />

to the ERP vendor’s next release excruciatingly difficult because the customizations will need to be torn<br />

apart and rewritten to fit with the new version’ (Khosrow-pour, 2006).<br />

2. Case Illustrations<br />

Waste Management announced in March 2008 that it was suing SAP, seeking the recovery of US$100m<br />

in project expenses that related to a failed ERP vendor implementation started in 2005. In the complaint,<br />

Waste Management alleges that SAP executives participated in a fraudulent sales scheme and that<br />

SAP's Waste and Recycling ERP product was actually fake software that was still not ready for Waste<br />

Management's use by Spring 2008 (Financial Times HE Supplement 2008).<br />

An ERP study conducted by Lugwigshafen University of Applied Science (Ludwigshafen University 2004)<br />

surveyed 192 companies. It concluded that companies which implemented SAP’s industry best practices<br />

decreased mission-critical project tasks such as configuration, documentation, testing and training.<br />

In a Deloitte Consulting survey of 64 Fortune 500 companies (Deloitte, 2008; Khrosrow-Pour 2006;<br />

Saleh, Abdullaziz and Alkattan, 2006), one in four admitted they suffered a drop in performance when<br />

their ERP vendor system went live - the most common reason for the performance problems was that<br />

everything looked and worked differently from the way it did before, which occurs when people can’t do<br />

their jobs in the familiar way and haven’t yet mastered the new way.<br />

RMIT University, an Australian top 200 global university in 2007 (Financial Times HE Supplement 2008)<br />

undertook to integrate basic student administration (and related financial) tasks with web-enrolments, the<br />

alumni system and other peripheral tasks. It went live in October 2001. According to Gray (Gray, 2003),<br />

the PeopleSoft ERP implementation was subsequently the subject of a Victorian Government Auditor<br />

General's Report (Victorian Auditor General, 2003) following the ERP vendor system's failure to deliver.<br />

The problems that followed cost RMIT University more than AU$47m, or 3.7 times the original budget<br />

(Victorian Auditor General, 2003).<br />

The hidden vendor costs of ERP most likely to result in budget overrun are training (expensive);<br />

integration and testing (high risk); customization (expensive); data conversion (from old systems to new<br />

ERP vendor systems); data analysis (combined with data from external systems for analysis purposes);<br />

consultants (ad infinitum); retaining the agency’s trained ERP employees; implementation (never stops);<br />

waiting for the agency’s ROI; post-ERP depression; and adjusting to the new ERP vendor system.<br />

Similar examples abound. Gray (2003) suggests that rather than trying to modify the ERP vendor<br />

software systems to suit an agency’s business processes, there is a need to look at ways of modifying<br />

the business’s processes to suit the ERP vendor system. However, this may lead to other acute and<br />

554


John Douglas Thomson<br />

expensive complications in writing software variations and revising and adjusting business structures and<br />

processes. Is this ‘the tail wagging the dog’? Is an ERP system a tool of management or vice versa?<br />

3. The story in brief<br />

Why do ERP projects fail so often? At its simplest level, Wailgum (2007) suggest that ERP is a set of<br />

‘best practices’ for performing different functions including e-procurement, logistics, finance, HR, and<br />

other processes. To get the most from the ERP vendor software, they argue that employees need to<br />

adopt the work methods outlined in the software. If public servants in the different agencies that will use<br />

ERP don’t agree that the work methods embedded in the software are better than the ones they currently<br />

use, they will resist using the software or will want IT to change the software to match the ways they<br />

currently do things. This can be where ERP vendor projects break down. Political fights break out over<br />

how, or even whether, the ERP vendor software should be installed. IT becomes involved in long,<br />

expensive customization efforts to modify the ERP vendor software to fit the business requirements.<br />

Customizations make the software more unstable and harder to maintain when it is implemented.<br />

Because ERP covers so much of what an agency does, a failure in the software can bring an agency to a<br />

halt.<br />

Every agency is different, with unique work methods that an ERP vendor cannot account for when<br />

developing its software. Further, changing a public servant’s work processes and habits will also create<br />

difficulties, and getting them to use the ERP vendor’s software to improve the ways they do their jobs<br />

may be a harder challenge, particularly if it means that on success, many will lose their jobs through<br />

‘productivity benefits and efficiency gains’. If the government agency is resistant to change, then an ERP<br />

project is more likely to fail.<br />

So rapid have been software and hardware improvements that strategy developing and decision making<br />

senior public servants are sometimes unaware of the inherent latent usable potential available to<br />

prosecute their interests – there may also be generational issues here. In some agencies, existing public<br />

servant ICT expertise may not be being realized or valued. Since 2000, there have been significant<br />

improvements in the computing power of generic hardware and software database tools for which there<br />

are ‘at no cost’ upgrades. Inexpensive training in the use of generic database software is accessible at<br />

low cost. Such may be the skill and curiosity of many public servants about ICT that no additional training<br />

is necessary. These ICT skills may be applicable to ICT challenges such as ERP, which function through<br />

establishing central databases. Standardization of software code makes it possible for agencies to<br />

develop their own ERP arrangements using their own employees who are already familiar with their<br />

agency’s structure, agency and culture.<br />

4. The challenge<br />

There has been at least one agency which used its internal resources to develop an efficient and<br />

effective ERP model at low cost over a period of 12 months. The innovation challenge was to implement<br />

government ICT policy through the internal development of an agency wide central ERP e-procurement<br />

database using standard generic database software, existing resources and data at lowest cost, in<br />

minimum time with maximum agency acceptance. This became an evidence based, longitudinal action<br />

research for a complex, high tech Australian Federal Government Department of around 90,000<br />

employees. In F/Y 2008-09 the agency procured more than AU$9.6 billion equipment and services, and<br />

employed over 7,500 people in more than 40 locations around Australia and overseas (DEF 09).<br />

Hundreds of small to large enterprises are dependent on the agency for orders, so whatever software is<br />

adopted would have an impact on them also. The more generic the software, the less cost and more<br />

efficient and effective for suppliers. The selection of Microsoft Access software (MIC 07) was made<br />

because the agency was already committed to generic Microsoft software as its standard and it was<br />

readily available to suppliers.<br />

The ERP design performance specification was determined after lengthy fieldwork discussions with many<br />

internal and external stakeholders. These were:<br />

First: it had to be simple, reliable, accurate and timely and kept current with new data entry as eprocurement<br />

transactions occurred;<br />

Second: it had to respond to internal customer’s many and varied needs on an established work<br />

priority basis but be capable of modification or adjustment should these needs change;<br />

555


John Douglas Thomson<br />

Third: it had to be user friendly, easy and intuitive to use with minimal if any training, simple to<br />

understand in concept and structure, and be perceived and accepted by authorized users as of value<br />

and not as a threat to their jobs; and<br />

Fourth: it needed to be developed, installed and maintained using existing data and resources at no<br />

additional resource, transaction or capital cost to the agency.<br />

To achieve these performance criteria, the boundaries of the model were based on existing financial data<br />

for each financial year’s transactions. This data was readily available, but spread throughout various<br />

functional areas such as accounting, project management, procurement and supply logistics. Initial<br />

exploratory research found there were around 250,000 electronic procurement transactions per annum,<br />

around 200,000 of which were under AU$2,000 in individual value. The ERP data for these less than<br />

AU$2,000 commodity purchases, large in number (greater than 90% of the total number of transactions)<br />

but individually very small in value (less than 10% of the annual spend), was already available through<br />

bank card statements and could be added to the database later if necessary. Details of the remaining<br />

(approximately) 50,000 e-procurement transactions, each above the agency bank card delegation of<br />

AU$2,000, were publicly available through the Federal Government Gazette and formed the basis of the<br />

initial generic ERP database model. These data were collected from a range of internal and external<br />

stakeholders.<br />

5. One unique field required<br />

For the ERP database model development, an unique attribute common to every transaction was<br />

necessary. This unique field, the Purchase Order number, provided the means by which data within and<br />

across each financial year was identified. This unique attribute thus provided the basis for the individual<br />

records of related data to be selected, interrogated, dissected, grouped and extracted in many shapes<br />

and forms. A ‘flat file’ structure made access to all data in the database easy and quick to access by<br />

authorized employees with very limited training. This approach ensured every authorized employee was<br />

able to intelligently determine the usefulness of the database to their own particular needs. Any masking<br />

of the ‘flat file’ data restricted and limited the usefulness of the database. Usually ERP vendors do not<br />

advocate such transparency of the entire database to all authorized users, but instead advocate ‘reports’.<br />

This was found to be an inefficient and much less effective approach than keeping the data open and<br />

transparent to all authorized users. Vendors also argue that a simple database such as MS Access is<br />

inadequate to cope with such a challenge. Again this was found not to be the case. The simple MS<br />

Access relational database ‘flat file’ structure used did not overload or make the database complicated or<br />

difficult to interrogate by authorized users. In fact, other relational database fields were subsequently<br />

added as ‘pull down’ menus, such as Zip Codes and Industry Codes (ANZIC). Pull down menus for buyer<br />

and supplier attributes, such as address, contact person, email addresses, telephone numbers and so on<br />

were also added. Any user that had a need for reports were able to design and develop them themselves<br />

as necessary, because of their access to the ‘flat file’ database, simplicity of the software and the easily<br />

understood database infrastructure.<br />

6. Intuitive use<br />

The structure of the extended relational database fields with each individual record tied to its unique<br />

Purchase Order (P/O) number was based on the chronology of the capability acquisitions ie in the order<br />

in which the processes occurred - from the agency buyer to product/price to supplier to delivery to final<br />

location – no changes to existing agency structure, systems or processes were required. Data included<br />

fields for the buyer’s name, buyer’s address and contact details, contract, contract type, account number,<br />

purchase order number and date, portfolio, department, division, branch, agency, and postcode, and<br />

details of payment arrangements and progress; product description and ANZIC industry code (Australian<br />

Bureau of Statistics, 1998), value and industry sector; supplier company number, name and address, and<br />

contact details. Other data required by specialist agency areas could be added as required (Figure 1).<br />

In this systems format, the data was able to be intuitively understood and interrogated by authorized<br />

users of the database, who were able to draw upon accurate and timely procurement, financial, project<br />

and supply records continuously updated with new information at the end of each month. Thus the<br />

AU$3b to AU$4b per annum history of strategic capability acquisition over six financial years was<br />

established on a part time basis by two employees over a twelve month period. Good relations with all<br />

stakeholders were maintained during the development period, no consultants, or expensive vendor<br />

software, or special training or ongoing license fees were necessary in the development and<br />

establishment of this ERP infrastructure.<br />

556


Figure 1: The chronology of capability acquisition<br />

John Douglas Thomson<br />

Some of the many possible fields in and uses of the database are shown in Table 1. These fields reflect<br />

the nature of the ERP business of the agency, which are largely common to most agency procurement<br />

activities. The ‘flat file’ database structure can be readily and rapidly ‘cut and diced’ by any authorised<br />

user to obtain desired data or develop reports. No change management or adjustments to systems or<br />

processes were required, no changes to agency or structure, and no threat of job losses to employees.<br />

Table 1: An example of some few of the possible database attributes (columns) and records (rows).<br />

P/O<br />

no<br />

Date 2008 Value<br />

(AU$K)<br />

A/P to date<br />

AU$K)<br />

Agency Cost<br />

Centre<br />

Supplies<br />

description<br />

446 18Dec 9,103 8,197 DCPM PINTAIL<br />

radios<br />

Qty Supplier<br />

20 Stanilite<br />

Electronic<br />

447 25Dec 7,557 6,000 DNSDC Lep’chaun lease 1 Dan Murphy<br />

448 01Jan 6,320 0 MM Goods 65 Disney<br />

Land<br />

7. Corrupt practices<br />

With this ERP database, the coordination and knowledge management problems associated with<br />

incomplete supply and transaction information and corporate governance issues are reduced. With<br />

accurate scrutiny of historical e-sourcing data over several financial years, an agency is better able to<br />

choose the most efficient and effective e-sourcing arrangements so reducing its transaction and other<br />

costs. It is also able to better synchronize the motivation of its agencies and its suppliers by reducing the<br />

differences of interest and information between the two, with panoptican transparency and trust<br />

(Bentham, 1785). This reduces the opportunities for internal or external rent seeking activities. The ERP<br />

database immediately provides accurate details of each product (good or service) purchased, by whom<br />

and from which supplier in which industry, when and where, at what cost, as well as the current status of<br />

the account. This transparency in itself reduces the potential for, or possibility of, corrupt practices.<br />

8. Need to know, now<br />

Government agencies, for a wide range of reasons, need to know with whom they are doing business,<br />

what business, and what financial exposure they have at any particular point of time. They need to know<br />

now, not in a month, or a week, or tomorrow, but now. Access to this ERP database enabled the agency<br />

to know immediately the number and value of transactions, and with whom it was doing business over<br />

the six financial years the database covered. This is demonstrated across two financial years of the ERP<br />

database (Figure 2).<br />

9. Benchmark buyer delegation limit<br />

Figure 3 demonstrates both the value of notifications of value greater than the agency’s (then) bank card<br />

delegation limit of AU$2,000 and the number of the notifications in this category. This information is<br />

useful if the level of delegations is to be reconsidered, particularly as each product (good or service)<br />

557


John Douglas Thomson<br />

comprising the data can be identified. Such information can also be used to benchmark an agency’s<br />

performance.<br />

AU$m<br />

10000<br />

1000<br />

100<br />

10<br />

1<br />

Figure 2: Value brackets of e-Transactions<br />

AU$m<br />

60000<br />

50000<br />

40000<br />

30000<br />

20000<br />

10000<br />

0<br />

$150m and over<br />

$100m to $150m<br />

$50m to $100m<br />

$20m to $50m<br />

$10m to $20m<br />

$5m to $10m<br />

$1m to $5m<br />

$100k to $1m<br />

$30k to $100k<br />

$2k to $30k<br />

Less than $2k<br />

Value Bracket of Procurement<br />

3768 4054 3768 4159<br />

Value of Notifications<br />

>AU$2,000 (in then year<br />

$m)<br />

Value of Notifications<br />

(AU$m ) at constant<br />

prices<br />

50989<br />

Total greater than $2k<br />

48995<br />

Number of Notifications<br />

>AU$2,000<br />

Figure 3: eProcurement values – global summary<br />

10. Strategic sourcing policy: technology transfer<br />

Major agency contracts, often high tech projects, are a focus of strategic management policy because of<br />

the potential for technology transfer, local high tech industry development and the national benefits to be<br />

derived therefrom. Figures 4 and 5 provide an indication of whether a local high tech strategic sourcing<br />

policy was working or not.<br />

558<br />

Number<br />

F/Y1<br />

F/Y2<br />

F/Y1<br />

F/Y2


FY1<br />

FY2<br />

0<br />

60<br />

52<br />

52<br />

40<br />

John Douglas Thomson<br />

Total number of contracts<br />

Total number of contracts<br />

Awarded to local suppliers<br />

50 100<br />

Figure 4: Number of eProcurement contracts greater than $5m & awarded to local suppliers<br />

FY1<br />

FY2<br />

0<br />

2209<br />

1074<br />

2383<br />

1528<br />

1000 2000<br />

Total Value AU$m<br />

Figure 5: Value of eProcurement contracts greater than $5m awarded to local suppliers<br />

11. Offshore sourcing vulnerability<br />

Total value of contracts<br />

Awarded value to local<br />

suppliers<br />

If there was a major disaster such as a tsunami, earthquake or epidemic, then it is necessary for an<br />

agency to be quickly aware of the possible effects on its offshore suppliers. Figures 6 and 7 provide<br />

examples of aggregated data of country of origin from which the agency was obtaining supplies. The data<br />

from each country can of course be broken down into individual supplier details, products being supplied<br />

by each supplier, and contract progress details.<br />

12. Agency business centre comparative performance<br />

Figures 8 and 9 provide a summary of the activities being undertaken by each of the agency’s business<br />

unit each financial year. Resourcing efficiency and effectiveness across agency business centres is a key<br />

issue and such data can indicate the relative efficiency and effectiveness with which each business unit is<br />

undertaking its business. Resources can then be justified or reallocated as appropriate, particularly useful<br />

when contracts end and new contracts are let in other locations.<br />

13. Top ten DoD industry sector spend<br />

Each of an agency’s e-procurements can be placed in an industry sector (Figure 10). This extends into<br />

other internal and external data base information relating to that particular industry sector. For example,<br />

other industry agencies such as the Australian Bureau of Statistics has a variety of data for specific<br />

industry sectors (trend, growth, location, demographic etc). These data extensions can be most valuable<br />

for a multitude of agency purposes, and particularly for the development of strategic industry policy.<br />

559<br />

3000


Number<br />

1000<br />

100<br />

10<br />

1<br />

Belgium<br />

Canada<br />

Denmark<br />

Fiji<br />

France<br />

John Douglas Thomson<br />

Country of Origin<br />

Germany<br />

Greece<br />

Indonesia<br />

Ireland<br />

Israel<br />

Italy<br />

Netherlands<br />

Norway<br />

NZ<br />

Singapore<br />

Spain<br />

Sweden<br />

Switzerland<br />

UK<br />

USA<br />

Figure 6: Number of agency eProcurements greater Than $100,000 from non local suppliers<br />

Value AU$<br />

$10,000,000,000<br />

$1,000,000,000<br />

$100,000,000<br />

$10,000,000<br />

$1,000,000<br />

$100,000<br />

$10,000<br />

$1,000<br />

$100<br />

$10<br />

$1<br />

Belgium<br />

Canada<br />

Denmark<br />

Fiji<br />

France<br />

Germany<br />

Greece<br />

Indonesia<br />

Ireland<br />

Israel<br />

Country of Origin<br />

Italy<br />

Netherlands<br />

Norway<br />

NZ<br />

Singapore<br />

Spain<br />

Sweden<br />

Switzerland<br />

UK<br />

USA<br />

Figure 7: Value of agency eProcurements greater than $100,000 from non local suppliers<br />

14. Top ten suppliers by value<br />

A summary of the top ten agency suppliers by number and by value each F/Y was also readily available<br />

from the database. This data is significant from political, industrial, national and international perspectives<br />

(Figures 11 and 12), as the data reveals agency conne4ctions and possible supply and supply chain<br />

vulnerabilities.<br />

DoD Program<br />

Unstated<br />

Washington<br />

London<br />

Science and Technology<br />

Budget and Management<br />

A cquis ition<br />

Strategy and Intelligence<br />

Air Force<br />

Army<br />

Navy<br />

Forces Executive<br />

Figure 8: Number of notifications by business unit<br />

0 2000 4000 6000 8000 10000 12000 14000 16000<br />

Number of Notifications<br />

560<br />

F/Y1<br />

F/Y2<br />

F/Y1<br />

F/Y2


DoD Program<br />

Unstated<br />

Washington<br />

London<br />

Science and Technology<br />

Budget and Management<br />

Acquisition<br />

Strategy and Intelligence<br />

Air Force<br />

Army<br />

Navy<br />

Forces Executive<br />

Figure 9: Number of notifications by value<br />

11%<br />

7%<br />

7%<br />

7%<br />

19%<br />

John Douglas Thomson<br />

0 200 400 600 800 1000 1200 1400 1600 1800<br />

4% 1%<br />

Value of Notifications AU$m<br />

12%<br />

18%<br />

14%<br />

Figure 10: Top ten DoD Industry sector spend for one F/Y<br />

26<br />

55<br />

4<br />

490<br />

14<br />

1730<br />

36<br />

646<br />

Number of Procurements<br />

Figure 11: Top ten suppliers by number of contracts awarded<br />

9<br />

561<br />

3<br />

Transport equipment (12%)<br />

Construction and Construction services (14%)<br />

Consultancy, Property and Business services<br />

(18%)<br />

Computer, office Equipment and Electrical<br />

equipment not elsewhere classified (19%)<br />

Chemicals, Petroleum and Coal Products (7%)<br />

Industrial machinery and equipment (7%)<br />

Electrical equipment,hardware,household<br />

appliances (11%)<br />

Photographic, Professional and Scientific<br />

equipment (7%)<br />

Textiles, clothing and footwear (4%)<br />

Communication services (1%)<br />

Lockheed Martin (14)<br />

Civil and civic (9)<br />

NQEA (36)<br />

ADI (646)<br />

Raytheon (3)<br />

DAS (1730)<br />

Rockwell (55)<br />

CSP (26)<br />

Forgacs (4)<br />

Shell (490)


156<br />

165<br />

99<br />

63 50<br />

77<br />

91<br />

188<br />

John Douglas Thomson<br />

239<br />

Value AU$m<br />

916<br />

Lockheed Martin (916)<br />

Civil and civic (240)<br />

NQEA (188)<br />

ADI (165)<br />

Raytheon (156)<br />

DAS (100)<br />

Rockwell (91)<br />

CSP (77)<br />

Forgacs (63)<br />

Shell (50)<br />

Figure 12: Top ten suppliers by value<br />

15. Price setting and competitive bids<br />

Supplier data can quickly reveal different or in some cases the same suppliers supplying an agency with<br />

the same ‘off the shelf’ product at significantly different prices. This knowledge can be used to re-arrange<br />

competitive bids by fewer suppliers at better prices and so lower an agency’s overall prices and<br />

transaction costs. Alternatively, because ERP data is accurate, timely and easy to access, there may be<br />

no need to limit the number of suppliers of a particular product but price setting may be to a buyer’s and<br />

supplier’s advantage. Such technological innovation enables an agency to review, revise and renew its<br />

existing buyer-supplier strategic sourcing relationships.<br />

16. Conclusion<br />

Many eGovernment agencies are taking advantage of the efficiency and effectiveness gains which can<br />

result from the evolution of new e-business models (Panayiotou, Gayialis and Tatsiopoulos, 2004). Such<br />

agencies are attempting to adopt and adapt the new technologies for public e-procurement in order to<br />

achieve the benefits being realised by entities in the private sector (Panayiotou, Gayialis and<br />

Tatsiopoulos, 2004). In the private sector, this is usually undertaken through the adoption of enterprise<br />

resource planning (ERP).<br />

This empirical research by two public servants over a twelve month period gave rise to an efficient and<br />

effective generic ERP database for their agency. The database did not require any adjustment of existing<br />

agency structures, systems or processes, or any additional resources, change management or special<br />

training. The model, which may be considered for adoption by others, was based on the agency’s existing<br />

data across almost all industry sectors. The model indicates that it is possible for ERP development to be<br />

undertaken by internal resources, so providing both centralized and decentralized functionality, high<br />

amenity, search sensitivity and speed to data by authorized users. The information is transparent,<br />

arranged systematically and logically and can be easily searched intuitively by IT aware authorised public<br />

servants. The high quality, timely data provides a routine basis for the collection, collation and<br />

dissemination of both strategic and detailed e-procurement data. This established one central ERP<br />

database using available generic database software with many uses and users. The model enabled the<br />

sharing and networking of information and provided an accurate historical corporate memory which may<br />

be used for many strategic, operational and audit/anti-corruption purposes.<br />

References<br />

Al-Fawaz, K., Zahran, A., and Tillal, E., (2008) Critical Success Factors in ERP Implementation: a Review, <strong>European</strong><br />

and Mediterranean <strong>Conference</strong> on Information Systems, may 25-26;<br />

Bentham, J., (1785) The Panopticon Writings. Ed. Miran Bozovic (London: Verso, 1995). p. 29-95<br />

Brown, C., and I. Vessey, (2003) Managing the Next Wave of Enterprise Systems: Leveraging Lessons from ERP,<br />

MIS Quarterly Executive, 2(1).<br />

562


John Douglas Thomson<br />

Carayannis, Eg., and Popescu, D., 2005, Profiling a methodology for economic growth and convergence: Learning<br />

from the EU e-procurement experience for central and eastern <strong>European</strong> countries, Technovation pp 1-14<br />

Cordella, A. and Simon, K.A. (1997), The Impact of Information Technology on Transaction and Coordination Cost,<br />

<strong>Conference</strong> on Information Systems Research in Scandinavia (IRIS 20), Oslo, Norway, August 9-12;<br />

Cordella, A. (2001), Does Information Technology Always Lead to Lower Transaction Costs?, The 9th <strong>European</strong><br />

<strong>Conference</strong> on Information Systems, Bled, Slovenia, June 27-29;<br />

Cordella, A (2006), Transaction costs and information systems: does IT add up?, Journal of Information Technology,<br />

21, 195–202;<br />

Daneva, M., and Wieringa, R., (2008) Requirements Engineering for Cross-agencyal ERP Implementation:<br />

Undocumented Assumptions and Potential Mismatches, University of Twente;<br />

Dehning, B., and Stratopolous, T., (2003), 'Determinants of a Sustainable Competitive Advantage Due to an ITenabled<br />

Strategy,' Journal of Strategic Information Systems, Vol. 12, 2003]<br />

Deloitte (2008) ‘In fighting shape? 2008 survey of cost-improvement trends in the Fortune 500’, Deloitte;<br />

Department of Defence, (2009) Defence Materiel Agency, Australian Government;<br />

Esteves, J., and Pastor, J., (2004), Enterprise Resource Planning Systems Research: An Annotated Bibliography,<br />

Communications of AIS, 7(8) pp. 2-54.<br />

Financial Times Higher Education Supplement, (2008) University Rankings, Financial Times Higher Education<br />

Supplement;<br />

Finkle, J., and Chernikoff, H., (2008) ‘Waste Management sues SAP over software quality’, Reuters, Mar 26;<br />

Gray, P, (2003) ‘In depth: RMIT's PeopleSoft disaster’, 30 September, ZDNet Australia<br />

International Association For Impact Assessment, B (1999), Principle of Environmental Impact Assessment Best<br />

Practice, <strong>European</strong> Union.<br />

ITU, (2009) ‘Measuring the Information Society: The ICT Development Index’, International Telecommunication<br />

Union, Geneva, Switzerland;<br />

King. W., (2005) "Ensuring ERP implementation success," in "Information Systems Management", Summer.<br />

Khosrow-Pour, M., (2006) Emerging Trends and Challenges in Information Technology Management, Information<br />

Management Association, International <strong>Conference</strong>, Idea Group Inc;<br />

Ludwigshafen University of Applied Sciences, (2004), Enhanced Project Success Through SAP Best Practices –<br />

International Benchmarking Study, Ludwigshafen University,Germany<br />

Moe, CE., (2004) Public e-Procurement – Determinants of Attitudes Towards Adoption, Electronic Government,<br />

Proceedings Lecture Notes in Computer Science pp 278-282;<br />

Monk, E and Wagner, B, (2009), "Concepts in Enterprise Resource Planning" 3rd.ed.Course Technology Cengage<br />

Learning.Boston, Massachusetts.<br />

Puschmann T and Alt R, (2005) Successful use of e-procurement in supply chains, Supply Chain Management: an<br />

International Journal, (2) pp 122-133;<br />

Saleh, K., Abdulaziz, A., and Alkattan, I., (2006) ‘A Services – Oriented Approach to Developing Security Policies for<br />

Trustworthy Systems’, in Emerging Trends and Challenges in IT Management’, Idea Group Icc;<br />

Turban, A., (2008). Information Technology for Management, Transforming Agencys in the Digital Economy.<br />

Massachusetts: John Wiley & Sons, Inc., pp. 300-343.<br />

Victorian Auditor General, (2003) Report of the Auditor General on RMIT’s Finances, June, State Government of<br />

Victoria, Australia;<br />

Wailgum, T., 2007, ERP Definitions and Solutions, CIO;<br />

Wittmann, C., and Cullen, M., (2000) B2b Internet, First Union Securities.<br />

Yusuf, Y., A. Gunasekaran, And Abthorpe, M., (2004) Enterprise Information Systems Project Implementation: A<br />

Case Study of ERP in Rolls-Royce, in International Journal of Production Economics, 87(3), February.<br />

563


Citizen-Government Interaction in Russia: eGovernment as<br />

Tradition Bearer<br />

Anna Trakhtenberg<br />

Institute of Philosophy and Law, Ural Branch of Russian Academy of Sciences<br />

Yekaterinburg, Russia<br />

cskiit@yandex.ru<br />

Abstract: This paper contains information about the results of sociological study in Urals federal district of Russia<br />

(2010). The study shows that the traditional model of citizen-government interaction based on a desire to move from<br />

formal to informal interaction with the authorities and to appeal directly to the top powers service demand is still<br />

preserved in large scale. Thus, while a state eGovernment proposal is based on the rational bureaucracy ideal and<br />

seeks to maximize the anonymity of service delivery and reduce the number of citizen-official personal contacts the<br />

public demand, on the contrary, is formed on the strategy which aims to convert a bureaucrat into «just a person».<br />

Keywords: eGovernment, statist discourse, interaction with officials, strategy of weak<br />

eGovernment transition, precisely, state and municipal service delivery in an electronic form, is one of the<br />

prior points in the political agenda of the Russian public administration.<br />

Russia is following the global trends. High expectations associated with the radical enhancement of the<br />

quality of governance are set on eGovernment around the world. Therefore, eGovernment transition is<br />

defined as one of the priorities of the UN within the larger process of a global information society<br />

construction.<br />

The statist discourse of eGovernment seems to be in the process of formation. EGovernment is defined<br />

in terms of normative objectives tending to be achieved by «… public administration revitalizing, public<br />

management overhauling, inclusive leadership fostering and moving civil service towards higher<br />

efficiency, transparency and accountability» (United Nations United Nations EGovernment Survey<br />

2010:1).<br />

This is a classical progress discourse within which eGovernment is not an upgraded version of existing<br />

control systems, but the embodiment of an ideal one that, by analogy with the Bill Gates’ term «friction<br />

free capitalism» can be described as «friction free bureaucracy». eGovernment is claimed to ensure free<br />

circulation of information within and between administrative bodies, as well as between authorities and<br />

citizens. This phenomenon is to result in the replacement of hierarchical, inactive and closed bureaucracy<br />

by flexible, horizontally interrelated, open service frameworks, providing services to citizens quickly,<br />

anonymously and without a glitch at 7 / 24 format (seven days a week, twenty-four hours a day). In other<br />

words, eGovernment will allow for a radical reform of administration which leads to elimination of<br />

bureaucracy evils and maintenance of its benefits.<br />

Certainly, there are skeptics, expressing doubt that a technological reform may entail such large-scale<br />

socio-political changes. Few of them articulate their claims with such harshness, as Bradshaw-Lynne,<br />

who described eGovernment policy as largely shaped by hype, rhetoric and normative arguments (2000).<br />

Nevertheless, much attention is paid to the fact that administrative structures obtain strong inertia while<br />

their employees acquire strong resistance to technological innovations and ability to exploit them in their<br />

own interests. Hence, the problem of whether a latent logic of IT development is able to reform existing<br />

governance practices has been reformulated by us in the problem of definition of a discursive practices<br />

complex accompanying the IT emergence in public administration.<br />

In some ways, the procedure of this discursive complex formation was reverse to the initial one. There is<br />

a detailed analysis of how a computer being a soulless tool of bureaucratic control over the masses has<br />

been transformed after discourse processing in the counterculture into an instrument of deliverance from<br />

this control and formation of new, alternative sociality.<br />

In the global statist discourse computers and the Internet once again are included in the dominant<br />

ideology as a synthesis of countercultural democratic discourse with administrative discourse. In this new<br />

discourse the watchword for eGovernment is «citizen-centered practice».<br />

564


Anna Trakhtenberg<br />

The core categories of an eGovernment discourse were formulated in the framework of New Public<br />

Management (NPM) - the movement for public administration modernization under the slogan «process<br />

above hierarchy». The attempt to increase efficiency and quality of public services via transformation of<br />

the government to a large corporation and citizens to customers failed, partly because of ignoring the<br />

values broadcasted in the governance process. As Noordhoek and Saner noted the democratic process<br />

has more goals than the delivery of services (2004). The fact that eGovernment supporters use a NPM<br />

efficiency discourse causes suspicions that they would face the same problem: big promises and<br />

disappointed citizens.<br />

Even now the initiatives on eGovernment matters are constantly hampered by lack of understanding of<br />

those who eGovernment is intended for and who are intended «to be empowered».<br />

According to the UN survey this failure takes the form of divergence of state proposals and public<br />

demand. Despite the fact that an increasing number of countries are making efforts to provide citizens<br />

with electronic content and services and establish on-line dialogue with them a chronic discrepancy<br />

between government offers and citizens’ expectations is noted (United Nations United Nations<br />

eGovernment Survey 2010:5).<br />

Unfortunately, there are relatively few surveys that examine citizens’ perception of eGovernment.<br />

Nevertheless, they display that citizens’ opinion on electronic services is determined by their traditional<br />

perception of the state. Thus, Jae Moon and Welch (2005) while analyzing the citizens and officials’<br />

understanding of the USA eGovernment, highlighted the fact that authorized representatives think within<br />

the bureaucratic (Hamiltonian) tradition while citizens are oriented on democracy (Jeffersonian) tradition.<br />

For this reason, citizens are first of all concerned with the problems of security and privacy while officials<br />

thinking primarily about eGovernment’s ability for provision greater convenience and more information do<br />

not realize that these advantages are of little importance for citizens. The two groups are proved to have<br />

fundamentally different mental practice within a single socio-cultural space.<br />

This conclusion is true for Russia almost as much as for the USA. However, one should mind a radically<br />

different tradition of citizens-officials interaction where the state is both «strict but fair father» and «the<br />

only <strong>European</strong>» implementing a «catch-up» modernization in Russia.<br />

Though international statist eGovernment discourse in Russia is used in a number of top government<br />

documents, such as «Strategy for Information Society Development in Russia» (2008) and its derivative<br />

«Concept of RF eGovernment formation by 2010» (2008), none of the documents speaks about «citizen<br />

empowerment». These are partly consequences of Russian bureaucracy not being involved into<br />

fascination for NPM in the 90-ies (for obvious reasons related to severe systemic crisis), hence, the<br />

corresponding Russian equivalents for «citizen empowerment» and «inclusive leadership» were not<br />

formed). When speaking about eGovernment authorities special attention must be laid to the problem of<br />

eliminating «friction» in the functioning of administrative structures: «it is necessary to achieve<br />

transparency, clarity and simplicity in everyday relations between the state and the citizens» (Medvedev,<br />

2010). The above quote from the Message of the President D. Medvedev in 2010 outlines clearly an<br />

eGovernment discourse framework in its Russian version. The term «e- government» is defined as «a<br />

new form of public entities’ activities which via wide-spread application of ICT is to provide citizens and<br />

organizations with a qualitatively new level of effectiveness and comfort in public service» (Strategy for<br />

Information Society Development in Russia, 2008). Оne of the most important and logical functions of<br />

eGovernment is the fight against corruption because it allows for breaking the direct relationship between<br />

officials and citizens and moving to an anonymous service. In technical documents eGovernment is<br />

regarded simply as an ICT system used for coordination and monitoring state entities’ activities at various<br />

levels through the creation of a unified telecommunication infrastructure. Naturally, such technical<br />

definitions coexist with more citizen-oriented. For example, the developers of the recently approved<br />

«System Project of the RF eGovernment infrastructure formation» (2010) have placed a citizen back in<br />

the discourse of «friction free bureaucracy». The System Project defines eGovernment as the<br />

arrangement of functions of federal, regional and local executive authorities which provides:<br />

Implementation of formal procedures for gathering information, preparing and making decisions<br />

based on remote electronic interaction in all cases where there is no proven need for applicant’s<br />

personal presence or paper documents;<br />

Governance quality improvement measured as the rate of state bodies activities’ compliance with<br />

legitimate interests of the RF citizens.<br />

565


Anna Trakhtenberg<br />

However, there is a significant gap between eGovernment infrastructure developers’ idea of the<br />

legitimate interests of citizens and how citizens themselves understand their needs (not much concern of<br />

their legitimacy).<br />

Numerous opinion polls have revealed a distinctive preference of customary personal communication<br />

with the authorities to the online interaction. For example, the results of opinion poll conducted by the<br />

Russian Public Opinion Research Centre in spring, 2010 are as follows: approximately three-quarters<br />

(73.0%) of respondents aged 25 to 59 years are aware of public services being converted into electronic<br />

form, whereas, only a quarter (25,0%) stated that they would prefer online addressing to the state bodies<br />

to the traditional personal one. 42.0% of the respondents expressed their satisfaction with exceptionally<br />

personal appeal while the others had no definite opinion on this issue (Russians are not accustomed to e-<br />

government officials, 2010).<br />

This conclusion was confirmed during a comprehensive survey conducted by us in the Urals Federal<br />

District in June 2010. (Sample size - 1,500 people. Territorial multi-stage sampling was implemented by a<br />

standardized telephone interview in the six regions: Kurgan region, Sverdlovsk region, Tumen region,<br />

Chelyabinsk region, Hanti-Mansyisk autonomous region-Yugra, Yamalo-Nenezki autonomous region).<br />

Nearly half of respondents over 18 years old (48.2%) stated that in the event of choice they would contact<br />

the authorities in person rather than on the Internet. Other 30.3% would like to have a choice of how to<br />

address- through the Internet or in person and only 16.5% unequivocally indicated they would prefer<br />

exceptionally online interaction.<br />

The highest level of readiness to use electronic services was typical for top management respondents: in<br />

this group, the proportion willing to receive such services amounted to 80.0% of the total number of<br />

respondents, while 34.7% expressed a desire to interact with the authorities only on the Internet.<br />

The weakest readiness was demonstrated by pensioners: in this group 78.8% of the respondents were<br />

focused on personal appeal to the authorities, 7.5% considered for a possible appeal both in person and<br />

online and only 5.8% stated that the electronic form of an appeal was quite suitable.<br />

In other words, eGovernment developers - young, highly educated, wealthy men in managerial positions<br />

or highly qualified specialists meet the full understanding and willingness to use new possibilities in the<br />

same social layer which they belong to and in this sense work on themselves.<br />

Why did the representatives of other social strata show markedly less interest in electronic services? To<br />

find it out we have conducted a series of focus groups on eGovernment transition. (This article uses the<br />

results of focus groups conducted in the cities Ekaterinburg, Nizhny Tagil and Pervouralsk, Sverdlovsk<br />

region. Similar results were obtained in other five major cities of the Urals Federal District).<br />

Focus groups have revealed that there is a clear discrepancy between the statist eGovernment discourse<br />

and the types of discursive structures which eGovernment is inscribed by citizens. This discrepancy is not<br />

too much alike to that described by Jae Moon and Welch (2005).<br />

The security and privacy concerns are not typical for Russian citizens. More precisely, when asked<br />

whether they fear for their personal information being used without their permission they replied like this:<br />

«Why should I care? What can I conceal?» Moderator’s arguments about the dangers of universal<br />

electronic control provoked laughter and replies: «They [state authorities] will do it all the same» and<br />

older participants even approved such control.<br />

Fears of Russian citizens were concentrated in another sphere. The participants agreed that the<br />

transition to online public service delivery can reduce the «bureaucratic friction» and will permit to avoid<br />

queuing at reception to the official. Here is a quotation of an elderly participant who is a skilled user of<br />

computers and the Internet (she acquired skills at work):<br />

«No need to go anywhere, no need to stand in a queue. You may stay at home, sit down,<br />

think a little, type, load and mail. That is all. And then, you get a mark that your enquiry is<br />

registered and dated. (Nizhny Tagil, female, former accountant, 60 years old).<br />

However, such positive assessments are usually accompanied by specific stipulations. We give an<br />

utterance of a middle-aged woman (a confident computer and the Internet user):<br />

566


Anna Trakhtenberg<br />

«Of course, if you do not have to queue, then it is very well. But is this possible? I mean, that<br />

my application could be lost. Could it get wherever needed? Would it be answered instead of<br />

being deleted and then said to be never sent! Or they may say: «The server is badly working<br />

and your e-mail has not come yet» and so on. There is some distrust left. Yet. Now ».<br />

(Pervouralsk, a woman employee at a municipal institution, 44 years old).<br />

Evidently, the participant has no doubt that «they / officials» could exploit new opportunities in their own<br />

interests and find the way to shirk their duties whereas she could not feedback and protect her interest.<br />

The idea «when online they (officials) can not be controlled» was articulated by younger and middle aged<br />

men involved in a dialogue:<br />

It is bad that you can not track how your application is being considered. It cannot be tracked<br />

anyhow. You just e-mail it and never learns if it will be read at least! (Nizhny Tagil, a male,<br />

student, 26 years old.)<br />

Well, there will be a notification...(Nizhny Tagil, a male watchmaker, aged 36)<br />

Notification is a pure notification, it is simply an automated issue. And they may not read, just<br />

put a tick and delete it! (Nizhny Tagil, a male, student, 26 years old).<br />

While traveling from one office to another you, at least, can supervise the process. (Nizhny<br />

Tagil, a male worker, 40 years old)<br />

The «control» here means a traditional «strategy of weak» - the desire for direct personal contact with an<br />

official in order to create an informal atmosphere which will encourage him to fulfill his direct duties and<br />

perhaps, even admit certain violations. The electronic form does not suggest such a strategy, therefore,<br />

causes some mistrust (applicants do not know how to behave in the environment where contact with an<br />

officer becomes mediate and impersonal).<br />

Meaningfully, that the focus group participants tended to this strategy, regardless of sex or age. It was<br />

important for them to have a chance to communicate with an officer «as a human being» rather than a<br />

formal function performer. Here is a general reasoning given by a twenty-year old student, an active IT<br />

user:<br />

«In case you need something specific, well, eMailing on the Internet seems to be ineffective<br />

- it is less likely that you will be replied and that your problem will actually be considered.<br />

Because when you just ask someone for something … It is harder to refuse when you<br />

communicate with a person face to face than like this (electronically). It generally can be<br />

ignored, moreover, not replied. Оfficials are people of another sort. It makes no difference to<br />

them - on line or alive addressing. But, nevertheless. At least you can remember the human<br />

face when you are refused. May be helpful on occasion! » (Pervouralsk, a female student,20<br />

years old).<br />

It is noteworthy how much of this opposition is expressed by saying «we - they» («officials are different<br />

people»). The fact that «eye to eye» contact gives an ordinary visitor at least some chance in<br />

administrative entities was reasoned by both a middle-aged teacher and an elderly worker:<br />

«I'll enter an office. And meet «face to face». With emotions expressed. I must see him and<br />

his eyes. This is what communication means to me; senses are the most important matters...<br />

How you should say, how to persuade and to convince, something like this. And eMailing is<br />

just dry, emotionless. And I need alive communication! » (Pervouralsk, a female teacher of<br />

sports, 40 years old).<br />

«Man, probably, is arranged so that he might wish to get online answer but so far it is<br />

soulless. You typed in, send and sit down guessing if it will get the office or not. And here, at<br />

a visual contact you can see if the answer will be given or not. As for e-mail, we still have not<br />

been developed enough.» (Nizhny Tagil, a male ex-worker at the city-forming enterprise,<br />

aged by 59).<br />

All these statements reflect a supplicant’s behavior at his interaction with officials when he applies a wide<br />

range of strategies designed to induce an informal (not official) response to his application, and<br />

consequently, gets focused on the most thorough «reading» interlocutor’s emotions, then a petitioner<br />

makes attempts to manipulate these emotions (as another participant formulated: «…at least you can let<br />

a tear»). The Internet interaction with authorities makes it impossible to use this basic strategy, hence,<br />

the fear for finally losing control over the official interaction process arises. Here is a gloomy<br />

567


Anna Trakhtenberg<br />

summarization made by a 26 year-old manager at Yekaterinburg IT-company: «Actually, they [officials]<br />

will stop communicating with us at all. They have nothing to speak to us».<br />

The focus group participants were not much inclined to believe the promise that eGovernment transition<br />

will reduce corruption. They proceeded from the premise that «…insignificant [corrupt] may stop whereas<br />

the more significant corrupt will remain, of course» (Ekaterinburg, a male engineer, 34 years old).<br />

Thus, proponents of online interaction with government officials were mostly highly educated men,<br />

residents of large cities who successfully and effectively use information technologies in everyday life.<br />

Therein, the emphasis was placed on the fact that with no need to communicate with petitioners the<br />

officials will contribute into their work effectiveness growth:<br />

«I am for the Internet, just to get rid of this personal contact. When you sit and concentrate,<br />

type faster and end up faster. Many people are executive in nature. They do not need<br />

dialogue. They get annoyed of communication. But they are able to quickly and efficiently<br />

perform their work».<br />

(Yekaterinburg, a male solicitor in a commercial organization, aged 32)<br />

Thus, while a state proposal is based on the «rational bureaucracy» ideal and seeks to maximize the<br />

anonymity of service delivery and reduce the number of «citizen-official» personal contacts the public<br />

demand, on the contrary, is formed on the strategy which aims to convert a bureaucrat into «just a<br />

person» having nothing in common with this ideal.<br />

There is another traditional «strategy of weak» that has been repeatedly described by specialists in<br />

Russian and Soviet history. V. Kozlov, who devoted a special study to this strategy, pointed out that the<br />

petition was an essential element of Russian culture management because it replaced the missing<br />

institutions of civil society to a large extent: «the denunciation, along with petitions of complaint to the big<br />

bosses over the heads of the bureaucrats and officials… gave the population a final hope that justice<br />

would be done, preserved for the central power an aura of infallibility and righteousness, and redirected<br />

the population dissatisfaction down the channel of «local criticism» (Kozlov, 2000: 118). In the XX<br />

century, the term « denunciation» acquired a negative connotation, hence, for the description of true and<br />

fair reports the term «signal» was introduced instead (Fitzpatrick, 1996), however, the essence remained<br />

the same: any citizen must be provided with the possibility to directly contact with a senior person in the<br />

hierarchy and complain to him on the arbitrariness of his subordinates. Traditionally, the Russian core<br />

belief is that the authority does not extend upwards - from citizens to government (Jeffersonian tradition),<br />

but top- down from some higher authorities center (empowered by God) to the periphery. This conception<br />

of powers can be combined with a deep sense of alienation of lower and top classes («we - they»<br />

scheme). However, this alienation does not exclude but even supposes an absolute power bearer at the<br />

very top who is able to restore order and discipline at subordinate levels.<br />

Characteristically, the discussion on eGovernment in all focus groups spontaneously passed into<br />

«electronic petitions» subject. We present a conversation with residents of Yekaterinburg who on their<br />

own tried to define what «eGovernment» is like, where a typical transition from online services to<br />

personal apply to a «superior they» was performed:<br />

I learnt about eGovernment! I guess, yesterday there was a TV broadcast on that subject in<br />

some city, I do not remember ... I am not sure about the city name. There was an<br />

eGovernment introduced, I think. Yes, they said you could receive a reply to your inquiry<br />

very fast! (Yekaterinburg, a female, housewife, 35 years old)<br />

Perhaps, we will have something like an online mayor. There could be any complaints<br />

submitted. (Yekaterinburg, a female nurse, 39 years old)<br />

Well, we can write to our mayor right now, no problem. But who is writing to you back on<br />

behalf? (Yekaterinburg, a female housewife, 35 years old)<br />

No one is writing on behalf. You answer will never come. (Yekaterinburg, a female nurse, 39<br />

years old)<br />

In the focus groups this idea was repeated and repeated, even by younger participants:<br />

«There is a site «Russian President» with his blog created, where you can leave a comment,<br />

write your opinion for something. On the one hand you are pleased to know that anyway it<br />

568


Anna Trakhtenberg<br />

gets the President, at least, his Secretary and that is great. And the fact that anyone can<br />

write is also very nice. That is, there are no restrictions, any person of our country is free to<br />

write. Of course, everything will pass the censorship, but still it seems to be a positive sign».<br />

(Nizhny Tagil, a male student, 26 years old).<br />

Participants in the older age groups formulated their position more traditionally (and dramatically):<br />

«The main thing for me is that I could send a complain myself! Otherwise, where is justice?<br />

Do you agree with this? As for the President I would better use the Internet to mail to him, of<br />

course. If I meet him face to face, I will not be able to say a word. He is the President indeed!<br />

» (Pervouralsk, a male former worker at the city-forming enterprise,70 years old).<br />

The older focus groups participants’ fears and expectations related to obtaining government services<br />

online resulted in a utopia of absolute control over the officials and citizens’ behavior (utopia actually not<br />

dystopia as might be expected):<br />

«If we were entirely (100 per cent) computerized and everyone could estimate the officials’<br />

work, then after summing up we would see the results: the quality of their work, the<br />

effectiveness of it, someone should supervise this. Only that way could we enjoy the<br />

efficiency» (Nizhny Tagil, a male former worker at the city-forming enterprise, 59 years old).<br />

«Everybody must be under control. You are an official, for example, the chief. You should<br />

swallow this pill. So that we can be aware of everything he is doing, with his whole life being<br />

transparent. And the same if you are a bandit -then take the pill, as well. As soon as you<br />

intend to commit something we are being reported without delay and we could get you in<br />

advance and take to jail! » (Pervouralsk,<br />

a male ex-worker at the city-forming enterprise, 70 years old).<br />

Thus, according to the latter viewpoint the total control is equally obligatory for both a government official<br />

and a gangster. In fact, the speaker puts no difference between them, he perceives them as similar<br />

figures.<br />

Another elderly member reinterpreted eGovernment in the spirit of utopia / dystopia «techno power»<br />

popular in the 60-ies, which used to be a part of a closed computer discourse at the Cold War times.<br />

According to his utterance an emotionless power machine is replacing the leaders guided in their<br />

decisions by pure personal likes and dislikes. In other words, we are talking about the destruction of the<br />

strategy that is acknowledged to be the only effective one on «citizen- official» interaction matters.<br />

«I see the subject like this. At present, a human factor is playing a great role. For example,<br />

there arrives the head of some region and asks: «Everything is getting from bad to worse in<br />

our location. Give us a hundred billion (rubles)! As he is a good and respectable person, he<br />

is given that money. Another leader comes with the similar or, perhaps, even worse<br />

problems but may be refused because he does not please them, maybe he is too rough. He<br />

might have said something wrong to someone. And eGovernment, I recon, is a huge<br />

computer which makes totally impartial decisions .It works independently, distributes money<br />

on itself. As for the legacy-then it follows the laws.» (Yekaterinburg, a male, an employed<br />

pensioner, 62 years old).<br />

Thus, for the focus group participants it is important both to get an opportunity for «softening» a<br />

government official and to complain about him if necessary. In Russia the traditional model of «citizengovernment»<br />

interaction with a «strategy of weak» based on a desire to move from formal to informal<br />

interaction with the authorities and to appeal directly to the top powers is still preserved in large scale and<br />

defines public eGovernment service demand. Prompt, high quality, but anonymous eGovernment<br />

services do not fit into this scheme. Focus group participants concerns about controlling the government<br />

activities are not similar to those of official eGovernment projects developers, because this control has<br />

little to do with the bureaucratic «supervision on implementation». Nevertheless, the eGovernment<br />

transition is hoped to encourage the modernization of traditional «citizen-government» relations.<br />

Acknowledgements:<br />

The materials used for writing are obtained with the support of the Sinara Charity Foundation<br />

(Ekaterinburg).<br />

569


References:<br />

Anna Trakhtenberg<br />

Bradshaw-Lynne D. (2000) ‘Technology Launch in EGovernment’, Handbook of Public Information Systems, N.Y.,<br />

Marcel Dekker, pp. 113 – 125.<br />

Commission of <strong>European</strong> Communities (COM (2003) 567) (2003). The Role of EGovernment for Europe's Future.<br />

Brussels. [Electronic]. Available:<br />

http://ec.europa.eu/information_society/eeurope/2005/doc/all_about/egov_communication_en.pdf. Last<br />

updated11/15/2010.<br />

Concept of EGovernment Formation in the Russian Federation until 2010 (2008). [Electronic]. Available:<br />

http://www.ifap.ru/ofdocs/rus/egovconc.pdf. Last updated: Last updated11/15/2010.<br />

Fitzpatrick S. (1996) ‘Supplicants and Citizens: Public Letter-Writing in the Soviet Russia in the 1930’, Slavic Review,<br />

vol. 55, no 1, pp. 78 – 105.<br />

Jae Moon M., Welch E.W. (2005) ‘Same Bed, Different Dreams? A Comparative Analysis of Citizen and Bureaucrat<br />

Perspectives of EGovernment’, Review of Public Personnel Administration, vol. 25, pp. 243 – 264.<br />

Kozlov V.A. (2000) ‘Denunciation and its Functions in Soviet Governance. From the Archive of the Soviet Ministry of<br />

Internal Affairs, 1944 – 1953’, Stalinism. New Directions, L., Routledge, pp. 117 – 141.<br />

Medvedev D.A. The President of the Russian Federation Message to the Federal Assembly of the Russian<br />

Federation. [Electronic]. Availvable: http://kremlin.ru/news/9637. Last updated11/15/2010.<br />

Noordhoek P., Saner R. (2004) ‘Beyond New Public Management: answering the claims of both politics and society’,<br />

IX Congreso Internacional del CLAD sobre la Reforma del Estado y de la Administración Pública, Madrid, 2-5<br />

November. 2004. [Electronic]. Available<br />

mode:http://unpan1.un.org./intradoc/groups/public/documents/Other/unpan021304.pdf. Last<br />

updated11/15/2010.<br />

‘Russians are not accustomed to eGovernment officials’ (2010). [Electronic]. Available:<br />

http://rumetrika.rambler.ru/review/2/4226. Last updated11/15/2010.<br />

Strategy for Information Society development in Russia (2010). [Electronic]. Available:<br />

http://www.rg.ru/2008/02/16/informacia-strategia-dok.html. Last updated11/15/2010.<br />

System project of EGovernment Infrastructure Formation in Russia (2010). [Electronic]. Available: mode<br />

[http://www.bftcom.com/upload/smi/Systemniy%20proekt.pdf. Last updated 11/15/2010.<br />

UN Department of Economic and Social Affairs (2010) United Nations EGovernment Survey 2010: Leveraging<br />

EGovernment at a Time of Financial and Economic Crisis. [Electronic]. Available:<br />

http://unpan1.un.org./intradoc/groups/public/documents/un/unpan038851.pdf. Last updated 11/15/2010.<br />

570


eGovernment Openness Index<br />

Nataša Veljković, Sanja Bogdanović-Dinić and Leonid Stoimenov<br />

University of Niš, Serbia<br />

natasa.veljkovic@elfak.ni.ac.rs<br />

sanja.bogdanovic.dinic@elfak.ni.ac.rs<br />

leonid.stoimenov@elfak.ni.ac.rs<br />

Abstract: We live in the era of rapid web technologies development that affects the growth and transformation of<br />

eGovernment. These new technologies impact leads to the re-evaluation of eGovernment, re-focusing of target<br />

characteristics and changing of general approach in eGovernment viewpoint. In today's electronic environment, the<br />

concept of eGovernment 1.0 has been overcome and a new eGovernment concept is being created, known as Open<br />

Government. Within this new concept, the focus is set on open public data, transparency, collaboration and citizen<br />

participation. Benchmarking eGovernment is an important task that indicates the level of implementation of<br />

eGovernment policies as well as eGovernment progress. Benchmarks of eGovernment concepts, eGovernment 1.0<br />

and eGovernment 2.0, are not suitable for Open Government. In this paper we will evaluate different methodologies<br />

for Open Government benchmarking and try to define eGovernment Openness Index (eGOVI) as a global measure<br />

that indicates to which extent one government is open.<br />

Keywords: open government benchmarking, eGovernment evolution, eGovernment openness index<br />

1. Introduction<br />

During the last decade, the concept of eGovernment has drastically evolved. It was firstly considered as<br />

the use of information and communication technologies (ICT) for delivering more effective and proficient<br />

government services to citizens, businesses or government agencies by various communication means<br />

such as the Internet, telephone, wireless devices or other communication systems. ICT provides various<br />

ways for integrating information systems into one compact entity, offers relatively inexpensive<br />

infrastructure for data interchange and the possibility of accessing information and eGovernment services<br />

from any place and at any time. Over the years, as the ICT evolved, eGovernment model changed. Web<br />

2.0 technologies provided new possibilities for eGovernment to become less service- and more useroriented.<br />

By incorporating Web 2.0 technologies, eGovernment can facilitate communication with users<br />

and improve the coordination of authorities within the different tiers of government. Web 2.0 brought new<br />

concepts, such as interactive information sharing, interoperability, user orientation and collaborative work.<br />

These concepts have led to creating tools and applications (blog, wiki, RSS, social networks, video<br />

networks) that enable an average user to create, publish and change content on Web. More and more<br />

people all over the globe are being drawn to the virtual world of Web 2.0. Social networks, blogs and<br />

wikis are virtual places where people are together and where governments can reach them.<br />

Governments have embraced Web 2.0 technologies, which enabled them to build a more close<br />

relationship with users and ensure their place in this new virtual era. EGovernment concept has evolved<br />

under Web 2.0 influence into eGovernment 2.0. But this was not the end of the road. Soon after adapting<br />

to new technology concepts governments were able to achieve more open and transparent relations with<br />

users. This influenced the creation of a new concept named Open Government. Opening governments<br />

towards citizens is one of the major goals recognized all over the world. Participation, collaboration and<br />

transparency are recognized as the most important features of Open Government.<br />

Various benchmarks exist for each phase of eGovernment development and are suited for measuring<br />

specific government goals. In eGovernment 1.0 focus was put on twenty basic public services and a set<br />

of indicators that reflect the levels of services development. As eGovernment evolved and started its<br />

transition towards eGovernment 2.0, new benchmarks appeared that were more oriented to user<br />

experience and specific government services. When the transition to eGovernment 2.0 was finished, new<br />

focus was brought to user's needs and public data. This caused the necessity for new changes in<br />

benchmarking models. For eGovernment 2.0 evaluation, Osimo proposed a model in which twenty basic<br />

public data should be evaluated against reusability and transparency, giving the final assessment of data<br />

availability (Osimo 2008b). Open data movements rising in the United States and in Europe soon after,<br />

caused further improvements of the eGovernment concept in which open data is set in the focus and the<br />

opening of governments towards citizens became a new flagship goal around the world. In order to<br />

evaluate the implementation of Open Government concept we need a new benchmark that will be<br />

shaped well enough to express the level of government readiness to become more transparent,<br />

collaborative and participatory. The overall goal of this paper is to present the eGovernment Openness<br />

Index (eGOVI) as a measure of the extent one government is open. The model is developed according to<br />

571


Nataša Veljković et al.<br />

the basic characteristics of Open Government concept and according to the authors’ experience in<br />

eGovernment assessment. It should be emphasised that the model is not final, but there need to be a lot<br />

of work on its improvements. The discussion on that subject is given in the final section of this paper.<br />

2. Open government<br />

Since the development of the Internet and understanding of its impact on society, eGovernment has<br />

started entering the virtual scene and making its place in virtual community. At first, eGovernment meant<br />

simple presence of state government on the Web, in the form of an informative web site, but in time the<br />

concept of eGovernment has evolved. Ever since, we can track its development from eGovernment 1.0 to<br />

Open Government.<br />

eGovernment, when it first emerged, posed the why questions. Why do we need electronic government,<br />

why do we need electronic services? As the digital world progressed, eGovernment has been refreshed<br />

and modernized and eGovernment 2.0 has entered the scene. EGovernment 2.0 is more related with the<br />

how and not why. How to provide better services, how to serve citizens faster and more efficiently, how to<br />

use contemporary technology in order to meet citizens’ needs? The shift from services to citizens has<br />

happened and technologies played the wheeler role. Web 2.0 provided answers for eGovernment 2.0<br />

how questions. Governments have recognized the potential of the Web 2.0 environment in building<br />

relationships with citizens and businesses.<br />

Schellong and Girrger explain that Government 2.0 is two-fold term, it veils the new form of governance<br />

and citizen-government interaction as well as the use of Web 2.0 application in Government (Schellong<br />

and Girrger 2010). However, the prevailing opinion is that eGovernment 2.0 is a technical enhancement<br />

of eGovernment. Eggers characterized eGovernment 2.0 as the application of Web 2.0 and Enterprise<br />

2.0 applications and concepts in the public sector (Eggers 2005) and Osimo as the use of Web 2.0<br />

applications in eGovernment (Osimo 2008a). EGovernment 2.0 is more oriented to technological aspects<br />

of government. The 2.0 suffix comes from web 2.0. EGovernment 2.0 reflects government attempts to<br />

renew and modernize eGovernment and its relationship with public sector using web 2.0 technologies.<br />

eGovernment 2.0 uses the technology and innovation of Web 2.0 to address the needs of government.<br />

Open Government is the new governmental concept, set to replace eGovernment 2.0 (e-Gov 2.0). There<br />

are many implications on what the concept of Open Government represents and how it is related to<br />

e-Gov 2.0. Di Maio (2010) sees Open Government as a subset of Government 2.0. Many authors argue<br />

on this statement. Jenn Gustetic explains that Open Government wouldn't be possible without the<br />

outcomes of eGovernment 2.0 (Gustetic 2010). From his perspective Open Government is the evolution<br />

of e-Gov 2.0. Tim O’Reilly delivers the vision of 'government as a platform' and in this vision e-Gov 2.0 is<br />

the next release (O’Reilly 2010). According to Microsoft Open Government is interoperable government<br />

in which people and systems communicate freely (Microsoft 2010).<br />

Open Government and eGovernment 2.0 relate to each other more than it seems at first. Open<br />

Government is two-dimensional eGovernment, where one dimension is certainly technical, it refers to<br />

technologies that will enable its development. The other is, we can say, social and it concerns citizens<br />

and their relations to government and governmental data. Open Government is related to achieving<br />

government accountability, open records and open access to public information. Openness, as the main<br />

feature of this concept, is reflected through the notion of open data, open access to governmental<br />

information and data transparency. Open Government is about information freely available to everyone,<br />

about participation and transparency. Government is becoming more oriented towards citizens who have<br />

the possibility to interact with the government and tell the government their opinion. They are becoming<br />

requestors and creators of electronic services and moreover they are participating in government<br />

decisions by giving their opinion and attitude toward important matters. Open data is an important<br />

transparency indicator, and a must in an Open Government. Open data is governmental data of public<br />

interest that can be easily found, it is accessible and available without restrictions. Government data of<br />

public interest should be made available bit not just in any format. Given that reusable data format<br />

enables data transformation suitable to citizens’ needs, governments should turn towards publishing data<br />

in those formats.<br />

In 2009, Open Government gained more significance in the light of new events. Starting with 2009, the<br />

President of the United States of America, Barak Obama (2009), set creating an unprecedented level of<br />

openness in government as a primary goal. This goal will be achieved when the government is<br />

transformed into a transparent, participatory and collaborative entity. Following the USA government<br />

572


Nataša Veljković et al.<br />

steps, the <strong>European</strong> countries are starting their own initiatives for government openness. The EU<br />

Member states have ratified the Malmoe Declaration on the joint eGovernment strategy until 2015. A year<br />

after signing the Malmoe declaration, the EU Member State ministers responsible for eGovernment<br />

agreed on an Action Plan that will set out the path for the field of e Government up until 2015. This<br />

Action Plan aims at transition from current eGovernment to a new generation of open, flexible and<br />

collaborative eGovernment services at local, regional, national and <strong>European</strong> levels that will empower<br />

citizens and businesses. The <strong>European</strong> Commission’s main responsibility in conveying this plan will be to<br />

improve the conditions for development of cross-border eGovernment services provided to citizens and<br />

businesses regardless of their country of origin. This further requires establishing pre-conditions<br />

(interoperability, e-Signature, e-Identification) which will help strengthen the internal market and<br />

complement EU legislative acts and their effectiveness in domains such as procurement, justice, health,<br />

environment and others. In order to achieve these highly set goals, the Action Plan defines four political<br />

priorities: user empowerment, internal market, efficiency and effectiveness of government and<br />

administrations and preconditions for developing eGovernment, followed by actions identified as means<br />

for their achievement. According to this Plan, the main focus of eGovernment for the next four years will<br />

be on increasing user involvement, improving transparency and data reusability, and most importantly<br />

improving internal markets and implementing cross-border eGovernment services. From this point of<br />

view, the definition of Open Government can again be rephrased, and now we can say that Open<br />

Government represents not two, but three-dimensional eGovernment, where one dimension is technical,<br />

the second one is social, and the third one refers to collaboration between different state governments<br />

through cross-border eGovernment services. Taking this definition into further consideration, we can<br />

conclude that Open Government, analyzed on the one state government level, can be seen as a 2D<br />

eGovernment, but on the Europe, or even the World level, from the aspect of collaboration among<br />

governments, it definitely can be considered as a 3D eGovernment. So, at the same time we can talk<br />

about 2D and 3D Open Government, just from the different perspectives.<br />

In order to measure efforts put in government transformation into transparent, participatory and<br />

collaborative government we cannot use the existing benchmarks that were designed according to the<br />

old government perspective. In the next section we will analyze the possible indicators that will lead to a<br />

notion of how much one government is open, a notion we have named eGovernment Openness Index.<br />

3. Benchmarking eGovernment<br />

Benchmarking eGovernment is a very important task. According to (Schellong 2009) it indicates the<br />

progress in reaching eGovernment goals and can be used as a tool for learning, information sharing, goal<br />

setting or supporting performance management. The eGovernment benchmarks have evolved over time<br />

as the eGovernment concept changed. For each eGovernment evolution stage there is a suitable<br />

benchmark with a different set of indicators. Figure 1 illustrates indicators used for benchmarking<br />

eGovernment during its evolution.<br />

The <strong>European</strong> Commission’s “eGovernment Benchmark” (EUeGovBe), together with the UN’s<br />

“eGovernment survey” and West’s “Global eGovernment report”, belongs to the longest running efforts to<br />

track the development of eGovernment (Bullivant 1994). Since its inception in 2001, EUeGovBe has<br />

proven to be a policy accelerator among the EU Member States and beyond (Capgemini 2010). It is<br />

applied on the yearly basis in order to provide review of twenty basic public services and eGovernment<br />

progress in terms of core indicators. Over time, the EUeGovBe core indicators have changed, since it<br />

was necessary to create a dynamic measurement instrument that will retain the existing comparability<br />

and the principle of open collaboration with participating countries (Capgemini 2009). From the time when<br />

the seventh measurement was taken, back in 2007 EUeGovBe has experienced a major enhancement in<br />

measuring criteria and core indicators. In 2007 EUeGovBe benchmark consisted of a set of four<br />

indicators (Capgemini 2007): sophistication, availability of services, user orientation and national portal.<br />

In 2009 EU Member States and the <strong>European</strong> Commission decided that the benchmark had to move<br />

away from its original supply-side focus. New benchmark focus is put on the high impact service areas as<br />

well as on the usage side of eGovernment which was neglected in the previous measurements. Two of<br />

the core indicators: national portal and user-centricity are removed and instead e-Procurement and User<br />

experience have been added, reflecting a shift in policy priorities towards outcomes and impact.<br />

573


Figure 1: eGovernment benchmark evolution<br />

Nataša Veljković et al.<br />

eGovernment data was somehow left behind in the process of eGovernment 1.0 benchmarking that<br />

defined twenty basic public services upon which full online availability and sophistication were measured.<br />

From the eGovernment benchmarking perspective, the focus is slowly shifting from electronic services to<br />

transparency and reusability of open public data. Therefore in eGovernment 2.0 (Osimo 2008b) proposes<br />

a set of basic public data upon which reusability and transparency will be measured. He recommends<br />

using five level scale for evaluation of public data in eGovernment 2.0. His scale shows the extent to<br />

which public data is available on the web. Levels overview is given in Table 1, they gradually change<br />

from no data to sheer data availability and reusability.<br />

Table 1: Availability of public data<br />

Level Meaning<br />

0 No information available<br />

1 Description of the procedure to obtain the information through FOI<br />

2 Information available in non reusable, non-machine readable format<br />

3 Information available in reusable and machine readable format such as xml or dbase<br />

4 Information available as per stage 3 and visualizable through predefined tools<br />

Benchmarking Open Government is something that will have to be addressed in the light of new policies<br />

and action plans. The existing Open Government benchmarking frameworks focus only on data<br />

reusability but there are also several other aspects for assessing government openness that need to be<br />

addressed. Indicators for measuring government openness should reflect three main principles of Open<br />

Government: transparency, participation and open data. In the following section, will propose a model for<br />

benchmarking Open Government. The model will result with a measure which will determine government<br />

openness.<br />

4. eGovernment openness index<br />

For assessing the extent of openness of a government, there should be introduced a new measure,<br />

flexible enough to adapt to the constantly changing nature of government. We propose a government<br />

openness benchmark model, depicted in Figure 2. The model uses four indicators: basic data set,<br />

transparency, participation and maturity for calculating eGovernment Openness Index (eGOVI). First<br />

three indicators are directly derived from open governmental concepts, while maturity represents the<br />

efficiency of embracing these new concepts. The model is two-dimensional, where vertical dimension<br />

leads towards eGovernment Openness Index while horizontal towards government maturity. Further in<br />

this section we will explain in detail each indicator and dimension as well as the final measure –<br />

eGovernment Openness Index.<br />

574


Nataša Veljković et al.<br />

Figure 2: Open government benchmark model<br />

Open data published on government's web sites is used as a data source for basic data set and<br />

transparency indicators. Basic data set is the predefined set of high value data categories. These<br />

categories can vary in different countries, but in order to establish a standard assessment model it is<br />

crucial for a basic data set to be defined and adopted. Since this is a new concept, a unique basic data<br />

set still does not exist. Upon analysis of the current government portals around the world we have singled<br />

out eight most common data categories: Finance and Economy, Environment, Health, Energy, Education,<br />

Transportation, Infrastructure and Population. Data belonging to these categories could form the basic<br />

data set. Each category should be well defined so the user could know what kind of data can be found in<br />

each of them. This basic set can be modified and improved over time according to user and government<br />

needs. The assessment of this indicator requires analyses of available data on governments’ portals.<br />

Governments' portals should publish all data categories from a basic data set along with corresponding<br />

data types for each category. In that case a government can be maximally scored for the basic data set<br />

indicator.<br />

Transparency indicator is seen as authenticity, understandability and reusability of data made available<br />

on the government website. Authenticity relates to data sources, data accuracy and integrity and the<br />

degree of trust in data publishers. Non-governmental institutions and agencies that publish data should<br />

be well known, with good reputation in order for users to utilize data safely and without prejudice. For this<br />

purpose eGovernment portal should provide online catalogues of trusted data sources and allow users to<br />

rate their authenticity.<br />

Understandability of each data set as well as of contained raw data must be provided. This can be done<br />

by publishing textual descriptions of data categories which in detail explain types of data that are<br />

published under each category. Data reusability is the last transparency aspect that we are addressing. It<br />

refers to providing data in open formats so that a user can search, index and download data using<br />

common tools without any prior knowledge of data structures. Osimo proposes five level scale for<br />

measuring data availability in eGov 2.0 (Osimo 2008b) which can be slightly modified and so used for<br />

measuring data reusability in Open Government context.<br />

User involvement is a data source upon which participation indicator is used. Participation reflects the<br />

possibility for users to have impact on published data by sending feedback as well as opinion about<br />

provided data sets and data sets for future publication. This further means that users become equally<br />

significant participators in shaping legal framework and action plans of their country. Accepting the<br />

concept of openness means accepting a user whose opinion matters and can influence government<br />

decision making. Participation can be assessed based on two key aspects: user feedback and feedback<br />

influence. User feedback relates to the possibility for users to leave comments and opinions on actual<br />

575


Nataša Veljković et al.<br />

matters (laws, data sets, published data, etc.). This can be achieved via online forms, polls and content<br />

ratings. Feedback influence is reflected through considering user feedbacks by government during the<br />

process of making important decisions, law making and e-services provision. User feedback must be<br />

considered as a people's voice in the government. A government is maximally scored for this indicator<br />

only if both, user feedback and feedback influence are satisfied.<br />

Basic data set<br />

Transparency<br />

Participation<br />

Time<br />

Maturity<br />

eGOVI<br />

Finance and Economy<br />

Health<br />

Energy<br />

Education<br />

Transportation<br />

Infrastructure<br />

Population<br />

Authenticity<br />

Understandability<br />

Reusability<br />

User feedback<br />

Feedback influence<br />

E-government openess index<br />

eGOVI<br />

Figure 3: Detailed open government benchmark model<br />

The fourth indicator for measuring government openness, named maturity, is related to government<br />

readiness for changing and embracing open concepts. Timely identification of necessary changes and<br />

their application for the purpose of government evolvement is an essential element of maturity. Maturity is<br />

an indicator that is calculated using eGOVI and time necessary for government to make same change<br />

and improve its openness. This further means that government which progresses in short period is more<br />

mature than government that makes the same amount of progress but much more slowly. It can be<br />

expected that mature government makes larger progress in the upcoming period.<br />

Based on these four indicators, eGovernment Openness Index (eGOVI) is calculated. EGovernment<br />

Openness Index indicates the progress of government over time, the efficiency of recognizing and<br />

implementing new concepts, as well as the willingness of government to recognize and embrace<br />

innovative ideas. It is expressed in percentage, where 100% indicates total openness, while 0% a<br />

complete lack of openness. Indicators and their belonging aspects, used for eGOVI calculation, are<br />

presented in Figure 3.<br />

The proposed model is certainly not final. Still a lot of work can be done regarding its improvement, yet<br />

only after applying this model on governments around the world, that will be a part of our future work.<br />

5. Future work discussion<br />

Open Government benchmark model that we have proposed covers main aspects of Open Government:<br />

transparency, participation and basic data set. Besides those aspects we have included the maturity<br />

feature as government readiness to open towards new concepts. Based on those four aspects<br />

eGovernment Openness Index is calculated as a percentage of government openness. EGovernment<br />

Openness Index gives the final estimation of government's state regarding governmental efforts,<br />

readiness to timely publish open data sets, orientation towards user needs and user participation. The<br />

576


Nataša Veljković et al.<br />

maturity of eGOVI will be reached after its detailed elaboration through our future work and application on<br />

Open Government implementations. We have explained all four indicators used for determining eGOVI,<br />

but each of them needs further exploration and clarification. At first, we plan to develop metric scale for<br />

each indicator in order to obtain a numeric value indicating the degree of accomplishment of Open<br />

Government regarding that aspect. Afterwards, we will develop the final metric with percentage share of<br />

each indicator in eGOVI. With the developed metric system this model can find real world application.<br />

Our future plan is to apply the developed benchmarking model on governments around the world.<br />

However, our main concern, regarding this model, is its application on evaluating Open Government in<br />

different countries. Although this model covers every important aspect of Open Government, not many<br />

countries in the world have achieved a satisfactory level of openness in order for this model to be applied.<br />

Since the Open Government concept is in the early stages of its development it can be expected that in<br />

the short period more countries will start to embrace the concept and lift off towards Open Governments.<br />

The Serbian government is progressing very slowly towards Open Government, in fact it hasn't yet<br />

achieved e-Gov 2.0 stage (Stomenov and Veljkovic 2010). We hope that the research presented in this<br />

paper, will be a wakeup call for Serbian and other less developed governments to raise the issue of<br />

governmental development to a higher priority level.<br />

References<br />

Bullivant, J. R. N. (1994) Benchmarking for continuous improvement in the public sector, Longman, London<br />

Capgemini (2007) "The User Challenge Benchmarking The Supply Of Online Public Services",<br />

http://ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/egov_benchmark_2007.pdf<br />

Capgemini (2009) "Smarter, Faster, Better eGovernment",<br />

http://ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/egov_benchmark_2009.pdf<br />

Capgemini (2010) "Method Paper: Preparing the 9th Benchmark Measurement",<br />

http://ec.europa.eu/information_society/eeurope/i2010/docs/benchmarking/eGovernment_Benchmarking_Metho<br />

d_paper_2010.pdf<br />

Di Maio, A. (2010) September 3, "How Do Open Government and Government 2.0 Relate to Each Other?", Gartner<br />

Blog [online], Available: http://blogs.gartner.com/andrea_dimaio/2010/09/03/how-do-open-government-andgovernment-2-0-relate-to-each-other<br />

[5 Feb 2011].<br />

Eggers, W. (2005) Government 2.0: Using Technology to Improve Education, Cut Red Tape, Reduce Gridlock, and<br />

Enhance Democracy, Lanham MD: Rowman & Littlefield Publishers<br />

Gustetic, J. (2010) "E-Gov versus Open Gov: The Evolution of E-democracy", [online],<br />

http://www.phaseonecg.com/docs/egov-opengov-whitepaper.pdf [5 Feb 2011]<br />

Microsoft (2010) U.S. Government white paper: Democratizing data for open government Meeting the goals of the<br />

Open Government Directive: The national strategy for improving adult literacy and numeracy skills, Microsoft<br />

Corporation.<br />

Obama, B. (2009). "Memorandum for the Heads of executive Departments and Agencies: Transparency and Open<br />

Government", White House, [online], Available:<br />

http://www.whitehouse.gov/the_press_office/Transparency_and_Open_Government [5 Feb 2011].<br />

O'Reilly, T. (2010) "Government as a platform", In D. Lathrop & L. Ruma, eds. Open Government: Collaboration,<br />

Transparency, and Participation in Practice, O'Reilly Media.<br />

Osimo, D. (2008a) "Web 2.0 in Government - Why and How?", JRC Scientific Technical Reports, Seville.<br />

Osimo, D. (2008b) "Benchmarking eGovernment in the Web 2.0 era: what to measure, and how", <strong>European</strong> Journal<br />

of ePractice, No. 4, August 2008<br />

Punie, Y., Misuraca, G. and Osimo, D. (Ed.) (2009) Public Service 2.0 – The Impact of Social Computing on Public<br />

Services, JRC Scientific and Technical Reports; EUR 24080 EN, Seville.<br />

Schellong, A and Girrger P. (2010) "Government 2.0 in BetaPhase", CSC, [online], Available:<br />

http://assets1.csc.com/de/downloads/CSC_policy_paper_series_06_2010_government_20_beta_phase_Englis<br />

h.pdf [5 Feb 2011].<br />

Schellong, A. (2009) "EU eGovernment Benchmarking 2010+: General remarks on the future of benchmarking Digital<br />

Government in the EU", [online], Available:<br />

http://www.iq.harvard.edu/blog/netgov/papers/schellong_2009_wp_eu_egovernment_benchmarking_future_met<br />

hodology.pdf [5 Feb 2011].<br />

Stoimenov, L., Veljkovic, N. (2010) "E-Local self-government in Serbia", EGOV 2010 <strong>Conference</strong> Proceedings,<br />

August 29-September 2 2010, Lausanne, Switzerland<br />

577


Exploring Facilitators and Challenges Facing ICT4D in<br />

Tanzania<br />

Jim Yonazi<br />

The Institute of Finance Management, Dar Es Salaam, Tanzania<br />

yonazijim@gmail.com<br />

Abstract: The success of implementing information and communication technologies for development (ICT4D)<br />

requires an informed understanding of the context of application. This helps to inform decision making during<br />

identification, planning, and evaluation of ICT projects. In the African context, this is of paramount importance.<br />

However, empirical studies regarding ICT4D in Africa are still limited. This study aimed at identifying issues<br />

underlying the implementation of ICT4D in Tanzania. Specifically, it focused at identifying key priorities on ICT4D,<br />

facilitators, and challenges facing ICT4D implementation in Tanzania. The study also attempts to suggest possible<br />

measures to be taken to facilitate the progress of ICT4D for next 10 years. The results show that it is imperative to<br />

streamline ICT into the areas of i) Production and service provision ii) government iii) Health iv) Education, v)<br />

Business, and vi) the growth of SMEs. This is facilitated by i) Tax relief in ICT equipment, particularly computers and<br />

peripherals, ii) availability of low cost ICTs, iii) supportive social infrastructure, and iv) Government commitment. On<br />

the other hand, ICT4D in Tanzania is challenged by i) unsupportive connectivity infrastructure, ii) inadequate content<br />

quality, iii) unsupportive organisational issues such as policies, laws, and established systems and procedures, and<br />

iv) people related issues including inadequate ICT skills, mindset, and awareness. We observe that successful<br />

implementation of ICT4D in Tanzania is possible if facilitators can be exploited and challenges addressed. Specific<br />

issues that can be addressed are i) improving ICT connectivity, ii) enhancing content quality, iii) addressing<br />

leadership and organisational inertia, iv) emphasising on ICT effective strategic planning for ICT, v) enhancing ICT<br />

skills, awareness and mindset, and vi) cultivating innovative the culture at organisation level.<br />

Keywords: ICT, ICT4D, eGovernment, Tanzania, Africa<br />

1. Introduction<br />

In the past twenty years, we have witnessed the increasing pervasiveness ICT in our social and<br />

economic development activities (Kramer, Jenkins, & Kats, 2007). As a commodity and a facilitator, ICT<br />

is embedded in products and services we use and consume in our daily lives. As a result ICT influences<br />

all aspects of development including social and industrial development (Cole & Roman, 2003). Currently,<br />

various stakeholders including governments, international organisations, practitioners and civil societies<br />

appreciate and engage in advocating for the utilisation of ICT in the development of the human race<br />

(Yusof & Lim, 2003).<br />

Cognizant of the role of ICT in development, the Government of Tanzania and other stakeholders have<br />

embarked on various initiatives that aim at increasing the facilitation role of ICT4D activities. Typical<br />

examples have been noted in various sectors including the government, business, health, and education<br />

(IICD, 2008, Sawe, 2007). Progress in infrastructure improvement and local contents development has<br />

also been noticed (Yonah, 2005). The government plans to streamline and implement more ICT4D<br />

initiates across the country (URT, 2003).<br />

Although Tanzania is continuing to invest in ICT4D, the country has not made significant progress in this<br />

direction (UN, 2008). However, few studies (e.g. Mutagayhwa, Kinyeki, Ulanga, 2007) have assessed the<br />

ICT4D situation and provided relevant recommendations relevant to the country. We could not notice a<br />

study regarding facilitators and challenges of ICT4D in the country. Accordingly, this aimed at exploring<br />

the current ICT4D priorities in Tanzania; and establishing key areas, potential to determine the success<br />

or failure of ICT4D in the country. Recommendations will also be given on how the identified issues can<br />

be approached in Tanzania.<br />

2. Method<br />

This research adopted a grounded theory approach - GTA (Strauss & Corbin, 1990). In GTA a researcher<br />

is facilitated to inductively derive meanings from data by systematically utilizing a set of procedures<br />

(Strauss & Corbin, 1990, p.24). Several reasons were considered to influence this choice. First the ICT4D<br />

concept is still new in Tanzania. Therefore, the actual meaning of what respondents and other data<br />

sources inferred needed to be interpreted rather than predetermined. Secondly, we anticipated to<br />

encounter data availability challenges especially from the government organizations. Thirdly, the study is<br />

was intended to identify issues typical to Tanzania. Therefore, it was wise to study the context inductively<br />

rather than imposing theoretical propositions.<br />

578


Jim Yonazi<br />

Various sources contributed data into this study. These include ICT practitioners, non-ICT practitioners<br />

and ordinary ICT users. We also collected data through observation and analysed various documents.<br />

ICT practitioners provided us with insights of how ICT is being currently applied in development<br />

initiatives. Other sources provided us with referential information concerning ICT4D in Tanzania.<br />

Interviews, workshops, and focus group discussions (FGDs) were used to collect opinions and<br />

experiences from both experts and users. Observations were made during researcher’s site 1 visits and<br />

participation in a government meeting 2 . Literature-based sources such as policies, and reports and other<br />

recorded evidences were analysed at the beginning of the study and at the end of data collection.<br />

Interviews were useful for capturing personal accounts of the respondents, while FGDs were instrumental<br />

in revealing and discussing new issues and clarifying doubts. Literature based sources were consulted to<br />

provide us with recorded and historical evidences.<br />

Data were collected from four regions in Tanzania; Dar es Salaam, Morogoro, Mwanza and Zanzibar. We<br />

selected Dar es Salaam because it is the main business city of Tanzania, while Morogoro and Mwanza<br />

were relevant sources to represent other regions in Tanzania with less business activities as compared to<br />

Dar es Salaam. Zanzibar provided us with information from the other side of the Union of the United<br />

Republic of Tanzania (URT)3.<br />

The selection of potential respondents was done by first contacting professionals from the President’s<br />

Office Public Services Management, Tanzania Global Development Learning Centre, and SWOPNET 4 .<br />

The professionals were interviewed and requested to suggest other potential respondents. This method<br />

helped to reduce researcher’s biasness in selecting respondents because the researcher had no control<br />

of who will be invited hence minimise biasness.<br />

2.1 Data capturing procedures<br />

We interviewed ICT experts as well as ordinary users. Interviews were arranged to take place at<br />

respondents’ most convenient locations, while those in distant places (e.g. in the diasporas) were<br />

contacted by various ICT means (e.g. phone or skype). We used semi structured interview guides to<br />

facilitate the flow of the interviews. All interviews were recorded except when respondents felt<br />

uncomfortable with this approach. We conducted 29 (Table 1) interviews, and each had an average<br />

duration of 80 minutes.<br />

Table 1: Interview respondent profile<br />

Category Number<br />

Government 13<br />

Private Sector 6<br />

Diaspora 5<br />

NGOs 3<br />

International organisations 2<br />

Total 29<br />

We conducted three main workshops during this research. Additionally, we organised one purposeful<br />

FGD with respondents from the Commission of Science and Technology (COSTECH). At the beginning<br />

of each workshop and FGD we provided an introductory presentation to familiarise the participants with<br />

the research topic, aim, and the information they were expected to contribute. We then divided the<br />

participants into smaller discussion groups, and given them 40 to 60 minutes for discussion. Each group<br />

was given an FGD guide to facilitate the discussion. Later, a joint group discussion was convened,<br />

whereby groups presented their findings. This approach was useful because it facilitated active<br />

participation, probing, and clarification of unclear concepts.<br />

2.2 Data analysis<br />

We used the Straus and Corbin’s (1990) framework of data analysis. The process was facilitated by<br />

means of qualitative data analysis software, Atlas.ti. The software was used to manage data, code,<br />

1<br />

Site visits to TGDLC, Mwanza Municipal Council, Internet cafes in Dar es Salaam, Morogoro, and Zanzibar<br />

2 rd<br />

E-government Meeting held at Utumishi on 3 March, 2009<br />

3<br />

Tanganyika and Zanzibar united in 1961 and formed URT<br />

4<br />

Sharing With Other People Network<br />

579


Jim Yonazi<br />

analyse, and relate the emerging themes. Figure 1 shows an example on how the category ‘challenges’<br />

was arrived at.<br />

Table 2: Workshop participants profile<br />

Category Number<br />

Government 9<br />

Private Sector 14<br />

Academia 10<br />

UN 3<br />

Coos 4<br />

Total 40<br />

Figure 1: Example of coding in Atlas.ti<br />

3. Results<br />

3.1 Facilitators of ICT4D<br />

We define the facilitators as factors which provide a favourable environment for the successful application<br />

of ICT4D in a particular context. Understanding such factors informs ICT4D practitioners on issues that<br />

can be exploited or influenced when planning or evaluating ICT4D related initiatives. In this study we<br />

identified that the current facilitators of ICT4D in Tanzania are (1) affordability, availability, and adoption<br />

of ICTs, (3) Supportive social infrastructure (levels of literacy and Kiswahili as a homogenous national<br />

language), and (4) presence of government will.<br />

3.1.1 Affordability, availability and adoption of ICTs<br />

The government removed the Value Added Tax (VAT) on computers in July 2000 (Miller et al, 2004).<br />

VAT was 20% until July 2009 when the government reduced it to 18% (UTR, 2009). As a result the cost<br />

of computers decreased and facilitated the uptake of ICTs in the country. This is especially evident in the<br />

urban areas where the number of internet access points (e.g. cybercafés), and the ownership of personal<br />

computers has increased. Second-hand computers can be bought from a price of TSh. 150,000 (about<br />

USD 150). This price can allow ordinary people, particularly in urban areas, to own a computer at home.<br />

However, it is still too expensive for the poor in rural regions, and low income people in the urban areas.<br />

580


Jim Yonazi<br />

The availability of low cost mobile phones, with a basic model from as little as TSh. 20,000 (about USD<br />

20) has also resulted in widespread penetration.<br />

“I recall there were hardly any cybercafés back in June 2000 which is when the tax on<br />

computers was lifted. It was an ethinkTankTZ initiative during our first year of existence. We<br />

sent a small delegation to meet the Minister of Finance around April or so that year. We<br />

prepared a paper describing the advantages of increasing the penetrationn of IT as opposed<br />

to targeting IT for Taxation. The boom of cybercafés is one of the advantages of the VAT<br />

relief on computers.” R.1.<br />

3.1.2 Availability and adoption of technologies<br />

Technologies with high domestication potential are those which ordinary households can acquire and<br />

own. Currently, technologies such as TVs, radio and mobile phones are widely available in Tanzania<br />

(TCRA, 2009). Many citizens have demonstrated that they are willing to adopt new technologies as seen<br />

in the sharp increase of mobile phones between 2000 and 2008 (Table 3). We noticed the increase of<br />

TVs, and radios in rural areas. The availability of such technologies, and the willingness to use them,<br />

allows more citizens to access information. They also facilitate users to advance their lifestyle and<br />

economic activities. This plays an important role in development as evidenced below.<br />

“Advancement in technologies is a facilitating factor. People have been fast in adopting<br />

technologies. For instance, currently we have more than 10 million mobile phone<br />

subscribers. Many people including secondary school pupils have and use mobile phones”.<br />

R2.<br />

3.1.3 Supportive social infrastructure: literacy and language<br />

Although illiteracy is still a challenge to Tanzania, 64% of the adult population can read and write (CIA,<br />

2009) and most can read, speak, and write Kiswahili. The existence of one national language has<br />

contributed to political and economical stability (Mukuthuria, 2006). If adequately exploited, the use of<br />

ICTs and content development and advocacy in Kiswahili could reach a wider audience who could benefit<br />

from the utilization of ICT in their social activities.<br />

“Tanzania uses one language, it is easy to communicate, advocate and develop contents in<br />

a language that everyone understands. A typical example is the AIDS awareness campaign.<br />

They mainly use Kiswahili. This makes it possible to reach people even in remote areas. I<br />

think it is time that we have to shift from using English in ICT to localisation through<br />

Kiswahili.”. R.3.<br />

Table 3: Voice telecommunication subscribers (2000 - 2009)<br />

YEAR<br />

BENSO<br />

N CELTEL TIGO<br />

TTCL<br />

Fixed<br />

TTCL<br />

MOBIL<br />

E<br />

VODAC<br />

OM<br />

ZANTEL<br />

MOBILE<br />

ZANTEL<br />

Fixed TOTAL<br />

2000 - - 56511 173591 - 50000 4007 - 284109<br />

2001 - - 89056 177802 - 180000 6501 - 453359<br />

2002 - 120089 160000 161590 - 300000 26770 - 768449<br />

2003 - 320000 210000 147006 - 700000 68000 - 1445006<br />

2004 - 504000 303000 148360 - 1050000 85000 - 2090360<br />

2005 - 882693 422500 154420 - 1562435 96109 - 3118157<br />

2006 - 1516832 760874 150897 6390 2975580 355246 747 5766566<br />

2007 3300 2505546 1191678 157816 72729 3870843 678761 5453 8486126<br />

2008 3000 3862371 2569527 116265 105804 5408439 1057652 7544 13130602<br />

2009 3101 4910359 4178089 157321 115681 6883661 1378595 15601 17642408<br />

Source: TCRA (as at December, 2009)<br />

3.1.4 Presence of government will and support<br />

Several aspects which indicate the presence of government will were observed. These include high-level<br />

policies and support, and establishment of coordination and implementation government organs. We<br />

summarise the indicators in table 4.<br />

581


Jim Yonazi<br />

Table 4: Indicators of the presence of government will and support on ICT4D in Tanzania<br />

Indicator Example<br />

Recognition of the value of ICT<br />

at the national top priority<br />

policies and strategies<br />

Establishment of ICT<br />

coordination and regulatory<br />

machinery<br />

Involvement of top level<br />

leadership<br />

3.2 Challenges facing ICT4D in Tanzania<br />

The value of ICT in Strategy for Growth and Reduction of Poverty (2005),<br />

National ICT policy (2003) and other sectoral policies such as the ICT policy<br />

for basic education (URT, 2007).<br />

Ministry of Universal Communications Services Access Fund, Ministry of<br />

Communications, Science, and Technology, Commission of Science and<br />

Technology (COSTECH), and Tanzania Communications Regulatory<br />

Authority<br />

Memorandum of understanding signed by H.E. Jakaya Mrisho Kikwete, the<br />

President of Tanzania, and the Chairman of Microsoft, Mr. Bill Gates in 2006<br />

We identified four categories of issues possible to challenge ICT4D in Tanzania. These include<br />

connectivity, content (service) issues, organisational, and people related challenges.<br />

3.2.1 Inadequate connectivity<br />

Connectivity challenges relate to the difficulties that organisations or individuals encounter when<br />

deploying or accessing ICT enabled initiatives. We related this issue to the inadequacy of the current ICT<br />

networks and other supporting in the country (Table 5). Typical examples are the lack of availability and<br />

the spread of broadband, the lack of electricity, and even the limited coverage of mobile phone networks.<br />

ICT equipment, especially computers, are still not widely available, particularly in the rural areas. This<br />

impedes the possibility of stimulating demand and deployment of ICT4D initiatives across the country.<br />

Table 5: Tanzania Infrastructure Index, 2008<br />

Element<br />

Value<br />

Internet per 100 users 1.00<br />

PC per 100 users 0.93<br />

Cellular subscribers per 100 users 14.78<br />

Main telephone lines per 100 0.40<br />

Users broadband per 100 users …<br />

E-readiness index 0.2929<br />

Regional average e-readiness index 5<br />

0.2879<br />

World average e-readiness index 0.4514<br />

World leader e-readiness index 6<br />

0.9157<br />

Source: Source: UN, 2008<br />

3.2.2 Content quality<br />

The quality and quantity of the existing ICT enables services are yet to meet user expectations. For<br />

instance much of the content, except news websites and blogs, is infrequently updated and also is not<br />

local. Specific examples include the obsolescence of links and tender information on government<br />

websites. These elements are often left unattended even when they are no longer useful. Other possible<br />

content quality issues include insufficiency and fragmentation of the provided services or information.<br />

Additionally, most of the websites, including government websites, are written in English. While English is<br />

the official language, most ordinary Tanzanians speak Kiswahili. Consequently, the available content is<br />

not perceived to be local. Other service related issues include lack of responsiveness, incompleteness,<br />

lack reliability and dependability.<br />

3.2.3 Organisational challenges<br />

Organisational challenges refer to the characteristics or issues which determine the aggressiveness and<br />

progress of an organisation towards ICT initiatives. Issues related to this category are the lack of<br />

leadership, organisational inertia, inadequate planning, and unsupportive processes. Projects with strong<br />

leadership conviction and commitment were succeeded (e.g. the Sengerema community centre project).<br />

5 East Africa<br />

6 Sweden<br />

582


Jim Yonazi<br />

Other projects stagnated when committed leadership ceased (e.g. the Kilosa community centre project).<br />

This situation is evidenced below:<br />

“Leadership is another important challenge. I will also give you an example. The District<br />

Executive Director for Kilosa went to Sengerema and wanted a similar project in her area.<br />

That was done successfully. However, after she was transferred to another area support<br />

problems started. People started calling even the local radio by her name. Madiwani 7 were<br />

divided such that diwanis from distant areas where the community radio cannot be heard did<br />

not want to contribute to the sustainability of the radio”. R.4.<br />

Equally, inadequate planning; unsupportive policies, practices and processes; and organisational inertia<br />

affect the application of ICT in development activities. These issues have also been observed by other<br />

researchers (e.g. Mutagahywa, et al., 2007). For example; inadequate planning has lead to lack of<br />

implementation of the National ICT Policy (URT, 2003). Consequently, no responsibility was assigned to<br />

any government body. The NIP remains a legacy document with minimal interpretation and<br />

implementation. The situation is similar at sectoral levels with exception of the Ministry of Education and<br />

Vocational Training (URT, 2007). We could not identify other sectoral strategy was available on how NIP<br />

will be implemented. One of our respondents cites this issue:<br />

“I think many people are yet to be knowledgeable about ICT projects. For this reason they do<br />

not know even how to write good ICT policies. The unsupportive ICT policies that we have<br />

are results of such poor skills.” R.5.<br />

3.2.4 People-related issues<br />

Three people-related issues were identified to be important for the application of ICT4D- adequacy of ICT<br />

skills, ICT awareness, and mindset. Although various initiatives are being deployed in Tanzania, many<br />

Tanzanians, especially in the rural areas, do not have adequate skills and awareness to operate ICT<br />

equipment, especially computers. Equally, organisations including the government do not have sufficient<br />

skilled people to drive the application of ICT in development initiatives.<br />

The third issue relates to unsupportive mindsets particularly among the older generation presently in<br />

decision-making positions. This may have a historical reason as the Government of Tanzania banned the<br />

use and importation of ICTs (e.g. TVs, computers) in the early 1970s. As a result, the ownership and use<br />

of these technologies was perceived to be illegal and luxury. The long term effect has been that decision<br />

makers lack the power to conceptualise and exploit the potential of ICT in development. This culminates<br />

in a limited number of ICT initiatives, limited utilisation of ICTs in development initiatives, and inadequate<br />

support, prioritisation and advocacy of ICT from the policy, implementation, and use levels.<br />

“The perception of people as well as the general public has to change. Tanzania is yet to<br />

grasp the importance of ICT. It is mostly regarded as a luxury rather than an important<br />

developmental tool. Many leaders are not aware of ICT potentials. This makes it difficult for<br />

them to put ICT as one of the priority issues in their activities. As a result ICT initiatives face<br />

some difficult bureaucracies. This is one of the major problems.” R.6.<br />

4. Recommendations<br />

Tanzania’s Vision 2015 has the country’s overarching development ambition for about 10 to 15 years.<br />

The vision is intended to be delivered through country’s MDGs, MKUKUTA, MKURABITA, national and<br />

sectoral policies, e-Government strategies and the Universal Communications Services Access Fund.<br />

Accordingly, we use our findings to synthesize recommendations to facilitate such efforts. Our<br />

recommendations include the identified ICTD facilitators, and the need to overcome the highlighted<br />

challenges. Although, the government has the sole responsibility for harnessing ICT4D, it may not<br />

achieve this goal alone. Joint efforts and collaborations from other stakeholders are necessary. Hence,<br />

our recommendations are relevant to the government, others current and future stakeholders of ICT4D in<br />

Tanzania.<br />

4.1 Exploiting existing opportunities<br />

Tanzania can benefit from the production and utilisation of ICTs. While utilisation of ICT in various sectors<br />

has been increasing, production of ICT is still underdeveloped. We therefore recommend that the<br />

government should strategise and encourage local production of ICTs. Although hardware production is<br />

7 Madiwani means local councillors<br />

583


Jim Yonazi<br />

time and investment intensive, software and applications development can be prioritised. Experiences in<br />

attracting investors in other sectors (e.g. tourism) can be used to benefit the ICT sector.<br />

At a national level the government has demonstrated its intent and willingness towards ICTs through the<br />

establishment of policies, strategies and coordination structures. These efforts need to be propagated<br />

more widely. Awareness should be raised at the community, organisational and local government levels<br />

where ICT implementation has to take place. This will facilitate the incorporation of ICTs into various<br />

development initiatives.<br />

Various development projects are being deployed across the country. However ICT deployment is still<br />

limited. The government can take the advantage of the existing coordination and regulatory structures to<br />

influence the integration of ICT into development initiatives. For instance, by collaborating with other<br />

ministries, departments, agencies and others, the MCST can foster the integration of ICTs into other<br />

large-scale projects such as road construction, and water supply. A road project may include the laying<br />

down of fibre cable to expand connectivity. Other collaborative strategies such as shared infrastructure<br />

and shared ICT skills training could also be considered.<br />

The VAT relief on computers has contributed to increased availability of ICTs and related services in<br />

Tanzania. The possibility of extending such measures to other areas of ICT should be considered,<br />

particularly those with high domestication potential. This will facilitate the spread, availability, and<br />

adoption of ICT in many other development activities. In addition, awareness should be raised about the<br />

VAT relief presently available. This can help to stimulate the use of ICT4D across the country.<br />

Existing educational levels and Swahili homogeneity were contextual facilitators identified during the<br />

research. Such and other similar factors need to be identified and exploited.<br />

4.2 Tackling the challenges<br />

The government has the responsibility for constructing reliable and adequate ICT access for the country.<br />

This relates to ICT networks and supporting infrastructure such as electricity and roads. However,<br />

because such initiatives may take a long time and resources are scarce, we recommend that ICT4D<br />

stakeholders should start integrating existing infrastructure for channelling services and advance the<br />

reach of ICT4D to a larger population. Specific emphasis should be put on the use of widely available<br />

technologies such as mobile phones, TV and radio. In addition, the use of alternative sources of energy,<br />

e.g. solar energy, should be considered.<br />

Service delivery needs to be adapted to meet the needs of local communities in an appropriate manner.<br />

Simplicity is required in terms of language and ease of use, usefulness and comprehensiveness.<br />

Responsiveness and reliability should also be promoted. The quality of websites needs to be improved<br />

through contents localisation, specifically in the use of Kiswahili. Existing content provision is limited and<br />

fragmentary - efforts should be made to increase the quantity of ICT based services. This will contribute<br />

to the completeness, sufficiency, and usefulness of the provided services, mainstreaming ICTs into<br />

citizen’s social-economic activities.<br />

ICT4D initiatives require strong, persuasive, and committed leadership. However, it may not be easy to<br />

achieve such leadership in every project. Mentoring and incentive schemes should be used to promote<br />

innovation in ICT4D. Mentoring combines training and coaching of stakeholders to understand and<br />

practise ICT4D. Incentive schemes can be used to coerce or attract stakeholders to adopt ICT4D<br />

activities. Schemes can take the form of sanctions or rewards towards ICT utilisation and innovation. This<br />

will attract and encourage leaders to engage and adopt ICT in development initiatives, and reduce<br />

organisational inertia.<br />

Other issues which may cause organisational inertia need to be identified and addressed. Issues such as<br />

unsupportive policies, regulations and procedures need to be reformed. Models used in other<br />

crosscutting issues such as gender advocacy and reforms can also be studied and used to highlight and<br />

fast track such reforms.<br />

As ICT4D is a crosscutting issue, more emphasis should be placed on intra- and inter-organisational<br />

collaborative planning involving a broad range of stakeholders. This will allow the identification of needs<br />

and priorities, as well as available opportunities for collaboration (e.g. standards, services, and<br />

584


Jim Yonazi<br />

infrastructure development). Multi-stakeholder models applied in other successful sectoral projects can<br />

be used where appropriate.<br />

Addressing these issues will require a combination of approaches. In the short term, ease of use should<br />

be prioritised. This may involve designing simplified and ease to use services which people can use to<br />

build their skills and encourage adoption. However, in the longer term, the government needs to<br />

emphasise ICT training into the country’s education system and workforce training. This will enhance<br />

citizens’ ICT skills, and ensure availability of skilled ICT labour to facilitate ICT4D. The government needs<br />

to establish a sustained ICT awareness campaign for mindset change, as has been done in other sectors<br />

such as health in fighting HIV/AIDS. People need to be reminded, convinced, and continually persuaded<br />

about the benefits of ICTs. Spontaneous and periodic campaigns will not produce expected results.<br />

More innovative research is required to understand and develop the most relevant solutions for<br />

communities. The establishment of centers of excellence in ICT is recommended as one possible<br />

approach. Such centers can be useful for providing advice and practical solutions concerning ICT4D.<br />

5. Conclusion<br />

In this study we have identified issues possible to facilitate and challenge ICT4D in Tanzania. We<br />

conclude that it is possible to successfully implement ICT4D in Tanzania. However, it is important to<br />

understand and exploits the facilitators, while addressing the challenges in favor of ICT4D. This is can be<br />

achieved though joint efforts of the government and other stakeholders of ICT in Tanzania. A specific<br />

attention need to be paid on collaborative planning between government Ministries, Departments, and<br />

agencies. This will facilitate the integration of ICT projects in other development projects. Otherwise,<br />

fragmentation and duplication of initiatives will continue and cause unnecessary over expenditure and<br />

loss of public resources.<br />

6. Appendix 1: Open coding list from Atlas.ti<br />

Administrative inertia challenge<br />

Appropriate technologies<br />

Challenge - Appropriate Financial Allocation<br />

Challenge - Awareness<br />

Connectivity<br />

Corruption<br />

Equipment<br />

Expertise<br />

Financial<br />

ICT literacy<br />

Illiteracy<br />

Leadership<br />

Local content<br />

Mindset<br />

Organizational inertia<br />

Planning<br />

Policy<br />

Political will<br />

Procurement process<br />

Resistance to change<br />

Updating<br />

Viruses<br />

585


Current ICTs<br />

Facilitating access<br />

Facilitator - Cheapness of technology<br />

Coordinating ministry<br />

Education<br />

high adoption rate<br />

One language Kiswahili<br />

Tax relief<br />

technology-need fit<br />

ICT applications<br />

Information Management<br />

Key responsibility<br />

Less use in agriculture<br />

education<br />

financial services<br />

Government<br />

health<br />

ICT application<br />

in manufacturing<br />

private sector<br />

in rural development activities<br />

specialized social services<br />

Less utilization<br />

Less utilization in SME<br />

Most relevant technologies<br />

Purpose of ICT<br />

Recommending - ICT R & D<br />

Access Fund<br />

adoption factors<br />

Benchmarking<br />

Business Process<br />

Outsourcing (BPO)<br />

coordination<br />

government commitment<br />

human capacity development<br />

ICT Curriculum<br />

ICT education and training<br />

ICT supportive policy<br />

implementation plan (planning)<br />

Jim Yonazi<br />

586


incentives<br />

infrastructure improvement<br />

leadership commitment<br />

Local content<br />

Mindset change<br />

on advocacy style<br />

Open Source<br />

prioritization of ICT communication<br />

relevant application<br />

sharing of infrastructure<br />

simple initiatives<br />

stakeholder involvement<br />

tax rate cut<br />

top leadership buy in<br />

Respondent information<br />

Jim Yonazi<br />

Unable to own ICT<br />

Agriculture<br />

business transaction<br />

commerce<br />

Communication<br />

development<br />

education<br />

Entertainment<br />

financial services<br />

governance<br />

health<br />

information management<br />

infrastructure development<br />

job creation<br />

land management<br />

Marketing<br />

Media<br />

Mining<br />

office productivity<br />

security and safety<br />

Social life<br />

travel and tourism<br />

References<br />

CIA, 2009, ‘The World Fact Book: Tanzania. CIA, Retrieved February 14th 2009, from<br />

https://www.cia.gov/library/publications/the-world-factbook/geos/tz.html<br />

CIA., 2006 ‘The World Fact Book: Tanzania’. CIA, Retrieved November, 21, 2006, from<br />

https://www.cia.gov/library/publications/the-world-factbook/geos/tz.html<br />

587


Jim Yonazi<br />

Cole, R.P., Roman, R., 2003, ‘ICT4D : a frontier for higher education in developing nations’, Journal of Africa and<br />

Asia Studies, Vol. 2, pp. 381 – 420<br />

IICD, 2008, ‘IICD supported programme: Telemedicine – Tanzania’. IICD. Accessed, 12 th Feb, 2009, from:<br />

http://www.iicd.org/projects/tanzania-telemedicine<br />

Kramer, W.J, Jenkins, B., Kats, R.S., 2007, The role of Information and Communication Sector in Expanding<br />

Economic Opportunity. Corporate Social Responsibility Initiative Report No. 2. Cambridge MA, Kennedy<br />

Schools of Government, Harvard University<br />

Miller, J., Kartano, K., Ntiro, S., 2004, ‘ICT investment Opportunities in East Africa: Country Specific Market Analysis<br />

– Tanzania’, International Finance Corporation. Accessed November 20, 2006, from<br />

www.trigrammic.com/downloads/new2005/Tanzania%20Report.pdf<br />

Mukuthuria, M., 2006, ‘Kiswahili and Its Expanding Roles of Development in East African Cooperation: A Case of<br />

Uganda’, Nordic Journal of African Studies, Vol. 15, No. 2, pp. 154–165<br />

Mutagayhwa, B., Kinyeki, C., Ulanga, J., 2007, A Review of E-Government Related Interventions in PSRP Phase I<br />

and Advice on a Strategy Framework Towards PSRP Phase II, POPSM, Dar Es Salaam, Tanzania<br />

Sawe, D., 2007, Serikali Mtandao; madhumuni, matatizo, mafanikio, na changamoto, POPSM, Dar Es Salaam,<br />

Tanzania<br />

Straus, A & Corbin J. 1990, Basics of Qualitative Research: Grounded theory Procedures and Techniques, SAGE<br />

publications, USA<br />

UN, 2008, E-Government Survey 2008: From E-Government to Connected Governance, United Nations, New York.<br />

URT., 2009, ‘Hotuba ya Waziri wa Fedha na Uchumi Mhe. Mustafa Haidi Mkulo (Mb.), Akiwasilisha Bungeni<br />

Mapendekezo ya Serikali Kuhusu Makadirio ya Mapato na Matumizi kwa Mwaka 2009/2010.’Accessed on 3 rd<br />

July, 2009, from:<br />

http://www.mof.go.tz/mofdocs/budget/Hotuba%20ya%20Bajeti%202009%208.06.2009%20FINAL%20text.pdf<br />

URT., 2008, ‘Telecommunication Statistics as at 30th September 2008’, Tanzania Communications Regulatory<br />

Authority, Accessed on 12, January, 2009, from; http://www.tcra.go.tz/publications/telecom.html<br />

URT. 2007, Information and Communication Technology (ICT) Policy for Basic Education, URT, Dar Es, Salaam,<br />

Tanzania<br />

URT. 2006, ‘Universal Communications Service Act’, Available at:<br />

http://www.parliament.go.tz/bunge/act.php?search=2006&imageField.x=0&imageField.y=0&select2=0<br />

URT., 2005, National Strategy for Growth and Reduction of Poverty, URT, Dar es Salaam, Tanzania<br />

URT. 2003, National ICT Policy, URT, Dar es Salaam, Tanzania<br />

URT., 2000, National Poverty Reduction Strategy, UTR, Dar Es Salaam, Tanzania<br />

URT., 1998, National Poverty Eradication Strategy, Dar Es Salaam, Tanzania<br />

Walsham, G., 1993, Interpreting Information Systems in Organizations, Chichester, Wiley.<br />

Yonah, Z. (2005). ICTs as Tools for Poverty Reduction, Proceeding of the Discourse on Engineering Contribution in<br />

Poverty Reduction<br />

Yusoff, A. Y., Lim, S.Y.P. (2003). Understanding ICT4D Thematics in Malaysia: A Sourcebook, UNDP<br />

588


PhD<br />

Research<br />

Papers<br />

589


590


Maturity Models Transition from eGovernment<br />

Interoperability to T-Government: Restyling Dynamic Public<br />

Services Through Integrated Transformation of Service<br />

Delivery<br />

Mohamed Mohyi Eddine El Aichi 1, 2 and Mohamed Dafir Ech-Cherif El Kettani 1<br />

1<br />

ENSIAS, University Mohamed V, Rabat, Morocco<br />

2<br />

Information Software Development Entity, Intelcom S.A., SATEC Group, Rabat,<br />

Morocco<br />

melaichi@intelcom.co.ma<br />

dafir@ensias.ma<br />

Abstract: Transforming public services through a global, common, measurable, achievable vision and clear<br />

objectives, the use of Information and Communication Technology and referral to services focused on the citizens<br />

needs have an important effect on economic, social and cultural life across the country that extends globally. The aim<br />

of this paper is to outline the part of the transformation of government services by defining the guidelines for<br />

implementation and monitoring procedures necessary to support any model of maturity to ensure the successful<br />

transformation of public services in a safe flexible and adaptable. The model we seek to build is based on best<br />

practices in service management, governance, enterprise architecture, and implementation of Information<br />

Technology.<br />

Keywords: maturity, t-government, service management, interoperability<br />

1. Introduction<br />

The requirement to provide citizen-oriented services in a controlled manner, easy, secure, flexible and<br />

integrated approach has resulted in the presence of several maturity models that define the stages of<br />

eGovernment evolution and use various frameworks to evolve from a maturity level to the next one or<br />

within a same stage improvement. However, the absence of a shared relationship between maturity<br />

models, used frameworks and key indicators had two major consequences: ranking in eGovernment<br />

remains dependent on technological change, which compromises the convergence of transformational<br />

services. In fact, public services represent a very large scale enterprise whose mission is to provide<br />

citizen-oriented transactional services that invoke multiple canal, multiple processes, require the<br />

solicitation of several entities and respond to citizen incentives and constraints. However, they suffer from<br />

absence of a generic maturity model that all countries can adopt and the presence of numerous<br />

eGovernment maturity models which have neither procedures for ensuring systemic transformation of<br />

public services nor the motivations for the adoption of a specific model. We can notice also the absence<br />

of key performance indicators to validate the evolution from one level to another, which presents a real<br />

ambiguity with respect to the convergence of t-government models. (Mecum 2001)<br />

Another problem related to t-Government progression is the presence of various Enterprise Architectures<br />

-EA- that have been adopted and adapted by governments. Those Enterprise Architectures are<br />

systematically adapted to a specific context. They faithfully reproduce a specific model of governance<br />

and also depend on technological factors in the implementation phase. This paper is organized as<br />

follows. After this introduction, we present in the second section a synthesis on eGovernment existing<br />

maturity models, which lead to a proposed projected model that contains five stages as for standardized<br />

maturity models related to other areas. The third section presents the Government Enterprise<br />

Architectures as implemented by some countries. The fourth section discusses the transformational<br />

government approach, and our perception to implement it within the context of a service management life<br />

cycle. The forth section presents a case study for two eGovernment implementations on Morocco, in<br />

connection with the proposed model. We finnish the paper with some concluding remarks concerning the<br />

main contributions of the paper, the main deficiencies and directions for future work.<br />

2. State of art: eGovernment maturity models<br />

2.1 Research method<br />

The goal of this research is to adopt a standard approach concerning eGovernment maturity models,<br />

especially in terms of levels, in order to prospect the Transformation aspect of eGovernment. Indeed,<br />

591


Mohamed Mohyi Eddine El Aichi et al.<br />

eGovernment seems to be constantly evolving, and a number of stage models have been developed and<br />

published (Lee 2010). The methodology used in this paper consists in synthesizing most important<br />

eGovernment developmental models produced during the last decade, in order to propose a maturity<br />

model that integrates stages that will facilitate the use of a common frame of reference for eGovernment<br />

development. As this is a relatively new area, these models are presented as results of qualitative studies<br />

rather than quantitative and empirical. Maturity models are defined as “A method for judging the maturity<br />

of the processes of an organization and for identifying the key practices that are required to increase the<br />

maturity of those processes”. The eGovernment Maturity Model is a model that measures public<br />

institutions' readiness to manage and implement eGovernment (Al khatib 2009). In this section, we<br />

summarize some recognized eGovernment maturity models, then we try to map them to a standard<br />

maturity model levels like CMMI, Cobit, … and attach it to Key Performance Indicators (KPI) referenced<br />

in section 4.<br />

2.2 eGovernment developmental models<br />

Table 1 summarizes a list of developmental models recognized and adopted by government to evolve<br />

within eGovernment vision. This table doesn’t contain the exhaustive list but the most used around the<br />

world and covered at this time by my research. (Saha 2009) (Lee 2010)<br />

Table 1: eGovernment developmental models and stages (Lee 2010)<br />

Author<br />

s<br />

Gartner<br />

Group<br />

Deloitte<br />

Research<br />

Layne and<br />

Lee<br />

Hiller and<br />

Belanger<br />

United<br />

Nations<br />

Accenture Siau and<br />

Long<br />

Anderson<br />

and<br />

Henriksen<br />

Year 2000 2000 2001 2001 2001-2008 2003 2005 2006<br />

# of<br />

stages<br />

4 6 4 5 4 5 5 4<br />

1 Culti<br />

2 Web<br />

presence<br />

Info<br />

publishing &<br />

disseminat<br />

ion<br />

3 Interaction Official twoway<br />

transaction<br />

4 Transaction Transacti<br />

on<br />

5 Multi<br />

-<br />

purp<br />

Portals<br />

person<br />

nalizati<br />

on<br />

Catalog Info<br />

dissemination<br />

& catalog<br />

Two-way<br />

communication<br />

Service and<br />

financial<br />

transaction<br />

Emerging<br />

presence &<br />

enhanced<br />

presence<br />

Interactive<br />

presence<br />

Transactional<br />

presence<br />

Online<br />

presence<br />

Basic<br />

capability<br />

Service<br />

availability<br />

6<br />

7<br />

ose<br />

port<br />

als<br />

Vertical<br />

integration<br />

Vertical and<br />

horizontal<br />

integration<br />

Seamless<br />

presence<br />

networked<br />

Mature<br />

delivery<br />

Clustering<br />

presence<br />

of common<br />

services<br />

connected<br />

8 Fullintegrat Horizontal<br />

ion &<br />

enterprise<br />

transaction<br />

integration<br />

9 Transformat<br />

ion<br />

10 Political<br />

participation<br />

Service<br />

transformati<br />

on<br />

Eparticipation<br />

index<br />

Web<br />

presence<br />

Interaction<br />

Transaction<br />

Transformat<br />

ion<br />

E-<br />

Democracy<br />

vatio<br />

n<br />

Exte<br />

nsion<br />

Maturity<br />

Revolution<br />

These models present the developmental models as a sequence of stages. The numbers of stage can<br />

vary from four to six stages. The sick of those models is the absence of the manner that explains how<br />

citizen oriented service can be managed (Kim 2009). Some of those models combine the state of<br />

eGovernment evolution and the eGovernment finality. For example, E-democracy (Siau Long model), or<br />

592


Mohamed Mohyi Eddine El Aichi et al.<br />

E-participation (Hiller and Belanger model) can be considered as goals of eGovernment vision rather<br />

than the last stage in eGovernment life cycle. EGovernment evolution can be obtained through Web<br />

presence (information need), transactions level (customer need) and transformation (citizen earned<br />

value).<br />

2.3 Standardization of eGovernment maturity model<br />

One needs to have a generic eGovernment maturity model that matches 5 levels like other standards<br />

maturity models applied to all kinds of government and under a governance vision (Tamara 2010). Each<br />

level is defined with some required processes and attached KPIs to ensure the real classification and<br />

ranking. The targeted capability maturity levels are defined below:<br />

Level 1 “Government Presence”: it is an evidence that the government has recognized that the<br />

Business alignment needs to be addressed through ICT. However, there are neither actions nor<br />

approaches that tend to be applied. There are no formal actions to communicate the eGovernment<br />

initiatives to its context. This level contains web site initiatives for each department. The goals,<br />

design, content depend on persons. The web site can be static or dynamic. The customer must be<br />

adapted to each web site navigation, information and vocabulary.<br />

Level 2 “Online Services”: The eGovernment Vision is defined and it is integrated to the business<br />

strategy. Defined and documented online services are provided to customers through ICT<br />

implementation. The eGovernment vision, policies and strategy have been communicated and<br />

understood by all employees. The web site presence is organized, standardized and enforced with<br />

multiple digital services (applications centric). Customers must be adapted to digital service structure<br />

and can get their need through services solicitation.<br />

Level 3 “Consolidate Transformational Services”: The eGovernment Vision is fully citizen concentric.<br />

The need to optimize citizen requests requires restyling public services design and architecture by<br />

enabling the transformation. This transformation implies a radical architecture review by making<br />

integrated horizontal and vertical public’s services architecture. In this level, governments must<br />

document the motivation for citizen oriented services, define clear objectives and scope, the<br />

dependence and constraints related to each new service. Another related Key to this level is the<br />

importance to redefine transaction scope by making more offering service and less requested<br />

service. The government in this level manages the citizen needs (Service centric). Citizen has<br />

motivation, empowerment, knowledge and competence to use new transformed services based on<br />

unique government portal. At this stage, the use of adopted Enterprise Architecture models is<br />

required.<br />

Level 4 “Rethought Government”: The vision, objectives and deployed public services are periodically<br />

inspected and verified through Key Performance Indicator (KPI) and Service Level Agreement (SLA).<br />

The goal is to measure the deviation between the offer and demand of transformed services and the<br />

new citizen requirements. This stage can use the e-participation services, other shared services like<br />

social and collaborative services and dashboard to manage the whole cooperation between<br />

governing and governed person.<br />

Level 5 “T-Gov improvement”: The vision is periodically reviewed according to citizen needs,<br />

bottleneck and technologies evolution. The strategy and policies are periodically updated according<br />

to feedback through e-participation and other shared or social services. The strategy process is<br />

continuously compared with the industry standards and improved. Resources assigned to the t-Gov<br />

initiatives are periodically adjusted according cost/benefit analysis (ROI) and citizen satisfaction. The<br />

final goal of this level is to transfer the public services knowledge to the citizen (Citizen<br />

Empowerment). Citizens can develop their own services (contributors), optimize the service’s<br />

utilization, share learned lessons and experience with others, and tell governments how they can<br />

improve services efficiency.<br />

3. eGovernment from an Enterprise Architecture view point<br />

Architecture at the level of an entire organization is commonly referred to as “Enterprise Architecture<br />

(EA)”. An “enterprise” can be defined as any collection of organizations that has a common set of goals. It<br />

consists in people, information, and technologies that perform business functions and has a defined<br />

organizational structure. (Lathrop 2010)<br />

Enterprise architecture is a conceptual framework that describes how an enterprise is constructed by<br />

defining the components and their relationship. It is a coherent set of principles, methods, and models<br />

593


Mohamed Mohyi Eddine El Aichi et al.<br />

that are used in the design and realization of an enterprise’s organizational structure, business<br />

processes, information systems, and infrastructure. Figure 1 schematizes the Enterprise Architecture<br />

Components relationship.<br />

Figure 1: Enterprise Architecture relationship<br />

3.1 Government Enterprise Architecture<br />

Government Enterprise Architecture (GEA), according to the main government objectives, aims to<br />

improve the quality of public services by understanding, defining, illustrating the new services, and<br />

clarifying how the information resources will contribute. This architecture is a model of references<br />

(guidelines, tools) that are made available to government entities, enabling them to position their projects<br />

and anticipate opportunities for resources share and reuse (Dyer 2009). Therefore, the objectives of the<br />

government enterprise architecture are:<br />

Improve coherence in government and facilitate the transformation;<br />

Provide guidance on four components Affairs, Information, Applications and Technology<br />

Infrastructure and Security.<br />

Allow the identification of elements that are common or can be shared or re-used by departments and<br />

agencies;<br />

Understand, define, illustrate and integrate new services to citizens.<br />

3.2 Scope of the architecture<br />

The government enterprise architecture is intended to clarify the structure of the following elements:<br />

Description of service model delivery and general principles;<br />

Definition of specific principles, concepts and approaches;<br />

Identification of potential combinations of products or services;<br />

Representations in the form of models, components, business information and Applications;<br />

594


Mohamed Mohyi Eddine El Aichi et al.<br />

Sharing and reusing identified components and accuracy of critical success factors for<br />

implementation of the GEA.<br />

The life cycle of business is summarized on the figure 2:<br />

Run the business by planning one or more service ;<br />

Grow the business by extending the scope of existing service and creating more services;<br />

Transform the business to respond to new requirements and optimization. Optimize the service<br />

portfolio and processes solicitation.<br />

Governm& ent M anagem ent<br />

Business<br />

Opportunities<br />

Planning<br />

D es ign & D eliv ery<br />

Run the Business<br />

Business Strategy IT St r ate gy<br />

Enterprise Architecture<br />

Business Architecture<br />

Processes<br />

In fo r ma tio n<br />

People<br />

Locations<br />

BusineRun ss Othe perating Bu siness Environment and IT<br />

Run infrastructure<br />

the Business<br />

G row the B u siness<br />

IT So lutions<br />

IT A r ch itec tu r e<br />

Information<br />

A pplication<br />

Technology<br />

T ransition Plann ing a nd G o uvernance<br />

Tran sfo rm the B usiness<br />

TechnologyA vailabi<br />

li ty<br />

Figure 2: Enterprise Architecture components<br />

This life cycle is based on two components:<br />

A clear business strategy (Business maturity)<br />

An adapted IT strategy (IT capabilities) that responds to business opportunities.<br />

Enterprise Architecture is the manner to align business vision to Technology availability by planning<br />

Business Architecture and IT Architecture Items, planning and delivering Business Environment through<br />

IT infrastructure.<br />

3.3 Summary of the GEA implementation<br />

This section summarizes the Government Enterprise Architecture as implemented by top ranking<br />

countries in eGovernment. There are two major adoptions to achieve eGovernment evolution (Saha<br />

2009):<br />

Transforming e-gov by designing interoperability architecture (UK example). The problem with this<br />

approach is the growth of architecture complexity and investment on time while the main goal of t-gov<br />

is the resource’s optimization.<br />

Transforming e-gov by adopting combined enterprise architecture with Maturity models (USA, ...).<br />

This approach depends on technologies adoption and capabilities evolution. A clear vision<br />

(eGovernment maturity) is a predominate key to success with this approach (Singapore as an<br />

example)<br />

595


Mohamed Mohyi Eddine El Aichi et al.<br />

Table 2 presents a description of the most known Government Enterprise Architecture.<br />

Table 2: eGovernment Enterprise Architecture<br />

Country Description<br />

Singapore There are four elements in Singapore Government Enterprise Architecture (SGEA):<br />

Business Architecture, Information Architecture, Solution Architecture and Technical<br />

Architecture.<br />

The BA provides common terminology for government business, while the IA and SA<br />

provide the data standards and ICT solutions for supporting the business functions<br />

identified in BA. The TA defines standards and provides guidelines on the use of<br />

technology components to support SA.<br />

The Enterprise-Wide Architecture for Value Enhancement (eWAVE) is the next evolution of<br />

the Singapore GEA efforts. The main objectives are:<br />

Better alignment between business and ICT.<br />

Increased communications and integration.<br />

Increased reuse of business and ICT assets.<br />

USA In September 1999, the Federal CIO Council published the "Federal Enterprise<br />

Architecture Framework" (FEAF) for developing an Enterprise Architecture within any<br />

Federal Agency for a system that transcends multiple inter-agency boundaries. It builds on<br />

common business practices and designs that cross organizational boundaries, among<br />

others the NIST Enterprise Architecture Model. The FEAF provides an enduring standard<br />

for developing and documenting architecture descriptions of high-priority areas.<br />

In 2001, the Federal Architecture Working Group (FAWG) was sponsoring the<br />

development of Enterprise Architecture products for trade and grants Federal architecture<br />

segments. The FEAF partitions a given architecture into business, data, applications, and<br />

technology architectures.<br />

The FEA develops a common taxonomy and ontology for describing IT resources. These<br />

include:<br />

Performance Reference Model,<br />

Business Reference Model,<br />

Service Component Reference Model,<br />

Data Reference Model and<br />

Technical Reference Model.<br />

UK UK eGovernment Interoperability Framework defines the essential prerequisites for joinedup<br />

and web enabled government. Adherence to the e-GIF specifications and policies is<br />

mandatory: they set the underlying infrastructure, freeing up public sector organizations so<br />

that they can concentrate on serving the customer through building value added<br />

information and services. The main thrust of the framework is to adopt the Internet and<br />

World Wide Web specifications for all government systems. There is a strategic decision to<br />

adopt XML and XSL as the core standards for data integration and management of<br />

presentational data. This includes the definition and central provision of XML schemas for<br />

use throughout the public sector. The e-GIF is a pragmatic strategy that aims to reduce<br />

cost and risk for government systems whilst aligning them to the global Internet revolution<br />

Canada The FEA is composed of five reference models: Performance, Business, Service, Data,<br />

and Technical. Each of the reference models represents specific aspects of the FEA, and<br />

provides a framework, or a shared language, for departments and agencies to develop<br />

technology solutions that can be used by the federal government collectively. The<br />

reference models are updated as needed to reflect changes in applications and services.<br />

596


Mohamed Mohyi Eddine El Aichi et al.<br />

Australia The AGA aims to assist in the delivery of more consistent and cohesive service to citizens<br />

and support the more cost-effective delivery of ICT services by government, providing a<br />

framework that:<br />

Provides a common language for agencies;<br />

Supports the identification of duplicate, re-usable and sharable services;<br />

Provides a basis for the objective review of ICT investment by government; and Enables<br />

more cost-effective and timely delivery of ICT services.<br />

AGIMO has adapted the established and proven Federal Enterprise Architecture<br />

Framework (FEAF) developed by the United States Government.<br />

Country Description<br />

Chile The eGov-MM model allows the evaluation of public agencies against international best<br />

practices in the area of eGovernment, including the formulation of organizational strategies<br />

and policies, management of ICT, operative management, and organizational capabilities<br />

of the organization and human resources. It also proposes specific roadmaps for capability<br />

improvement, directives about where the financial and human resources of an organization<br />

should be allocated to improve its ability to carry out eGovernment initiatives.<br />

EGov-MM and its assessment methodology were evaluated, provided with feedback and<br />

validated by expert public officials from several government agencies through a pilot study<br />

and several workshops.<br />

The absence of generic models that dress eGovernment evolution and architecture contributes to<br />

different ranking points of view. Each one takes some KPI as repository and those KPI are generally<br />

based on technological evolution, innovation and government investment. The need to get eGovernment<br />

evolution as transformation matrix is important. The next section presents this point and our perception to<br />

do design the transformation.<br />

4. Transformational Government<br />

4.1 What Is Transformational Government?<br />

Transformational Government is the use of Information and Communications Technologies (ICT) to<br />

enable thought, global and radical improvement to the public services delivery with full citizen and Market<br />

centric and results oriented. The term is commonly used to describe a government reform strategy<br />

(citizen centric) which aims to avoid the limitations which have come to be seen as associated with a<br />

traditional eGovernment strategy (application concentric).<br />

Organization for the Advancement of Structured Information Standards [OASIS] define t-Gov as :<br />

“Transformational Government…. encompasses a new "virtual" business layer within government which<br />

allows an integrated, government-wide, citizen-focused service to be presented to citizens across all<br />

channels, but at no extra cost and without having to restructure government to do so.”<br />

4.2 Why Transformational Government?<br />

Traditional eGovernment investments tend to under-deliver because they overlay technology onto the<br />

existing business model of government, based around unconnected departmental silos (i.e. with policymaking,<br />

budgets, accountability, decision-making and service delivery all embedded within a verticallyintegrated<br />

delivery chain based around specific government functions). The result of this has been<br />

duplicated IT expenditure, wasted resources, low levels of customer satisfaction, no critical mass of users<br />

for online services, and limited impact on core, cross-silo public policy objectives (Sahraoui 2009).<br />

A recent study concluded that government transformation programs differ from traditional eGovernment<br />

programs in those major ways:<br />

T-gov takes a whole-of-government view of the relationship between the public sector and the citizen<br />

or business.<br />

T-gov takes a whole-of-government view of the most efficient way of managing the cost base of<br />

government.<br />

T-gov focuses on the “citizen” not the “customer”. It seeks to engage with the citizens as owners or<br />

participants in the creation or rethinking of public services, not as passive service’s recipient.<br />

597


Mohamed Mohyi Eddine El Aichi et al.<br />

The OECD defines this change as a paradigm shift “Governments are shifting towards this broader view<br />

rather than focusing on the tools themselves. They are shifting from a government-centric paradigm to a<br />

citizen-centric paradigm….”<br />

4.3 Transformation guidelines<br />

The transformational government (t-Gov) is an eGovernment stage which seeks a new direction of<br />

offered services to citizens by focusing on their needs through a horizontal and vertical integration and<br />

rethinking government as Service Management life cycle.<br />

All service solutions and activities should be driven by citizens and businesses needs and theirs<br />

requirements. Within this context they must also reflect the strategies and policies of the service provider<br />

organization. The service life cycle is initiated from a change in requirements (transformation needs,<br />

developing new citizen centric service).<br />

Those requirements are identified and agreed within the Service Strategy stage (Business Level) within a<br />

Service Level Package and a defined set of business outcomes. The SLP must address some SLA like<br />

availability of service, capacity management, security, disaster recovery …<br />

This passes to the Service Design stage where a service solution is produced together with a Service<br />

Design Package (SDP) containing everything necessary to take this service through the remaining stages<br />

of the life cycle. In this stage we must decide or vote Government Enterprise Architecture to drive the<br />

implementation.<br />

The SDP passes to the Service Transition stage, where the service is evaluated, tested and validated,<br />

the Service Knowledge Management System (SKMS) is updated, and the service is transitioned into the<br />

live environment, where it enters the Service Operation stage.<br />

Wherever possible, Continual Service Improvement identifies opportunities for the improvement of<br />

weaknesses or failures anywhere within any of the life cycle stages. This stage is conduct by<br />

eGovernment Maturity Models (Cartlidge 2007)<br />

Those guidelines will be developed while the research advancement. The objective is to define, for each<br />

stage the prerequisite, constraints and deliverable. It’s important to rely those guidelines with a voted<br />

Government Enterprise Architecture to implement and trace the life cycle and especially the design<br />

phase. Those guidelines must be also integrated with generic maturity model that we start to define in<br />

section 2 as presented in figure 3.<br />

Figure 3: Guidelines for T-Government<br />

598


Mohamed Mohyi Eddine El Aichi et al.<br />

We try to summarize in table 3 the relationship between stages and maturity levels, through a mapping<br />

between recognized maturity models, standard maturity models and actual technological evolution based<br />

on guidelines indicated in this section. The actual statement and market needs must have a minimum<br />

prerequisite: it must be action governed. That’s why Web site presence must be attached to interaction.<br />

Table 3: eGovernment maturity models compared with a standard maturity Model<br />

EGovernment<br />

Maturity Models<br />

Initial Repeatable Defined Managed Optimized<br />

Gartner Group (2000) - Web Presence<br />

- Interaction<br />

- Transaction - Transformation<br />

UN’s Five (2001) - Emergence presence<br />

- Enhanced presence<br />

- Interactive presence<br />

Deloitte (2001) - Information publishing /<br />

dissemination<br />

Layne and Lee<br />

(2001)<br />

Hiller and Belanger’s<br />

(2001)<br />

- Transactional<br />

presence<br />

- Official two why<br />

transaction<br />

- Seamless or fully<br />

integrated presence<br />

- Multi-purpose portals<br />

- Portal Personalization<br />

- Clustering of common<br />

service<br />

- Full integration and<br />

enterprise transaction<br />

- Catalog - Transaction - Vertical Integration<br />

- Horizontal integration<br />

- Information<br />

- Two way<br />

communication<br />

Moon (2002) - Simple information<br />

dissemination (one way<br />

communication)<br />

- Two way<br />

communication (request<br />

and response)<br />

Siau, Long (2005) - Web presence<br />

- Interaction<br />

Andeson, Henriksen<br />

(2006)<br />

- Cultivation<br />

- Extension<br />

- Transaction<br />

- Service and<br />

financial<br />

transaction<br />

- Integration<br />

- Participation<br />

- Vertical and horizontal<br />

integration<br />

- Political Participation<br />

- Transaction - Transformation<br />

- E-democracy<br />

- Maturity - Revolution<br />

The remark is that all maturity models actually present in the government market tend to reach just the<br />

third level, compared the standard proposed eGovernment maturity model. These models must be<br />

extended or consolidated to get generic models that are implemented by all governments.<br />

4.4 Key performance Indicator<br />

A Key Performance Indicator (KPI) is a kind of parameter intended to measure the performance of<br />

eGovernment. KPIs are commonly used by an organization to evaluate its success of a particular activity<br />

in which it is engaged. Success is defined in terms of making progress toward strategic goals, or the<br />

repeated achievement of some level of operational goal. Accordingly, choosing the right KPIs is relevant<br />

upon having a good understanding of what is important to the organization. The performance indicator<br />

selection is often closely associated with the use of various techniques to assess the present state of the<br />

business, and its key activities. A KPI can follow the SMART criteria. This means the measure has a<br />

Specific purpose for the business, it is Measurable to really get a value of the KPI, the defined norms<br />

have to be Achievable, the improvement of a KPI has to be Relevant to the success of the organization,<br />

and finally it must be Time phased, which means the value or outcomes are shown for a predefined and<br />

relevant period. It’s important to define a repository of eGovernment and T-government KPI to unify the<br />

eGovernment ranking. For 2010, while Wadesa University put Singapore in the top ranking, the United<br />

Nation Survey 2010 makes the Republic of Korea in this place. Table 4 presents a non-exhaustive list of<br />

KPI that will be extended across the evolution of this research. It’s based on some domains and strongly<br />

599


Mohamed Mohyi Eddine El Aichi et al.<br />

attached to service management and enterprise architecture. It will be extend under the point of view of<br />

maturity models.<br />

Table 4: Key performance indicators<br />

Domain KPI<br />

Organization Clear vision and Objectives<br />

Quality of stakeholders<br />

Number of involved entity<br />

Number of involved citizen in the life cycle<br />

Defined role<br />

Organization maturity<br />

Services Number of Services in the catalogs<br />

Number of Services centric citizen<br />

Number of Services solicited by Citizen<br />

Number of pushed Services<br />

Number of service created by citizen<br />

Number of ACID Service<br />

Reliability<br />

Availability<br />

Service maturity<br />

Processes Number of defined Process<br />

Defined role and Actors<br />

Number of SMART activities<br />

Process maturity<br />

Data Accountability<br />

Security<br />

Integrity<br />

Data governance Maturity<br />

Availability<br />

Storage<br />

Recovery disaster<br />

Evolution Capacity Management<br />

Service Level Agreement<br />

Availability<br />

Reliability<br />

Evolution maturity<br />

Infrastructure Networking capabilities (capacity, availability, reliability)<br />

Systems and Application capabilities<br />

Standardization<br />

Interoperability<br />

Infrastructure maturity<br />

Services Management Defined process for service management<br />

Defined role for service management<br />

Certified process for service management<br />

Scope of service management process on the organization.<br />

5. Case study: eGovernment in Morocco<br />

Based on UN indicators for 2010, Morocco is ranked on the 126 th place with 0.29. One year ago,<br />

Morocco launched its IT 2013 Vision. This Moroccan digital project aims at strengthening its<br />

eGovernment structure. This section presents the main components of this vision and two projects<br />

characterized by their added value for citizens and transparency.<br />

The National Strategy for Information Society and the Digital Economy "Numeric Morocco 2013 " aims to<br />

make information technology (IT) "a vector of human development". This strategy tries to "make available<br />

to the public broadband Internet and promote access to knowledge."<br />

It also aims to bring government closer to citizen needs in terms of efficiency, quality and transparency<br />

through an "ambitious eGovernment". In this context, he indicated that the implementation of 89 projects<br />

and services identified eGovernment "will achieve a UN eGovernment index of 0.8 in 2013"<br />

Through this strategy, the government tries also to upgrade and strengthen the legislative framework and<br />

establish the appropriate organizational structures, including the Center for coordination and response to<br />

600


Mohamed Mohyi Eddine El Aichi et al.<br />

incidents involving the security of information systems and the national commission for the protection of<br />

personal data.<br />

5.1 Ministry of Justice: SAJ<br />

SAJ is an integrated software solution for handling criminal, civil matters and fund management in 1st<br />

and 2nd Instance according to the needs of courts and Department of Justice. The project objective is to<br />

contribute to the improvement of the performance of the judiciary aspires to a higher level of ethics and<br />

dispute resolution with transparency, independence and efficiency.<br />

5.1.1 Requirements for internal use<br />

First, the "Business Management" meets internal needs to improve productivity, efficiency and<br />

responsiveness of different entities in the implementation and execution of their activities within the same<br />

jurisdiction. This is possible by creating a centralized space that is the Intranet of the court which will<br />

include everything a magistrate or an officer needs to perform its responsibilities: update and consult the<br />

status of files or components on which they depend (hearing, diligence, notice, appeals, etc..) research in<br />

historical records, access to news, dashboards and synthesis of applications, filing parts, etc.. This<br />

intranet should be the primary tool in each jurisdiction.<br />

5.1.2 Needs of citizens<br />

The main need is the full transparency of information with the Moroccan citizens. Indeed, the main activity<br />

of courts is citizen-oriented. It provides quick access to information and clarity. Under this vision, the<br />

citizen needs:<br />

To receive enough education and awareness to follow the evolution of civil and criminal cases.<br />

To know at any time the involvement of different parts of a file (court appointment date, time<br />

designations expert, disqualification of a judge, etc.)<br />

This relationship can be established and maintained through communication and accessibility to<br />

information and for the general public. The courts must give the citizen a place where he can find<br />

answers to his questions.<br />

5.2 Custom project: BADR<br />

BADR is the result of Custom computerization process over fifteen years with the real-time processing of<br />

summary statements and declarations. BADR includes many objectives:<br />

The desire for greater openness between the Custom operators and partners;<br />

The increased transparency of customs procedures through the use of ICT and the progressive<br />

dematerialization of the clearance process to better control performance versus fluidity of customs<br />

clearance;<br />

The establishment of a system based on market standards (open, scalable and maintainable);<br />

The computerization of customs clearance system to speed up operations and operators avoid costly<br />

and unnecessary travel.<br />

Providing a good visibility, a better integration and greater research possibilities;<br />

Simplification the treatment of cases which now monopolize;<br />

The integration of all partners (government, operators, ...) into a platform for trade policy;<br />

BADR system is designed for:<br />

Importers<br />

Exporters<br />

Forwarding<br />

Maritime Consignees<br />

Consignees air<br />

Carriers<br />

etc…<br />

601


Mohamed Mohyi Eddine El Aichi et al.<br />

In point of view of eGovernment, those applications offer an interest to government and citizen but they<br />

must be reviewed depending on service management policies and maturity models.<br />

6. Conclusion<br />

T-government is more than a stage of maturity models; it’s a state of art that permits to government a<br />

radical empowerment of its organization and citizen centric services. Using ITIL to promote a much more<br />

“joined up government as value added services”, approach as IT service management replacing the<br />

‘technology silos’ and isolated ‘islands of excellence’ by ‘service silos’ are the goals of the next step of my<br />

research with conceptualize a generic maturity model based on 5 stages as described briefly in section 2.<br />

The focus of IT management has been changing for some time and in the future management will be<br />

even less focused on technology and still more integrated with the overall needs of the business<br />

management and processes.<br />

The goal is to define a light-motive to fill those objectives: first, it should be more focused on business<br />

needs (citizen needs), more closely integrated with the business processes (permanent transformation),<br />

less dependent on specific technology and more “service centric”, and more integrated with other<br />

management tools and processes as the management standards evolve. Restyling dynamic public<br />

services through integrated transformation of service delivery will be accomplished through three<br />

components (triangle): first, through the adoption of ITIL as a service management life cycle, second the<br />

extension of EGovernment Maturity models as defined in section 2, and at last the adoption of a<br />

standardized Government Enterprise Architecture<br />

References<br />

Al khatib, H. (2009) “A Citizen Oriented EGovernment Maturity Model”, Brunel University,. London<br />

Almarabeh, T., AbuAli, A. “A general Framework for EGovernment: Definition, Maturity, Challenges, Opportunities,<br />

and Success, <strong>European</strong> Journal of Scientific Research”,Vol 39, No:1, Austria,2010.<br />

Cartlidge, A. Hanna, A Rudd, C. Macfarlane, I. Windebank, J. Rance, S. (2007) “An introductory overview of ITIL V3”,<br />

ISBN 0-9551245-8-1, itSMF .<br />

Dyer, A. (2009). “Measuring the Benefits of Enterprise Architecture: Knowledge Management Maturity”, In Saha, P.<br />

(Ed.), Advances in Government Enterprise Architecture<br />

Kim, H. (2009) “Maturity Model Based on Quality Concept of Enterprise Information Architecture “ (EIA). In Saha, P.<br />

(Ed.), Advances in Government Enterprise Architecture<br />

Lathrop, D. Ruma, L. (2010) “Open Government: Collaboration, Transparency, and Participation in Practice”, O'Reilly<br />

Media, ISBN: 0596804350<br />

Land, M. Proper, E. Waage, M., Cloo, J. Steghuis, C. (2009) “Enterprise Architecture: Creating Value by Informed<br />

Governance (The Enterprise Engineering Series)” , Springer<br />

Lee, J. (2010) "10 year retrospect on stage models of eGovernment: A qualitative meta-synthesis", Government<br />

Information Quarterly, InPress, pp 220-230.<br />

Mecum, V. (2001) Les clés de l’e-administration.<br />

Saha, P. (2009) “A Methodology for Government Transformation with Enterprise Architecture”. In Saha, P. (Ed.),<br />

Advances in Government Enterprise Architecture<br />

Sahraoui, S., Ghoneim, A., Irani, Z. and Özkan, S. (2008) “t-Government for benefit realization: A research agenda”.<br />

Zahir Irani and Peter Love (Eds.) Evaluating Information Systems. Elsevier: London<br />

602


Quality of Services and Citizen Profiling in eGovernment<br />

Guillaume Gronier 1 , Sandrine Reiter 1 and Mélanie Becker 1,2<br />

1 Public Research Centre Henri Tudor, Luxembourg, Luxembourg<br />

2 University Paul Verlaine, Metz, France<br />

guillaume.gronier@tudor.lu<br />

sandrine.reiter@tudor.lu<br />

melanie.becker@tudor.lu<br />

Abstract: This research, still in progress, aims at increasing eGovernment services (eGov services) appropriation<br />

through recommendations for design of adaptive interface for eGov services. In order to reach this goal, we propose<br />

to focus our research on eGov services quality, considering the fact quality is one of the most critical dimension<br />

which influences website usage. This is particularly true when website addresses eGovernment services, where<br />

confidentiality, quality and information authenticity are crucial. The eGov services quality measure is then a major<br />

stake for public administrations if they want to promote eGov services use to citizens. The paper proposes a<br />

methodology in several steps. At the end, we must be able to propose a quality model for eGovernment which will be<br />

derived into several set of perceived quality models, trust models and acceptance models, corresponding to different<br />

user’s profiles. Moreover, we propose to identify interaction way that is the most suitable for user regarding their<br />

profile. To do that, we will define some interaction characteristics that have to be taken into account, such as<br />

interface form, dialogue structure, manipulation preferences, errors treatment… and then propose interaction<br />

typologies depending on user’s typology model. In the mid-term, our objectives are to provide tools and<br />

methodologies to support <strong>European</strong> eGovernment. This research could help designers and developers in producing<br />

better quality services regarding the eGovernance objectives and to benefit from recommendations closer to reality.<br />

Keywords: quality, e-services, eGovernment, user profile, appropriation, adaptive interface, interaction<br />

1. Introduction<br />

Deploying online administrative services, already begun in the early 2000 in several countries, is actually<br />

a main stake for all governments (Lu, Bai & Zhang 2007). EGovernment goals are hugged and a number<br />

of individual, social as well as political perspectives is often mentioned (Jaeger & Thompson 2003).<br />

Since a few years, it is possible for numerous administrative procedures to be performed remotely over<br />

the Internet. The benefits can be considerable for governments that want to increase their process<br />

efficiency as well as for citizens that can interact with public administrations more easily and comfortably.<br />

For example, eGov services enable people with disabilities and people living in rural areas to improve<br />

their living conditions by enhancing access to information and services. Based on the use of information<br />

and technological communication increase, the Commission of <strong>European</strong> Communities (CCE) proposed<br />

in 2006 (Commission of The <strong>European</strong> Communities 2006), a EGovernment action plan putting forward 5<br />

main goals for 2010:<br />

Carry on efforts regarding eGovernment, in order to allow everyone, including socially disadvantaged<br />

groups, having access to online services;<br />

Increase users’ satisfaction regarding public services, and reduce significantly administrative tasks<br />

for businesses as well as for individuals;<br />

Give the opportunity to any public administration in Europe to spend 100% of their procurement<br />

electronically;<br />

Give the opportunity to any businesses and individuals, in Europe to benefit from electronic means,<br />

secure and convenient, in order to be able to identify themselves to public services in their own<br />

country or in any other member state;<br />

Reinforce the participation and the democratic process in Europe through electronicvoting.<br />

Today, in 2011, results seem to be positive, even if all objectives have not been reached. This is<br />

particularly shown through a study conducted by the “Caisse des depots et de l’Association de<br />

l’Economie Numérique” (l’Acsel), published in 2010. According to this study, 60% of French internet<br />

users are using online service to do their tax return and 46% of them consult their social security account<br />

online. Moreover, 96% declare that they trust eGovernment services, which represent a higher score<br />

than for online bank services (69%) or e-commerce (only 51%). However, this study also show that these<br />

results are mainly positive for certain users’ profile, and that other profile are on the contrary more<br />

reticent, and that specific studies have to be conducted in their direction, in order to promote eGov<br />

services use.<br />

603


Guillaume Gronier et al.<br />

Therefore, since both governments and citizens have a shared interest in eGov services, it is important to<br />

ensure that services provided meet citizens’ needs with maximum efficiency and satisfaction. In other<br />

words, the issue of eGov services appropriation seems fundamental. By appropriation, we mean “the<br />

process by which people incorporate advanced technologies into their (work) practices” (DeSanctis &<br />

Poole 1994).<br />

In order to answer to this question (eGov services appropriation for the largest number of citizens), and<br />

based on a previous literature review (Gronier & Lambert 2010), we propose to consider the quality of<br />

eGov Services as a starting point. According to (Halaris, Magoutas, Papadomichelaki & Mentzas 2007),<br />

quality of eGov services could be define as “all the features of digital services in Public Administrations<br />

that influence their capability to satisfy declared or implied citizens and firms’ needs”. In the proposed<br />

approach we will target the eGovernment websites adaptation to different users’ classes, through citizens<br />

profiling. Sometimes called e-Profile, user profiles can improve eGov services with the delivery of trusted<br />

and personalized services (Pettenati, Pirri & Giuli 2010).<br />

2. eGovernement service quality<br />

Satisfaction and loyalty to a website are in response to a number of criteria for the individual. While<br />

visiting a site, it is possible to distinguish several stages which the individual passes through before<br />

deciding whether or not he/she will return to this site. At each moment during navigation, different<br />

cognitive processes will sequentially occur in the individual, which will lead him (or her) to decide at the<br />

end of the visit if the site has or has not met his/her expectations.<br />

The concepts such as acceptance, trust, usability of the site or perceived quality are all variables that will<br />

be involved in assessing the online service.<br />

Figure 1 illustrates these different points of navigation and the main cognitive mechanisms involved by<br />

the user. The review of literature that we are presenting therefore aims at showing how they can improve<br />

the adoption, use and appropriation of eGovernment services.<br />

Figure 1: Illustrates different points of navigation and the main cognitive mechanisms involved by the<br />

user<br />

2.1 Acceptance and e-trust as factors in the use and adoption of eGovernment services<br />

System acceptability is often considered a key factor in the success or failure of a development project<br />

for a new technology, and more specifically for an eGovernment service (Hamner & Qazi 2009). In fact,<br />

technology is external to humans, and it is necessary to accept it in order to use it.<br />

Acceptance refers to the attitude and intention that will decide whether or not to implement an usage<br />

behaviour for a technology. The first to have modelled this concept are (Davis, Bagozzi & Warshaw<br />

1989), with the TAM, "Technology Acceptance Model". The TAM predicts the individual acceptability of<br />

new information systems by future users, and diagnoses problems that may hinder the system being<br />

adopted.<br />

The authors started with the premise that the perceived usefulness and ease of use of technology were<br />

influencing our attitudes, which themselves were influencing our usage intentions, and are therefore a<br />

prediction of our actual use. Fishbein and Ajzen's (1975) theory of reasoned action laid the foundation for<br />

this model.<br />

604


Guillaume Gronier et al.<br />

However, according to (Legris 2003), many criticisms are raised regarding this model, such as the fact<br />

that it only takes into account the subjective aspects while omitting the importance of usability, or that it is<br />

too deterministic and not social enough. These flawed aspects have fostered other models.<br />

Thereby, the P3 model "Power, Perception and Performance" (Dillon & Morris 1996) aims to meet the<br />

same objectives as the TAM, but takes into account both subjective and objective aspects, such as users'<br />

perception of the actual usefulness and usability of technology. At present, according to (Brangier,<br />

Hammes-Adelé & J.-M. C. Bastien 2010), the model that combines the most of other models, and best<br />

explains the usage intention of a technology, is the UTAUT - "Unified Theory of Acceptance and Use of<br />

Technology" (Venkatesh 2000).<br />

Trust in the online service, often called "e-trust" or "digital trust", is also a factor influencing the use and<br />

adoption of a site. According to (Bélanger & Carter 2008), we define trust as "an expectancy that the<br />

promise of an individual or group can be relied upon". The authors add that trust in eGovernment is<br />

therefore composed of the traditional view of trust in a specific entity (trust of the government) as well as<br />

trust in the reliability of the enabling technology (trust of the Internet). (McKnight, Choudhury & Kacmar<br />

2002) demonstrated that consumer trust in electronic services influenced their transaction intentions.<br />

Trust depends on a combination of factors, such as the level of use, the use of standards, reputation, and<br />

past user experience with e-services.<br />

2.2 Quality as a factor in the adoption and use of eGovernment services<br />

Service quality is a fundamental marketing element to understand customer satisfaction. Specifically,<br />

individuals will evaluate the perceived quality, which can be defined as a subjective assessment, in the<br />

same way that a consumer will make about the superiority of a product.<br />

Measuring the quality of online services has been the subject of many models. The SERVQUAL model<br />

(Iwaarden van 2004) is perhaps one of the most widely used to measure the quality of online public<br />

services. Based on a dichotomy between the service offered by a client and the service perceived by the<br />

user-consumer, SERVQUAL has been applied to many industries and has undergone some<br />

modifications (Li, Tan & Xie 2002).<br />

Other models have also been proposed to evaluate commercial sites (Webqual, Sitequal, E-Qual, EtailQ,<br />

ES-Qual, etc.). However, the criteria that define the quality of services offered by these models<br />

seem too generic, and do not sufficiently take into account, for example, the interface quality or elements<br />

that promote interaction. Furthermore, no scale of the perceived quality of e-services has specifically<br />

been developed for eGovernment services. However, (Liu, Du & Tsai 2009) emphasize that a model<br />

developed for one type of service is not necessarily applicable to another type. Also, eGovernment<br />

services have several characteristics of their own:<br />

They respond to a social demand (United Nations 2008) and therefore must be particularly attentive<br />

to peoples' expectations;<br />

They are the extension of an existing physical service. Therefore, people are still able to choose<br />

whether to use the physical service or online service;<br />

In addition to the efficiency principle, eGovernment services incorporate the equity principle by<br />

remaining accessible to all citizens, consequently, the public sector cannot exclude any category of<br />

the population;<br />

The physical government service cannot be abolished. This comes from the fairness principle. The<br />

eGovernment service should therefore be considered as related to the physical service;<br />

eGovernment services have no competition. Therefore users cannot compare the quality of several<br />

eGovernment services (Wang & Liao 2008);<br />

Users of eGovernment services would be more heterogeneous in terms of socio-demographic<br />

characteristics than users of commercial websites.<br />

Consequently, eGovernment services differ from other types of e-services by the nature of the service<br />

offered, their intrinsic characteristics and the characteristics of their users.<br />

605


Guillaume Gronier et al.<br />

2.3 The concept of usability and satisfaction as a factor in the long term use and<br />

adoption of eGovernment services<br />

Although often underestimated, usability plays a major role in the adoption and use of e-services<br />

(Corradini, Polzonetti, Re & Tesei 2008). Usability (Norm ISO 9241-11) is defined as: "the degree to<br />

which a product can be used, by specified users, to achieve defined goals with effectiveness, efficiency<br />

and satisfaction in a specified context of use". Ease of learning and memory were subsequently<br />

incorporated into that definition by (Scapin & J. M. C. Bastien 1997).<br />

Literature thereby puts forward the following observation: the ease of using a human-machine interface<br />

or a website influences the use of this technology (Brangier, Hammes-Adelé & J.-M. C. Bastien 2010).<br />

Usability problems that may be encountered could influence his/her use.<br />

Usability is therefore a key element, which promotes individual performance, error reduction, technology<br />

acceptance and user satisfaction (Corradini, Polzonetti, Re & Tesei 2008). When applied to government<br />

services online, usability is described as "an assessment of the relative “ease with which a novice user<br />

interacts with a public agency website to accomplish the user’s goal(s)” (Baker 2009). According to<br />

(Corradini, Polzonetti, Re & Tesei 2008), the quality of eGov sites is largely a product of usability and the<br />

effectiveness and efficiency provided by the site.<br />

3. Adaptive interfaces<br />

In the previous part, we have proposed a literature review on quality models definition in order to be able<br />

to better take into account users’ needs. However, as the research proposed here intends to have an<br />

impact on the development of adaptive interfaces; we have to complete our state of the art, by a study of<br />

existing researches in this domain.<br />

3.1 General approach to personalisation, adaptive interface and profiling<br />

Applications or services personalisation proposes a user adaptation, targeting his preferences, interests<br />

and needs, as well as his own characteristics. Any personalisation process first needs a profiling stage,<br />

i.e. a user model and its instantiation to each specific user representing then its profile.<br />

In a second step, the adaptation itself consists in providing the user with relevant information at the right<br />

time and in an adapted format. This adaptation stage is generally separated into two main classes:<br />

information filtering and application modification. Current systems are more specifically developed for<br />

general public, and mainly concern recommending systems, or information retrieval (on the internet or for<br />

training courses (Mitchell, Caruana, Freitag, McDermott & Zabowski 1994).<br />

Concerning the profiling approach, researches mainly focus on the way to identify user profile during the<br />

interaction. This profiling could be either explicit, i.e. edited by the user, either implicit, i.e. determined by<br />

behaviour and interaction analysis (Teevan, Dumais & Horvitz 2005). An explicit profiling can be obtained<br />

through electronic questionnaires or interviews, while implicit profiling requires logging user activity,<br />

analyzing it and deduct useful behavioural patterns, interests or preferences.<br />

The explicit approach is intrusive and suffers from the bias of the evaluation doubts. The implicit<br />

approach is more effective than an explicit profiling and does not need human intervention (at least only a<br />

little). However, this approach suffers from “the cold start” problem and needs a large amount of data in<br />

order to converge towards an effective user profiling.<br />

Several approaches are proposed in the literature concerning data collection and analysis regarding<br />

users’ profiling. Mainly (Gauch, Speretta, Chandramouli & Micarelli 2007) propose an interesting state of<br />

the art on recent approaches as well as an overview of classical profile formalisation modalities.<br />

A good compromise can be achieved by using both explicit and implicit approaches. Additionally, an<br />

interesting solution can be found in the use of stereotypes (Rich 1979). Stereotyping allows to group<br />

users by broad categories of similar profiles. As a consequence, regarding computer implementation, two<br />

approaches are possible:<br />

Create these stereotypes by grouping similar users’ profile after an implicit profiling;<br />

Determine a priori stereotypes, and then use them as an initialisation of the implicit profiling process,<br />

overcoming then the “cold start” problem.<br />

606


Guillaume Gronier et al.<br />

These two approaches can also be combined in a loopback, the initialization being based on a priori<br />

stereotypes, refined through a posteriori stereotypes grouping. In addition, a posterior stereotypes<br />

grouping can also be performed through methodologies used in collaborative filtering, such as clustering,<br />

neural networks or evolutionary approaches (Adomavicius & Tuzhilin 2005).<br />

In the project, the profiling stage will be conducted focusing on the evaluation of parameters defined by<br />

the perceived quality model through priori stereotypes, as well as by the definition of interaction<br />

typologies, explicitly and implicitly as we will now describe in the following paragraphs.<br />

3.2 Personalisation and interaction<br />

Nowadays, Human-Computer Interactions are part of our everyday life, from computers to mobile<br />

phones, and in the near future, they will be practically in every artifact. There is a proliferation of devices,<br />

acting in more and more different contexts and interacting with more and more users, thanks to the evergoing<br />

technical breakthroughs. This propagation of electronic devices tends to complicate interaction<br />

paradigms and leads to lose users’ attention.<br />

In order to make the user focus on his task among a set of devices, new interaction paradigms came as a<br />

response, such as the “pervasive computing” (a.k.a. “ubiquitous computing” abbreviated “ubicomp”).<br />

Introduced for the first time by (Weiser 1995), this interaction paradigm describes seamless interactions<br />

between the user and his surrounding electronic devices to an extent that the devices’ presence is<br />

omitted by the user. While “pervasive” and “ubiquitous” literally means “manifesting throughout<br />

everything”, by speaking of pervasiveness or ubiquity, Weiser is also referring to the seamless aspect of<br />

interactions.<br />

3.2.1 User interface adaptation<br />

Interfaces adaptability is not a new subject. During the last years, a lot of studies have been carried out<br />

on the subject, but they was mostly oriented on Adaptive Hypermedia Systems (AHS). (Brusilovsky 2001)<br />

works focused on what can be adapted (content and navigation) and on adaptation methods and<br />

techniques. Since, these works have evolved and multiplied (especially applied to web sites). Besides the<br />

generic context, interface adaptation can be executed at different levels, namely at the user and device<br />

ones. According to tour research, we will focus only on the user.<br />

3.2.2 Interface adaptation according to the user profile<br />

One important source of interface adaptation perspectives consists in the study and modeling of the user<br />

profiles. It includes his identity information, his preferences and interests as well as his capacities. The<br />

user profile can also be useful to define user disability, as an example a visual interface will be adapted<br />

into an audio interface for a blind; or some set of colors will be never used for a color-blind. Adaptation<br />

work will focus on the different interaction channels now available on mobile devices (e.g. entry:<br />

keyboard or tactile screen, vocal command, body movements).<br />

Adaptation to user profile implies modeling the user and profiling it, explicitly by asking for his personal<br />

data or preferences, or implicitly. As it relies on an analysis of the user behavior, implicit profiling is more<br />

efficient in the sense it is not biased by the inherent uncertainties of human assumptions.<br />

3.3 eGovernment problematic<br />

However, we can notice that these researches focus mainly on the software architecture and algorithms<br />

(Calvary et al. 2002). (Thevenin & Coutaz 2002) have proposed taxonomy related to Human Computer<br />

Interface adaptation, where notions such as « interaction », « presentation » « dialogue controller » are<br />

mentioned. However, these aspects are only put forward in a software architecture perspective.<br />

For their part, (Hariri, Lepreux, Tabary & Kolski 2009) mentioned the concept of « database design<br />

patterns », fundamental to any adaptation process. As shown through these studies, having interaction<br />

model is then a base for adaptive algorithm. The underlying question is then: on which bases these<br />

concepts of “interaction, presentation, dialogue controller,” as well as “design patterns” should rely on?<br />

Indeed, before constituting these databases, we must still identify the data that would be stored in.<br />

In order to answer to this problematic, it seems essential to identify the interaction types corresponding to<br />

users’ needs. This means, that we should be able to link user’ profile to interaction profile, and then<br />

607


Guillaume Gronier et al.<br />

identify underlying characteristics that should be present for eGov services and more specifically in our<br />

case for eGov services.<br />

The study proposed in the present project eProfiler, will mainly be based on such an approach; drawing<br />

interaction typologies adapted to eGov services which could then be used as inputs for the adaptive<br />

interfaces domain. Our study will be based here on literature references in the interaction domain and<br />

which mainly concern:<br />

Dialog mechanisms (menus, natural command languages, question/answer, direct manipulations,<br />

forms, etc.) (Sears & Shneiderman 1994);<br />

Way to manage the dialog (information filtering, information flow management, interaction objects<br />

management, environment management, etc.);<br />

Information presentation (visual characteristics – size, position, colours – notation conventions, data<br />

format);<br />

Help functions: Out of error (comprehension help, feedback, online help, navigation, warning) or in<br />

case of error (When, why, task performed percentage, task backup, cancellation, etc.);<br />

Tasks type (selection, positioning, orientation, path, quantification, text acquisition, images<br />

acquisition);<br />

Metaphor use (Carroll, Mack & Kellogg 1988). This domain is not new, and establishes Human<br />

Computer Interaction bases since a long time and is always subject to actual studies, which will need<br />

to be carefully analysed.<br />

4. Methodology proposed<br />

In order to improve the quality of eGov services, we propose a methodology based largely on the user, in<br />

this case, the citizen. The main objective is to understand the factors that determine the appropriation of<br />

eGov sites and to ultimately be able to increase the appropriation and use of online government services,<br />

through adaptive interfaces.<br />

We describe bellow each step of our methodology, which will be applied to Belgium and Luxembourgish<br />

eGov services.<br />

4.1 Identify user’s profiles and classes<br />

The first step of our methodology consists of a preliminary study that will identify different profiles of<br />

potential users of eGov sites. The data needed to characterize user profiles will be collected through an<br />

online questionnaire, which will gather the following data:<br />

Demographics (age, gender, socio-professional status, etc.);<br />

Data on frequency of use;<br />

Data on their experience of Internet use in general, and eGov sites in particular;<br />

Statistical analysis (Hierarchical) with SPSS software.<br />

Three classes of potential users may be identified a priori:<br />

Regular users of eGov sites;<br />

Infrequent users, for instance those who have visited an eGov site at least once but who did not<br />

return, following, for example, a bad experience or low satisfaction;<br />

Individuals who have never visited a government website.<br />

4.2 Understand use and not-use of eGov services<br />

The second stage is to collect qualitative data in order to understand what may or may not influence the<br />

use and acceptance of eGov services. These interviews will be conducted by taking into account<br />

previously identified user types and the reasons that motivate or do not motivate them to use these online<br />

services:<br />

Semi-structured interviews;<br />

Flanagan's critical incident technique following interviews. This technique (1954) in its original context<br />

can detect incidents that operators have deemed critical to a stage of their work. This methodology<br />

will include potential bad experiences with eGov services;<br />

608


Focus groups.<br />

4.3 Model of eGov services quality<br />

Guillaume Gronier et al.<br />

The third step is to substantiate questionnaires from the existing models (models for perceived quality,<br />

usability, acceptance, trust, etc.). In order to do this, the methodology aims to:<br />

Review literature and select several scales from different models;<br />

Identify an eGov site;<br />

Administer online questionnaires, relating to an identified eGov site;<br />

Statistical analysis (linear regression).<br />

4.4 Perceived quality and interaction typologies validation<br />

This step will propose some recommendations for the adaptive interaction domain declined for eGov<br />

services. However, we think that such recommendations should at least be validated through concrete<br />

experiments. Since some years now, the Wizard of Oz paradigm has been used with success in complex<br />

natural-language systems study and more recently in spoken dialog systems (Winterboer, Tietze, Wolters<br />

& Moore 2010). This technique can be viewed as a rapid prototyping technique where the system<br />

answers are implemented but simulated by human actors.<br />

This technique consist to propose to the user a system which answers are simulated by a human (the<br />

wizard), but, in order to study real situation, to let the user think that he is interacting with a real system.<br />

4.5 Recommendations for adapting e-services interfaces<br />

The main objective of our project is to improve quality of eGov services, through several<br />

recommendations for adapting e-services interfaces. Using the previous steps, we will have two essential<br />

types of information in order to improve e-services: on one hand, user’s profiles and on the other hand,<br />

different types of interfaces in accordance with profiles. Thus, it will be possible to provide exact<br />

information about what information and how to propose them to a particular type of user. In other words,<br />

we can provide recommendations for adapted interfaces, and to a longer-term for adaptive interfaces.<br />

For example, these recommendations will take the form: "if the user is a male over 45 years, with little<br />

Internet experience, the interface must include elements which increases his trust with the e-service, and<br />

must be reduced to only essential information needed to service for which he is connected”. Of course,<br />

this example is not based on any experience and is given as illustration. These recommendations will<br />

take the form of guidelines, which will be freely available to eGov services.<br />

5. Expected results and conclusion<br />

The research aims at facilitating eGov services and to improve their appropriation. The appropriation<br />

concept is here proposed as the cognitive, organisational and social mechanisms that lead a user to<br />

integrate a technology (eGov services in our case) in his practices, through spontaneous answer. The<br />

main idea is to provide citizens with online services that better meet their expectations in terms of quality.<br />

Three main results can be put forward:<br />

The first result aims at establishing a citizens’ classification in relation to eGov services quality. Many<br />

ergonomics recommendations addresses Web interfaces, works on this subject are consistent and<br />

many heuristics and criteria have been defined (Scapin & J. M. C. Bastien 1997). However these<br />

recommendations, like quality models, are formulated for the benefit of all internet users,<br />

independently from their profiles. We propose to cover this gap, by identifying citizens’ profiles, in<br />

order to develop a set of quality models as well as recommendations for designers.<br />

The second result will lay the foundation for the design of a dynamic interface dedicated to eGov<br />

services. As shown in the state of the art, the problematic of adaptive interface is mainly concerned<br />

by software architecture considerations but less is mentioned about interaction model underlying this<br />

question. The underlying objective is to propose an interaction model as well as interaction typologies<br />

adapted to eGov services which would be used as inputs for adaptive interfaces;<br />

The third result concerns the improvement of perceived quality and appropriation of egovernment<br />

websites and online eGovernment services, through a new model of e_gov services quality included<br />

trust, acceptance and usability aspects. In fact, very little research to date focuses on the concerns of<br />

609


Guillaume Gronier et al.<br />

public administration and in particular on increasing the use of eGov services. New elements of<br />

understanding relating to the reluctance towards or adoption of government sites will be identified<br />

from the user-centred approach that will be adopted. Moreover in recent years the concept of<br />

acceptation, trust, perceived quality have not been rehabilitated or reworked.<br />

The following table shows an example of what could be our result. We will identify the quality criteria of<br />

their respective eGov service and the interaction will be adjusted according to these criteria. In this case,<br />

we illustrate the example of post-users. The table will be completed and is in progress.<br />

Table 1: An example of what could be our result<br />

Pre user<br />

Post user with<br />

good<br />

experience<br />

Post user with<br />

bad<br />

experience<br />

Quality<br />

criteria<br />

Interaction<br />

element<br />

Quality<br />

criteria<br />

Interaction<br />

element<br />

Quality<br />

criteria<br />

Interaction<br />

element<br />

Profile 1 Profile 2 Profile 3 Profile 4 Profile n…<br />

i.e : usability, i.e : trust in<br />

eGov<br />

i.e : limit the<br />

amount of<br />

information<br />

on screen<br />

i.e:<br />

strengthen<br />

the<br />

perception of<br />

safety data<br />

i.e: perceived<br />

usefulness,<br />

usability<br />

i.e: highlight<br />

the services<br />

available<br />

i.e :<br />

perceived<br />

quality<br />

i.e :<br />

efficiency,<br />

usability,<br />

design of the<br />

web site<br />

i.e:<br />

availability of<br />

information<br />

i.e: citizen<br />

support,<br />

availability of<br />

system<br />

in progress in progress in progress in progress in progress<br />

in progress in progress in progress in progress in progress<br />

in progress in progress in progress in progress in progress<br />

in progress in progress in progress in progress in progress<br />

The objectives are numerous; nevertheless the main goal is to provide tools and elements for assessing<br />

and improving the appropriation of eGovernment services. To finish, the interest of this research is that<br />

results may be extended to other sectors that also have this type of organisation (e-commerce, eservices,<br />

etc.).<br />

References<br />

Adomavicius, G. & Tuzhilin, A. (2005) 'Toward the Next Generation of Recommender Systems: A Survey of the<br />

State-of-the-Art and Possible Extensions', IEEE Trans. on Knowl. and Data Eng., vol. 17, no. 6, pp. 734-749.<br />

Baker, D. (2009) 'Advancing EGovernment performance in the United States through enhanced usability<br />

benchmarks', Government Information Quarterly, vol. 26, no. 1, pp. 82-88.<br />

Brangier, É., Hammes-Adelé, S. and Bastien, J-MC. (2010) 'Analyse critique des approches de l’acceptation des<br />

technologies : de l’utilisabilité à la symbiose humain-technologie-organisation', Revue Européenne de<br />

Psychologie Appliquée/<strong>European</strong> Review of Applied Psychology, vol. 60, no. 2, pp. 129-146.<br />

Brusilovsky, P. (2001) 'Adaptive Hypermedia', User Modeling and User-Adapted Interaction, vol. 11, no. 1-2, pp. 87-<br />

110.<br />

Bélanger, F. and Carter, L. (2008) 'Trust and risk in eGovernment adoption', Journal of Strategic Informations<br />

Systems, vol. 17, no. 2, pp. 165-176.<br />

Calvary, G., Coutaz, J., Thevenin, D., Limbourg, Q., et al. (2002) 'Plasticity of User Interfaces: A Revised Reference<br />

Framework', in Proceedings of the First International Workshop on Task Models and Diagrams for User<br />

Interface Design, INFOREC Publishing House Bucharest, pp. 127-134.<br />

Carroll, JM., Mack, RL. and Kellogg, WA. (1988) 'Interface metaphors and user interface design', in Handbook of<br />

Human-Computer Interaction. Amsterdam; New York: Elsevier Science Publishers B.V.,pp. 67-85.<br />

Commission of The <strong>European</strong> Communities (2006) 'i2010 eGovernment action plan: Accelerating eGovernment in<br />

Europe for the benefit of all', Brussels.<br />

Corradini, F., Polzonetti, A., Re, B. and Tesei, L. (2008) 'Quality of service in eGovernment underlines the role of<br />

information usability', International Journal of Information Quality, vol. 2, no. 2, pp. 133-151.<br />

Davis, FD., Bagozzi, RP. and Warshaw, PR. (1989) 'User Acceptance of Computer Technology: A Comparison of<br />

Two Theoretical Models', Management Science, vol. 35, no. 8, pp. 982-1003.<br />

DeSanctis, G. and Poole, MS. (1994) 'Capturing the Complexity in Advanced Technology Use: Adaptive<br />

Structuration Theory', Organization Science, vol. 5, no. 2, pp. 121-147.<br />

Dillon, A. and Morris, MG. (1996) 'User acceptance of information technology : Theories and models', Annual review<br />

of information science and technology, vol. 31, no. 1, pp. 3-32.<br />

Gauch, S., Speretta, M., Chandramouli, A. and Micarelli, A. (2007) 'The adaptive web', in P Brusilovsky, A Kobsa, &<br />

W Nejdl (eds), Springer-Verlag, Berlin, Heidelberg, pp. 54-89.<br />

Gronier, G. and Lambert, M. (2010) 'A model to measure the perceived quality of service in eGovernment', in 10th<br />

<strong>European</strong> <strong>Conference</strong> on eGovernment, Ireland, 17-18 June 2010,pp. 527-531.<br />

Halaris, C., Magoutas, B., Papadomichelaki, X. and Mentzas, G. (2007) 'Classification and synthesis of quality<br />

approaches in eGovernment services', Internet Research, vol. 17, no. 4, pp. 378-401.<br />

610


Guillaume Gronier et al.<br />

Hamner, M. and Qazi, R. (2009) 'Expanding the Technology Acceptance Model to examine Personal Computing<br />

Technology utilization in government agencies in developing countries', Government Information Quarterly, vol.<br />

26, no. 1, pp. 128-136.<br />

Hariri, A., Lepreux, S., Tabary, D. and Kolski, C. (2009) 'Principes et étude de cas d’adaptation d’IHM dans les SI en<br />

fonction du contexte d’interaction de l’utilisateur', Ingénierie des Systèmes d’Information (ISI), Networking and<br />

Information Systems, vol. 14, no. 3, pp. 141-162.<br />

Iwaarden van, J. (2004) 'Perceptions about the quality of web sites: a survey amongst students at Northeastern<br />

University and Erasmus University', Information & Management, vol. 41, no. 8, pp. 947-959.<br />

Jaeger, PT. and Thompson, KM. (2003) 'EGovernment around the world: lessons, challenges, and future directions',<br />

Government Information Quarterly, vol. 20, no. 4, pp. 389-394.<br />

Legris, P. (2003) 'Why do people use information technology? A critical review of the technology acceptance model',<br />

Information & Management, vol. 40, no. 3, pp. 191-204.<br />

Li, YN., Tan, KC. and Xie, M. (2002) 'Measuring web-based service quality', Total Quality Management & Business<br />

Excellence, vol. 13, no. 5, pp. 685-700.<br />

Liu, C-T., Du, TC. and Tsai, H-H. (2009) 'A study of the service quality of general portals', Information &<br />

Management, vol. 46, no. 1, pp. 52-56.<br />

Lu, J., Bai, C. and Zhang, G. (2007) 'E-Service cost benefit evaluation and analysis', Studies In Computational<br />

Intelligence, vol. 37, pp. 389 - 409.<br />

McKnight, DH., Choudhury, V. and Kacmar, C. (2002) 'Developing and Validating Trust Measures for e-Commerce:<br />

An Integrative Typology', Information Systems Research, vol. 13, no. 3, pp. 334-359.<br />

Mitchell, TM., Caruana, R., Freitag, D., McDermott, J. and Zabowski, D. (1994) 'Experience with a learning personal<br />

assistant', Communications of the ACM, vol. 37, no. 7, pp. 80-91.<br />

Pettenati, MC., Pirri, F. and Giuli, D. (2010) e-Profile Management as a Basic Horizontal Service for the Creation of<br />

Specialized eGov services', in First International <strong>Conference</strong> on Exploring ServicesSciences, 17-18-19<br />

February 2010, Geneva, Switzerland,<br />

Rich, E. (1979) 'User modelling via stereotypes', Cognitive Science: A Multidisciplinary Journal, vol. 3, no. 4, pp. 329-<br />

354.<br />

Scapin, D. and Bastien, JMC. (1997) 'Ergonomic criteria for evaluating the ergonomic quality of interactive systems',<br />

Behaviour & Information Technology, vol. 16, no. 4, pp. 220-231.<br />

Sears, A. and Shneiderman, B. (1994) 'Split menus: effectively using selection frequency to organize menus', ACM<br />

Trans. Comput.-Hum. Interact., vol. 1, no. 1, pp. 27-51.<br />

Teevan, J., Dumais, S. and Horvitz, E. (2005) 'No Personalizing search via automated analysis of interests and<br />

activities', in Proceedings of the 28th annual international ACM SIGIR conference on Research and<br />

development in information retrieval SIGIR ’05 (August 2005), ACM, New York, NY, USA, 2005, pp. 449-456.<br />

Thevenin, D. and Coutaz, J. (2002) 'Adaptation des IHM : Taxonomies et architecture logicielle', in Actes IHM02,<br />

ACM Press, pp. 207-210.<br />

United Nations (2008) 'U.N. eGovernment survey 2008'.<br />

Venkatesh, FD. (2000) 'A theoretical Extension of the Technology Acceptance Model: Four longitudinal Field<br />

Studies', Management Science, vol. 46, no. 2, pp. 186-204.<br />

Wang, Y. and Liao, Y. (2008) 'Assessing eGovernment systems success: A validation of the DeLone and McLean<br />

model of information systems success', Government Information Quarterly, vol. 25, no. 4, pp. 717-733.<br />

Weiser, M. (1995) 'Human-computer interaction', in RM Baecker, J Grudin, WAS Buxton, & S Greenberg (eds),<br />

Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, pp. 933-940.<br />

Winterboer, AK., Tietze, MI., Wolters, MK. and Moore, JD. (2010) 'The user model-based summarize and refine<br />

approach improves information presentation in spoken dialog systems', Computer Speech & Language, Vol. 25,<br />

no. 4, pp. 175-191.<br />

611


A Quest for an Applicable Model of Growth for Directgov<br />

Panos Hahamis<br />

University of Westminster, London, UK<br />

P.Hahamis01@wmin.ac.uk<br />

Abstract: This paper presents research towards the Henley Doctor of Business Administration (DBA) Programme<br />

which is in progress. The purpose of the paper is to review the most well known models of growth for<br />

eCommerce/eBusiness and in particular eGovernment to date, on a quest to identify an applicable model for<br />

mapping the progress made by the most prominent state-of-the-art eGovernment initiative of the UK government, the<br />

Directgov portal.<br />

Keywords: eGovernment, eBusiness, models of growth, portals, Directgov<br />

1. Introduction<br />

Even though the computerisation of organisations started over four decades ago, it is only since the<br />

evolution of information and communication technologies (ICT) and, later on, their convergence with<br />

Internet technologies, that dramatic change was brought into the landscape of conducting business.<br />

The Internet and the hyperbole surrounding it brought new dimensions and consequently new<br />

terminology in to the use of technology by organisations. Two concepts, those of eCommerce and<br />

eBusiness entered every day business language and remained prominent ever since. Governments<br />

followed suit soon after, hence a new term of jargon, or buzzword, was born, that of eGovernment.<br />

Much has been written about both the benefits and drawbacks brought by this evolution for the<br />

organisations that invested in these technologies and systems. With the advent of the Internet in<br />

particular and its impact on business and the public sector, various maturity models have been developed<br />

in order to predict the growth and development of the organisation and facilitate an understanding of the<br />

changes caused by these technologies.<br />

This paper presents research towards the Henley Doctor of Business Administration (DBA) Programme<br />

which is in progress. The purpose of the paper is to explore the most well known models of growth for<br />

eCommerce/eBusiness and in particular eGovernment to date, on a quest to identify an applicable model<br />

for mapping the progress made by the most prominent state-of-the-art eGovernment initiative of the UK<br />

government, Directgov.<br />

For that reason, a discourse on the impact of the Internet will be conferred first, followed by a literature<br />

review and critique of maturity models in both the private and public sectors. An attempt will be made to<br />

map the development maturity of Directgov to the most appropriate model or models of growth, followed<br />

by recommendations and concluding with the acknowledgement of any limitations of this study.<br />

2. The impact of the internet<br />

The advent of the Internet provided business at first, and later on, the public sector with enhanced<br />

opportunities, enabling them to gain competitive advantages and allowing them to establish better<br />

strategic positions than those of previous generations of information technology (IT) (Porter, 2001). Whilst<br />

early proponents of the Internet tried to predict its likely technological evolution, Angehrn (1997) argued<br />

that “the Internet may accelerate certain trends whilst revoking others”. Porter (2001, p. 64) suggested<br />

that the Internet is “an enabling technology – a powerful set of tools that can be used wisely or unwisely,<br />

in almost any industry and as part of almost any strategy” and always as a complement to traditional<br />

ways of conducting business.<br />

2.1 Businesses go online<br />

Although the term eCommerce literally “refers to the conduct of commerce or business electronically -<br />

essentially using Internet technologies” (Ward & Peppard, 2002, p. 5), it had emerged before the Internet,<br />

notably in the 1980s, with the use of Electronic Data Interchange (EDI) in the financial sector, initially for<br />

intra-company trading and consequently used for the exchange of documents and so on (Swatman,<br />

1993).<br />

612


Panos Hahamis<br />

eBusiness, on the other hand, has come to refer to the automation of an organisation’s internal business<br />

processes using web-based technologies and interfaces (Ward & Peppard, 2002). ECommerce is a key<br />

component of eBusiness which includes “not just the buying and selling of goods and services, but also<br />

servicing customers, collaborating with business partners, and conducting electronic transactions within<br />

an organisation” (Turban, King, Lee, & Viehland, 2006, p. 4).<br />

According to Earl (2000, p. 33), “It was in about 1994/95 that the cry let’s have a home page began to<br />

ring out across corporations”. The prospect that the utilisation of the Internet and the World Wide Web<br />

could increase their market presence and share, boost communications, reinforce their relationships with<br />

customers and finally enhance their supply chain and other processes and operations, sounded very<br />

attractive. Some businesses retained their physical high street presence but embraced these<br />

technologies, thus becoming clicks and mortar incumbents, whilst on the other hand new business startups<br />

became pure play dot-coms, with the notable example of Amazon.com.<br />

2.2 Governments follow suit<br />

Despite the antecedents of the dot-com boom and subsequent crash, there is no Chinese wall between<br />

the private and public sectors preventing stakeholders’ expectations in one from informing their attitudes<br />

and behaviour in another. Moreover, in the name of efficiency and effectiveness - the most perceptible<br />

and intangible benefits - along with the aim of cost cutting, governments started to realise the potential of<br />

going online.<br />

A simple definition of eGovernment is offered by West (2004, p. 16): “eGovernment refers to the delivery<br />

of government information and services online through the Internet or other digital means”. Curtain,<br />

Sommer, & Vis-Sommer (2004) however, argue that is far more than simply making some information<br />

and services for the citizens available publicly online. It is a transforming agent for all layers of<br />

government, each providing a variety of different services.<br />

3. Models of growth<br />

Remenyi, Williams, Money, & Swartz (1998, p. 285) define a model as “a representation of an artefact, a<br />

construction, a system or an event or a sequence of events” and it may consist of a picture or a drawing,<br />

symbols, numbers, words or a combination of these depictions.<br />

3.1 In eCommerce<br />

The theories of growth first emerged in the mid-1970s well before the evolution of the Internet (Chan &<br />

Swatman, 2004; Ghachem, 2006; McKay, Marshall, & Prananto, 2000; Prananto, McKay, & Marshall,<br />

2001; Ward & Peppard, 2002). Computerisation prompted scholars such as Nolan (1973), amongst<br />

others, to study the computing evolution within organisations. He developed a model to “determine the<br />

degree of computing maturity of a company by taking into account the evolution of information<br />

technologies as an organisational learning process” (Ghachem, 2006, p. 1). He is also “the first to have<br />

presented a theoretical description of the phases dealing with the planning, the organisation and the<br />

control of activities in association with the management of computer resources in the organisation”<br />

Ghachem (2006, p. 1). Nevertheless, although Nolan consequently amended and expanded his model to<br />

six stages in order to accommodate two new stages, namely integration and administration (of data), it<br />

relied mainly on the organisation’s spending on computing to determine the different stages of the<br />

computer evolution. Thus, it was deemed inadequate, by critics such as Galliers & Sutherland (1991) and<br />

Swatman (1993) cited in Ghachem (2006), to represent the reality of implementation of information<br />

systems.<br />

Ghachem (2006) found a number of similar maturity models outlining the phases through which<br />

organisations evolve in relation to the use of information and communication technologies and systems.<br />

However, these models did not take into consideration the advancement of the Internet, its technologies<br />

or other factors, as they were proposed long before the emergence of eCommerce. McKay et al. (2000,<br />

p. 29) argue that among these models, the Galliers & Sutherland (1991) model appears to be the most<br />

sophisticated of all, as most early models were criticised as being IT-centric.<br />

Ghachem (2006) also conducted a review of the new maturity models, better tailored to the realities of<br />

electronic commerce. In particular, he has focused on four models of growth. The models he reviewed<br />

and are worth mentioning, are Earl’s (2000), McKay et al’s. (2000), Rayport & Jaworski’s (2001) and Rao<br />

et al’s. (2003).<br />

613


Panos Hahamis<br />

In the late 1990s, an important contribution was made by Angehrn (1997). Instead of trying to predict the<br />

likely technological evolution of the Internet, he proposed a generic framework (the ICDT model) for<br />

understanding the opportunities and threats posed by the Internet to businesses, and for developing a<br />

strategy to leverage these (See Figure 1 below).<br />

Source: (Angehrn, 1997)<br />

Figure 1: The ICDT model<br />

According to Angehrn (1997, p. 2), the model takes its name from “the four virtual spaces created by the<br />

Internet: a Virtual Information Space, a Virtual Communication Space, a Virtual Distribution Space, and a<br />

Virtual Transaction Space. The four spaces are treated separately because they correspond to different<br />

strategic objectives and require different types of investment, and organisational adjustments”. The Visual<br />

Information Space (VIS) is about visibility, the Visual Communication Space (VCS) is about interaction,<br />

the Virtual Distribution Space (VDS) is about service delivery and the Virtual Transaction Space (VTS) is<br />

about trading. Although the ICDT model is generic, it has been used to diagnose Internet maturity and<br />

strategies of whole sectors, such as banking. Furthermore, the model could be used in the context of<br />

Intranets to highlight the space of opportunities available to companies internally and how they can utilise<br />

this to their advantage (Angehrn, 1997).<br />

3.2 In eGovernment<br />

It was only after the advancement of the Internet, when the concept of eGovernment had emerged, that<br />

practitioners and scholars alike started studying “the new face of government” (Andersen & Henriksen,<br />

2006). Beside the impact, evaluation and good practices, a number of maturity models have also been<br />

developed and proposed. The three most prominent models are examined below.<br />

In 2001, Hiller & Belanger (2001) proposed an eGovernment framework that consists of six constituent<br />

relationships and five stages of eGovernment (see Figure 2). Although it is supposed to be an adaptation<br />

and/or an improved version of a model or models suggested earlier by other scholars, it is not clear as no<br />

citations were made nor any references provided.<br />

Hiller & Belanger (2001, p. 14) suggested that “eGovernment can be considered through two lenses: the<br />

type of relationship and the stage of integration”. As far as the relationships are concerned, they<br />

endeavoured to offer a broader view of the multidimensional relationships between the government and<br />

all the entities they interact with. These are: Government Delivering Services to Individuals (G2IS), ie<br />

delivering services or benefits directly to citizens, Government to Business as a Citizen (G2BC), ie filing<br />

or paying taxes online, Government to Business in the Marketplace (G2BMKT), ie electronic procurement<br />

(e-procurement), Government to Employees (G2E), ie providing information to their employees via an<br />

Intranet and Government to Government (G2G), allowing collaboration between agencies at many levels<br />

and aggregating various public sector websites.<br />

614


Panos Hahamis<br />

Source: Hiller & Belanger (2001)<br />

Figure 2: Electronic government framework<br />

The stages of eGovernment they suggest in their model are Information, Two-way Communication,<br />

Transaction, Integration and Participation. At the Information stage, there is only provision of information<br />

in a static form; however, content does not update itself and thus they stress the need for accurate and<br />

timely information. At the Two-way Communication stage, there is supposed to be some interaction<br />

between government and its constituents, allowing communication, simple requests and changes. At the<br />

Transaction stage, constituents should be allowed to interact and transact fully online, through a webbased<br />

interface without the need for human intervention. At the Integration stage, all services should be<br />

integrated and offered through a single portal no matter which agency provides them. Portals are similar<br />

to websites with the difference that they act as gateways and aggregators to many services offered by<br />

various agencies/providers. Nonetheless, this requires another integration to take place first, that of both<br />

back-office and front-office systems. At the final Participation stage, constituents should be allowed to<br />

comment on/participate in the democratic process and to register and vote online. Although Hiller &<br />

Belanger (2001) conceded that this stage could have been a sub-category of the Two-way<br />

Communication stage, they considered it significant enough to merit a separate category altogether.<br />

At the same time, Layne & Lee (2001) proposed a four stage model which outlines the complex<br />

transformation within government as it makes its transition to eGovernment through each stage. Thus,<br />

the model incorporates the complexity involved at each stage and the different levels of integration (See<br />

Figure 3). Their discussion includes definition, functionality and challenges that arise at each stage.<br />

In stage one of cataloguing, government websites are mainly static and limited, just for the sake of<br />

establishing a web presence. There is limited functionality at this stage and among the challenges are<br />

website development and ownership and maintenance of the information. In the second stage of<br />

transaction, citizens are allowed to interact and transact online, again without – or with minimum – human<br />

intervention as per Hiller & Belanger’s (2001) model, discussed above. At this stage, two-way<br />

communication adds to functionality and along with organisational challenges, the issue of transaction<br />

fulfilment should be taken seriously. Integration starts at this stage and governments are forced to go<br />

further by integrating the “underlying processes not only across different levels of government but also<br />

different functions of government” (Layne & Lee, 2001, p. 125). They argue that integration may happen<br />

615


Panos Hahamis<br />

in two ways, vertically and horizontally, and thus the next two stages correspond to these types of<br />

integration. It is expected however that the vertical integration “within the similar functional walls but<br />

across different levels of government will happen first, because the gap between levels of government is<br />

much less than the difference between different functions” (p. 130). At this stage, the point of service<br />

must be at local level as the citizen would feel more familiar and thus local portals connected to central<br />

government and so on will add to functionality. This in its turn presents challenges as several<br />

technological issues emerge, ie signal authentication, format compatibility of electronic data interchange,<br />

exposure level of internal system to the outside etc. (p. 131). The last stage of horizontal integration<br />

refers to integration of government services across different functional walls or silos. They foresee that<br />

from the citizen’s perspective this would be ideal as such integration would facilitate the one stop shop<br />

concept and serve their needs in one go. At this stage functionality is characterised by efficiency and<br />

effectiveness, driven by citizens’ demands for a move towards more service oriented functions. The<br />

challenges presented here are not only technical but also managerial; most importantly, “it requires a<br />

change in the mindset of government agency directors” (p. 133). Among the technological and<br />

organisational challenges Layne & Lee (2001) presented, they also pointed out three major issues ie<br />

universal access, privacy and confidentiality and citizen focus in government management (p. 134), thus<br />

the re-conceptualisation of government in order to achieve citizen-focused changes and development.<br />

Source: (Layne & Lee, 2001)<br />

Figure 3: Dimensions and stages of eGovernment development<br />

After examining both Hiller & Belanger’s (2001) and Layne & Lee’s (2001) models, Reddick (2004)<br />

proposed a two stage, combined with three different governmental relationships, model of eGovernment<br />

growth. As his study examined eGovernment growth in American municipalities at the time, he conceded<br />

that the two first phases of the Layne & Lee (2001) model, the cataloguing and transaction stages, would<br />

be applicable as there was no evidence suggesting otherwise. He has also used Hiller & Belanger’s<br />

(2001) model of major types of eGovernment relationship, Government to Citizen (G2C), Government to<br />

Business (G2B) and Government to Government (G2G) as they “represent the heart of the governmental<br />

relationships” (Reddick, 2004, p. 4), (See Figure 4).<br />

Similar to Hiller & Belanger’s (2001) and Layne & Lee’s (2001) models, the first stage of growth,<br />

cataloguing, is all about maintaining a web presence - merely a static web site that allows no<br />

transactions. The second stage of transaction allows citizens and the business to interact and transact<br />

directly online by paying taxes, fines and so on. With regard to eGovernment relationships, the results of<br />

the Reddick (2004) study showed that the G2C relationship was mainly still in Stage I, whilst the G2G<br />

616


Panos Hahamis<br />

relationship was somewhat advanced with the application and use of intranets in government. The G2B<br />

relationship was the most advanced, especially with the emergence of e-procurement and the realisation<br />

of the cost savings via this innovative procurement channel. Similar results were obtained by Hahamis,<br />

Iles, & Healy’s (2005) study of Greek municipalities, applying Reddick’s (2004) model of growth, although<br />

to a smaller sample than the one he used for his study.<br />

Source: As adapted from Reddick (2004)<br />

Figure 4: Model of eGovernment growth<br />

4. Critique of the models<br />

All of the eBusiness/eCommerce models which were reviewed, with the exception of Angehrn’s (1997),<br />

are somewhat linear, assuming progress through their stages of growth over time. In most cases<br />

however, it was recognised that an organisation can leap over stages to accelerate its development,<br />

assuming that previous issues were addressed. Also, the models are either descriptive, prescriptive, or<br />

half and half.<br />

As far as the strategy is concerned, although Angehrn’s (1997) model, was proposed prior to the rest of<br />

the aforementioned models, it was a precursor and quite different in many respects. The aim was to<br />

identify and understand the opportunities and threats that arise from the emergence of the Internet so<br />

appropriate strategies could be developed in order to leverage these.<br />

The relationships and stages in eGovernment are more complex than in eCommerce. As far as the<br />

relationships are concerned, Hiller & Belanger (2001) stress that they are multi-dimensional. Although<br />

Reddick (2004) used only the major types of eGovernment relationships, they are core to the model he<br />

proposed. There is no mention of relationships between government and its entities in Layne & Lee’s<br />

(2001) model. All of the eGovernment models examined here incorporate similar stages of growth, such<br />

as cataloguing or information, two-way communication, transaction and integration. Due to the nature of<br />

his study, Reddick (2004) used only two of the stages described above, cataloguing and transaction. At<br />

the stage of integration, Hiller & Belanger (2001) suggested portals, whilst Layne & Lee (2001), in<br />

addition to portals, suggested both vertical and horizontal integration, bringing to the fore back-office and<br />

front-end processes and the issue of bringing down the silos. Hiller & Belanger (2001) went further than<br />

the integration stage and proposed a participation stage, taking the argument to a higher level.<br />

Furthermore intranets are discussed extensively by all scholars and the concept of the one stop shop<br />

emerges as crucial to providing services to the citizen (Hiller & Belanger, 2001; Layne & Lee, 2001;<br />

Reddick, 2004). They also attempt to map at each stage the challenges, both technological and<br />

organisational, that the transition from government to eGovernment presents.<br />

5. The case of Directgov<br />

Directgov (www.direct.gov.uk) was launched in 2004 as the third generation British government portal. It<br />

followed open.gov.uk which was just an online directory and UK Online, launched in 2000. UK Online<br />

was the first citizen portal, at least in the UK, to group information into life events (Cross, 2004), and was<br />

617


Panos Hahamis<br />

part of the Modernising Government white paper’s strategy and eGovernment vision by the then Prime<br />

Minister Mr Blair (HM Government, 1999).<br />

Portals also act as hubs for other websites and on many occasions replace and aggregate a number of<br />

these. “Cabinet Office figures show that 762 of the 1,649 targeted central government websites have<br />

been closed, and a further 599 are expected to close this year” (Grant, 2009). Following a web<br />

rationalisation policy endorsed by minsters in 2006 to rationalise content, the plan is to move the content<br />

of most of government websites to two portals by 2011, Directgov and Business Link<br />

(www.businesslink.gov.uk). “The rationale is that services enabled by IT, must be designed around the<br />

citizen or business, not the provider, and provided to modern, co-ordinated delivery channels” (Saxby,<br />

2007a, p. 214). It was part of the Cabinet Office’s Transformational Government Agenda which aimed to<br />

improve return on investment of IT projects and inter, extra and intra-departmental information sharing<br />

(HM Treasury, 2007; Norton, 2008; Pickering, 2009; Saxby, 2007b).<br />

In the years since its inception, the Directgov supersite (and agency) had an interesting journey. Primarily<br />

‘owned’ by the Cabinet Office, then the Department of Work and Pensions (DWP) and most recently,<br />

ownership was moved back to the Cabinet Office. Directgov joined the powerful new Efficiency and<br />

Reform Group in the Cabinet Office since last summer. Meanwhile, a strategic review of Directgov was<br />

undertaken by Martha Lane Fox, co-founder of Lastminute.com who was appointed as the UK Digital<br />

Champion. Her recommendations included advice on how the Government can use the internet to both<br />

communicate and interact better with citizens whilst also delivering significant efficiency savings from<br />

channel shift and by converging Directgov with Business Link into a single domain (Fox, 2010;<br />

Transform, 2010). Indeed, most of her proposals were accepted by the Minister for the Cabinet Office,<br />

Francis Maude in his response letter last November (Cabinet Office, 2010).<br />

Directgov offers the user fairly sophisticated administrative, legal, regulatory and social public services,<br />

and a number of online tools. Furthermore, its availability in the Welsh language and in many accessible<br />

formats as well as via other media, such as digital television and mobile phones, enhances outreach to a<br />

wider audience and broadens accessibility (Directgov, 2009; Kolsaker & Lee-Kelley, 2008; Norton, 2008;<br />

Pickering, 2009). In addition, the introduction of the Connect to your Council (mycouncil.direct.gov.uk)<br />

service offers seamless access, acting as a single point of contact instead of going through many layers,<br />

directly to the local council’s service the user requires (Directgov, 2009; King & Cotterill, 2007; Kolsaker &<br />

Lee-Kelley, 2008; Sarikas & Weerakkody, 2007).<br />

On the participation front, it promotes public consultation by linking directly to the e-petitions section of<br />

the 10 Downing Street (petitions.number10.gov.uk) website but it does not offer e-voting or any other<br />

form of interactivity and participation, nor has it embraced Web 2.0 or social networking technologies.<br />

Contrary to the service provision to both citizens and business which has been a success, improving<br />

citizen engagement, input and participation have been minimal and of little benefit. Thus, citizens turn to<br />

sites unaffiliated with government websites, such as YouGov (www.yougov.co.uk) to have a say and try<br />

to influence politics and policy alike (Kolsaker & Lee-Kelley, 2008; Norton, 2008; Pickering, 2009).<br />

If we were to apply any of the maturity models from either the eCommerce/eBusiness or eGovernment<br />

areas examined above, in order to map Directgov’s maturity and stages of growth, these would be<br />

Angehrn’s (1997) in synergy with Hiller & Belanger’s (2001) model. Angehrn (1997) was a pioneer of his<br />

time and his model stands out from the rest as diachronic over time; in addition, its flexibility and<br />

adaptability makes it applicable to many cases, levels and instances. The four virtual spaces Angehrn<br />

(1997) proposed apply to Directgov, which with the creation of new channels within all of those spaces,<br />

fulfils visibility, interaction, service delivery and multi-dimensional transactions at many levels,<br />

accompanied by strategic planning and clear objectives. In particular, Directgov’s strong brand could be<br />

mapped on the Visual Information Space (VIS) which is about visibility. Moreover, according to Directgov<br />

Strategic Review which was published recently, the brand can be stretched to cover news,<br />

announcements/press releases; corporate information from departments, campaigns and e-democracy.<br />

This could be achieved by shared web services and a single domain (Transform, 2010). This move in<br />

turn, will enhance citizens and business alike to engage in relationship, ideas and opinion-building<br />

activities such as lobbying inter alia, which could be mapped to the Visual Communication Space (VCS)<br />

which is about interaction. The distribution of information and transactional services via a multitude of<br />

digital channels could be mapped to the Virtual Distribution Space (VDS) which is about service delivery.<br />

The high quality user-friendly transactions that take place on Directgov, although in need of improvement,<br />

618


Panos Hahamis<br />

as they need to be more user-centred, along with more guidance to be provided (Transform, 2010), could<br />

be mapped to the Virtual Transaction Space (VTS) which is about trading.<br />

Hiller & Belanger’s (2001) model on the other hand, offers an integrated approach to map Directgov’s<br />

evolution, maturity and sophistication of services. It covers all possible relationships Directgov is<br />

designed to serve and the extra stage other models do not offer, that of participation. Directgov has bypassed<br />

the Information stage by default, as it was not designed with the provision of information in a<br />

static form. On the Two-way Communication stage, where there is supposed to be some interaction<br />

between government and its constituents, we could map not only the tools provided on the portal for a<br />

two-way communication, but also the feedback forms on each page containing the actual information<br />

sought. Directgov also fulfils the Transaction stage where constituents are allowed to interact and<br />

transact fully online, through a web-based interface without the need for human intervention. With regard<br />

to the Integration stage, it is worth noting that Directgov had reached the integration stage which was<br />

complex, as not only back-office processes and systems were integrated with front-end interfaces, the<br />

integration of central and local government systems had to be achieved too. On the final Participation<br />

stage, we could map some initiatives, such as the e-petitions and recent consultations with regard for<br />

example the Directgov review, which was made public. However, citizens are still not allowed to comment<br />

on/participate in the democratic process in various ways and to register and vote online. The recently<br />

published Government ICT Strategy (Cabinet Office, 2011) pledges for a creation and delivery of policy in<br />

an open and accessible forum which through digitally engagement and collaboration, it “will enable<br />

citizens to influence, comment on and contribute to the decision-making process” (p. 19).<br />

6. Conclusions<br />

This paper presents research towards the Henley Doctor of Business Administration (DBA) Programme<br />

which is in progress. An attempt was made to map the development maturity of the Directgov portal on<br />

applicable models of growth by means of content observation and review of the literature. This effort is<br />

certainly not complete or holistic as the literature review is by no means exhaustive and a further<br />

empirical study needs to be conducted.<br />

Ideally there should not be a need to use a synergy of models as suggested above, but to build a new<br />

model taking into account not only the relationships and the stages outlined by previous studies and<br />

proposed frameworks, but also a new set of constructs. In the case of Directgov, issues such as full<br />

democratic participation and engagement as well as e-inclusion, in order to tackle the digital divide, have<br />

not been taken into account satisfactorily. Furthermore, it lags behind in embracing Web 2.0 and social<br />

networking technologies, although the latest Government ICT Strategy and Directgov Strategic Review<br />

promise more use and incorporation of social media (Cabinet Office, 2011; Transform, 2010). The citizen<br />

is now served as a customer, not as a citizen, and so far it could be said that the project is successful,<br />

mainly as a cost cutting exercise. For joined-up government, you need to have joined-up citizens.<br />

References<br />

Andersen, K. V., & Henriksen, H. Z. (2006). EGovernment maturity models: Extension of the Layne and Lee model.<br />

Government Information Quarterly, 23(2), 236-248.<br />

Angehrn, A. (1997). The Strategic Implications of the Internet. Paper presented at the 5th <strong>European</strong> <strong>Conference</strong> on<br />

Information Systems. Retrieved 30 April 2009, from<br />

http://www.calt.insead.edu/Publication/ICDT/strategicImplication.htm<br />

Cabinet Office. (2010). Response by Minister for the Cabinet Office Francis Maude to the Directgov 2010 and<br />

Beyond Report. London: Cabinet Office.<br />

Cabinet Office. (2011). Government ICT Strategy. London: Cabinet Office.<br />

Chan, C., & Swatman, P. M. C. (2004). B2B eCommerce stages of growth: the strategic imperatives. Paper<br />

presented at the System Sciences, 2004. Proceedings of the 37th Annual Hawaii International <strong>Conference</strong> on<br />

System Sciences.<br />

Cross, M. (2004). Direct to your destination. The Guardian 4 March. Retrieved 17 July 2009, from<br />

http://www.guardian.co.uk/technology/2004/mar/04/internet.egovernment<br />

Curtain, G. G., Sommer, M. H., & Vis-Sommer, V. (2004). The World of EGovernment: Haworth Press.<br />

Directgov. (2009). About Directgov. Retrieved 1 August 2009, from<br />

http://www.direct.gov.uk/en/SiteInformation/DG_4004497<br />

Earl, M. J. (2000). Evolving the eBusiness. Business Strategy Review, 11(2), 33-38.<br />

Fox, M. L. (2010). Directgov 2010 and Beyond: Revolution Not Evolution. London: Race Online 2012.<br />

Galliers, R. D., & Sutherland, A. R. (1991). Information systems management and strategy formulation: the'stages of<br />

growth'model revisited. Information Systems Journal, 1(2), 89-114.<br />

Ghachem, L. (2006). Maturity of electronic commerce: A review of the principal models. Paper presented at the<br />

FEBR 2006.<br />

619


Panos Hahamis<br />

Grant, I. (2009). UK government shuts down half its websites, 600 more to close. Computer Weekly 5 August 2009.<br />

Retrieved 8 August 2009, from http://www.computerweekly.com/Articles/2009/08/05/237197/uk-governmentshuts-down-half-its-websites-600-more-to.htm<br />

Hahamis, P., Iles, J., & Healy, M. (2005). eGovernment in Greece: Bridging the gap Between Need and Reality.<br />

Electronic Journal of eGovernment Volume, 3(4), 185-192.<br />

Hiller, J., & Belanger, F. (2001). Privacy Strategies for Electronic Government. In M. A. Abramson & G. E. Means<br />

(Eds.), EGovernment (pp. 162-198). Oxford: Rowman and Littlefield Publishers.<br />

HM Government. (1999). Modernising Government. White Paper. London: The Stationery Office.<br />

HM Treasury. (2007). Service Transformation Agreement. Retrieved 30 July 2009, from<br />

www.eurim.org.uk/.../Service_Transformation_Agreement.pdf<br />

King, S., & Cotterill, S. (2007). Transformational Government? The role of information technology in delivering<br />

citizen-centric local public services. Local Government Studies, 33(3), 333 - 354.<br />

Kolsaker, A., & Lee-Kelley, L. (2008). Citizens' attitudes towards eGovernment and e-governance: a UK study.<br />

International Journal of Public Sector Management, 21(7), 723-738.<br />

Layne, K., & Lee, J. (2001). Developing fully functional EGovernment: A four stage model. Government Information<br />

Quarterly, 18(2), 122-136.<br />

McKay, J., Marshall, P., & Prananto, A. (2000). Stages of maturity for eBusiness: The SOG-e model. Paper<br />

presented at the PACIS 2000, Hong Kong.<br />

Nolan, R. L. (1973). Managing the computer resource: a stage hypothesis. Communications of the ACM (16), 399–<br />

405.<br />

Norton, P. (2008). Directgov: The Right Direction for EGovernment or a Missed Opportunity? The Journal of<br />

Information, Law and Technology (JILT)(1).<br />

Pickering, A. (2009). New Labour’s Digital Vision: A Survey of EGovernment in the UK Since 1997. Knowledge<br />

Politics Quarterly, 2(1).<br />

Porter, M. E. (2001). Strategy and the Internet. Harvard Business Review, 79(3), 62-79.<br />

Prananto, A., McKay, J., & Marshall, P. (2001). Frameworks to support eBusiness growth strategy. Proceedings of<br />

the Global Cooperation in the New Millenium, ECIS, 1254–1263.<br />

Rao, S. S., Metts, G., & Monge, C. A. M. (2003). Electronic commerce development in small and medium sized<br />

enterprises. Business Process Management Journal, 9(1), 11-32.<br />

Rayport, J. F., & Jaworski, B. (2001). Introduction to eCommerce: McGraw-Hill Higher Education.<br />

Reddick, C. G. (2004). A two-stage model of eGovernment growth: Theories and empirical evidence for U.S. cities.<br />

Government Information Quarterly, 21(1), 51-64.<br />

Remenyi, D., Williams, B., Money, A., & Swartz, E. (1998). Doing research in business and management: an<br />

introduction to process and methods. London: Sage.<br />

Sarikas, O. D., & Weerakkody, V. (2007). Realising integrated eGovernment services: a UK local government<br />

perspective. Transforming Government: People, Process and Policy, 1(2), 153-173.<br />

Saxby, S. (2007a). News and comment on recent developments from around the world. Computer Law & Security<br />

Report, 23(3), 211-226.<br />

Saxby, S. (2007b). News and comment on recent developments from around the world. Computer Law & Security<br />

Report, 23(2), 125-137.<br />

Swatman, P. M. C. (1993). Integrating Electronic Data Interchange into existing organisational structure and internal<br />

application systems: the Australian Experience. School of Computing.<br />

Transform. (2010). Directgov Strategic Review. London: Transform Innovation Ltd.<br />

Turban, E., King, D., Lee, J., & Viehland, D. (2006). Electronic commerce 2006 : a managerial perspective (4 ed.).<br />

Upper Saddle River, N.J. ; [London]: Pearson Prentice Hall.<br />

Ward, J., & Peppard, J. (2002). Strategic planning for information systems (3rd ed. / John Ward and Joe Peppard.<br />

ed.). Chichester: Wiley.<br />

West, D. M. (2004). EGovernment and the Transformation of Service Delivery and Citizen Attitudes. Public<br />

Administration Review, 64(1), 15-27.<br />

620


Non<br />

<strong>Academic</strong><br />

Papers<br />

621


622


Providing Public Services Through Digital Postal Networks:<br />

A Position Paper<br />

Liam Church and Maria Moloney<br />

Escher Group Ltd, Dublin, Ireland<br />

Liam.Church@eschergroup.com<br />

Maria.Moloney@echergroup.com<br />

Abstract: Extant government literature shows that, in recent decades, many western democracies have pursued a<br />

program of liberalisation of public services. The once predominantly public telecommunications sector has seen<br />

considerable privatisation. Postal systems have undergone multiple restructuring and streamlining programs to<br />

ensure their continued viability. This privatisation trend has been largely driven by three factors influencing<br />

government policy: a concern to lower costs in the provision of public services, the belief that private sector<br />

companies tend to be more efficient, and the conviction that competition increases efficiency and effectiveness in the<br />

delivery of public services. Additionally, as a result of the technological revolution, postal systems that were once<br />

viewed as efficient, trusted and inclusive have rapidly come to be seen as outdated, expensive and slow. Even<br />

though Posts are still recognised as essential to citizens, they are showing evidence of decline. A direct effect of this<br />

decline is that the ability of posts to fulfil their universal service obligation (USO) is slowly being eroded. The aim of<br />

this paper is to present a digital postal solution to counteract this decline. The new system restores, in digital format,<br />

the full gamut of traditional universal services afforded by Posts to citizens in earlier times. The new system gives<br />

every citizen a private digital space, where they can securely access, process and store official, personal and private<br />

information such as bills, employment records, academic records, health and dental records and postal mail. From<br />

this space, citizens can fully interact with digital society: privately on a one to one basis, socially, commercially and<br />

politically. In addition, the system provides new services, such as informational privacy protection and the supply of<br />

‘anonymised’ online statistical data which will provide information on online behaviour and trends. Currently, this type<br />

of statistical data is largely in the hands of private companies and therefore of no benefit to the public good. A digital<br />

postal system based on the concept described in this paper is proposed to be rolled out in Ireland over the next few<br />

years.<br />

Keywords: postal services, freedom of information, eDemocracy, informational privacy, digital government,<br />

technology artefact, socio-technical design<br />

1. Introduction<br />

In recent years, and arguably as a result of governmental policy and rapid technological innovation, there<br />

have been a number of fundamental shifts in the communications market that have affected the postal<br />

industry. Since the 1970s, governments across Europe, and indeed elsewhere, have held the belief that<br />

public service organisations were best managed as if they were 'businesses' (Cordella & Willcocks, 2010;<br />

Hambleton, 1994). This resulted in a number of key government policy shifts to replace state services<br />

with numerous competing providers. To a large extent, these providers took on the traditional role of the<br />

public service, which in turn was portrayed as ‘enabling, not providing’ public services. The fundamental<br />

driver of these reforms was the assumption that public services were better managed in the interest of<br />

efficiency through private sector economic drivers as opposed to the ‘inclusive’ interest of citizens<br />

(Cordella & Willcocks, 2010). The culmination of this trend, in the postal sector, was a political agreement<br />

at the <strong>European</strong> level for the full opening of the postal services market to competition by the end of 2010.<br />

In reaction to these neo-liberal policies, and to replace revenues lost by falling mail volumes, posts are<br />

employing new technologies and business strategies not only to improve, and make more cost effective,<br />

their provision of a universal service, but also to expand and develop their core competencies to<br />

encompass expertise in the fields of ecommerce, e-government and hybrid mail. In fact, Posts are<br />

particularly well placed to become key players in these fields because they are traditionally regarded as<br />

Trusted Intermediaries (TIs) and are obligated to all citizens of a nation by their universal service<br />

obligation (USO). Therefore posts have an advantage in that they have an established brand that is<br />

recognised by the entire population of a state as that of an organisation that is controlled and regulated.<br />

De Reuck and Joseph (1999) posit that the concept of a USO is relative to the historical moment in which<br />

the USO occurs. That is to say that it is not a rigid concept but rather a dynamic one, which requires<br />

continual revisiting in light of changing technological innovations and social needs (De Reuck & Joseph,<br />

1999). For example, in Great Britain, the provision of broadband services to all households in the country<br />

has recently become a universal service (Carter, 2009). Therefore, it can be argued that Posts are only in<br />

decline because they are being allowed to decline.<br />

623


Liam Church and Maria Moloney<br />

Posts have a valuable exploitable asset in that they have an established and trusted brand. Research<br />

has shown that given the profit-driven and competitive nature of our digital society and individuals’<br />

concerns surrounding issues like the protection of their personal information online, individuals prefer to<br />

entrust their personal information to familiar and trusted brands. When individuals 'trust' an online brand,<br />

it increases the likelihood of those individuals actually interacting with that brand because trust alleviates<br />

concerns regarding possible negative consequences (Kim & Prabhakar, 2000). The challenge now facing<br />

posts is to use their trusted brand to their advantage by extending it to encompass an inclusive,<br />

affordable and high-quality electronic service.<br />

In section two of this document, an historical snapshot of the postal system and the democratic<br />

importance of its USO is presented. This is used to emphasise how the USO has been eroded over the<br />

last number of decades, to the detriment of citizens. A comparison between past and present postal<br />

systems is also outlined and in section three, a description of a proposed digital postal solution is given.<br />

Section four concludes the paper.<br />

2. The historical impact of privatisation on public services<br />

Historically, in the paper-based world of three decades ago, posts played a significant societal role. Every<br />

citizen, business and government depended on the Post for safe delivery of mail. The Post enabled<br />

citizens to establish and maintain business relationships and links with emigrants. It helped them save<br />

and send money, and connected them with information about their health, education and employment.<br />

Given that the pace of business and of life in general was much slower at this time, the post had a very<br />

safe, reliable and efficient system. The local post office and the postman were central to the lives of all<br />

citizens regardless of location, age, gender or socio-economic status.<br />

2.1 The government transparency and privatisation paradox<br />

After World War II, the notion of ensuring transparency in government started to gain momentum<br />

internationally (Braman, 2006). However, it took considerable time for many nations to actually implement<br />

government transparency. In the mid-1980s, only 11 nations had freedom of information laws, but by the<br />

end of 2004, 59 nations had implemented such laws (Relly & Sabharwal, 2009; Roberts, 2006).<br />

Privatisation, on the other hand, became popular in the 1970s and 1980s in reaction to what had often<br />

become, by that time, costly and bureaucratic public services. It was believed that privatising<br />

governmental services would lead to greater efficiency and competition, which would in turn benefit the<br />

citizen (Aman, 2005; Cordella & Willcocks, 2010).<br />

In the last three decades, these two movements, privatisation and government transparency have grown<br />

in parallel. Many governments have worked to increase openness and transparency in their actions,<br />

through ongoing process improvements and the implementation of freedom of information acts.<br />

Transparency in government and the right to access government information are now internationally<br />

regarded as essential to democratic participation, prevention of corruption, informed decision-making,<br />

and provision of accurate information to the public, companies, and journalists (Cullier & Piotrowski,<br />

2009; Mulgan, 2007; Quinn, 2003; Reylea, 2009; Shuler, Jaeger, & Bertot, 2010).<br />

Privatisation usually entails handing over to the market, the provision of services that were traditionally<br />

provided by government. This political decision to move a service or governmental responsibility from the<br />

public sector to the private sector has many consequences. Privatisation subjects the activity in question<br />

to the forces of the market while freeing it from both substantive and procedural forms of regulation that<br />

apply to public bodies. The privatisation of an industry or a social service means, by and large, that the<br />

administrative laws of a country no longer apply to that industry or service, nor do any Freedom of<br />

Information Acts (FOIA) (Aman, 2005).<br />

Paradoxically, as governments strive for transparency, they are at the same time handing over public<br />

services to private companies who are not publicly accountable. Traditionally, governments were in<br />

charge of providing vital public services to all its citizens. Examples of such services that citizens enjoyed<br />

at one time were the provision of:<br />

The opportunity for every citizen to post their mail in their local post office and receive mail to their<br />

door at least once every working day.<br />

National maps. All maps of the country were owned by the state. This was considered a vital role of<br />

the government to ensure that all citizens had access to maps of their nation;<br />

624


Liam Church and Maria Moloney<br />

A national public directory to all households and businesses in the country, containing the contact<br />

details of all the businesses and residences in the country;<br />

Freely available books to all citizens through a nationwide network of public libraries.<br />

Free post office savings accounts for all citizens<br />

A central statistics office to provide information on economic, social and general activities and<br />

conditions in the State, such as the productivity of school and hospitals.<br />

In the last decade or so, all these services have either been completely or partially digitalised:<br />

Every citizen, with access to a computer, has a means of written communication through the use of<br />

Internet email applications, again most of which are privately owned.<br />

Even though ordinance survey maps are now digitally available, they are not interactive. Interactive<br />

maps of a nation and the world, detailing information on residential and business locations are<br />

available through the Internet application, Google Maps, which is privately owned by Google Inc;<br />

Access to public directories containing all the businesses and residences in the country is available<br />

through Internet search engines such as Yahoo and Google, all of which are privately owned<br />

companies;<br />

Books are still freely available to citizens through public libraries but the digital versions of books are<br />

available to citizens - at a price - through Internet applications like privately owned Google Books,<br />

and wireless reading devices like Kindle privately produced by Amazon.com;<br />

Free banking is still available through post offices but they do not offer online banking. Banks charge<br />

for banking services which include online banking.<br />

The central statistics office website has become the main information dissemination vehicle for the<br />

office in recent decades. All their statistical data are now available in digital form on their website.<br />

However, any statistical data regarding society’s online behaviour is held by private companies<br />

usually for the sole benefit of that company and not benefiting society at large.<br />

There are two noteworthy differences between these two scenarios. The first difference is the method of<br />

communication for all these services has changed from physical to digital form. The second difference is<br />

that many services once provided by the government are now being replaced by digital equivalents in the<br />

hands of private companies. A significant consequence of this is that, unlike regulated governmental<br />

bodies, private enterprise cannot be held accountable; they are not subject to national administrative law<br />

or to the freedom of information act. As a result, all transparency within the service is either non-existent<br />

or can potentially be eliminated.<br />

In addition, all personal information these private companies aggregate about citizens or how they are<br />

using it does not have to be disclosed. There are multiple consequences of this but two major<br />

consequences are now discussed. Citizens have growing privacy concerns regarding their personal<br />

information which is in the hands of private companies and secondly, the publicly owned central statistics<br />

office does not have access to vast quantities of information pertaining to the online behaviour of the<br />

nation’s population. These private companies have as their motivation, maximisation of profit not the<br />

provision of efficient, publicly inclusive services.<br />

Even though governments provide digital equivalents for some of the services previously outlined, given<br />

the profit motivation and advertising strength of private companies, the privately owned digital equivalents<br />

are developing faster and capturing a larger portion of the market. As a result, governments are no longer<br />

competitive. However, in allowing a private monopoly to develop, citizens’ basic democratic rights to vital,<br />

affordable, inclusive public services are under threat. In reaction to this situation, various approaches to<br />

reforming public services have been proposed whereby public bodies can deliver efficient services, while<br />

still remaining publicly accountable (Cordella & Willcocks, 2010; Hambleton, 1994; Mintzberg, 1996;<br />

Osborne & Gaebler, 1993; West, 2005).<br />

In the next section, a description is provided of how reliable provision of at least some of these services<br />

can be restored to the public through a trusted third party or a government-owned corporation such as a<br />

national postal operator.<br />

625


Liam Church and Maria Moloney<br />

3. Co-networking: The networking of the future<br />

Currently, the trend dominating the Internet is towards mass socialisation of services. That is to say,<br />

individuals are looking to the Internet to take part in social activities. Social networking, a process of<br />

forming online communities, is the most rapidly growing area of social online activity (Chubb, 2010).<br />

However, social networking only covers the online social lives of individuals. As individuals begin to<br />

spend more time online, their physical world becomes more intrinsically linked with their digital world.<br />

Now everything that defines individuals, such as their identity and relationships, communications,<br />

financial data, health data, academic and employment records can now be found both in physical form<br />

and digital form. In light of this, it is only a matter of time before individuals start to look to the Internet for<br />

networking sites that allow them to carry out not only their social activities but their financial, economic<br />

and political activities as well.<br />

3.1 The proposed solution<br />

The proposed digital postal system will provide a de jure system which will allow citizens to have a<br />

protected digital representation of themselves and of their community. What is meant by the term “a<br />

protected digital representation” is that the proposed system will allow each citizen to register on the<br />

system as a digital citizen with a digital private space, equivalent in many ways to a virtual home. From<br />

this space, they will be able to securely access, process and store all their official, personal and private<br />

information such as bills, employment records, academic records, health and dental records and official<br />

and unofficial mail. Additionally, each citizen will be able to interact with the digital society on all levels.<br />

That is to say, citizens will not just be allowed to communicate socially with friends and family but to also<br />

communicate with government, business and other citizens just like the traditional postal system allows.<br />

This is in effect, a progression from social networking to a more cohesive or fully communicative<br />

networking or co-networking.<br />

The significant difference between this proposed cohesive network and current networks on the Internet<br />

is that, this network will be a protected network where private enterprise will not be allowed to access,<br />

track or aggregate individuals’ personal information. As a result, all the personal information of a citizen<br />

will remain their own and they will possess the choice of accessing the Internet privately and<br />

anonymously through the secure postal network or ‘stepping outside’ their safe network and accessing it<br />

freely as they do now. With this system and for the first time since the advent of the Internet, citizens will<br />

have a layered level of privacy protection ranging from being fully in control of their actions and the<br />

information generated by those actions to being fully and publicly available to the forces of the Internet.<br />

Figure 1 shows this layered level of privacy protection within the postal system.<br />

Figure 1: The layered privacy protection infrastructure<br />

626


Liam Church and Maria Moloney<br />

Social communication conducted over the electronic postal system will be similar to the services offered<br />

by social networking sites. One extra benefit is that the system will facilitate information sharing on a local<br />

level. Additionally, for a fee, local businesses will be able to send Direct Mail through the system to all<br />

local residents.<br />

Formal communication over the system will allow all members of the community to send invoices, bills,<br />

payments and official notices over a secure, digital channel. The local city/county council will be able to<br />

send notifications in the form of bulk mail to all residents of the city or region, notifying them of issues of<br />

public interest such as road closures and public meetings. Likewise, local politicians will be more<br />

accessible to their constituents. Residents will be confident that such notifications are genuine as they<br />

are delivered through and therefore authenticated by, the secure digital postal system. Residents looking<br />

to find information on local businesses, services and community events will have a central reference point<br />

for all such information.<br />

This type of secure, formal co-networking within the system could easily scale from a local level to a<br />

national, <strong>European</strong> and international level. A public directory stored within the system would provide a<br />

lookup service, similar to the traditional White Pages, which residents could use to find contact details of<br />

other residents, local businesses or governmental offices. A geo-location application would then pinpoint<br />

the address of the service being sought on an interactive map which could provide extra information<br />

about the service such as opening times and range of services offered. This free look-up service could be<br />

a vital tool to local businesses in attracting back revenue lost to large online shopping stores.<br />

Services like a national public directory, a national mapping service and secure transfer of electronic mail<br />

are again provided to the public for the benefit of citizens and society rather than economic gain for<br />

private enterprise. Figure 2 shows the various services offered by the proposed system.<br />

Figure 2: A regulated electronic postal service benefiting all citizens of a nation.<br />

Due to the fact that posts are based in the country where they offer their services, national governments<br />

will be able to regulate the network with their own legislation as opposed to most social networks and ecommerce<br />

sites that are frequently based in the US and thus governed by US law. National governments<br />

can thus decide on how much legislation is required for their own electronic postal system as they have<br />

done with their posts for centuries. This facilitates the existence of a trusted intermediary at the core of<br />

the digital postal system like that at the core of the traditional post.<br />

627


Liam Church and Maria Moloney<br />

The fact that this network could be governed and controlled by each individual country would be<br />

particularly important when conducting secure transactions through the system. Online banking and bill<br />

payments could be facilitated through the postal network and, for a fee, receipts of financial transactions<br />

and other sensitive information, such as credit card details, account numbers, would be stored in secure<br />

encrypted databases within the network. These secure databases that contained individuals’ private<br />

information would be protected by the posts that manage the network. In effect, the posts would offer a<br />

privacy management service to their customers.<br />

Private enterprise would pay for the privilege of accessing ‘anonymised’ personal information. The notion<br />

of ‘anonymised’ personal information means that all personally identifiable information that could link the<br />

information back to specific individuals would be stripped prior to it becoming available to private<br />

enterprise. This method of information exchange would allow private enterprise access valuable personal<br />

information while still protecting individuals’ informational privacy and allowing them to monetise the<br />

information they generate.<br />

In the proposed postal system, all citizens, small and large businesses, government departments and<br />

large enterprises would be entitled to an electronic Post Office (PO) box once they supplied proof of their<br />

identity and their physical address. Each PO box in the system would require users’ authentication in<br />

order to access it. All mail sent from a PO box, either business or personal, would be securely and<br />

confidentially enclosed in electronic envelopes, through the use of encryption, while still in the PO Box<br />

and then passed along a secure closed network. It would not be decrypted until it reached its destination.<br />

If the mail was lost and needed to be handled by postal employees, the contents of the mail could not be<br />

viewed, just like in the traditional system.<br />

The infrastructure of the electronic postal system is set up in such a way that citizens could either access<br />

their PO boxes at home through the use of a traditional browser or if they did not have a computer at<br />

home, they could call to their local post office to access it. In this respect, the postal system would help<br />

to bridge the digital divide within society. Citizens who cannot afford a personal computer or those who<br />

are computer illiterate would have access, with the help of the post office, to digital society. Just like three<br />

decades ago, the main function of the new postal system is their USO, to provide an inclusive system<br />

which collects and delivers post privately and securely to every citizen’s (virtual) home. However in this<br />

system, customers could also avail of all the traditional services offered by posts such as:<br />

Protection of citizens’ personal information within communications;<br />

Bill pay services;<br />

Public directory lookup services;<br />

Registered mail and other traditional postal services;<br />

Free savings accounts<br />

In addition, Post could offer other services traditionally provided by government such as:<br />

Geo-location and mapping services which could include any information that businesses wish to<br />

impart to their customers; A service similar to combining access to ordinance survey maps with<br />

business directory services for citizens.<br />

Provision of anonymised statistical data, gathered from the network, to the central statistics office for<br />

the benefit of the public good.<br />

The proposed digital postal system would facilitate the digitalising of the entire community, regardless of<br />

age, gender, education level or socio-economic status. Additionally, it would digitalise a nation’s<br />

communities on three significant fronts: the political, commercial and social fronts. The fact that this can<br />

be achieved by one system makes the digital transition less complex for everyone. All citizens could<br />

experience a complete digital community life, either at home or at their local post office. Citizens would<br />

also have fewer concerns about privacy due to the secure and regulated nature of the network. With this<br />

system, citizens could continue to interact and communicate locally, nationally and internationally as has<br />

always been true of communications via the postal network.<br />

In addition, by providing digital postal services throughout an entire nation, the proposed system supports<br />

EU policy for e-Government and encourages the fair and balanced deployment of ecommerce<br />

nationwide. It could be operated and managed by either national postal operators or state-sponsored<br />

bodies regulated by law.<br />

628


4. Summary and conclusions<br />

Liam Church and Maria Moloney<br />

Posts have used many strategies over recent decades in an attempt to survive in the current competitive<br />

communications market. Over the last two or three decades, governmental policies of prioritising market<br />

competition over democratic goals have subtly but progressively affected both citizens and posts alike.<br />

Many countries in Europe and worldwide have implemented certified electronic mail solutions to bring<br />

their postal system into the digital age. However, if there is to be a truly international digital postal service<br />

similar to the traditional postal service, a series of national digital postal solutions that work together is<br />

required along with the implementation of legislation both at a national and international level.<br />

This paper proposes a system that will establish posts in digital society and will also provide a holistic<br />

solution to bridging the growing digital social divide. It achieves this by allowing citizens access their<br />

electronic mail and the digital postal network at their local post office regardless of whether they have a<br />

computer at home and if necessary, with the assistance of postal staff. In this way, young, old, computer<br />

literate and computer illiterate citizens have access to the digital world through their postal system.<br />

By bringing public services into the digital world, citizens can experience the benefits of publicly inclusive<br />

services in digital form. Posts will also reap benefits in the form of increased market share and a renewal<br />

of their role in modern society. The entire community will benefit through full and safe engagement with<br />

their digital society. A solution based on the system outlined in this paper is proposed to be rolled out in<br />

Ireland over the next number of years.<br />

References<br />

Aman, A. C. (2005). Privatization, Prisons, Democracy, and Human Rights: The Need to Extend the Province of<br />

Administrative Law. Indiana Journal of Global Legal Studies (Volume 12, Issue 2), pp. 511-550.<br />

Braman, s. (2006). Change of state: Information, policy, and power. . Cambridge, MA: Massachusetts Institute of<br />

Technology Press.<br />

Carter, S. (2009, June 16). A User's Guide to Digital Britain. (A. Chitty, Interviewer)<br />

http://www.illumina.co.uk/projects/showreels.php.<br />

Chubb, P. (2010, March 4th). Mobile Social Networking Statistics: 2010 Growth. Retrieved January 13th, 2011, from<br />

http://www.onlinesocialmedia.net/20100304/mobile-social-networking-statistics-2010-growth/<br />

Cordella, A., & Willcocks, L. (2010). Outsourcing, bureaucracy and public value: Reappraising the notion of the<br />

'contract state'. Government Information Quarterly , Volume 27 (Issue 1), pages 82-88.<br />

Cullier, D., & Piotrowski, S. J. (2009). Internet information-seeking and its relation to support for access to<br />

government records. Government Information Quarterly , Volume 26, pages 441−449.<br />

De Reuck, J., & Joseph, R. (1999). Universal Service in a Participatory Democracy: A Perspective from Australia.<br />

Government Information Quarterly , Volume 16 (Issue 4), Pages 345-352.<br />

Hambleton, R. (1994). The Contract State and the Future of Public Management. The Employment Research Unit<br />

<strong>Conference</strong>. Cardiff: Cardiff Business School.<br />

Kim, K., & Prabhakar, B. (2000). INITIAL TRUST, PERCEIVED RISK, AND THE ADOPTION OF INTERNET<br />

BANKING. International <strong>Conference</strong> on Information Systems (pp. 537 - 543 ). Brisbane, Queensland, Australia :<br />

Association for Information Systems Atlanta, GA, USA .<br />

Mintzberg, H. (1996, May-June). Managing government, governing management. Harvard Business Review, , pages<br />

75−85.<br />

Mulgan, R. (2007). Truth in government and the politicization of public service advice. Public Administration , Volume<br />

85, pages 569−586.<br />

Osborne, D., & Gaebler, T. (1993). Reinventing government. How the entrepreneurial spirit is transforming the public<br />

sector. New York: Plume.<br />

Quinn, A. C. (2003). Keeping the citizenry informed: Early congressional printingand 21st century information policy.<br />

Government Information Quarterly , Volume 20, pages 281−293.<br />

Relly, J. E., & Sabharwal, M. (2009). Perceptions of transparency of government policymaking: A cross-national<br />

study. Government Information Quarterly , Volume 26, pages 148−157.<br />

Reylea, H. C. (2009). Federal freedom of information policy: Highlights of recent developments. Government<br />

Information Quarterly , Volume 26, pages 314−320.<br />

Roberts, A. (2006). Blacked out: Government secrecy in the information age. New York: Cambridge University Press.<br />

Shuler, J. A., Jaeger, P. T., & Bertot, J. C. (2010). Implications of harmonizing e-government principles and the<br />

Federal Depository Library Program (FDLP). Government Information Quarterly , Volume 27, pages 9-16.<br />

West, D. (2005). Digital Government. . Oxford: Princeton University Press.<br />

629


An Evaluation of Expression of Doubt in the context of<br />

Self-Assessment<br />

(Section 955(4) Taxes Consolidation Act 1997) – Irish Revenue Commissioners<br />

Anne Corbett and Francis Rossney<br />

Irish Revenue Commissioners, Ireland<br />

University of Limerick, Ireland<br />

ancorbet@revenue.ie<br />

frank.rossney@ul.ie<br />

Abstract:: Revenue has always been at the forefront of change in Ireland. 1988 saw a major change with the<br />

introduction of Self-Assessment for taxpayers. This brought new levels of trust and a user-friendly operation into<br />

the relationship between Revenue and taxpayer. It also brought a requirement for new levels of knowledge of the<br />

tax system by practitioners and taxpayers. Ireland is one of the few EU countries to introduce a facility whereby<br />

the taxpayer can express doubt on filing their tax return. This enables the taxpayer to file on time and remain<br />

compliant despite having a doubt about a matter in their return. The facility in Ireland is referred to as an<br />

Expression of Doubt (EOD), provided for under Section 955(4) Taxes Consolidation Act 1997. Ireland’s<br />

interactive internet-based filing system, Revenue Online Service (ROS) used by taxpayers to submit their tax<br />

returns is enhanced by the availability of this facility. A taxpayer expresses doubt by ticking a box on the tax<br />

return and providing an explanation of the doubt. Revenue then examines the doubt, and because the taxpayer<br />

has disclosed the matter, he/she will avoid interest and penalties should the doubt give rise to a liability of tax.<br />

The author, using software and discussion with practitioners and Revenue personnel, examines the EOD facility<br />

in a systematic way by asking: after many years, is it used and still valuable? Does it achieve the goal of aiding<br />

voluntary compliance? What are the doubts of taxpayers? Are there patterns to its use, and are there common<br />

issues arising?. This 2010 study looks at all Irish Income Tax and Corporation Tax returns filed for years 2007<br />

and 2008 where an EOD was indicated. Whilst some issues arise regarding the general use of the system and<br />

require to be addressed, this paper concludes that the introduction of this legislation is significant in aiding,<br />

encouraging and facilitating voluntary compliance of the taxpayer. The recommendations and conclusions draw<br />

together the data, the views of practitioners and Revenue officials in a systematic analysis of the EOD.<br />

Keywords:Self-Assessment, Voluntary Compliance, Interrogative software, Income Tax, Corporation Tax, Anti-<br />

Avoidance<br />

1. Introduction<br />

One of the most fundamental changes in Irish taxation and Revenue structures came with the<br />

introduction of Self-Assessment for Income Tax in 1988, followed by Self- Assessment for Corporation<br />

Tax. Under the Self-Assessment system, taxpayers are required to lodge a tax return containing<br />

detailed information and calculations of their taxable income. The fundamental difference between<br />

this new regime and the original system is that the onus of responsibility is now on the taxpayer to<br />

prepare an accurate return, which is normally accepted by Revenue at face value. Previously, income<br />

tax returns were examined by Revenue officials and assessments issued without input by the<br />

taxpayer.<br />

By 2008, over half of OECD member countries had evolved their systems of administration of income<br />

tax to one based on Self-Assessment principles. (OECD 2008)<br />

Acutely aware of the vital role played by practitioners and taxpayers in the success of the new regime,<br />

Irish Revenue introduced various measures to assist compliance for taxpayers and their agents. The<br />

EOD came into effect, accommodating situations where taxpayers and practitioners have a genuine<br />

doubt about the application of the law to, or the treatment for tax purposes of, any matter included in<br />

their tax return. The benefit to the taxpayer is the avoidance of interest and penalties should tax<br />

become due arising from the doubt. The surcharge applying to late filing is also avoided, as the<br />

taxpayer is deemed to have made a full and true return on time.<br />

The purpose of this study is to examine the Expressions of Doubt of Irish taxpayers for years 2007<br />

and 2008. The overall aim is to establish if the EOD facility is successful in aiding voluntary<br />

compliance and to address the question of whether or not complexity of tax legislation is the driving<br />

force for taxpayer to express doubt. The paper attempts to establish the value of the EOD facility to<br />

taxpayers: to explore areas of doubt where Revenue might focus attention: to define areas where<br />

630


Anne Corbett and Francis Rossney<br />

further support is required to maintain voluntary compliance, and to contribute to best practice in the<br />

future.<br />

2. Background<br />

Irish Revenue collects taxes and duties, which fund the provision of public services for the benefit of<br />

all citizens.<br />

Its primary goal as set out in its Statement of Strategy (Revenue 2008) is:<br />

“to ensure, as far as possible, that everyone complies with their tax and customs<br />

responsibilities – that they pay the right tax and duty at the right time and meet the<br />

obligations set out in tax and customs law”<br />

Prior to 1988, administrative assessment involved the examination of all tax returns by Revenue<br />

officials prior to issuing assessments to taxpayers. On receipt of the Inspector of Taxes’ assessment,<br />

the taxpayer would pay the tax due by certain deadlines. If in disagreement the taxpayer would<br />

appeal against it.<br />

However, this system became “bogged down in an endless paper chase of estimated assessments<br />

and appeals.” (Department of Finance 1998).<br />

The introduction of Self-Assessment for taxpayers and businesses in 1988 heralded a new regime for<br />

taxpayers, giving them greater control over their tax affairs. Arguably, imposing the Self-Assessment<br />

regime on taxpayers had the effect of forcing them to gain knowledge about tax laws, requiring them<br />

to be sufficiently familiar with tax legislation such that they complete the return correctly.<br />

For taxpayers to comply with Tax Law involves adhering to certain legislative provisions. One<br />

involves submitting the tax return providing and full and true disclosure of all material facts pertaining<br />

to the income, credits and allowances due. It is contended that the EOD aids voluntary compliance in<br />

the context of the Self-Assessment regime, in enabling taxpayers and practitioners to fulfil their filing<br />

obligations, knowing that they will not be penalised if wrong. A taxpayer expresses doubt by simply<br />

ticking a box on the tax return and/or providing an explanation of the doubt. Revenue then examines<br />

the doubt, and because the taxpayer has disclosed the matter, he/she will avoid interest and<br />

penalties, which might otherwise apply, should Revenue rule that further tax is due.<br />

During each of the years under examination, in excess of 450,000 Income Tax returns and 120,000<br />

Corporation Tax returns were submitted in Ireland. The level of EOD included in those returns was<br />

present in .5% of Income Tax and .3% of Corporation Tax returns (on average). To put these levels<br />

into context, it is useful to examine the level of exchequer receipts for the same period, amounting to<br />

in excess of 13 billion and 5 billion respectively (Tables IT2 and CT1)<br />

3. Self-Assessment- the definition<br />

There are two generally accepted systems of tax assessment applied by OECD countries –<br />

Administrative Assessment and Self-Assessment. (OECD 2008) Self-Assessment gives the taxpayer<br />

greater control and responsibility over their tax affairs, and brings with it a new level of trust in the<br />

taxpayer.<br />

The essential feature of the self-assessment system is the obligation on the taxpayer<br />

company to estimate its liability to the tax concerned and to ensure that it makes a sufficient<br />

preliminary tax payment, usually before any assessment is made by the inspector. (Feeney<br />

2010, p. 2172)<br />

The Australian Tax office introduced this regime in 1986, and noted that trust in the taxpayer is key to<br />

the system working effectively. Self-assessment is premised on a tenet of trust. There is no way we<br />

would have moved to self assessment if we did not have the conviction that returners, predominantly<br />

tax agents, could be trusted to prepare returns with a high degree of integrity. If there is no trust,<br />

there can be no self-assessment regime. (Michael D’Ascenzo, 1993)<br />

Murphy and Torgler (2004) refer to literature reviews which argue that voluntary compliance improves<br />

in those allowed to self-regulate, and contend that trust “appears to be a resource like no other: it is<br />

not depleted through use but rather through lack of use”. By 2008, over 50% of all OECD countries<br />

had abandoned the Administrative Assessment procedures, in favour of Self-Assessment on the<br />

631


Anne Corbett and Francis Rossney<br />

grounds of efficiency and effectiveness (OECD 2008). Under this system, tax is collected earlier, the<br />

number of disputed assessments is reduced as they are taxpayers’ own calculations, and verification<br />

of the returns is targeted based on risk<br />

Source Irish Revenue Commissioners<br />

3.1 The Expression of Doubt – the Legislation – Section 955 (4) TCA 97<br />

(4) (a) Where a chargeable person is in doubt as to the application of law to or the treatment<br />

for tax purposes of any matter to be contained in a return to be delivered by the chargeable<br />

person, that person may deliver the return to the best of that person’s belief as to the<br />

application of law or the treatment for tax purposes of that matter but that person shall draw<br />

the inspector’s attention to the matter in question in the return by specifying the doubt and, if<br />

that person does so, that person shall be treated as making a full and true disclosure with<br />

regard to that matter.<br />

(b) This subsection shall not apply where the inspector is, or on appeal the Appeal<br />

Commissioners are, not satisfied that the doubt was genuine and is or are of the opinion that<br />

the chargeable person was acting with a view to the evasion or avoidance of tax, and in such<br />

a case the chargeable person shall be deemed not to have made a full and true<br />

disclosure with regard to the matter in question.<br />

632


Source Irish Revenue Commissioners<br />

Anne Corbett and Francis Rossney<br />

4. Tax Compliance and the Complexity of Tax Laws<br />

The primary focus of tax administrations is to ensure compliance with tax laws. Compliance is the<br />

willingness of taxpayers to fulfil their tax obligations to register, file and pay. It is generally believed<br />

that there is huge complexity in Tax Law.<br />

As Braithwaite (2007) observes “most people do not have much understanding of what tax laws<br />

mean”.<br />

Davies et al. (2001) citing William Stromsem, AICPA tax director, believes that in attempting to make<br />

tax treatment fair for all taxpayers, the effect is to further complicate the legislation.<br />

“simplicity and fairness are tradeoffs. The fairer you make the tax code the more<br />

complex it becomes. The simpler you make the tax code, the rougher the justice”.<br />

Martindale et al. (1992) commenting on the complexity of the US tax Laws, contends that it is feasible<br />

to improve the readability of Tax laws by removing the complexity of the text. Citing Duffy and<br />

Kabance (1982) the most important criteria in the usability of text is comprehensibility. The two<br />

factors affecting the latter are the complexity of both the content and text. It is their contention that<br />

President Reagan, during his term of office, criticised the fact that the Income Tax laws were too<br />

complicated, resulting in the IRS revising their schedules and regulations in an effort to improve<br />

readability.<br />

Doyle et al. (2008 p. 177) contributing to the debate on ethics in tax practice suggests that tax<br />

complexity has led to a change in the role of general practitioner.<br />

Tax, once the remit of the ‘general practitioner’ accountant and considered an offshoot of<br />

accounting has grown in complexity and importance and has become a distinct and highly<br />

specialised profession in itself.<br />

Is the Expression of Doubt the necessary counterbalance?<br />

633


5. Methodology of the Study<br />

Anne Corbett and Francis Rossney<br />

Data was extracted from the Central Revenue Database, interrogated and analysed using a software<br />

tool. This data includes information from tax returns filed on Revenue Online Service together with<br />

paper returns filed. The latter are input manually to Revenue’s database. Following export of the data<br />

to Microsoft Excel, it was imported to the software tool IDEA. This tool was used to analyse,<br />

interrogate and where possible aggregate the data over various categorisations. The extent of the use<br />

of the EOD, the submissions by district, region, industry type, practitioner and size of business was<br />

analysed for any trends or patterns. The profile of the submitter and the general nature of issues<br />

arising were established. An initial examination of sample data revealed a mismatch, due to the<br />

number of taxpayers who tick the box without providing narrative (or where no narrative is available),<br />

and others providing narrative who fail to tick the box. The selection criterion therefore involved<br />

extracting details for those taxpayers who ticked the box as appropriate and/or where only the<br />

narrative field was populated. This data formed the basis of the analysis. Data was examined for the<br />

whole country to obtain the complete perspective. This is facilitated with the use of area codes for<br />

each taxpayer. Industry type was facilitated by the NACE code. Views of tax practitioners, revenue<br />

personnel were sought and other EU administrations were requested to confirm the availability of<br />

such facility in their administrations, to complete the study.<br />

5.1 Revenue Online Service (ROS)<br />

The ROS is regarded as the flagship of e-Government services in Ireland. ROS is a self-service<br />

process, removing the requirement for the taxpayer or practitioner to make direct contact with<br />

Revenue when filing the tax return. Mandatory electronic payments and filing using ROS is part of<br />

Revenue’s strategy to establish the use of electronic channels as the normal way of conducting tax<br />

business, with mandatory electronic filing for many categories of taxpayer from 1 st June 2011.<br />

5.2 The Software<br />

The file interrogation software used for this study was Interactive Data Extraction & Analysis (IDEA).<br />

IDEA is a computer-based file interrogation tool for use by auditors, accountants, investigators, and IT<br />

staff. It analyses data in many ways and allows extraction, sampling, and manipulation of data in<br />

order to identify errors, problems, specific issues, and trends. It is capable of performing analyses,<br />

checking calculations, cross matching data between systems, testing for gaps and duplicates and<br />

sampling.<br />

5.3 The Data<br />

Full data on EOD was received for years 2007 and 2008. This included:<br />

o Business description<br />

o Nature of Doubt<br />

o Level of turnover<br />

o Types of income involved<br />

o Capital allowances and deductions claimed<br />

o Tax district dealing with the individual and business taxpayer<br />

o Tax region<br />

The data which was evaluated for this work was extracted from the Central Register, where each<br />

individual taxpayer or taxpayer company has a unique identification number or personal public service<br />

number (PPS) and the full gamut of data returned on their tax returns, including address, nature and<br />

size of business, local inspector of taxes, and NACE code. In addition to the use of this software,<br />

manual sampling was carried out, although the sheer volume of data could not be checked in its<br />

entirety by manual sampling.<br />

5.4 NACE codes<br />

NACE codes are of primary importance in producing statistical analysis for Revenue reports. NACE<br />

code classifications in tax records are compiled by reference to the primary area of economic activity<br />

reported by individual and corporate taxpayers on their own behalf.<br />

The maintenance of accurate NACE codes contributes to the effectiveness of Revenue’s system<br />

analysis tools, such as the risk ranking tool, REAP, and in the selection of cases by sector through<br />

various other systems.<br />

634


Anne Corbett and Francis Rossney<br />

Charts in this study are dependent on the accuracy of the NACE codes on our records.<br />

6. Data Analysis and Discussion<br />

(a) Volumes of EODs<br />

EODs represent 0.55% or less of all returns (Table 3)<br />

Table 3: Expression of Doubt as Percentage of Tax Returns Filed<br />

2007 Income Tax Corporation Tax<br />

Number of returns filed 466,692 126,698<br />

No. of Expressions of Doubt 2,549 451<br />

% of Returns with EOD 0.55% 0.36%<br />

2008 Income Tax Corporation Tax<br />

Number of returns filed 493,306 139,546<br />

No of Expressions of Doubt 2546 374<br />

% of Returns with EOD 0.52% 0.27%<br />

(b) Geographical Spread across Regions<br />

The regional distribution is examined. As can be seen below, the figures are consistent between the<br />

two years for Income Tax (Figure 1).<br />

Figure 1: Expressions of Doubt – Income Tax - Comparison by Region 2007/2008<br />

The spread of Corporation Tax doubts over the regions was inconsistent, with Large Cases Division<br />

seeing a sharp rise in cases in 2008 (Figure 2).<br />

635


Anne Corbett and Francis Rossney<br />

Figure 2: Expressions of Doubt - Corporation Tax – Comparison by Region 2007/2008<br />

(c) District Analysis<br />

Dunlaoghaire/Rathdown district receives the most Income Tax (IT) expressions of doubt, followed by<br />

Fingal district. A sharp rise in Galway’s figures in 2008 draws attention, together with smaller rises in<br />

Kildare and Meath. Interestingly, the figures are fairly standard year on year. Figure 3 provides a<br />

visual comparison.<br />

Figure 3: Expressions of Doubt – Income Tax – Comparison by District<br />

The corporation tax graph in figure 4 shows a completely different trend. Galway, Westmeath/Offaly,<br />

Cavan/Monaghan, Kildare and Cork South West had a much larger volume of doubts in 2007 than in<br />

2008. This may be due to duplication of the same doubt across a number of taxpayers, but requires<br />

further examination. A sharp rise in 2008 is noted in Large Cases Financial Services and<br />

636


Anne Corbett and Francis Rossney<br />

Construction/Property/Mining areas. This is in line with information provided by tax practitioners, as<br />

will be seen later in the study.<br />

Figure 4: Expressions of Doubt – Corporation Tax – Comparison by District 2007/2008<br />

(d) Nature of Business<br />

To establish the trend in business types indicating doubts, the data was interrogated for percentages<br />

across business descriptions. As can be seen from Figure 5, for Income Tax, individuals involved in<br />

rental and property submitted the most doubts. Significant numbers came from PAYE workers and<br />

various types of farming business.<br />

Figure 5: Expressions of Doubt – Income Tax – by Business Description 2008<br />

Businesses submitting doubts for Corporation Tax show a different trend. The Financial Services<br />

sector is the highest submitter of Expressions of Doubt followed by brokers, retailers, property<br />

development, investment holding companies and construction. See figure 6.<br />

637


Anne Corbett and Francis Rossney<br />

Figure 6: Expressions of Doubt – Corporation Tax – by Business Description 2008<br />

(e) How valid are the Expressions of Doubt?<br />

A manual exercise on 300 individuals’ ROS returns sought to establish if they could be regarded as<br />

valid doubts as opposed to informational. This was based on a general belief within Revenue from<br />

those officers working them that there are a considerable number of informational items included as<br />

expressions of doubt. Each “doubt” was examined separately and categorised. A limitation should be<br />

noted here as only one auditor carried out the sampling. A random sample of Income Tax 2008 cases<br />

was used and a common-sense approach to analyse them. They were divided into four categories as<br />

follows:<br />

1.EOD – not completed by taxpayer or just no details available<br />

2.Informational items only<br />

3.Some degree of complexity, but not regarded as technical<br />

4.Could be regarded as technical and complex.<br />

Table 4: Sample Level of Complexity noted in examination of 300 Income Tax returns for 2008<br />

Level of Complexity Number of Cases % of Total<br />

1 38 13%<br />

2 128 43%<br />

3 77 26%<br />

4 57 19%<br />

(f) Nature of issues arising for Income Tax<br />

The data was examined for types of issues giving rise to the doubts. Certain key broad words were<br />

used to make extractions from the data in an effort to find common issues. Table 5 tabulates the most<br />

common issues noted for Income Tax.<br />

Table 5: Sample of Expressions of Doubt received for Income Tax 2008<br />

Income Tax 2008 – Type of Doubt No. of Cases % of Total Doubts<br />

Rental Income 212 8.32%<br />

Interest 85 3.33%<br />

Losses 69 2.71%<br />

Partnerships 61 2.39%<br />

Capital Allowances 58 2.27%<br />

Medical Expenses 56 2.19%<br />

Farming 47 1.84%<br />

Retirement 35 1.37%<br />

Total 623 24.46%<br />

638


(g) Tax Practitioners/Agents<br />

Anne Corbett and Francis Rossney<br />

The level of EOD, which included an agent name, was established (Table 6). It does not suggest that<br />

all others were submitted by individuals privately. It may be that the agent omitted to provide details<br />

or that details are not available.<br />

Table 6: EOD Returns Showing Agent for IT and CT 2007 and 2008<br />

Year Income Tax Corporation Tax<br />

2007 35% 90%<br />

2008 30% 96%<br />

However, 47 cases, which were remitted for Corporation Tax without an agent, were examined to see<br />

if they had an agent per Revenue’s records. 80% of them did not.<br />

6.1 Tax Practitioners’ Views<br />

Interviews were held with three of the ‘big four’ tax practitioner firms in Ireland, as well as a<br />

representative from one of the Accountancy Bodies. The questions were designed primarily to<br />

establish the value of the EOD to their clients, the level of interaction arising with Revenue regarding<br />

the issues involved and the outcomes.<br />

Contributor’s confidentiality and ethical considerations have been fully complied with.<br />

The findings proved interesting. Satisfaction with the EOD facility was high. The attitude of tax<br />

practitioners was very favourable toward the EOD, and confirmation was received in all discussions<br />

that it provides comfort to taxpayers and practitioners and helps them meet the filing deadlines. Some<br />

issues arose on both sides, with timing of responses to doubts by Revenue being considered too<br />

long. Practitioners rarely pursued a response from Revenue, considering it not to be in their client's<br />

best interest since the tax has generally not been paid. The taxpayer is not always looking for an<br />

answer to the doubt. They are merely using the Legislation provided and believe it is Revenue’s<br />

responsibility to pursue the matter if they wish. Some practitioners will not express doubt, fearing loss<br />

of face with a client. Agents would like a timeframe from Revenue, which will allow the matter to<br />

“wither on the vine.<br />

Some of the issues giving rise to EOD according to practitioners were as follows:<br />

o Financial Services sector – types of income and other issues<br />

o Whether 12.5% or 25% applies to various income streams<br />

o Capital versus Revenue items<br />

o Interest on borrowings to fund dividends<br />

o Land dealing – trade or non trade<br />

o <strong>European</strong> Law issues.<br />

6.2 Tax Officials’ Approach and Views<br />

30 Revenue districts spread throughout the country were contacted for their views. The response rate<br />

was 60%.<br />

Large Cases Division has responsibility for businesses with tax payments in excess of 16 million<br />

annually. The EOD on the annual tax return for these taxpayer individuals and businesses is<br />

reserved for very complex situations. This is due to the fact that LCD engages in a process called Cooperative<br />

Compliance, in which a relationship is built between taxpayer and a Revenue official<br />

assigned to the case. A significant number of queries raised by taxpayers during the course of the<br />

year, are dealt with eliminating in some instances the requirement for an EOD. All EODs of these<br />

taxpayers are referred to Revenue Legislation Section (RLS) for consultation. A number of cases<br />

where an EOD was received have been challenged by Revenue and have been appealed. Due to<br />

taxpayer confidentiality rights, details cannot be provided. Cases, which were settled in Revenue’s<br />

favour did not attract interest or penalties, in accordance with Legislation. Due to complexity of issues<br />

the timeframe can span 2-3 years in having the matter settled.<br />

639


Anne Corbett and Francis Rossney<br />

Districts outside of LCD provided a different experience. Here, turnover and levels of tax are on a<br />

smaller scale. All officers interviewed in these customer service areas considered that between 50%<br />

and 90% of EOD could not be regarded as being in the spirit of the Legislation, by their interpretation,<br />

with many being merely informational. Tax in dispute is usually small, with a mere 2 out of 10 EOD<br />

relating to complex issues. The timeframe for dealing with them ranged from 10 days to 6 months.<br />

Very little abuse of the system was noted.<br />

6.3 Intra-<strong>European</strong> Organisation of Tax Administrations (IOTA)<br />

To obtain an international perspective, the IOTA facility (an enquiry service for member tax<br />

administrations) was used to establish whether similar facilities are available to taxpayers in other<br />

jurisdictions.<br />

Of those countries providing a response, two countries were identified as having a similar facility.<br />

Table 7: EU Countries - Expressions of Doubt Responses<br />

Country responding Yes No Country responding Yes No<br />

The Netherlands X Azerbaijan X<br />

Austria X Belarusian X<br />

Luxembourg X Estonia X<br />

Belgium X Finland X<br />

Bulgaria X Hungary X<br />

Denmark X Moldova X<br />

Cyprus X Norway X<br />

Portugal X Poland X<br />

Spain X Serbia X<br />

Czech Republic X Sweden X<br />

France X Slovenia X<br />

UK X Slovakia X<br />

France has indicated that it has an EOD facility. The procedure is named “rescrit fiscal”. This allows<br />

taxpayers to ask the Administration for the interpretation of legal conditions (Articles L. 80-A and L 80-<br />

B of “Livre des procedures fiscales”). In this case, penalties cannot be applied under special<br />

conditions listed in the articles L.80-A and L80-B of “Livre des procedures fiscales”. The legislation<br />

about the expression of doubt is:<br />

>Mention express: article 1727 –ll 0 2e du Code general des impost:<br />

>Rescrit fiscal : l. 80-a ET l.80-b DUE Livre des procedures fiscales.<br />

It is not clear whether this facility compares with the EOD or has properties similar to the Advance<br />

Private Rulings. The difference between the EOD and the Advance Ruling is that the transaction<br />

giving rise to the doubt has been completed, whereas the Advance Ruling must be applied for, in<br />

advance of the transaction taking place.<br />

6.4 Advance Private Rulings<br />

The purpose of the advance tax ruling service is also to promote voluntary compliance. However, it is<br />

not the same as the Expression of Doubt. In line with many EU and non-EU countries, Ireland<br />

provides the facility to make an advance private ruling. Application is limited and can be made to the<br />

Revenue Technical Service where strict guidelines apply. The matter must be complex, clarification<br />

not already in the public domain, and detailed research carried out prior to submission. There is no<br />

charge.<br />

Poland, Germany, Australia, New Zealand and South Africa also provide advance tax rulings at the<br />

request of the taxpayer. In some instances the applicant is required to make a full disclosure of all<br />

relevant facts and intentions and to set out his/her own legal analysis in their application. The<br />

applicant must conclude with their view of the law, and usually the matter relates to specific schemes<br />

or circumstances in respect of transaction not yet implemented by the taxpayer.<br />

The IRS has private letter rulings, issued by their national office to the taxpayer, interpreting and<br />

applying the tax laws to a specific set of facts. The IRS charges fees for ruling, opinion letters, and<br />

similar requests.<br />

Fees are also charged by Canada’s Revenue Agency, (CRA) who issue advance income tax rulings<br />

indicating how the CRA will interpret and apply specific provisions to a definite transaction, which the<br />

640


Anne Corbett and Francis Rossney<br />

taxpayer is contemplating. The provision of advance income tax rulings is an administrative service<br />

and there is no legal requirement to issue them.<br />

7. Recommendations<br />

Recommendations based on the data findings and interviews with key personnel within Revenue and<br />

practitioners are as follows:<br />

• The use of the software tool used in this paper is highly recommended, to filter expressions of<br />

doubt received by Revenue. This is capable of highlighting key areas of difficulty, following<br />

trends and picking up fluctuation across districts, noting sharp increases or decreases in<br />

sectors, on which they could focus attention. Duplication of the same doubt amongst groups,<br />

for example, partnerships, can be located and perhaps the response from Revenue<br />

streamlined. It many be possible to detect incidences of anti-avoidance.<br />

• A drop down menu on the tax return should be provided. This would allow the taxpayer to<br />

select the reason most appropriate to their doubt. Using a key word, the taxpayer would then<br />

be guided to an area on the website which corresponds with the item selected, enabling them<br />

to check the matter to find the answer. This would reduce Revenue staff time in dealing with<br />

items for which the information is already available.<br />

• Specific legislation causing difficulty could also be highlighted, and estimate of tax at issue be<br />

provided. Where multiples of cases have the same difficulty responses could be streamlined<br />

by Revenue, or global guidelines issued to clarify.<br />

• New guidelines should be given to Revenue staff regarding the urgency of dealing with valid<br />

Expressions of Doubt, to ensure that, in the event that Revenue requires to tax the matter,<br />

interest is not lost.<br />

• Genuine expressions of doubt should receive priority treatment, to avoid loss of interest to<br />

Revenue in the event that tax is due, and to allow practitioners to close off their books for the<br />

accounts year when the matter is resolved.<br />

The EOD facility has real potential, and requires rejuvenation. In the early years after 1988 Revenue<br />

issued regular notices to taxpayers and practitioners regarding its correct use, and what to expect<br />

from Revenue in response. Literature relating to it is now outdated and needs immediate refreshing,<br />

for taxpayers, practitioners and Revenue personnel. There should be a re-launch of the service.<br />

8. Conclusion<br />

This study examined the value of the EOD facility. The research confirms the belief that it provides<br />

comfort for practitioners and their clients enabling them to file on time, therefore aiding voluntary<br />

compliance. It provides certainty that they will not be pursued for interest and penalties in the event<br />

that the treatment of a matter included in the return is incorrect. There is considerable value to<br />

Revenue also, as it fosters the desire by the taxpayer to remain compliant.<br />

However, there is strong evidence to suggest that full value is not being received from it. The findings<br />

relating to years 2007 and 2008 raised concerns over the high level of expressions of doubt received<br />

that were informational only. In some instances no response was required from Revenue, and this<br />

could not be regarded as being in the spirit of the Legislation.<br />

Complexity of the law is not the main driving force for most of the doubts. However, it clearly exists<br />

for some.<br />

The danger of interest being lost for Revenue in situations where the expression of doubt is not<br />

resolved quickly, needs to be balanced with the benefits gained from encouraging and facilitating<br />

voluntary compliance.<br />

Following a thorough review of the internal process and a re-launch of the service, taxpayers and<br />

Revenue should, in a combined effort, enable the EOD to reach its full potential.<br />

References<br />

Braithwaite,V. (2007) Responsive Regulation and Taxation: Introduction. Law & Policy [serial online]. January<br />

2007;29(1):3-10. Available from:<strong>Academic</strong> Search Complete, Ipswich, MA. [Accessed August 8,2010]<br />

Davies, Thomas, Carpenter, Jon, Inverson, Gene. (2001) Issues in Federal IncomeTax Complexity. South<br />

Dakota Business Review, 00383260, Mar 2001, Vol. 59, Issue 3 Database: Regional Business News<br />

http://web.ebscohost.com.proxy.lib.ul.ie [Accessed 14th September 2010 at 3p.m.]<br />

641


Anne Corbett and Francis Rossney<br />

D’Ascenzo, M. (1993) Assistant Commissioner : Speech to the ASCPA, 13 February 1992.<br />

http://www.ato.gov.au/individuals/PrintFriendly.aspx?ms=individuals&doc=/content/74841.htm&p<br />

age=1<br />

Doyle, E., Frecknall Hughes, J., Glaister, K. (2008) ‘Linking Ethics and Risk Management in Taxation: Evidence<br />

from an Exploratory Study in Ireland and the UK’, Journal of Business Ethics, 86:177-198.<br />

Feeney, M. (2010) The Taxation of Companies 2010 Chapter15, 14 th Edition. Bloomsbury Professional 2010,<br />

West Sussex. ISBN 978 1 84766 384 9.<br />

Ireland, Department of Finance (1998) Self Assessment, [online], Available: http://www.finance.gov.ie [5 July<br />

2010]<br />

Ireland, Revenue Commissioners (2008) Revenue Statement of Strategy 2008- 2010<br />

http://www.revenue.ie/en/about/publications/statement/sos08-10/mission_and_goals.html<br />

[accessed on 06/08/2010].<br />

Martindale, B., Koch, B., Karlinsky, S. (1992) “Journal of Business Communication”<br />

Oct92, Vol. 29 Issue 4, p383-400, 18p, 5 Charts http://web.ebscohost.com.proxy.lib.ul.ie [accessed 14 th Sept.<br />

2010 @12.50pm]<br />

Murphy, K., Torgler, Benno. (2004) “Tax Morale in Australia” [2004] JIA Tax 9; (2004) 7(2) Journal of Australian<br />

Taxation 298 http://www.austlii.edu.au/cgibin/sinodisp/au/journals/JlATax/2004/9.html?stem=0&synonyms=0&query=torgler,benno:%20murphy%20kri<br />

stina<br />

OECD (2006) Information Note Strengthening Tax Audit Capabilities: General Principal and Approaches. Forum<br />

on Tax Administration: Compliance Sub Group. Centre for Taxation Policy and Administration, OECD<br />

publication. http://www.oecd.org/dataoecd/46/18/37589900.pdf<br />

OECD (2008) Tax Administration in OECD and Selected Non-OECD Countries: Comparative Information Series<br />

(2008.) Forum on Tax Administration. Centre for Tax Policy and Administration, OECD publication.<br />

http://www.oecd.org/dataoecd/57/23/42012907.pdf<br />

Taxes Consolidation Act 1997 (2009) Irish Taxation Institute, Direct Tax Acts 12 th Edition, edited by Tom<br />

Maguire. Published by Irish Taxation Institute, Ireland<br />

1642


Moving Fast Forward to National Data Standardization<br />

Asanee Kawtrakul 1 , Intiraporn Mulasastra 1 , Tawa Khampachua 2 and Somchoke<br />

Ruengittinun 1<br />

1 Kasetsart University, Bangkok, Thailand<br />

2 King Mongkut’s University of Technology North Bangkok, Bangkok, Thailand<br />

asanee_naist@yahoo.com<br />

int@ku.ac.th<br />

khampachua.tawa@gmail.com<br />

somchoke.r@gmail.com<br />

Abstract: Since 2007, the Ministry of Information and Communication Technology has been developing the Thailand<br />

eGovernment Interoperability Framework (TH e-GIF) as guidelines for transformation to a connected government.<br />

However, the transformation has been slow for four main reasons: lack of national data standards, lack of best<br />

practices to follow, no clear guidelines for how to start the project, and absence of a proactive mindset. This work<br />

focuses on building national data standards to support government data interchange and data integration. We begin<br />

to establish the footprint for data standardization by producing a manual containing implementation guidelines and<br />

developing the roadmap for national data standard initiatives. These initiatives, we hope, will be implemented over a<br />

five year period, from 2011 to 2015. By conducting an eSurvey of government information systems, the data<br />

landscapes and information logistics were developed. Then, information exchange domains were outlined based on<br />

task-oriented and organizational ontology. In addition, several workshops and seminars were conducted for both<br />

executive and operational officials from several public agencies. As a result, fifteen information exchange models<br />

were constructed; three of them were selected for study in detail to help create data standardization guidelines. The<br />

survey, workshops, and seminars, along with a study of national strategic plans, enabled us to come up with the data<br />

standardization roadmap that consists of three main activities: national data standard building, research and<br />

development to support standardization mechanisms, and government personnel preparation. Based on this<br />

roadmap, the creation of national data standards can be pursued in a strategic manner, strengthening the<br />

government transformation to be completely eGovernment as well as to become connected government.<br />

Keywords:, data standardization, eGovernment, data landscape, information logistic, ontology based information<br />

exchange, domain classification<br />

1. Introduction<br />

The performance of government leaders is increasingly being measured by the benefits they can create<br />

for their citizens, communities, and the private sector. These clients of government demand greater<br />

efficiency, proper accountability and public trust, and a renewed focus on delivering better services and<br />

results. Examples of service improvements needed are how to speed up payment of promised<br />

compensation to flood-effected households, how to reduce waiting time and cost in referring patients from<br />

one hospital to another, or how to provide a one-stop service to enable searching and viewing all data<br />

pertinent to an individual citizen, such as records of birth, study, employment, sickness, and death.<br />

In Thailand, almost all government agencies are actively grooming their organization to incorporate<br />

eGovernment to provide better services. However, the processes have been individually designed and<br />

developed by data owners or by software developers, which has resulted in a wide variety of nonstandard<br />

data formats and data collection procedures. Starting in 2007, the Ministry of Information and<br />

Communication Technology has developed the Thailand eGovernment Interoperability Framework (TH e-<br />

GIF) as guidelines for transformation to connected government. Two main phases of TH e-GIF, TH e-GIF<br />

1.1 and TH e-GIF 2.0 are put forth as recommendations and guidelines for eGovernment interoperability<br />

implementation. The recommendations are related to data harmonization, data interoperability standards,<br />

technical interoperability standards, eGovernment project development, etc. Some pilot projects have<br />

been implemented. However, the transformation has been slow for four main reasons: lack of national<br />

data standards, no best practices to follow, lack of clear guidelines for how to start the project, and<br />

absence of a proactive mindset.<br />

In order to reduce the gaps between TH e-GIF and the eGovernment project implementation, some key<br />

challenges should be addressed (Dada,2006):<br />

The ability of government organizations to interchange and integrate information using common data<br />

standards,<br />

Creating success cases for sharing and reusing best practices,<br />

643


Asanee Kawtrakul et al.<br />

Strategies and policies to support transformation to a connected government.<br />

This work, then, focuses on building the national data standards to support government data sharing. We<br />

start to establish the footprint for data standardization by constructing a manual containing<br />

implementation guidelines and developing a roadmap for national data standard initiatives. By conducting<br />

an eSurvey of government information systems, the data landscapes and information logistics were<br />

defined. Then, information exchange domains are outlined based on a task-oriented and organizational<br />

ontology. In addition, several workshops and seminars were conducted for both executives and<br />

operational officials from several public agencies. Fifteen information exchange models were created<br />

during the workshops for initiating and prioritizing success cases; three of them were selected to study in<br />

detail to help create data standardization guidelines with concrete examples.<br />

The survey, workshops, and seminars, along with a study of the national strategic plan, enabled us to<br />

come up with a data standardization roadmap that consists of three main activities for supporting<br />

connected government activities: national data standard building with a universal core set, research and<br />

development to support standardization mechanisms, and government personnel preparation. In the<br />

future, based on the roadmap, the creation of national data standards will be promoted in a strategic<br />

manner, strengthening government transformation to be completely eGovernment as well as to become a<br />

connected government.<br />

In section 2, the backgroud of TH e-GIF development is given, the problems of transformation and<br />

implementation of the eGovernment pilot projects are described in section three. A holistic view of<br />

ongoing efforts to develop national standards and roadmap is described in sections 4 and 5. The final<br />

section presents observations and recommendations for future work.<br />

2. Background and related work<br />

In order to achieve the targets of a one-stop service: providing seamless data integration, and quality and<br />

cost effective service delivery, the Thailand eGovernment Interoperability Framework (TH e-GIF) was<br />

developed under the auspices of the Ministry of Information and Communication Technology. TH e-GIF<br />

1.1 and TH e-GIF 2.0 are put forth as recommendations and guidelines for eGovernment interoperability<br />

implementation.<br />

TH e-GIF version 1.1 (Ministry of Information and Communication Technology, 2009) provides six<br />

recommended guidelines for eGovernment interoperability implementation, as follows:<br />

Policies and guidelines for government data integration<br />

eGovernment interoperability benchmarking<br />

Business process modeling<br />

Business information modeling with XML Naming and Design Rules<br />

Interoperabilty technical standards that allow data, IT systems, business processes, and delivery<br />

channels to interoperate such that services can be properly integrated<br />

TH e-GIF change management and compliance.<br />

Many public agencies have been implementing e-Document for back office functions and some<br />

integrated service applications, such as e-Tax and e-Procurement, under TH e-GIF 1.1 guidelines.<br />

TH e-GIF 2.0 provides more details for how to develop interoperability projects with one pilot project, and<br />

indicates success criteria with evaluation methods. A one-stop driver licensing service has been<br />

implemented as a proof of concept pilot project.<br />

However, in practice, public-agencies need a footprint to start up information exchange projects,<br />

especially the process of data standardization with the seed of existing national data standards. National<br />

data standards can provide not only common syntactic but also semantic understanding of data among<br />

government agencies. Without national data standards, government agencies are unable to share<br />

information in a timely and effectively manner; data conversion or data mapping tools are needed to<br />

facilitate information exchange.<br />

644


Asanee Kawtrakul et al.<br />

According to NIEM (2007), data standards are classified into three categories: universal core data,<br />

common core data, domain specific core data (see Figure 1).<br />

Universal data standard is defined for data that is commonly shared and understood among all<br />

domains, e.g., person, address.<br />

Domain-specific data standards are defined for each specific domain.<br />

Common core data standard is defined for use in two or more domains.<br />

Universal<br />

Core<br />

Domain B<br />

Domain C<br />

Domain<br />

Specific<br />

Common<br />

Core<br />

Domain A<br />

Figure 1: Domain data core concept (NIEM,2007)<br />

There are three main types of data that should be standardized for information sharing: data component,<br />

code list, and electronic document.<br />

A data component describes a concept by giving its name and details (attribute names). For<br />

example, a person is a data component describing an individual person by attributes such as the<br />

person’s name, date of birth, sex, race, and ethnicity.<br />

A code list is a list of codes and descriptions representing objects in the same set such as currency<br />

codes (ISO-4217) and country codes (ISO-3166-1) defined by ISO (in Charalabidis et al. 2008:42).<br />

An electronic document for interchange among government agencies compose of data extracted<br />

from their internal databases. It is essential that the data contained in each document conform to<br />

existing data standards. A commonly used document can be registered as a standardized document<br />

for reuse or restructuring to create new related documents.<br />

The universal data standards can be applied directly or can be reused and extended to create domain<br />

specific or common core data standards as shown by example in Figure 2. This reuse makes common<br />

data in many domains effectively interoperable since data have the same core attributes.<br />

FirstName<br />

U: Person<br />

LastName<br />

Gender<br />

BirthDate<br />

U: Person<br />

Figure 2: Example of universal core data reuse (NIEM, 2007)<br />

645<br />

Edu: Student<br />

EntryYear<br />

EducationField


Asanee Kawtrakul et al.<br />

To become a universal data standard, consensus by all domains is needed on the semantics and<br />

structure of the data (NIEM, 2007). An example of a universal address component defined by UK e-GIF<br />

(2010) is shown in Table 1.<br />

Table 1: UK e-GIF universal address (UK-eGIF, 2010)<br />

BS7666 Address Component Cardinality<br />

Basic land and Property Unit 0-1<br />

Primary Addressable Object Name 1<br />

Secondary Addressable Object Name 0-1<br />

Unique Property Reference Number 0-1<br />

Street Descriptive Identifier Structure 0-1<br />

Unique Street Reference Number 0-1<br />

Postcode 0-1<br />

Note: details of each component are given on the UK e-GIF website (UK-eGIF, 2010)<br />

Figure 3 illustrates the relationships between each type of data standard where the innermost, universal<br />

core set, is necessarily defined first as core data standard for reuse in defining domain specific or<br />

common core sets. For example, a person data component could be reused to create new kinds of<br />

people components such as student, farmer, and patient. Compliance with the universal data standard<br />

enables people data in all domains effectively interoperable. Based on the data standards, electronic<br />

documents can be designed for exchange among government agencies.<br />

Birth Birth Certificate Certificate<br />

XML XML Schemas Schemas for for Documents<br />

Documents<br />

Student,<br />

Student,<br />

Soldier<br />

Soldier<br />

Farmer<br />

Farmer<br />

Tax Tax Payer<br />

Payer<br />

ID ID Card<br />

Card<br />

Domain Domain specific specific Core Core Set, Set, Common Common Core Core Set<br />

Set<br />

Citizen Citizen<br />

Farmer Farmer Address<br />

Address<br />

VISA VISA Document Document<br />

Farmer Farmer Record<br />

Record<br />

Tax Tax Clearance Clearance Criminal Criminal Record<br />

Record<br />

Universal Universal Core Core Set<br />

Set<br />

Person Person Address<br />

Address<br />

Document Document Organization<br />

Organization<br />

Period Period Payment<br />

Payment<br />

Patient Patient Transferred Transferred Record<br />

Record<br />

Code Code List: List: country code list, province code list, unit code list, currency Code,…<br />

Figure 3: Basic data modeling concepts and their relations (modified from Charalabidis et al, 2008)<br />

TH e-GIF 2.0 recommends using the Core Component Technical Specification developed by<br />

UN/CEFACT (United Nations Centre for Trade Facilitation and Electronic Business) for electronic<br />

document data modeling, XML Naming and Design Rules (UN/CEFACT), and existing international data<br />

standards. However, there are many different international data standards which make it difficult for<br />

public organizations to follow this guideline. Moreover, the international standards may not be applicable<br />

in every case, for example, the address component of each country has both schematic and semantic<br />

differences. In Thailand, there exist data standards, most are code list types, used in some government<br />

agencies but they have not been declared as national data standards yet. In addition, there is some<br />

redundancy in data standards by different government agencies.<br />

3. A holistic framework for eGovernment interoperability implementation<br />

As mentioned in section 2, the universal data core set is crucial for data integration and service<br />

interoperability. In order to achieve the goal of both vertical integration (between tiers of public<br />

administration either for a single function or for a number of functions) and horizontal integration (across<br />

boundaries of functions, organizations, or nations) (United Nations, 2008), every domain should create its<br />

domain specific core set; related domains need to collaborate to define common core data sets. Every<br />

public organization should be motivated and educated to realize the necessity of data standardization so<br />

646


Asanee Kawtrakul et al.<br />

as to collaborate on data standard development. To accomplish those goals, skills, culture, politics, and<br />

mindsets of public officials with a holistic framework should be considered (Archmann and Kudlacek,<br />

2008; Gottschalk and Solli-Saether, 2009).<br />

To facilitate the national standardization, including building the universal data core set, common core<br />

sets, and domain specific core sets, we conducted an eSurvey, several workshops, and seminars for<br />

government agencies. As a result, a Strength-Weakness-Opportunity-Threat analysis of Thailand<br />

eGovernment Interoperability Implementation was developed as summarized in Table 2.<br />

Table 2: SWOT analysis of Thai eGovernment<br />

STRENGTH<br />

Drivers from top-down: trust, political and legal<br />

pressures as lubricants facilitating eGovernment<br />

projects.<br />

Active government agencies on transformation to<br />

eGovernment<br />

Government budget for enhancing network infrastructure<br />

OPPORTUNITY<br />

Increase of service innovation delivery<br />

Improvement of Thailand's competitiveness<br />

Equity and accessibility of rural public services<br />

Greater efficiency, transparency, and cost reduction in<br />

delivering services.<br />

WEAKNESS<br />

Lack of national data standards and standard<br />

governance body<br />

Lack of awareness about the necessity for data<br />

integration.<br />

Lack of clear understanding about common processes<br />

across all involved stakeholders.<br />

Lack of best practices and knowledge sharing in<br />

implementation<br />

Lack of data quality and data collection resources<br />

Lack of laws and regulations in data sharing<br />

Insufficient IT personnel in government sector<br />

THREAT<br />

Frequent change of political agenda<br />

Data ownership mindset problems<br />

No clear rules about financial support and hosting for<br />

cross-ministry projects.<br />

Effects of frequent political change on sustainable and<br />

continuous project implementation<br />

No clear direction and support to motivate government<br />

agencies to participate in information exchange projects<br />

(across organizations)<br />

Using SWOT analysis, this work focuses on building the national data standards in support of<br />

government data interchange and data integration. We begin to establish a footprint for data<br />

standardization by producing a manual containing implementation guidelines and developing the<br />

roadmap for national data standard initiatives partly based on the results of the SWOT analysis.<br />

4. A practice in data standardization footprint establishment<br />

To establish national data standardization, it is important to consider the re-engineering of processes,<br />

tools and technologies, skills, and the mindsets of public officials within a holistic framework. In order to<br />

accelerate connected government transformation, the footprint for data standardization has been<br />

recommended.<br />

4.1 Processes<br />

Figure 4 describes the process to establish the footprint for data standardization resulting in a manual of<br />

implementation guidelines and a roadmap for national data standard initiatives. Based on the eSurvey of<br />

government information systems, data landscapes and information logistics were defined. Then,<br />

information exchange domains are outlined based on a task-oriented and organizational ontology. In<br />

addition, several workshops and seminars were conducted for both the executive and operational officials<br />

from government agencies. As a result, fifteen information exchange models were created during the<br />

workshops; three of them were selected for study in detail to help create data standardization guidelines.<br />

The survey, workshops, and seminars, along with a study of the Eleventh National Development Plan<br />

2012-2016 and ICT Master Plan 2020, provide the basis for the data standardization roadmap.<br />

647


1 eSurvey<br />

3-4 Conduct<br />

seminars and<br />

workshops<br />

Data Landscape<br />

Information Logistic<br />

Information<br />

Exchange<br />

Domains<br />

Asanee Kawtrakul et al.<br />

5 Create Manual<br />

for Data<br />

Standardization<br />

6<br />

Roadmap<br />

Development<br />

2<br />

Study national<br />

policy & plan<br />

Figure 4: The process of data standardization guideline and roadmap establishment<br />

4.2 Analysis of government information exchange model<br />

Manual for Data<br />

Standardization<br />

Data Standardization<br />

Roadmap<br />

• short term (1 year)<br />

• medium term (3 years)<br />

• long term (5 years)<br />

Information exchange domains are an important key to initiate national data standardization. Each<br />

domain indicates which service should be integrated, what data is needed for interchange, and who are<br />

the stakeholders. Figure 5 shows the process of generating the information exchange domains.<br />

Data Landscape<br />

• What (data)<br />

• Where<br />

(government agencies<br />

producing data)<br />

Information Logistics<br />

• data flow among<br />

government agencies<br />

Process<br />

Ontology Specified<br />

Information Exchange Domain<br />

Figure 5: Ontogy based information exchange domain identification<br />

Using the eSurvey results, the data landscapes (Chisholm, 2008) and Information logistics are analyzed.<br />

The data landscapes illustrate data stored and information produced by government agencies.<br />

Information logistics are data flows among government agencies. Table 3 shows the data landscape of<br />

crops and farmers. Data landscapes of all ministries can be integrated and extended to define<br />

government information logistics.<br />

An information logistic is defined as a directed graph where each node represents an organization and<br />

each directed path represents the flow of data from one organization to another. Each directed path in the<br />

graph is labeled with a name of a data element disseminated from one node to the other. An organization<br />

that produces data for internal use has a path directed to itself. Also, each path can be categorized by<br />

data dissemination methods: paper based, electronic, or online exchange.<br />

Figure 6 a) illustrates flows of data among government agencies. When using graphical tools to depict a<br />

logistic, the density of traffic can be easily detected and the status of data exchange method can be<br />

explored. Figure 6b) shows that the information logistic can be reduced to a specific information logistic<br />

by using the domain specific ontology: both the organizational and task-orient ontology.<br />

648


Asanee Kawtrakul et al.<br />

Table 3: A part of the data landscape of the Ministry of Agriculture and Cooperatives<br />

Department Name<br />

Data<br />

Crops crop production area * * * *<br />

crop production amount * * *<br />

crop seed *<br />

rice seed *<br />

rice production cost *<br />

Farmers farmer groups *<br />

farmer registry *<br />

economic crop farmer registry *<br />

farmer crop production *<br />

farmer career groups *<br />

Cooperative Promotion<br />

Note: * indicates that the department stores the data in a database<br />

crop seed<br />

soil<br />

rice seed<br />

forest<br />

weather<br />

crop<br />

production<br />

amount<br />

specify concept<br />

‘crop’<br />

Agricultural Extension<br />

Fisheries<br />

Land Development<br />

crop seed<br />

ice seed<br />

Agricultural Economics<br />

rop<br />

production<br />

amount<br />

6 a) Before Reduction 6 b) After Reduction<br />

Note: crop is a main concept; rice is a lower level concept of crop<br />

Figure 6: 6a) Information logistic generated from eSurvey, 6b) ontology based domain analysis<br />

Based on the information logistic, we can use the reduction process to form a collaborative group of<br />

agencies who use or produce related information. This group should be involved in national data<br />

standardization in defining domain specific or common core data sets. For example, when we want to<br />

develop a data standard in the justice domain, the reduction of government information logistic will result<br />

in an information exchange domain: the groups of organizations that use, produce or disseminate data<br />

involving the court of justice are shown in Figure 7.<br />

In summary, we used eSurvey as a tool for Plan-Do-Check-Act the information exchange domains of<br />

eGovernment services. The flow of data, the collaborative group of public agencies, and the integrated<br />

services then, could be formalized to initiate data standardization.<br />

649<br />

Rice<br />

Agriculture


Prisoner Data<br />

Ministry of<br />

Finance<br />

Ministry of<br />

Justice<br />

Prime<br />

Ministry<br />

Office<br />

Ministry of<br />

Education<br />

Lawsuit data<br />

Tax<br />

Consumer data<br />

Ministry of<br />

Interior<br />

Asanee Kawtrakul et al.<br />

Education data<br />

Bankrupt<br />

Personal ID<br />

Patient data<br />

Ministry of<br />

Commerc<br />

Patents<br />

Justice<br />

Domain<br />

Ministry of<br />

Health<br />

Absolver data<br />

Politician data<br />

Office of<br />

Election<br />

Commission<br />

Lawyer<br />

data<br />

Foreigner data<br />

His Majesty's<br />

Principal Privat<br />

e Secretary<br />

Labor data<br />

Ministry of<br />

Foreign<br />

Affair<br />

Lawyer<br />

Office<br />

Ministry of<br />

Labor<br />

Warrant of arrest<br />

Warrant of arrest<br />

Insurance<br />

Office<br />

Police<br />

Office<br />

Figure 7: Organizations and information involved in the Justice domain.<br />

Participants in the eSurvey process include 30% of government agencies comprised of seven main<br />

domains being outlined: health, education, agriculture, transportation, security, enviroment, and<br />

economy.<br />

4.3 Top-down and bottom-up based implementation guidelines establishment<br />

From analysis of government agency requirements gathered during workshops, fifteen information<br />

exchange models were created (see Table 4). Three of them were selected based on prioritization factors<br />

for study in detail to help create data standardization guidelines. Those are data integration for tracking<br />

educational records, data interchange for patient referral, and data integration for traceability of<br />

agricultural products.<br />

Table 4: Information exchange models derived from workshops<br />

Information Exchange Model Domain Integration Type<br />

Data integration for tracking educational records Education Horizontal<br />

Research data integration Education Horizontal<br />

Data exchange for checking vaccine receipt records of students Health Vertical<br />

Data interchange for patient referral Health Vertical<br />

Data integration for traceability of agricultural products Agriculture Horizontal<br />

Data integration for predicting the spread of brown plant hoppers (rice<br />

insect pests)<br />

Agriculture Horizontal<br />

Individual and juristic person data exchange for ship registration Agriculture Horizontal<br />

Data exchange for natural disaster assistance for farmers Agriculture Horizontal<br />

Data exchange for rubber exporter subsidiary Agriculture Horizontal<br />

Data exchange for criminal background checks Security Horizontal<br />

Data integration for elderly monthly payment service Security Horizontal<br />

Data integration for job finding assistance for disabled people Security Horizontal<br />

Data integration for pollution control Environment Horizontal<br />

Data integration for checking juristic tax fraud from water usage amount Justice Horizontal<br />

Data exchange for facilitating application for factory building in<br />

settlement industrial zones<br />

650<br />

Economic Horizontal


Asanee Kawtrakul et al.<br />

The projects were prioritized using six criteria: the readiness of technology infrastructure, data quality,<br />

budget for implementation (compared to its cost), personnel readiness for project participation, impact on<br />

the nation, and collaboration among related organizations. However, prioritizing projects based on their<br />

impact is difficult, since the impact is not always quantifiable and comparable. Accordingly, prioritization<br />

can be done by brainstorming ideas from people who are affected by each project (McGilvray,2008).<br />

The implementation guideline (see Figure 8) starts with data standard concepts followed by data<br />

standardization processes with the three selected cases as examples. Finally, cost-benefit analysis of<br />

data exchange projects is presented along with project prioritization methods.<br />

Introduction<br />

and<br />

Teamwork<br />

Preparation<br />

4. Validation<br />

and Publish<br />

1. Business<br />

Scenario<br />

Creation<br />

3. Data<br />

Standardization<br />

2.<br />

Information Exchange<br />

Requirement Analysis<br />

Figure 8: The data standardization guideline (modified from NIEM, 2007)<br />

5. Roadmap<br />

Cost-<br />

Benefit<br />

Analysis<br />

Two executive seminars were conducted in 2010, with 109 executives invited from various government<br />

agencies. The seminar participants brainstormed for ideas on the success factors of information<br />

exchange among government agencies, resulting in identification of four success factors: human<br />

resources, budget, policy, and incentives, for which the details are presented in Table 5.<br />

Table 5: Success factors in eGovernment implementation<br />

Success Factors Details<br />

Human Resources Continuous training and education for both operational and management personnel<br />

Forming data standardization groups (cross functional) in every public organization<br />

Including data standardization topic in ICT curriculum<br />

Budget Sufficient budget for ICT activities, e.g., data standardization, information exchange<br />

projects, data quality improvement programs<br />

Policy National policy for public information sharing with clear guidelines for each organization<br />

to follow<br />

Raising management awareness on ICT as strategic driving<br />

Incentives Rewards for successful projects<br />

Best practices for adopters<br />

The roadmap highlights three categories of tasks: national data standard building, research and<br />

development for supporting standardization mechanism and government personnel preparation in order<br />

to tackle data standardization challenges as early as possible. The mindset for this strategy is that the<br />

earlier a data standardization project can be established, the greater the likelihood that a connected<br />

government can be successfully achieved. Figure 9 shows the 5-year roadmap (2011-2015).<br />

651


Data Standard<br />

R&D<br />

People<br />

Asanee Kawtrakul et al.<br />

Short Term<br />

National Data Standard Committee<br />

Appointment<br />

Medium-Term Long Term<br />

Universal Data Core Set Development Revision and Usage<br />

Promotion<br />

Establishment of Communities of<br />

Interest for Strategic Domains<br />

Extension<br />

Development of Domain Specific<br />

and Common Core sets<br />

Extension<br />

National Data Standard Registry<br />

Development<br />

Maintenance<br />

Research Innovation for<br />

eGovernment Services<br />

Continuing<br />

Data Standard Benchmark and<br />

Evaluation System<br />

Monitoring and Auditing<br />

Information Regulation Study Propose for creating<br />

Government Data Quality<br />

Improvement Program<br />

Raising Awareness and Building<br />

Capacity<br />

Establishing Benchmark<br />

and Evaluation System<br />

Knowledge Management<br />

and Sharing<br />

Strategic Planning Implementation Continuous<br />

Improvement<br />

Figure 9: The 5-year data standardization roadmap (2011-2015)<br />

6. Conclusion and next steps<br />

This work provides the necessary tools, data standardization manual, and roadmap, to complete an<br />

eGovernment interoperability framework for government agencies at all levels in Thailand. A platform for<br />

establishing the universal core set, domain specific core set, common core sets, and code lists are<br />

established in the standardization manual. The data standardization roadmap, which consists of three<br />

main activities: national data standard building, research and development for supporting standardization<br />

mechanisms, and government personnel preparation, is also provided for faster and more effective<br />

implementation.<br />

Ontology development for eGovernment services is a current project led by the Uknow Center, Kasetsart<br />

University. It will be constructed to function as a key word index to support online searching, and as a<br />

“category list” to support navigational browsing. This ontology could support automated semantic<br />

matching. For example, when users want to find data about farmers, by using the ontology, the search<br />

system could find data elements in data landscapes that semantically relate to the word “farmer” such as<br />

“rice grower” and “grains grower”.<br />

In order that mindsets and work systems reflect best practices, the following issues should be<br />

considered:<br />

Initiate and promote events for sharing best practices in the public sector, such as an eGovernment<br />

day for sharing service innovation, service innovation exhibition, etc.<br />

Capture, share and reuse knowledge and best practices in data standardization<br />

Develop and design innovative mechanism for driving the data standardization implementation<br />

Market the benefits of data standardization<br />

Establish a standardization evaluation system with<br />

Attractive key performance indices which are academic based, outcome-oriented, and mission-based<br />

Non-financial incentives for motivating proactive participation in data standardization,<br />

Rewards for success cases in developing connected goverment applications<br />

652<br />

Connected Government for Integrated Services


Acknowledgements<br />

Asanee Kawtrakul et al.<br />

This paper is the result of our work on the TH e-GIF project (phase 4) hosted by the Ministry of<br />

Information and Communication Technology of Thailand. We would like to thank all representatives from<br />

both public and private sectors who participated in TH e-GIF project activities and provided us the<br />

comments and suggestions. Special thank goes to Dr. James Edward Brucker for English proofreading.<br />

References<br />

Archmann, S., Kudlacek, I. (2008) ‘Interoperability and the exchange of good practice cases’, <strong>European</strong> Journal of<br />

ePractice, Vol. 2, No. 1, pp 3-12.<br />

Charalabidis, Y., Lampathaki, F. and Askounis, D. (2008) ‘Unified Data Modeling and Document Standardization<br />

Using Core Components Technical Specification for Electronic Government Applications’, Journal of Theoretical<br />

and Applied Electronic Commerce Research, Vol. 3, No. 3, pp. 38-51.<br />

Chisholm, M. (2008) Mapping the Data Landscape, [Online], Available: http://www.b-eye-network.com/view/6674, [10<br />

January 2010].<br />

Dada, D. (2006) ‘The Failure of eGovernment in Developing Countries: A Literature Review’, The Electronic Journal<br />

on Information Systems in Developing Countries (EJISDC), Vol. 26, No.7, pp. 1-10.<br />

Gottschalk, P., Solli-Saether, H. (2009) EGovernment Interoperability and Information Resource Integration:<br />

Frameworks for Aligned Development, Information Science Publishing.<br />

Janssen, M., Wagennar, R. (2002) ‘Towards a flexible ICT-Architecture for Multi-Channel eGovernment Service<br />

Provisioning’, Proceedings of the 3<strong>6th</strong> Hawaii International <strong>Conference</strong> on System Sciences (HICSS'03), IEEE<br />

Computer Society, pp.148-158.<br />

McGilvray, D. (2008) Executing Data Quality Projects: Ten Steps to Quality Data and Trusted Information, Morgan<br />

Kaufmann, MA.<br />

Ministry of Information and Communication Technology (2009) Thailand Electronic Government Interoperability<br />

Framework version 1.1.<br />

Ministry of Information and Communication Technology (2010) Thailand Electronic Government Interoperability<br />

Framework version 2.0 (in Thai).<br />

NIEM (2007). Introduction to the National Information Exchange Model, [Online], Available:<br />

http://www.niem.gov/topicIndex.php?topic=file-introduction, [25 Febuary 2010].<br />

UK e-GIF (2010) Data Standard Cataloque, [Online], Available:<br />

http://interim.cabinetoffice.gov.uk/govtalk/schemasstandards/e-gif/datastandards.aspx, [20 March 2010]<br />

United Nations (2008) United Nations eGovernment Survey 2008: From eGovernment to Connected Governance,<br />

[Online], Available: http://unpan1.un.org/intradoc/groups/public/.../un/unpan028607.pdf, [10 January 2010]<br />

653


654


Work<br />

in<br />

Progress<br />

Papers<br />

655


656


Bridging the IT/Process Divide in Public Administrations by<br />

Simple Semantic Interoperability Artefacts<br />

Robert Orlowski and Veit Jahns<br />

University of Duisburg-Essen, Germany<br />

robert.orlowski@stud.uni-due.de<br />

veit.jahns@icb.uni-due.de<br />

Abstract: Semantic interoperability is an objective that has been addressed in many research projects and<br />

publications in the past by the development or presentation of new artefacts (approaches, ontologies, tools, etc.).<br />

Mostly, different aspects of semantic interoperability have been addressed, which distinguished these artefacts from<br />

each other. But on the other hand, all these artefacts have one characteristic in common: they are big, complex,<br />

complicated, not easy to understand for people who are not familiar with the concepts and technology of the<br />

Semantic Web, and (sometimes) not easy to integrate into legacy systems. But this is crucial in the context of public<br />

administration, because there are small- and medium-sized public authorities, e.g., municipalities with limited<br />

resources, as well as big and advanced public authorities with a sufficient amount of resources, but existing<br />

information systems that cannot be replaced easily, e.g., because they are customized to local needs. In this work in<br />

progress paper the question is posed, how the technology regarding the facilitation of semantic interoperability can<br />

be simplified, so that these concepts and technology are first of all more understandable to employees and second<br />

easier to implement in small- and medium-sized public authorities like municipalities. A deliberation on this question<br />

promises the possibility, that the barriers for using these concepts and technology in municipality can be reduced<br />

and, that the municipalities can take advantage of these concepts and technology. Some ideas how this question can<br />

be approached are outlined in this poster paper.<br />

Keywords: eGovernment, public service, interoperability, semantic web<br />

1. Introduction<br />

In their vision for a semantic business process management Hepp et al. (2005) propose to use Semantic<br />

Web technology to bridge the IT/process divide, i.e., that manual labour is needed to transfer the<br />

artefacts from the sphere of business process analysis into the sphere of IT implementation and vice<br />

versa (Hepp et al. 2005: 536). This issue has been addressed also in eGovernment. Many projects<br />

dealing in one way or the other with issues of semantic interoperability were conducted in the past or are<br />

still in progress. Examples for such projects are the Governance Enterprise Architecture (e.g., Peristeras<br />

and Tarabanis 2004), Access eGov (e.g., Skokan et al. 2008), TERREGOV (Bettahar et al. 2009), or<br />

Amt@Direkt (e.g., Jahns et al. 2009). On the one hand, these projects differ in the considered aspects of<br />

semantic interoperability or the chosen approach to it, but on the other hand they share a common<br />

characteristic: many complex and sometimes complicated artefacts are developed.<br />

The reason for this complexity lies in the concept of public administration itself. In a simplified manner,<br />

public administration can be defined as an organization providing services, which are assigned to it due<br />

to a decision made by a sovereign, e.g., a parliament or a king (Lynn 2006: 24). But such a decision is<br />

always based on epistemological and ideological assumptions. And as there are many different<br />

epistemological and ideological assumptions, there are many different ideas about what a public<br />

administration shall be and which services it shall provide.<br />

Furthermore, the manifestation of public administration in practice covers a wide spectrum depending on<br />

different degrees of autonomy, of resource availability, etc. With respect to the usage of information<br />

systems to support the provision of services by the public administration and based on a similar analysis<br />

by Jahns et al. (2009: 306) two types of organizations in the public administration can be identified:<br />

Public authorities of small and medium size, e.g., municipalities or public authorities, which are<br />

independent and not embedded in some kind of network providing the needed IT resources. In<br />

general, those authorities possess simple structured information systems and amount of personnel. If<br />

they want to use such technologies, they want to use them with minimal efforts and costs.<br />

Public authorities of big size in general possess highly advanced information systems and business<br />

processes, as well as the required resources in terms of budget, staff, and knowledge needed to<br />

realize information systems by using highly advanced Semantic Web technologies. But on the other<br />

hand those kinds of authorities already invested many efforts in their existing information systems,<br />

which they want to protect.<br />

657

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!