150 research outputs found

    Local e-Government in the Netherlands: from ambitious policy goals to harsh reality

    Get PDF
    The Netherlands took up e-Government development relatively early and was considered to be one of the leading nations in e-Government developments. In recent years, it has slipped back in the various international benchmarks, and also other signs show that the country no longer is at the front of e-Service development. This paper discusses possible causes for the decline of Dutch e-Service delivery development. Important factors in the explanation can be found in the structure of the Dutch public sector which can be characterized as fairly decentralized. The central government sets ambitious policy goals, but lacks the means to have them realized on the local level which is the primary level at which public service delivery takes place. The municipalities on the other hand are incapacitated by relatively small scale, the large number of services they provide and the lack of real incentives to move service delivery online. As a result, e-Service development on the local level is inefficient and progresses relatively slow. There are signs though that things are changing: the central government takes on a more active stance, and local authorities join forces to develop services together.e-Government, e-Government policy, electronic service delivery, public service delivery maturity, the Netherlands

    The Cookiewars:From regulatory failure to user empowerment?

    Get PDF

    \u27Code\u27 and the Slow Erosion of Privacy

    Get PDF
    The notion of software code replacing legal code as a mechanism to control human behavior-- code as law --is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of code as law on privacy. To what extent is privacy-related code being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it affects the reasonable expectation of privacy. Technology usually makes privacy violations easier. Particularly information technology is much more a technology of control than it is a technology of freedom. Privacy-enhancing technologies (PETs) have yet to be implemented on any serious scale. The consequent eroding effect of technology on privacy is a slow, hardly perceptible process. If one is to stop this almost natural process, a concerted effort is called for, possibly in the form of privacy impact assessments, enhanced control mechanisms, and awareness-raising

    \u27Code\u27 and the Slow Erosion of Privacy

    Get PDF
    The notion of software code replacing legal code as a mechanism to control human behavior-- code as law --is often illustrated with examples in intellectual property and freedom of speech. This Article examines the neglected issue of the impact of code as law on privacy. To what extent is privacy-related code being used, either to undermine or to enhance privacy? On the basis of cases in the domains of law enforcement, national security, E-government, and commerce, it is concluded that technology rarely incorporates specific privacy-related norms. At the same time, however, technology very often does have clear effects on privacy, as it affects the reasonable expectation of privacy. Technology usually makes privacy violations easier. Particularly information technology is much more a technology of control than it is a technology of freedom. Privacy-enhancing technologies (PETs) have yet to be implemented on any serious scale. The consequent eroding effect of technology on privacy is a slow, hardly perceptible process. If one is to stop this almost natural process, a concerted effort is called for, possibly in the form of privacy impact assessments, enhanced control mechanisms, and awareness-raising

    Conclusions and recommendations

    Get PDF

    Article 43 certification bodies

    No full text
    • 

    corecore