63,761 research outputs found

    Secure web application development and global regulation

    Get PDF
    The World Wide Web (WWW) has been predominantly responsible for instigating radical paradigm transformations in today’s global information rich civilizations. Many societies have basic operational economical components that depend on Web enabled systems in order to support daily commercial activities. The acceptance of E-commerce as a valid channel for conducting business coupled with societal integration and dependence on Web enabled technology has instigated the development of local, national, and global efforts to regulate criminal activities on the World Wide Web. This paper makes two contributions. The first contribution is the high-level review of the United States and United Kingdom legislation that has developed from the escalation and integration of the World Wide Web into society. The second contribution is the support for the idea that legislative compatibility, in concert with an organization’s policy compatibility, needs to be acknowledged in secure Web application development methodologies

    The internet and public bureaucracies: towards balancing competing values

    Get PDF
    Innovation in public administration is one of the central aspects of public sector reforms. Given the procedural nature of government tasks, the adoption of the Internet and related information and communication technologies (ICT) has become critical for government organisations. The aim of this paper is to discuss the implications of the diffusion Internet led innovations in the public sector on balancing public values. Rather than diminishing their benefits, we aim at highlighting challenges and dilemmas that can emerge from ICT implementation in the public sector. The paper starts by reviewing the main trends of e-government research and show a dominant view towards managerial and private sector values embedded in the literature. To propose an alternative approach, we then draw on an empirical example from Mexico, that of the Federal Transparency and Access to Government Information Law. Using Mexico’s available statistics and secondary data, the case explores how a quicker ICT-mediated interaction between citizens and government can result in social and political dilemmas. We propose to bring into play the public value paradigm to highlight these issues. Conclusions follow

    Government as a social machine - the implications of government as a social machine for making and implementing market-based policy

    Get PDF
    This is the second of two reports from the Government as a Social Machine project. The first report gave an overview of the evolution of electronic/digital government, and explored the concept of 21st century government as a \u27social machine\u27. This report identifies seven social machines developed by governments in Australia and New Zealand. These social machines harness digital technologies in order to deliver more effective and efficient services, develop better business practices, and enable better accountability and transparency. The report gives an overview of each social machine in context, describing the social need that is being met and the community that has developed it, and begins to unravel some of the socio-political consequences that might arise from the use of these social machines within the public policy context. These reports are not intended to be comprehensive (further educational materials are being developed as part of the ANZSOG Case Library), but they are intended to begin a conversation amongst those studying or practicing in public policy as to how governments can better understand, manage and employ these evolving social machines for better governance and social benefit

    Contrasting Community Building in Sponsored and Community Founded Open Source Projects

    Get PDF
    Prior characterizations of open source projects have been based on the model of a community-founded project. More recently, a second model has emerged, where organizations spinout internally developed code to a public forum. Based on field work on open source projects, we compare the lifecycle differences between these two models. We identify problems unique to spinout projects, particularly in attracting and building an external community. We illustrate these issues with a feasibility analysis of a proposed open source project based on VistA, the primary healthcare information system of the U.S. Department of Veterans Affairs. This example illuminates the complexities of building a community after a code base has been developed and suggests that open source software can be used to transfer technology to the private sector

    Harnessing Health Care Markets for the Public Interest: Insights for U.S. Health Reform From the German and Dutch Multipayer Systems

    Get PDF
    Outlines how the German and Dutch systems offer universal coverage via competing insurance plans and promote effective and efficient care. Highlights insurance exchanges, multipayer policies and group purchasing, information systems, and public reporting

    Securing The Root: A Proposal For Distributing Signing Authority

    Get PDF
    Management of the Domain Name System (DNS) root zone file is a uniquely global policy problem. For the Internet to connect everyone, the root must be coordinated and compatible. While authority over the legacy root zone file has been contentious and divisive at times, everyone agrees that the Internet should be made more secure. A newly standardized protocol, DNS Security Extensions (DNSSEC), would make the Internet's infrastructure more secure. In order to fully implement DNSSEC, the procedures for managing the DNS root must be revised. Therein lies an opportunity. In revising the root zone management procedures, we can develop a new solution that diminishes the impact of the legacy monopoly held by the U.S. government and avoids another contentious debate over unilateral U.S. control. In this paper we describe the outlines of a new system for the management of a DNSSEC-enabled root. Our proposal distributes authority over securing the root, unlike another recently suggested method, while avoiding the risks and pitfalls of an intergovernmental power sharing scheme

    The Growth of Social Media Norms and the Governments\u27 Attempts at Regulation

    Get PDF
    • …
    corecore