93,217 research outputs found
Empirical Investigation of the Role of Privacy and Data Protection in the Implementation of Electronic Government in Ghana
This study investigates the role of privacy and data protection in the implementation of e-government in developing countries. It examines the privacy and data protection issues which arise when e-government is introduced in Ghana.
E-government is a way that governments liaise with their various departments and agencies through the use of information and communication technologies (ICTs). Through e-government, governments are able to provide better, effective and efficient services to their citizens. This new form of governmentsâ delivering services electronically to their citizens, businesses and various departments potentially offers benefits (for example, economic development, low costs and improved services) to society. However the implementation of e-government carries potential risks to users. The potential for online identity theft and fraud raises privacy concerns.
From a theoretical foundation, fieldwork in Ghana, through interviews and focus groups, is used to investigate the issue of privacy and data protection in e-government implementation in an empirical setting. Interviewees included senior civil servants, political leaders, members of the Select Committee on Communication, academics, university students as well as stakeholders from private and public organisations. The research borrowed from the Straussian grounded theory approach as a technique to analyse the fieldwork data.
The results of the study indicate that privacy and data protection does not currently play a significant role in e-government implementation in a developing country such as Ghana. Other factors such as access to information and communication technologies (Internet accessibility) and e-skills were found to be challenges which significantly impact individualsâ use of e-government.
The study found that there is a low privacy concern among Ghanaian citizens. This was found to be significantly related to a lack of awareness of privacy issues; and also the national cultural dimensions of Ghanaian society.
The study concludes by emphasising the importance of government investing in ICT infrastructure and public education to raise awareness of e-government services, as well as privacy and data protection issues.
Implications for research and policy makers are discussed. The study suggests future research to investigate the further impact of privacy awareness on individualsâ adoption of e-government in a collectivist society such as Ghana.Government of Ghan
E-government in Kuwait : attitudes and perceptions
The aim of this study was to explore the attitudes and perceptions of citizens towards
the adoption of e-government services in developing countries. This is deemed of value
at a time when e-government initiatives are still emerging in many developing countries
and many government departments and units have put a wide range of materials from
publications and information about government services online for use by citizens.
The Unified Theory of Acceptance and Use of Technology (UTAUT) model was
adopted in this study to identify factors that determine the adoption of e-government
services. The use of a theoretical model allowed for formulating hypotheses governing
the relationship between the different variables.
Mixed research methods were utilised to fulfil the aims and objectives of this study.
The quantitative and qualitative methods used included a questionnaire survey, which
incorporated the amended version of the UTAUT model and which was completed by
more than 800 students at Kuwait University, as well as usability testing, focus groups,
interviews and open-ended questions. The study found that performance expectancy,
effort expectancy, peer influence and facilitating conditions were direct determinants of
usage intention and behaviour while Internet experience and type of academic course
moderated the impact of the determinants on usage intention and behaviour.
The results also showed that the general attitudes towards adopting e-government
services were positive. The study identified a number of factors that positively
influenced the attitude of respondents regarding the adoption of e-government services.
These factors were related to reforming bureaucracy, usefulness, eliminating the
importance of connections (wasta), facilitating government-public communication,
reducing gender differences, and including all people in society. However, negative
attitudes identified towards adopting e-government services related to fears and
concerns about issues of technology, such as privacy and security. Other issues were
related to lack of awareness, increasing unemployment rates, lack of faith in
government, the belief that face-to-face interaction would add value to dealings with
government, and most importantly, lack of capacity building. The evaluation of the
Kuwait e-government website, as supplemental information, also identified a number of
strengths and weaknesses that contributed to an increase or decrease in the potential
adoption of e-government services. All adoption findings identified in this study were
modelled through the use of a systemic approach which provided some insight into and
understanding of the factors underlying the adoption of e-government services in
developing countries.
Based on the results and conclusions of the research, recommendations were made to
officials responsible for the e-government project and ideas for further research were
identified
Recommended from our members
Generating citizen trust in e-government using a trust verification agent: A research note
Generating Citizen Trust in e-Government using a Trust Verification AgentThis is an eGISE network paper. It is motivated by a concern about the extent to which trust issues inhibit a citizenâs take-up of online public sector services or engagement with public decision and
policy making. A citizenâs decision to use online systems is influenced by their willingness to trust the environment and agency involved. This project addresses one aspect of individual âtrustâ decisions by
providing support for citizens trying to evaluate the implications of the security infrastructure provided by the agency. Based on studies of the way both groups (citizens and agencies) express their concerns and concepts in the security area, the project will develop a software tool â a trust
verification agent (TVA) - that can take an agencyâs security statements (or security audit) and infer how effectively this meets the security concerns of a particular citizen. This will enable citizens to state
their concerns and obtain an evaluation of the agencyâs provision in appropriate âcitizen friendlyâ language. Further, by employing rule-based expert systems techniques the TVA will also be able to explain its evaluation.Engineering and Physical Sciences Research Council, UK (grant GR/T27020/01
Recommended from our members
Generating citizen trust in e-government using a trust verification agent: A research note
Generating Citizen Trust in e-Government using a Trust Verification AgentThis is an eGISE network paper. It is motivated by a concern about the extent to which trust issues inhibit a citizenâs take-up of online public sector services or engagement with public decision and policy making. A citizenâs decision to use online systems is influenced by their willingness to trust the environment and agency involved. This project addresses one aspect of individual âtrustâ decisions by
providing support for citizens trying to evaluate the implications of the security infrastructure provided by the agency. Based on studies of the way both groups (citizens and agencies) express their concerns and concepts in the security area, the project will develop a software tool â a trust
verification agent (TVA) - that can take an agencyâs security statements (or security audit) and infer how effectively this meets the security concerns of a particular citizen. This will enable citizens to state
their concerns and obtain an evaluation of the agencyâs provision in appropriate âcitizen friendlyâ
language. Further, by employing rule-based expert systems techniques the TVA will also be able to explain its evaluation.Engineering and Physical Sciences Research Council-UK (grant GR/T27020/01
Recommended from our members
Issues and challenges: cloud computing e-Government in developing countries
Cloud computing has become essential for IT resources that can be delivered as a service over the Internet. Many e-government services that are used worldwide provide communities with relatively complex applications and services. Governments are still facing many challenges in their implementation of e-government services in general, including Saudi Arabia, such as poor IT infrastructure, lack of finance, and insufficient data security. This research paper investigates the challenges of e-government cloud service models in developing countries. This paper finds that governments in developing countries are influenced by how the top management deals with the attention to the adoption of cloud computing. Further, organisational readiness levels of technologies, such as IT infrastructure, internet availability and social trust of the adoption of new technology as cloud computing, still present limitations for e-government cloud services adoption. Based on the findings of the critical review, this paper identifies the issues and challenges affecting the adoption of cloud computing in e- government such as IT infrastructure, internet availability, and trust adopted new technologies thereby highlighting benefits of cloud computing-based e-government services. Furthermore, we propose recommendations for developing IT systems focused on trust when adopting cloud computing in e-government services (CCEGov)
Incentives for the adoption of e-government by Greek municipalities
Purpose: The research aims to identify the incentives that play an important role in the evolution of e-government in Greece at local scale and its actual development level. It also investigates the factors and the perceived barriers that affect the development of local egovernment in Greek Municipalities, as well as the benefits they derive from it. Design/Methodology/Approach: The research is based on a survey that was conducted through a questionnaire to all 325 Municipalities of the country and includes data from 109 Municipalities that participated in the quantitative approach. Findings: While e-government is spread at a relatively satisfactory level, it appears that only a few Municipalities are performing well. Results highlight also the two main incentives that motivate Municipalities to adopt e-government: The first is the improvement of the efficiency of information exchange with the external environment and the second is managing internal issues-relationships in conjunction with the existence of prominent IT departments. Amongst the main factors that affect e-government adoption by Local authorities, budgetary constraints stand out, while the lack of personnel specialized in Information Technologies is identified as common obstacle. Practical Implications: Findings suggest that an integrated approach to e-government is needed in order to enable organizations to minimize failures and to overcome barriers and counter risks. The capacity to align e-government applications with the increasing and evolving needs and requirements of the citizens is the key to optimizing the benefits of eGovernment at local scale. Originality/Value: There is no similar empirical research in the context of Greece; hence, it seems important to increase the knowledge about the drivers of e-government adoption, especially in the public sector at the local scale.peer-reviewe
A National Dialogue on Health Information Technology and Privacy
Increasingly, government leaders recognize that solving the complex problems facing America today will require more than simply keeping citizens informed. Meeting challenges like rising health care costs, climate change and energy independence requires increased level of collaboration. Traditionally, government agencies have operated in silos -- separated not only from citizens, but from each other, as well. Nevertheless, some have begun to reach across and outside of government to access the collective brainpower of organizations, stakeholders and individuals.The National Dialogue on Health Information Technology and Privacy was one such initiative. It was conceived by leaders in government who sought to demonstrate that it is not only possible, but beneficial and economical, to engage openly and broadly on an issue that is both national in scope and deeply relevant to the everyday lives of citizens. The results of this first-of-its-kind online event are captured in this report, together with important lessons learned along the way.This report served as a call to action. On his first full day in office, President Obama put government on notice that this new, more collaborative model can no longer be confined to the efforts of early adopters. He called upon every executive department and agency to "harness new technology" and make government "transparent, participatory, and collaborative." Government is quickly transitioning to a new generation of managers and leaders, for whom online collaboration is not a new frontier but a fact of everyday life. We owe it to them -- and the citizens we serve -- to recognize and embrace the myriad tools available to fulfill the promise of good government in the 21st Century.Key FindingsThe Panel recommended that the Administration give stakeholders the opportunity to further participate in the discussion of heath IT and privacy through broader outreach and by helping the public to understand the value of a person-centered view of healthcare information technology
Quantum surveillance and 'shared secrets'. A biometric step too far? CEPS Liberty and Security in Europe, July 2010
It is no longer sensible to regard biometrics as having neutral socio-economic, legal and political impacts. Newer generation biometrics are fluid and include behavioural and emotional data that can be combined with other data. Therefore, a range of issues needs to be reviewed in light of the increasing privatisation of âsecurityâ that escapes effective, democratic parliamentary and regulatory control and oversight at national, international and EU levels, argues Juliet Lodge, Professor and co-Director of the Jean Monnet European Centre of Excellence at the University of Leeds, U
Recommended from our members
Predicted Adoption Rates of Contact Tracing App Configurations - Insights from a choice-based conjoint study with a representative sample of the UK population
Widespread adoption of a contact tracing app by the UK public is an important part of safely easing or lifting the lockdown. In this context, it is essential to understand how adoption rates are influenced by different configurations of a proposed contact tracing app. There are many implementation options that can impact app adoption. For example, which institution should be responsible for and have oversight of the app? What type of data is collected? Does it matter how long it is stored? This whitepaper provides data-driven insights into these and other questions to guide app implementation choices
Feasibility and Sustainability Model for Identity Management
National Identity projects and providing such identification to citizens in various countries around the globe has captured attention of late. Although the perceived benefits are numerous, nonetheless the challenges and bottlenecks for a successful rollout are many. The objective of this paper is to put forward the drivers and inhibitors for adopting a common identity management system across various organizations and to suggest a model for determining the feasibility and sustainability of such a system. The paper develops on TAM for proposing a model for identifying the drivers and inhibitors of managing such an identity management exercise. This paper highlights various factors affecting successful implementation of an identity management system and investigates the impact of these factors. The model suggested in this paper would allow organizations and policy makers to determine the critical factors for the implementation of an identity management system in large scale.
- âŠ