CHARACTERIZING AND CATEGORIZING INTERNAL ADMINISTRATIVE PROCESSES IN AN E-GOVERNMENT SETTING (original) (raw)
Related papers
A Framework for Secure Digital Administration
2001
The efficiency and service quality in public administration can be improved by using electronic documents (or e-docs) and digital signature to speed up their activity and at the same time to better satisfy customer needs. This paper presents an XML-based document exchange system that integrates a platform for the management (creation, search, storage) of e-docs and a secure trustworthy environment for digitally signing edocs. The framework provides security services, like privacy, authorization, authentication and non-repudiation. Possibly a mobile terminal equipped with a smartcard reader and integrating WYSIWYS features could be used for viewing and signing e-docs. The proposed system can be easily integrated with the infrastructure (e.g. database system) already in use at each administration site. It is described also the use of the system in a real world service.
A Secure Multi-Layer e-Document Method for Improving e-Government Processes
J. Univers. Comput. Sci., 2014
In recent years, there has been a tremendous growth in e-Government services due to advances in Information Communication Technology and the number of citizens engaging in e- Government transactions. In government administration, it is very time consuming to process different types of documents and there are many data input problems. There is also a need to satisfy citizens' requests to retrieve government information and to link these requests to build an online document without asking the citizen to input the data more than once. To provide an e-Government service which is easy to access, fast and secure, the e-Document plays an important role in the management and interoperability of e-Government Systems. To meet these challenges, this paper presents a Secure Multilayer e-Application (SMeA) method for improving e-Government processes. This method involves five steps: namely (i) identifying an e-Template; (ii) building a SMeA; (iii) mapping the data; (iv) processing the e-Appl...
Journal of Computing and Information Technology, 2009
Processes that are related to the identification and the authentication of persons and other legal entities have been necessarily existing and functioning for a while in public administration and business. Information Society offers new e-services for citizens and businesses, which dramatically change the administration and results additional challenges, risks and opportunities. Citizen's confidence and trust to services has to be improved, meanwhile several requirements, like data protection, privacy and legal requirements has to be satisfied. The usual business process of identification of the corresponding entity is generally based on some trivial control mechanism, typically password identification. In order to keep up the trust of the public in the public administration activities, the process for entity identification (both person and legal entity) should be amended taken in account the business and security consideration. Identity management solutions show intriguing variation of approaches in Europe, they are at a different maturity level of services. Our paper gives an overview about the most frequently cited identity management architectures (namely: Liberty Alliance Architecture, IDABC, Sibboleth, Government Gateway Model and Austrian Model) and presents an identity management framework (based on the PKI, but improved it), customized for the Hungarian specialities, which offer possibilities to improve the related services quality.
E-government: Aspects of security on different layers
Database and Expert Systems …, 2001
The global IT revolution is growing rapidly. Governments and businesses have to be ready to meet the increased demand of effective and secure online services. Providing secure online services in e-Government requires, however, careful deliberation on different levels and for the distinct domains of e-Government. The first issues on security coming in mind regard of course technical aspects. Here, many concepts and tools have been developed to provide secure transactions, to protect against non-allowed access to information and data, to protect against hacker attacks etc. Yet, security aspects not only regard technical issues. Instead, these need careful investigation from a non technical viewpoint as well. In this contribution, we suggest a holistic concept that integrates security aspects from the strategic level down to the data and information level in order to address different security aspects in a comprehensive way.
Electronic Document Exchange and Management for the Governmental Organizations
During the electronic document exchange processes, new information may be added, existing information may be modified , and control information has to be checked. For different purposes different formats are created and used by different organisations even if they share one database system. Our investigation in the project MIWIS (Metadata Infrastructure for the Web Information Systems in Swedish Governmental Sectors) for the Swedish governmental organisations has revealed that regional and local governmental organisations and departments usually have their own database systems and use their own customised electronic document formats. Their documents are sent out along with the localised formats. These localised formats hinder the exchange of electronic documents among organisations. In the WWW community, the metadata concept is introduced to provide a set of structural descriptions of information. A number of metadata models have been proposed. Some of them are developed along with ...
Computer Communications, 2003
The concept of one-stop on-line government is not science fiction any more. On the contrary, the high reliability and performance of communication links, combined with architectural models that facilitate transparent access to distributed computational and storage resources, propel the development of integrated e-government platforms that support increased citizen mobility. The price we have to pay is the complexity introduced in the design of the security mechanisms required for protecting several heterogeneous information systemseach one supporting some of the services offered through the e-government integrated environment-and ensuring user privacy. This paper demonstrates that the security services offered by Public Key Infrastructure (PKI) can be employed for fulfilling most of the identified security requirements for an integrated e-government platform. The list of security requirements has been compiled by adopting an organisational framework that facilitates the classification of e-government services according to the security requirements they exhibit. The proposed approach has been applied, as a case study, to the e-government system 'Webocrat', identifying its security requirements and then designing a PKI-based security architecture for fulfilling them.
Journal of theoretical and applied electronic commerce research, 2008
e-Government can be defined as Internet applications for public administration processes and decision making on local, regional, national as well as cross-national level. Therefore, the strong necessity to ensure vertical and horizontal interoperation of administrative units is arrived. The main goal of the paper is to reveal how interoperability is built into the public administration engineering process. The paper covers explanations how interoperability is important for e-governmental processes covering documents flows and what activities have been realized with EU agencies to ensure interoperability development. The first part of the paper comprises explanation of e-Government document engineering and administrative process development. The second part covers consideration on interoperability for e-Business and public administration. The third part includes analysis of what standardization is demanded for interoperability of e-Government agencies and how different countries' governments are prepared to ensure such interoperability in public administration in the light of documents, institutional norms and open standards.
2014
Effective e-government is becoming an important aim for many governments around the world. Within this context this paper aims to review and reorganize the previous work about e-government such as: e-government definition, types, advantages and barriers to e-government. It provides essential background knowledge to the research subject, as well as highlighting the main concepts of e-government.
E-Government Services: Certification and Security Overlay
Certification and Security in E-Services, 2003
E-govemment services are very difficult to implement because they present legislative, organizational and technical issues all together, each of them causing very strict design and implementation requirements. In this paper we present the Certification and security overlay as an effective solution to design and implement e-govemment services; this solution has already been adopted in several existing Italian PA services like the Cadastral Municipalities Interchange System, the National Census Index, providing different e-govemment services to all Italian citizens.