E-Government: Transformation of Government

E-Government: Transformation of Government
1.
Introduction
With the advent of the information age, the ways in which we work, study, and live have been
experiencing dramatic changes. Due to the influence of economic and information globalization and the
rise of the digital economy, governments are ‘reinventing’ themselves to meet new expectations and the
priorities of citizens and businesses. These dynamics are compelling many governments to create a
new vision for their relationship with businesses and citizens, and to create a new organizational
structure to fulfill their mandate.
Many governments are seizing the opportunity to establish a government of the information age.
This transformation stems from many powerful influences of the information revolution and is still in its
nascent stages. Obviously, the ultimate objective of developing a new organizational structure of
government is not only for effectiveness and efficiency, but also for building a new modality of
government. This long journey includes formulating a new vision of how governments view citizens and
businesses, and building a citizen-centered, service-oriented, public-participated government.
2.
Traditional Structure of Government
The traditional, industrialized management system arose in the middle of the nineteenth century
and has had more than 150 years of history. This kind of managerial system was initially targeted at the
management of railroad and postage transportation services. The system to manage these services,
which appeared in the 1850s in the United States, is deemed as the earliest example of modern
management. The main purpose of these management systems was to secure the safety of railroad
transportation. The system essentially designed for data collection and to expedite information delivery,
is recognized by historians as ‘the first modern, carefully designed, internal organizational structure
used by American business enterprise’. The multidivisional organizational model introduced by General
Motors in the 1920s marked the maturity of the modern management corporation operating within this
framework.
The traditional structure of government is very much like the multidivisional organizational model
that exists in many industrial organizations. The basic characteristic of such a management system is its
hierarchical management structure, i.e., the typical organizational chart of a government appears as a
pyramid. Clerks and staff are at the bottom of the hierarchy, ascending levels of office staff rise up the
hierarchy, and a head of the government, such as a chief executive officer, perches on the top of the
pyramid. Within this hierarchy, officials at every tier are assigned functions and duties and report
directly to his/her supervisor. Vital information concerning government business flows up the chain of
command where it is processed at each level and then carried to the next, until it eventually reaches top
management, which in turn uses the information to make decisions and commands that are then
transmitted down the hierarchy and implemented at each descending level of the government structure.
In some large governments, the organizational chart contains hierarchies within hierarchies. Each
department or agency has its own chain of command embedded inside the larger structure and
Transformation of Government
formulates a quite complicated, multi-hierarchy management system.
The traditional structure of government can be viewed as a three tired pyramid (Figure 1.1):
decision-making (strategic) at the top, managerial or administrative (tactical) in the middle, and
operational at the bottom. Each tier represents a different level of control and has a different level of
information requirement and view of the government agency.
Figure 1.1 The Traditional Structure of Government
This kind of government structure, which came into being with the industrial revolution, has existed
for more than one hundred fifty years. It meets the demands of an industrialized administrative and
managerial society and corresponds to the economic and technical environment of the industrial age.
This kind of management system has dominated the organizational modality of government for almost
the entire twentieth century. An evident characteristic of it is its dependence on the tiers of the middle
management, both for processing the internal vertical flow of information (there is almost no horizontal
flow of information between divisions) and for the control and coordination of the business activities of
the government. As a result, the tiers of middle management are increasingly large and overstaffed and
have become the largest portion of the organization. Due to the over-centralized decision-making
structure, the system seems rigid, lacking in flexibility, and slow to respond to the changes of the
changing world. With the development of globalization, the drawbacks of such a management system
have been progressively more exposed; it can make governments lose their competitiveness. Many
advantages of the system in the industrial age have become disadvantages in the information age. With
the progress of the information revolution and the advent of the information age, such an organizational
structure can no longer meet the challenges that governments are facing today.
2.1 Impact of ICT on Management
Modern information and communication technologies (ICT) have had a significant impact on
existing management systems. The first impact is that it is easier to acquire information. Actually,
information can be accessed anywhere, anytime and by anyone authorized to do so. By means of
databases and computer networks, especially the Internet, different people within the same business or
the same business process are able to share and process information and perform their duties even
though they may be in different geographical locations.
The second impact is that control and coordination of various business activities can be done at
the lower tiers of the managerial hierarchy, i.e., the level closer to the operational aspects of the
E-Government – What a Government Leader Should Know
Page 2 of 7
Transformation of Government
business, because the information needed can be obtained wherever there is a demand. Information
can be processed horizontally as well, and it is not at all necessary to hand information up and down, tier
by tier, for the sake of transferring it to other divisions. Hence, the traditional pyramid modality and
structure is no longer justifiable or even necessary.
The third impact is that decisions can be decentralized and made by any authorized person who has
adequate information and knows the criteria of the decision-making process. In practice, this can be
done by means of a networked personal computer and a decision-making system which does not
require requesting approvals from each level of the hierarchy of the traditional pyramid.
The fourth impact is that the development of a sophisticated ‘knowledge-base’, using modern
information technology, further increases the possibility of decentralizing decision-making. With the
assistance of a knowledge-base, the capacity for decision-making by government staff at the lower tiers
will be strengthened. They will become increasingly knowledgeable, and, accordingly, increasingly
competent decision-makers.
Within this context, the larger middle-tier of management and administration in traditional
government gradually loses its role and becomes overstaffed, and the pyramid modality of traditional
government seems less effective and efficient, and consequently becomes out-of-date. Therefore, the
collapse of the pyramid modality of the traditional industrial organizational structure is unavoidable.
The choice between centralization and decentralization is a difficult one and it is a question that is
always posed in the theories and practices of management science. However, informatization may
make this difficult question redundant. By means of modern information technology, decisions can be
taken close to where the business activity takes place; but at the same time, management is still able to
keep centralized control of relevant information. With the advent of the Internet age and a networked
economy, the modality of management is shifting from a pyramid to a networked structure.
Correspondingly, the new organizational modality of government, relevant to the information age, is very
much like a flat, horizontal and networked structure, within which all the elements of society are
connected, and able to share information and knowledge and to communicate easily with each other.
3.
New Role of ICT in Government
The new role of information and communication technologies, therefore, is not only to computerize
or re-engineer existing government businesses, but more significantly, to assist government in
materializing the kind of transformation mentioned above. The ultimate destination of this transformation
is an e-government, which has been recognized, in addition to e-commerce, as one of the most
important arenas of ICT applications in today’s world. It provides a focus for the reform of public
administration.
It can be said that government transformation is a characteristic as well as a benchmark of a
mature e-government. All the programmes and projects to be implemented in the creation of an egovernment, such as e-documentation, e-record, and e-workflow, etc., will inevitably lead to a redesign
of business flow as well as a restructuring of governments. The interface with clients is moving from
offices, counters and windows to computer screens. Links with customers are shifting from telephones,
telegraphs, and facsimiles to networks supported by the Internet. Together, these changes will lead to
changes in the operational mode and to the restructuring of a government. Therefore, should a
government agency claim that it has become an e-government agency even though its structure and
operational mode remain the same as before, then, it can be concluded that the transition to egovernment by this agency was not successful. It will not have made use of all the opportunities
available to it.
E-Government – What a Government Leader Should Know
Page 3 of 7
Transformation of Government
The formulation of a distributed information processing environment has led to a new way of
thinking that takes full advantage of information technology. However, transformation of government is
neither primarily a technical issue nor the sole responsibility of technical professionals. It must be
recognized that the transformation of an organizational structure represents a revolution of the
management system made possible by modern information technology. Hence, the drive and
determination of the top management tier of an organization is essential if the transformation is to
succeed. During the transformation process, a variety of social resistances will emerge and try to find
ways to block the transformation.
4.
Business Process Re-engineering
A government agency is organized to perform its functions. A function is carried out by a
managerial control unit with responsibility for and authority over a series of related activities involving one
or more entities and performed for the direct or indirect purpose of fulfilling one or more missions or
objectives of the agency. Specific functional responsibility and authority may rest with an individual, a
group of individuals, groups of individuals, one or more areas of the agency, or the whole agency itself.
The functional performance of a government agency must be identifiable, definable, and measurable.
Generally, a function can be equated to a management control point, with one manager
representing one function. Thus the functional composition of a government agency follows the
management reporting structure, which may or may not follow the organizational lines, and a function is
whatever a manager is responsible for. Functions correspond to managerial authority and responsibility,
which can only be delegated from above. Hence, the functional model of an agency can be represented by
a simple hierarchy.
A business process is a sequence of related activities, or a sequence of related tasks, which make up
an activity. These activities or tasks are usually independent, but there is a well-defined flow from one activity
to another or from one task to another. The definition and description of business processes identify these
activity and task dependencies. Business processes usually consist of major units of bounded, repetitive
work, and they are often more easily modelled in horizontal form than in vertical form. Business
processes are groups of business activities organized around data or process dependencies. For a wellorganized government agency, there must be a well-defined flow from one activity to another or from one
task to another.
The chain from business functions to process and then to activities are the chains used in business
systems analysis to analyse and create a model of a government agency. A well-organized government
agency should have a set of well-defined function-process-activities chains, or systems.
The real power of e-government is not that it can make the original, or the old, business processes
work better but that it enables government agencies to break old rules and outdated assumptions and
create new ways of doing the work. That process is usually called business re-engineering although other
terms and names include business process redesign, business redesign and process redesign.
4.1 E-Procurement: an Example of Government Re-engineering
An example of an e-procurement system can illustrate how re-engineering works in practice. An eprocurement system consists of three elements: government, supplier, and e-procurement institution or
department which is a new phenomenon of the information age and plays a key role in e-procurement
(Figure 1.2).
E-Government – What a Government Leader Should Know
Page 4 of 7
Transformation of Government
Figure 1.2 An e-Procurement System
Within this system, the e-procurement institution provides consultancy and offers the infrastructure
necessary for the implementation of the new procurement model; implementation which includes
defining purchasing strategies, promoting services, and designing and developing e-procurement
models. The government agency handles demand, makes purchases online, and plans budgets. The
supplier signs the frame contracts with the e-procurement institution and provides goods and services
to the government agencies.
The e-procurement institution interacts with suppliers activating and receiving reports about
contracts. It interacts with government agencies on their needs and requirements and receives
feedback regarding the degree of satisfaction. It also provides comparative analyses of goods and
services from different suppliers and other support agencies and mechanisms. Government agencies
send orders either online or by fax; and receive goods and services and expense reports from
suppliers. Within the system, online catalogues are available on a dedicated website for each active
frame contract and online purchasing is available for most active contracts. In addition, only authorized
users can access the e-shopping area (online purchasing), but all web users may have access to the
rest of the information (user profiling not required).
The benefits of e-procurement are obvious. First of all, it simplifies the process of government
procurement and saves tremendous human and financial resources. Secondly, a fair market
competition can be organized and reduced prices for goods and services can be obtained through
batch procurement. Thirdly, the entire procurement process of a government agency can be monitored
and reported in a timely way so as to better control the budget and expenditure of the agency. The last
but not the least important consideration is that a transparent procurement process can be achieved and
monitored by the public.
There are also non-quantifiable savings to the government in such re-organizations (Figure 1.3).
Within a traditional procurement process, seven steps may have to be taken by the government: needs
analysis, drafting of contract and documents for tender, supplier selection, drawing up of final contract,
possible involvement in litigation with suppliers, goods/services supply, and payment. With the new e-
E-Government – What a Government Leader Should Know
Page 5 of 7
Transformation of Government
procurement system, however, the steps are reduced to four: needs analysis, online order,
goods/services supply, and payment notification. With implementation of e-procurement, obviously, the
procurement branches of government agencies can be removed or simplified and government must be
re-engineered to adapt to the new model of procurement business.
This example also shows that one of the keys for successfully re-engineering business processes
is to understand the fundamental changes that modern information technologies have brought to the
world and how these changes will transform the ways in which people conduct their business.
Figure 1.3 The e-Procurement: Re-engineering the Government
5.
Methodology of Government Re-engineering
There is a methodology of government re-engineering used for streamlining activities affecting the
business and information flow of an organization. This methodology aims to transform and streamline the
business processes of an organization by using a combination of the techniques and tools of modern
industrial engineering, operational research, management theory, and system analysis. It results in
breakthroughs in the organization’s quality, responsiveness, flexibility and efficiency. For example,
process flow analysis is a problem identification technique that has its roots in industrial engineering. It
has been successfully used for several decades in various engineering disciplines to study the general
flow of processes that can cross several businesses, shop floors or engineering departments within an
organization.
Implementing a re-engineering project requires significant effort. The main steps included in the
process are as follows:
1. Organizing a steering committee and a project team that will be responsible for the entire reengineering process.
2. Defining and measuring current business processes, including documentation of current
business process flows and steps, as well as information flows.
3. Identifying change opportunities, through a series of brainstorming workshops and
presentations to the steering committee and key stakeholders.
4. Defining the new business process and information flow for the organization, as well as
E-Government – What a Government Leader Should Know
Page 6 of 7
Transformation of Government
documenting the organizational changes necessary for implementation.
5. Obtaining government approval for the recommendations on the new business process of
the organization.
6. Implementing the changes identified in re-engineering process.
Within these steps, three major activities essential for a successful re-engineering programme can be
observed. They are reviewing the existing business processes, identifying the opportunities for change,
and redesigning the business processes.
Re-engineering can help organizations achieve radical improvement over a short period of time.
However, such re-engineering is neither a straightforward nor easy undertaking. It requires vision,
willpower, and a comprehensive approach to change that includes following elements:
•
Leadership and commitment from the top management tier of the organization throughout
the entire re-engineering process; leadership and commitment that can guide change and
lead the implementation.
•
An external perspective seeking why and how to improve existing business processes.
•
Sound methods for re-engineering work processes to meet the strategic objectives and
performance goals of the organization.
•
The appropriate use of modern information technology to enable breakthrough performance.
•
Effective change management to adjust the organization’s people and culture to new ways of
working.
•
Continuous improvement methods to sustain and increase the dramatic gains achieved
during re-engineering.
In practice, re-engineering has been found to be a difficult undertaking. The difficulties start with the
task of documenting the systems currently in place. Actually, the important work of evaluating the current
state of the organization’s systems and business processes is not highly technical work. It requires time
and dedication, both of which are often in short supply. It also requires the formation and growth of a
community of interest within the organization.
E-Government – What a Government Leader Should Know
Page 7 of 7
E-Government Strategies
1.
Introduction
The development of e-government is a long term business. A strategic direction is needed to
identify and guide the way a government should transform itself in response to new opportunities and
challenges. Well organized plans and strategies are needed in the early stages to pave the way for the
success of e-government development. Especially for developing countries, e-government development
strategies can help to achieve e-government milestones in a relatively short time. The success of egovernment initiatives depends on how well they are planned and implemented. Although the basis for
e-government development, such as e-government readiness, infrastructure, and business processes
may vary from country to country, the ultimate goal of e-government is more or less the same.
2.
Priority Setting and Where to Start
It is not enough simply to computerize existing business processes merely for greater efficiency or
cost effectiveness. The processes and the structures themselves and the organizations that deliver them
need to change. However, even in many developed countries, e-government is still very much about
computerizing existing government businesses, rather than reengineering or transforming them and this
fails to take full advantage of the opportunities available.
E-government is a powerful means for administrative reform. Whenever e-government
projects/programmes are being formulated or are going to be launched, opportunities and ways for
transforming the existing administrative structure must be studied. Moreover, it is crucial not to follow
blindly what the other countries are doing with respect to e-government development. Instead, each
country should aim to
•
Understand the global trends of e-government and the potential of ICT for good
governance.
•
Identify its own opportunities for e-government development based on its own situation.
•
Define its own priority areas and develop its own strategy for e-government development.
It is important to analyze existing global e-government projects and to apply the best practices from
successful models as well as to learn from their mistakes. Creating a tailor-made strategic plan relevant to
the actual requirements of a country is the first thing one needs to do when thinking about e-government
development.
Hundreds of issues face government agencies and departments. It is critical to decide where to start, or
how to set the priorities of an e-government development plan. Obviously, the foremost consideration
when planning an e-government project is the nature and extent of the potential benefit. In other words,
whenever an e-government project is going to be launched, the first question is: What can be achieved or
what return on investment is likely to be achieved by the e-government project? No one would be willing
to invest in an e-government project which has neither explicit benefits nor returns. Global experience
E-Government Strategies
indicates that there are three types of benefits or returns that can be achieved from e-government
development. They are economic benefits, social benefits, and benefits of government.
2.1 Priority to Economic Benefits
Those e-government projects which have brought remarkable economic benefits have done so
through
•
Revenue increase, this includes all kinds of systems that can be used for increasing
government revenue, such as: taxation management systems, VAT management systems,
property tax management systems, and custom management systems, as well as
management systems that deal with all kinds of public charges (e.g. toll fees, vehicle
registration fees, and license fees, etc.).
•
Better financial management, this includes payroll management, payment and expenses
management, and different kinds of project and investment management designed to
maintain an effective management of cash flow.
•
Improving resources and planning management, such as geographic information systems
(GIS is the foundation), resource information systems, land and property management
systems, national assets management systems, and city planning and construction
management systems, etc. All these systems can improve management effectiveness so as
to achieve economic benefits.
•
Create a better marketing and investment environment, for example, industrial and
commercial business management systems; national/international trading management
systems; market information systems, providing statistics and an analysis of the economy and
of new technology; patent management systems; foreign capital management information
systems; and legal information systems.
Government information systems which bring such remarkable economic benefits can no doubt
help governments provide better services to businesses and citizens. Moreover, they can increase
government revenue as well. Obviously, increased government revenue may give governments more
financial power to re-invest in e-government projects. Therefore, e-government projects with the
potential to bring economic benefits are the first priority area to be selected in many countries.
Successful implementation of these projects will create a favorable cycle for sustainable e-government
development.
2.2 Priority to Social Benefits
Those e-government projects which have obvious social benefits include
•
Improving services to citizens, including systems for the management of registration
services, such as births, deaths, marriages, divorce, and migration; management systems
for issuing ID cards, passports, driver licenses, unemployment allowance, and
employment support; and management systems for land and housing registration, etc.
•
Strengthening police and public safety, including management systems for immigration
control, criminal and prison management, drug control, transportation monitoring and
management, and other associated public management systems.
•
Better public education and cultural management systems, including systems for
electronic enrolment, for enquiring about diploma and degree certificates, for facilities such
E-Government – What a Government Leader Should Know
Page 2 of 8
E-Government Strategies
as e-library and community information centres, and for providing access to the Internet in
schools and colleges.
•
Improving medical and health care, including hospital information systems and systems for
making appointments online, providing distant medical care, and supporting the online
selling of medicines, as well as organ transplant information systems, blood centres, and
medical insurance systems.
•
Environment protection and environment information systems, including environment
protection information systems, weather forecasting systems, earthquake monitoring, and
alarm systems, etc.
Some e-government projects which bring sufficient social benefits require significant investment.
Although in some instances it may be possible to get a quick return on this investment, in other cases it
may be difficult to get the investment back within a short period. Even though some e-government
projects may not have immediate social benefits, they provide convenience and safety for citizens, and
they improve the quality of government services. At the same time, citizens’ personal skills are
improved through easy access to information and knowledge. Therefore, these kinds of e-government
projects benefit social progress and economic development. Moreover, initiatives of this type can
secure enthusiastic and genuine support from citizens and thereby help maintain social stability and
safety.
2.3 Priority to Benefits of Government
Informatization is a powerful tool that can not only improve government but also transform it. Egovernment projects benefit government by
•
Improving effectiveness and efficiency of core government business, through systems for:
national defense, security and intelligence; the provision of information to executives and
high-levels of government; management of public communications and internal
telecommunications systems; decision-making; and information and knowledge
management.
•
Increasing transparency and strengthening anti-corruption, by providing more effective
systems for internal financial management, personnel management, auditing, eProcurement, public tendering for government goods and services, etc.
•
Development of government information, through systems for the management of different
kinds of legal information and information about government instruction/orders and
systems for the management of documents, records and archives.
E-government covers a wide variety of government business; all the systems and the projects
listed above are examples that can be taken into consideration when the development of e-government
is being planned. Which ones are selected will, of course, depend on the priorities of the government
which must also take into account diverse points of view.
3.
‘Think Big, Start Small, Scale Fast!’
In moving towards e-government, one thing is clear above all else, initiatives must be more than
front-end showcases that mask internal chaos. Instead they must demonstrate new ways of thinking,
new ways of doing business, new alliances and new technology. Therefore, for any e-government
development, it is important to follow the strategic principle: ‘Think Big, Start Small, Scale Fast’ (Figure
E-Government – What a Government Leader Should Know
Page 3 of 8
E-Government Strategies
1.1). This principle has become fundamental in global e-government development and information
systems engineering. Follow it and succeed; otherwise ignore it and, most probably, fail! This is due to
the complexity of information system engineering which is susceptible to dominating factors which
include: the nature of closely–related business, the influences of human behavior, the costliness of ICT
products and the necessity for big investment with possible ambiguous investment returns and rapidly
advancing technologies.
Figure 1.1 Think Big, Start Small, Scale Fast
‘Think Big’ means that an overall picture of e-government development should be sketched out
before any concrete e-government initiative is implemented. In this regard, first of all, ‘Think Big’ implies
that a vision and an insight for e-government must be formulated. Secondly, the short- and long-term
objectives and goals of e-government development in a country or region must be clearly defined.
Thirdly, the priority areas of e-government development must be identified and a development plan
worked out. Fourthly, the funds for the planned e-government projects need to be in place. Finally, all
the issues which influence the projects to be implemented should be given careful consideration. Issues
include legitimacy, regulations, norms and standards, and organization and management. ‘Think Big’
does not mean planners of e-government should have a large-scale e-government plan with huge
investment. On the contrary, the imperative is to make the e-government development realistic,
sustainable and carried out with full discernment and imagination.
‘Start Small’ suggests that no matter how grandiose an e-government plan is, or how large an egovernment project is, they must start on a relatively small scale or with a relatively small portion of the
total plan. The purpose of ‘Start Small’ is to ensure the success of e-government initiatives. As far as
how to select the ‘relatively small portion’ is concerned, it must be simple, easy to achieve, require
reasonable investment, and carry the least risk. By carrying out the initial project successfully in this
way, the project team will be given credit, gain substantive experiences, learn lessons, and win further
support from users and top management. More importantly, all the problems, resistance, and potential
obstacles will be exposed which will definitely benefit the entire e-government plan or project.
‘Scale Fast’ implies that anything achieved in e-government initiation should be applied and/or
extended to similar business activities within the entire government agencies or branches promptly so as
to enlarge the ‘victory’ and obtain as much economic and social benefit as possible. ‘Scale Fast’ also
means keeping pace with and making full use of the advanced technologies, otherwise the ICT
products which are procured would soon become either obsolete or out of date.
E-Government – What a Government Leader Should Know
Page 4 of 8
E-Government Strategies
4.
Development Strategies
There are a number of other development strategies related to e-government development.
4.1 Early identification and resolution of common policy issues and practical
challenges
As government agencies place information and services online and begin to implement their egovernment projects, it is inevitable that they will face a series of common policy, administrative and
managerial issues; and a lot of practical challenges, such as the creation of government standards for
public data and information, norms for common government business, and standards for information
security. An important strategy that governments should place emphasis on is the early identification
and resolution of common issues and challenges. Some of these enablers will assist agencies to
overcome practical problems, while others will provide guidance about which approach to adopt where
no obvious choice currently exists. Doing so will not only accelerate the progress of e-government
development but will also save much investment.
4.2 Building User’s Confidence
One strategic priority for a government to consider is the early development of a legal and
regulatory framework to facilitate electronic commerce. It is important to gain the confidence of all
people that online information and transactions are private and secure, and, where necessary, that the
identity of the counter-party is authenticated. Some aspects of user’s confidence can be dealt with in an
economy-wide manner, such as the passage of an Electronic Transaction Act to provide legal certainty
for online transactions. In this respect it is important to secure the following three features if egovernment is to be successful:
4.2.1 Authentication
A common feature of online service delivery and financial transactions is the need for each party in
the transaction to ensure the authenticity of the other party, and to ensure the integrity and security of
the information exchanged as part of the transaction. Electronic authentication technologies, such as
‘public key infrastructure (PKI)’, provide a means to meet these requirements. Many governments have
already set up a priority for developing these facilities while others already have them in place. A specific
public key digital signature process that assists both business and government agencies in dealing with
government is also important for electronic transactions or electronic document exchanges. An online
digital signature certificate, which authenticates the identity of a business or government agency,
should be linked to a government’s PKI and be used by all agencies.
Electronic authentication technologies should be a part of online service delivery initiatives if a
substantive e-government system is going to be established.
4.2.2 Privacy
The protection of personal information on the Internet is widely regarded as a threshold issue for
many people who use, or who are considering using, the Internet for providing information to, or
transacting with, government agencies. Therefore, many governments attach great importance to
finding a solution for this. A survey carried out in the United States in the year 2000 showed that 65% of
American people hoped that the pace of e-government would slow down because of concerns about the
ability of the Government to protect citizens’ privacy.
Many governments are already bound by a Privacy Act passed by their legislative body and already
E-Government – What a Government Leader Should Know
Page 5 of 8
E-Government Strategies
handle personal information in accordance with the information privacy principles. It is the responsibility
of government departments and agencies to ensure that their websites and other online activities
comply with the Privacy Act. Some governments also articulate guidelines to agencies to assist them in
ensuring that the privacy practices of their websites and other online activities comply with the Privacy
Act. Such guidelines cover openness, collection of personal information, security of personal
information, publishing personal information, and so forth. As part of the e-government strategy, some
governments also require agencies to comply with these guidelines within a timetable or a specified
timeframe.
4.2.3 Security
The security of personal information is also a threshold issue of concern to potential and current
online users, even if the user is confident about the privacy practices of the agency. Cryptographic and
authentication technologies can provide security while a transaction is conducted, but users require
more than this. They want reassurance about the totality of an agency’s security, including the storage
of information after a transaction is completed.
For this reason, agencies are required to devise an information systems security policy and
implement plans to ensure government information systems are appropriately protected. Government
agencies are also required to comply with security guidelines developed by relevant government
authorities, in order to protect classified or unclassified online information. Usually, such guidelines will
describe the steps to be taken to evaluate a number of features including the security situation faced by
the agency, threats to security, consequences of security attacks, and the planning and implementation
of information security measures required by the government.
4.3 Agency-Based Approach
Each government agency should be requested to develop its understanding of the online
environment; what the online needs of clients are, what the possibilities are, and how best to deliver
services. Each agency needs to adopt a thorough and systematic approach to placing its information
and services online.
Each agency’s government online action plan should
•
Be based on the analysis of existing government information capacities, including national
or regional information infrastructure, various information systems and computing powers,
and human resources.
•
Be based on a comprehensive audit of the agency’s information, transactions, purchasing
arrangements, and other external dealings.
•
Be related to the agency’s customer service charter and identify all functions which
potentially could be made available online.
•
Identify services which could be coordinated with the delivery of services of other agencies.
•
Identify an indicative timeframe for bringing all their functions online.
•
Indicate impediments which need to be removed to achieve the goals of e-government.
An e-government plan should also address issues such as legislative issues, costs and benefits of
the Internet service delivery, and risk control strategies for the Internet and other electronic service
delivery. The strategies will also need to ensure that there are minimum mandated common standards
E-Government – What a Government Leader Should Know
Page 6 of 8
E-Government Strategies
and online requirements.
Some government business processes are common to all agencies and are particularly well suited
to being delivered online. Each government agency should commit to moving all appropriate common
and routine business processes either online or to other electronic mechanisms in order to maximize the
efficiency of these processes for both the government and those that deal with the government. For
example, government e-procurement will reinforce the trend towards simplified electronic systems and
will perform an exemplar role.
4.4 Monitoring Best Practice and Progress
Experience to date has already illustrated the potential for all government agencies to benefit from
well-documented examples of best practice. In such a dynamic environment as the Internet, if best
practice examples of information and service delivery can be quickly identified and disseminated to
agencies, it will be possible to accelerate the movement of government to an online environment, and
thereby improve service quality and reduce costs more quickly. A lack of knowledge of examples of
best practice can be an impediment for an agency looking to move information and services online.
5.
Bridging the Digital Divide
Information technology opens new vistas for humankind and promises to improve our study, work,
and leisure. Information technology offers possibilities to broaden and to accelerate the global integration
of information networks, of economic activities, and of social, political, and cultural pursuits. Casting a
shadow, however, on these inviting prospects are multiple asymmetries that still bedevil the progress of
an information society. Currently, as a result, many developing countries and countries with economies
in transition are only passively integrated, if at all, into the global economy. An absolute majority of
enterprises in these countries have neither the capacity nor the means to be an active player in the
globalization process. Thus, the primary beneficiaries of globalization are trans-national corporations
and developed countries.
One of the principal causes of the asymmetries produced by technological progress is the widening
divide between those who can access and actively participate and those who do not have access to
global information networks. This is the digital divide. In a knowledge-based economy, economic
activities have become increasingly information intensive. Information has become as important as, or
more valuable than, land and physical capital. The ability to utilize the information available worldwide,
including the Internet, and to translate it into knowledge for productive activities has become a critical
factor not only for the survival of enterprises, but ultimately also for public organizations. Remaining on
the cutting edge requires the acquisition of state-of-the-art technology to capture, process, generate,
and transmit information.
Yet, in today’s world, the digital divide is emerging everywhere, not only between the developed and
developing nations but also within countries. Recent surveys indicate that, even in the industrialized
world, typical network users are middle-class, young adult or adolescent, and male. The poor, disabled,
older, or poorly educated have not been introduced to new technology and may continue to be
excluded from it. In many developing countries, access to the Internet remains a distant dream. Ability
to access information and knowledge has turned into a ridge dividing rich and poor.
A series of measures has been taken to bridge the digital divide worldwide. In the United Kingdom,
governments have set up PCs with Internet access at public libraries free of charge. In Jamaica, PCs
with access to the Internet are available in Post Offices at affordably low fees. In Italy, some city
governments provide free Internet access and e-mails to all the citizens. In Canada and Singapore,
E-Government – What a Government Leader Should Know
Page 7 of 8
E-Government Strategies
governments offer financial assistance to families with low incomes. In India and in some other
countries, information kiosks are becoming popular, where not only is Internet access available but
access to the public services, such as receiving payments for water, gas, electricity, and others is also
available.
When transforming government into e-government, providing access to technology is viewed as a
powerful enabler helping to bridge the digital divide. However, in a citizen-centered approach to the
digitization of information, citizens’ needs and requirements must be identified first. Technology is used
to meet these needs so as to encourage and attract citizens to access the Internet, and, as a result,
bridge the digital divide.
Actually, in many countries the digital divide issue has been addressed at a higher level through
the development of various policies. Governments attempt to break down both the physical and
psychological barriers associated with the digital divide. A range of suitable media is used to maximize
the use of available telecommunication infrastructure and existing community resources. A proliferation
of delivery channels is used to mitigate against limited access due to a lack of ICT knowledge or skills,
financial restrictions, language, or disability barriers.
Most e-government initiatives provide citizens with easy access to relevant, consolidated district,
county, and national information and services. At the same time, e-government initiatives should focus
on producing a locally named and designed website. Local websites provide citizens with access to local
knowledge, services, and learning opportunities. A community portal with a local identity, rather than a
national or regional perspective, can make citizens more likely to trust electronic interaction and learning.
This acts as a catalyst for greater knowledge sharing and the development of learning opportunities.
These websites provide a personalized interface for citizens to explore areas of interest and need and
to interact with other local and wider community members.
Wider community isolation and employment issues are resolved through the use of web-based
information, local business information, email services, and online access to educational facilities.
Citizens on an individual level are helped to acquire knowledge, develop skills, and to pursue leisure
interests and opportunities. Citizens are also empowered to campaign and to participate in the
democratic process, and to publish and broadcast opinions and ideas. Moreover, web-based
government business can support and develop small businesses, open up new avenues of
communication, improve public agency service delivery, and support existing regeneration objectives
and programmes.
Governments have to innovate and exploit the existing information infrastructure and to build
services around citizens’ needs in order to make public information and services accessible and useful.
Sustainable returns in e-government can be made if citizens’ ICT skills and knowledge are improved to
fit the new e-driven business processes.
The creation of a knowledge-based economy is not an impossible dream for developing countries.
However, moving to a knowledge-based economy may not be either feasible or meaningful for all
countries, especially in the short term. It is important to note that bridging the digital divide is not simply
an issue of building an information infrastructure, nor of buying and handing out computers and modems
to all citizens. Indeed, moving to a knowledge-based economy involves more than just acquiring and
using information technologies. Specific policy choices, the ability to absorb new technologies, and
success in creating a favorable national culture are also important factors.
E-Government – What a Government Leader Should Know
Page 8 of 8
Related Laws and Regulations
1.
Introduction
The tremendous importance of computer applications and information systems has made issues
surrounding relevant laws and regulations increasingly crucial for any country developing or implementing
e-government initiatives. In e-government development some issues require immediate attention while
others can be faced in the medium or long term. Early attention to laws and regulations will benefit the
creation of an environment that will facilitate the development of e-government. Issues that are of
immediate and pressing importance include electronic documents, data security, privacy, statistical
disclosure, protection of intellectual property, vulnerability, computer crime and fraud, and transborder data
flow.
However, technology is developing much faster than the legal systems and law making process. No
adequate laws may exist, and sometimes there is no legal protection offered against the misuse of
certain new technology. In these circumstances, it is imperative that ethics take over to manage what
would otherwise be a very chaotic situation. Since it is not feasible to discuss the legal practices with
respect to computers and the Internet in every country around the world, a number of selected laws and
regulations covering common issues will be mentioned in this module.
2.
On Access Control
As a result of computerization, there is an increased danger of unauthorized penetration and use of
sensitive and confidential data and of the destruction of databases and communication networks. Concern
over the security of data and information systems has led to regulations that address information system
design, personnel, operation and data transmission. For example, a standard rule for data security may
include guidelines on
•
The designation of a data security manager.
•
The management of magnetic data files and records of inputs and outputs.
•
The management of documents (on system design, operation procedures, code books etc.).
•
The management of the operation of computers and terminals.
•
The maintenance and security of computer rooms and facilities to store magnetic files.
•
The contracting out of computer work.
•
The provision of data to outside people. Regulations regarding the handling and
transmission of classified data and information stipulate that scramblers and encoding
devices must be used to prevent unauthorized access to information while it is being
transmitted.
Related Laws and Regulations
The Access to Information Act and Regulations of Canada provides a right of access to information in
records under the control of a government institution in accordance with the principle that government
information should be available to the public. Necessary exceptions to the right of access are limited and
specific and decisions on the disclosure of government information are reviewed independently of
government. This act ensures that effective and consistent administration concerning the access to
information in records is controlled by government. Records defined in the Act are extendable to records
that do not currently exist but are able to be produced from a machine-readable record using computer
hardware and software and the technical expertise normally used by the government institution.
The Criminal Code of Canada has two related sections on unauthorized access (hacking), i.e.,
Section 342.1: Unauthorized use of computer and Section 342.2: Possession of device to obtain
computer service. These two sections address issues on using unauthorized user names, passwords,
computer addresses, or identities. They also address modifying assigned network settings that are used
to gain access to computer resources and/or data, or to evade, disable, or ‘crack’ the security provisions of
organizational or external systems. They stress that every effort must be made to prevent the unauthorized
disclosure and distribution of information that is the property of an organization.
3.
On Data Privacy
The provision for the privacy of data normally involves legislation and administrative guidelines for
ensuring that the collection, maintenance, and dissemination of an individual’s information by the
government are consistent with the laws relating to confidentiality. The acceptability of the use of the data
must be based on the individual’s fundamental confidence that government organs and other data users
will deal justly with him/her, that he/she is legally protected and that despite his/her relative impotence,
he/she will not be abused. The government information systems should prevent access to data that is
legitimately secret, confidential, private, or otherwise not accessible under the law and prevent improper
interference with or erasure of the record. A most controversial issue is the use of national individual
identification numbers that information systems can use for various administrative purposes. Easy access
to data on individuals from various administrative offices makes public administration extremely
efficient. However, crucial questions arise concerning the protection of the privacy of individuals, the extent
to which the data can be retrieved, and so on. Consequently, different mechanisms of securing privacy
must be devised.
Much of the data gathered or information compiled by government agencies is legitimately of interest
to organizations and individuals outside the government. Accordingly, legislation should exist to make
information of interest available to the public. In particular, surveys and statistics on various subjects
should be routinely made available to the public. In addition, individuals should know what personal
data relating to them is on file, why this data is needed, how it will be used, who will use it, for what
purpose, and for how long. Data subjects should be able to verify data related to them and have the right
of redress.
The Data Privacy Act of the United States of America (H.R. 2368) introduced in 1997 helps to cut
out, at the source, the dissemination of Social Security numbers, unlisted telephone numbers, and
other personal information, such as date of birth, postal address, and mother’s maiden name. This is
important because this kind of information is subject to serious abuse. For instance, this information
can be used to open fraudulent charge accounts, to manipulate bank accounts, and to gain access to
the personal records of others.
The Privacy Act of 2003 of the United States of America attempts to stem the rising tide of identity
theft and other privacy abuses through legislation by setting a national standard for the protection of
personal information, including social security numbers, driver’s licenses, and health and financial data.
E-Government – What a Government Leader Should Know
Page 2 of 6
Related Laws and Regulations
The Act establishes a two-tiered system of protection for all personal information. For the most sensitive
personal information such as social security numbers, an opt-in system has been put in place that requires
organizations to obtain an individual’s explicit permission prior to the sale, licensing, or renting of the
information to third parties.
The Data Protection Act of the U. K was first introduced in 1984. The amendment in 1998 brings
the Act into line with other European countries, in particular Germany and France. The main objectives
of the Act are to protect personal privacy and to enable the international free flow of personal data
through harmonization. The principles of data protection state that personal data must be processed
fairly and lawfully (e.g. include preconditions); obtained and processed for specific purposes; relevant
and not excessive; accurate and up-to-date (where appropriate); kept no longer than necessary;
processed in accordance with data subject’s rights; kept appropriately secure; kept within the EEA
(European Economic Area) unless adequate protection is available outside.
4.
On Electronic Documents
Electronic Document means data that is recorded or stored on any medium, in or by a computer
system or other similar device, and that can be read or perceived by a person, a computer system, or
other similar device. It includes a display, printout, or any other output of that data. (See also below:
The Personal Information Protection and Electronic Documents Act of Canada)
The purpose of laws or regulations on electronic documents is to provide for the use of electronic
alternatives where the law specifies the use of paper to record or communicate information or
transactions. Together with secure electronic signatures, electronic documents can be used to
authenticate business transactions and to provide evidence in legal proceedings.
The Personal Information Protection and Electronic Documents Act of Canada was introduced in
2000. The second part of this Act defines that an electronic document is data that is recorded or stored
on any medium, in or by a computer system or other similar device, and that can be read or perceived
by a person, a computer system, or other similar device. It includes a display, printout, or any other
output of that data. In government terms, the Act allows the provision of information and documents in
an electronic form that are signed by the Minister or a public officer with that person’s secure electronic
signature to be admissible as evidence as it satisfies federal laws. The Act states that the electronic
document should be retained for a specified period in the format in which it was made, sent or received,
or in a format that does not change the information contained in it. The Act also states that:
1. Information in the electronic document will be readable or perceivable by any person who
is entitled to have access to the electronic document or who is authorized to require the
production of the electronic document.
2. Any information that identifies the origin and destination of the electronic document, and
the date and time when it was sent or received should also be retained.
ISO/DIS 17933 of 1998 is an international standard on generic electronic document interchange. It
defines a format for the exchange of electronic documents between computer systems. In this regard,
the standard places emphasis on two areas: the definition of electronic document format, and the
description of the interchange mechanism. The standard provides a common ground for the
development of electronic document delivery services. Use of the standard makes it relatively easy to
develop links between different delivery services and presents a general model for the interchange
process underpinning electronic document delivery. It provides suppliers and consumers with the facility
to enable the transfer of electronic documents.
E-Government – What a Government Leader Should Know
Page 3 of 6
Related Laws and Regulations
The Electronic Freedom of Information Act Amendment 1996 of the USA requires all federal
agencies to use electronic information technology to foster the public availability of electronic
documents. Government agencies increasingly use information technology to conduct agency
business, and to store records of value to the public as well as information in electronic forms. The Act
provides individuals with the right to access those records that are in the possession of the federal
government.
5.
On Copyright and Patent
One of the major areas with which the terms of computer law are concerned is the relationship
between copyright and patent law, and the legal protection of software. The emergence of sophisticated
equipment, software programmes, and application packages emphasizes the importance of legal protection
for intellectual property through national legislation. This includes software protection, patenting, and
copyrighting. The development of software and computers must be protected against illegal copying to
ensure that developers are properly rewarded for their work and to encourage others to enter the
marketplace. Traditional means of protecting intellectual property are copyrights and patents. Information
technology brings a number of problems to this area, for example: the problem of distinguishing between
the central idea captured in a programme and the programme itself; and the distinction between hardware
and software is increasingly blurred.
The Copyright Act of Canada establishes and protects ownership and the corresponding rights to
produce or reproduce works, or any substantial part of them, in any material form, and to perform or publish
them. The Act identifies actions representing infringement, identifies remedies to which the owner is
entitled in cases of infringement, and establishes the process of copyright requests and of maintaining a
register of copyright. The Copyright Board administers the Act, rules on issues, and certifies royalties.
The Software Copyright of UK states that it is a criminal offence to copy/use licensed software
without permission. Proprietary software products are usually supplied under a license agreement that
limits the use of the products to specific machines and may limit copying to the creation of back-up
copies only. FAST (Federation Against Software Theft) and BSA (Business Software Alliance) actively
seek out prestigious organizations to prosecute. Whilst it takes significant effort to keep track of
licensing, it is important to improve everyone’s awareness about software copyright.
6.
On Computer Crime
Computer crime is one of the major areas of concern in terms of computers and the law. It has
become one of the most publicized aspects of computer use. The various crimes associated with computers
are difficult to evaluate in terms of either magnitude or frequency, but it seems safe to say that the number
and variety are increasing and that the stakes are growing. Computer crime involves the use of the
computer, with or without computer networks, to steal or embezzle money in a manner that could not
easily have been done otherwise. There are also such crimes as stealing computer time, unlawful access
to files, the acquisition of privileged information, and the actual destruction of computer files. This last
activity has probably become the most highly publicized, and terms such as ‘virus’ and ‘worm’ have
penetrated the public consciousness. In industrial countries, while much computer crime has traditionally
been perpetrated in banks, small and large companies, and government bureaucracies, viruses have had a
direct impact on ordinary citizens at home. Computer viruses seem to arrive as regularly as biological ones
and occasionally with the same devastating effects.
E-Government – What a Government Leader Should Know
Page 4 of 6
Related Laws and Regulations
To safeguard against computer crime in government information systems, it is necessary to adopt
‘minimum’ legislation with regard to
•
Data safety and requirements, which should be based on internationally accepted technical
standards.
•
The protection of users and the public under predetermined conditions.
•
The transborder flow of data to ensure that confidential or sensitive information of vital
national interest is stored and processed only within the borders of the country itself.
The Computer Fraud and Abuse Act of the United States of America (CFAA) was introduced in
1986. This Act punishes anyone who intentionally accesses without authorization a category of
computers known as ‘federal interest computers’ and damages or prevents authorized use of
information in such computers, causing the loss of $1000 or more. The issues raised are (i) whether the
government must prove not only that the defendant intended to access a federal interest computer, but
also that the defendant intended to prevent authorized use of the computer’s information and thereby
cause loss; and (ii) what satisfies the statutory requirement of ‘access without authorization’.
The Computer Misuse Act of the United Kingdom was introduced in 1990. It covers unauthorized
access (hacking) and unauthorized alteration/destruction (e.g. through viruses, Trojan horses, logic
bombs, etc). ‘Unauthorized’ includes exceeding authority. It is essential, therefore, that all users are
aware of the precise scope of their permitted access. Any use of the information processing facilities for
non-business or unauthorized purposes, without management approval, should be regarded as
improper use of the facilities. This Act widely protects all systems. It is a criminal offence to misuse
computers in most countries and, now, almost all developed countries have a relevant Act. However,
this is not completely the case internationally and it is difficult to prosecute people or organizations
involved in such activities outside the protected countries.
7.
On Electronic Signature
The primary intent of the laws and regulations on electronic signatures is to spur e-commerce and
e-government by clearing legal impediments to electronically signed records. This ensures security and
trust in electronic communication. Although some are more technology-specific requiring public-keybased digital signatures, most of them promote both flexibility and diversity in government e-signature
use.
The EU Electronic Signature Directive 1999 covers the use and legal recognition of electronic
signatures within the European Union. It ensures that electronic signatures can be used as evidence in
legal proceedings in all Member States. It establishes a legal framework for electronic signatures and
certain certification-services in order to ensure the proper functioning of the Internet market. The
Directive requires each Member State to ensure the establishment of an appropriate system that allows
for the supervision of the certification-services-providers established on its territory and which issue
certificates to the public. Member States may make the use of electronic signatures in the public sector
subject to possible additional requirements. The Directive does not seek to harmonize national rules
concerning contract law with reference to e-signatures, particularly the formation and performance of
contracts, or other formalities of a non-contractual nature. However, Member States shall bring into
force the laws, regulations, and administrative provisions necessary to comply with the Directive.
E-Government – What a Government Leader Should Know
Page 5 of 6
Related Laws and Regulations
The Government of the United States of America has enacted a variety of electronic
signature laws. Electronic Signatures in Global and National Commerce Act went into effect in
2000. The Uniform Electronic Transactions Act and the federal Government Paperwork
Elimination Act also encourages the use of e-signatures. These laws provide U.S. federal, state,
and local governments with the flexibility to implement a variety of e-signature technologies to
meet specific needs.
E-Government – What a Government Leader Should Know
Page 6 of 6
E-Government Related Standards1
1.
Introduction
Standards play a key role in the healthy and smooth development of governmental information
infrastructure and systems. The compatibilities of hardware, software, and communication facilities of
organizational information systems are secured by standardization as are the compatibilities that enable
sharing of data/information within and outside government agencies. The broad social and economic
benefits in the proliferation of information systems largely rely on standardization because standards are
the tools for raising productivity, avoiding duplication of efforts, and reducing the risk of investing in
complex systems. Standardization practices help government agencies to more fully utilize the skills of
their staff members and reduce their training costs. Standardization is a tool for managing change and for
protecting the increasing volume of computer data/information, as well as a method of raising the level of
science and technology and the quality of management.
2.
Developing and Issuing Standards
Government performs a key role in the standardization of information systems. It is the government’s
mandate to set clear policies and objectives for the standardization of government information systems. It
can do this through the precise definition of their fields of applications and their nature (descriptive or
normative) and through the process of their development, updating and maintenance. Of course, the State
Bureau of Standardization, if it exists, would take the main responsibility for the development of various
standards of information systems. If it does not exist it is helpful to set up an ad hoc national commission
responsible for setting priorities, planning, organizing, supervising, and maintaining the various kinds of
standards identified. The recommended terms of reference of the commission are
1. To make sure that standards are taken into account in all fields of information system policy,
training, procurement and in associated regulations and laws.
2. To organize a review of existing information systems according to development priorities to
ensure the use of standards where necessary.
3. To review all significant information system projects to ensure that information standards are
taken into account.
4. To organize the updating of standards (especially classifications) in order to keep them
consistent with developments in legislation as well as in technology.
5. To make sure that when changes are made in legislation, the necessary time is allowed to
1
‘Database Management Systems Standards Committee Recommendation’ and ‘Email,
Directory Services & Security’ by State of Colorado; ‘Desktop Standards’ by CIO Forum Desktop
Subcommittee are the main references of this session.
E-Government Related Strategies
adapt the affected information systems.
6. To avoid obstacles to innovation or the setting of standards that could prove inapplicable and
counterproductive, by involving all the relevant institutions of the public and/or private
sectors in their development.
While developing and issuing the standards for government information systems, it is essential to edit
and disseminate various guidelines to the government agencies. These guidelines may
•
Assist in the selection and evaluation of information technology resources.
•
Provide technical or economic criteria for making choices among several alternative practices.
•
Assist in the implementation of a standard.
•
Establish a recommended practice when a mandatory standard might inhibit developing
technology or overly constrain management options. In addition, sufficient attention should
be paid to existing corporate, national, and international standards, such as ANSI
(American National Standards Institute), ISO (International Standards Organization), and
de facto industrial standards, such as those developed by Microsoft.
Standards for Government information systems are usually composed of data standards, technical
standards, methodological standards, and security standards.
3.
Data Standards
Data standards help to eliminate duplication and incompatibilities in the collection, processing and
dissemination of data and promote useful information interchange. Standards facilitate inter- and intradepartmental data sharing. Data standards are used by core business functions to promote maximum
efficiency, accuracy, and return on investment. Their use is a necessary step towards data integration
across boundaries between government agencies.
To fully realize the organizational benefits, data standardization should also include data elements
and data exchange standards. Standard data elements and representations for geographic places, dates,
time, industrial classifications, government organizations, and other identified priority entities (individuals,
business enterprises, land units, buildings, vehicles, etc.) are prerequisites for the development of
government information systems.
During the establishment of data standards, lists of basic entities and priorities should be identified
first and unambiguous definitions should then be assigned to the basic entities according to the legal
environment. A thorough evaluation of the quality (coverage, reliability) of existing registers needs to be
conducted and amended as necessary. Meanwhile missing registers should be identified and steps
taken to establish them. Adequate common identifiers for each basic entity will then be designated to
identify the minimum information sets to be included in the basic register consistent with existing privacy
regulations. Finally, access to and use of the basic registers within the public sector information systems
can be organized.
Data classification is another important issue in developing data standards. In this instance, it is
necessary to identify key information items of common use in government information systems or those
which are essential for planning and development such as economic data. Each information item should
be defined and related to the relevant basic entity. Classification(s) to be used for these information
items can then be identified.
E-Government – What a Government Leader Should Know
Page 2 of 5
E-Government Related Strategies
While developing its national or governmental data standards it is important for any country to make
full use of, and act in consistency with, the relevant existing international standards. This is because, on
the one hand, it would benefit global information sharing, which has been particularly important in the
Internet age; and, on the other hand, it would provide a short-cut to setting up national standards.
Developing national data standards requires tremendous human and financial resources and can be
time consuming. For many countries, in particular, the least-developed countries, this is a heavy burden
and likely an unaffordable one. The use of international standards can reduce the burden.
4.
Technical Standards
Technical standards include those for hardware, software, and telecommunications, as well as
information systems as a whole. As the common foundation for developing government information
systems, a consistent set of standards for the description of the technical architecture of government
information systems (such as networks, servers, security systems, etc.) should be chosen. A limited set of
hardware standards needs to be selected to facilitate compatibility and data communications, including
operating systems and formatting. A unique set of telecommunication standards and protocols should be
designated in order to ensure the development of data transmission within the government, from the
cabling systems to the user interface. A limited set of software for mainframes, servers, as well as
microcomputers (e.g., database management systems, word processing) should also be chosen in order
to facilitate the setting up and use of common databases, and to reduce the costs of applications
development and training.
The objectives of these standardizations are to
•
Leverage the buying power of the entire organization to acquire the most economical
units.
•
Enable easier maintenance of standardized units by reducing fragmented configurations
and improving the ability to troubleshoot that would have otherwise increased the cost of
ownership.
•
Reduce resources required to acquire hardware and software.
•
Eliminate ‘rogue’ applications.
•
Enforce software licensing.
•
Facilitate communication and information transfers among the organization’s employees.
•
Improve technical support and training by reallocating funds saved at the initial purchase.
It is obvious that the main reason organizations should adopt these standards is to improve overall
business productivity, which means cost savings. Organizations should focus on the functions and
specifications required for standardization rather than on the specific products. This is because of the
pace of technological change and the fact that this approach increases the possibility of leveraging buying
power during product acquisition.
5.
Methodological Standards
Methodology is an approach, a method, or a technique for developing information systems. The
methodology employed guides planners in the desired working method. These standards define common
E-Government – What a Government Leader Should Know
Page 3 of 5
E-Government Related Strategies
terminologies and offer a standardized job plan, while allowing greater diversity in individual practices that
is characteristic of successfully developed projects. They can also reduce confusion.
Methodological standards involve choosing a unique and consistent set of methodologies covering all
the steps of information system planning, design, implementation, and evaluation, for example:
•
Information system planning methods.
•
Information system design methods.
•
Software engineering methods.
•
Quality assurance and testing methods.
•
Security and maintenance methods.
•
Performance assessment methods.
It is the popularization, publication, and use of these standards and methods that guarantees the
quality and success of information systems development. Therefore, it is necessary to make sure that these
methods are made mandatory and are applied by contractors in all public sector service projects, including
procurement. It is also necessary to make sure that these methods are introduced at the appropriate level
in the training curricula provided by the various institutions contributing to the initial and in-service training
for public administration professionals and managers. In addition, it is important that the processes are
designed in such a way that they can be amended or replaced whenever necessary or appropriate.
6.
Security Standards
Security standards help organizations to protect their information systems from possible threats
through effective and sufficient countermeasures and activities that safeguard the information used in the
course of government business activities. A government policy should be issued to establish and fix the
responsibility for security within the government. This will also be useful in setting the stage for the
subsequent issuance of security standards within the government.
Security standards should be formulated on the basis of risk assessment. These standards should
specify security issues and problems, the ownership of government information resources, and the
protection afforded to them, including the responsibility of users/owners for the care of the information
resources entrusted to them. They will also cover access control and formal programmes. The
responsibility of users and owners of information resources should include the physical security of
physical resources, e.g. microcomputers, servers, LANs, and the Internet connections, etc., under their
care.
Security standards are developed to support
•
The categorization of information and information systems for security purposes.
•
Selection of appropriate security controls for information systems.
•
Verification of security control effectiveness and determination of information system
vulnerabilities.
•
Operational authorization for the processing (security accreditation) of information systems.
E-Government – What a Government Leader Should Know
Page 4 of 5
E-Government Related Strategies
Therefore, security standards aim to achieve
7.
•
More consistent, comparable, and repeatable evaluations of security controls applied to
information systems.
•
A better understanding of organization-wide mission risks resulting from the operation of
information systems.
•
More complete, reliable, and trustworthy information for authorizing officials – thereby
facilitating better informed security accreditation decisions.
•
More secure information systems within government agencies including the critical
infrastructure of the country.
Normalization of Government Business Processes
As described in the horizontal model of a government presented in ‘Modelling Government
Business’ (Part 1, Module 4) government agencies share many common functions, such as financial
management, personnel management, document management, archive management, etc. Obviously,
there is no need for every agency to develop its own financial, personnel, document, and archive
systems. Standardized software sets for these commonly-used systems will no doubt minimize a
government’s need to invest in system development, facilitate information sharing, and promote the
popularization of the application systems. In certain cases, it will promote the development of the
national software industry as well.
In order to achieve this, however, the prerequisite is to normalize the business processes of
government agencies for financial management, personnel management, document management,
archive management, and so forth. Data and data models of a business process can be standardized
only once the business processes are normalized. From this point of view, normalization of government
business processes is not only significant in the improvement of the quality of government administration
and management; it is also important to the development of e-government.
E-Government – What a Government Leader Should Know
Page 5 of 5
Methodologies of e-Government Systems Development
1.
Methodologies for Information System Development
Methodologies, specifically systems development life-cycle methodologies, provide the framework and
the sets of procedures within which the myriad of tasks involved in the development of e-government can be
performed. Most methodologies cover the entire span of development activities from project initiation
through to post-implementation review. A methodology for system development is a formal and
structured approach that outlines and describes sequentially all phases, tasks and considerations that
are necessary for a successful project. The framework and the set of procedures will ensure that each
development phase is carefully planned, controlled and approved; that each complies with set
standards; that each is adequately documented; and that each is properly staffed.
From the viewpoint of management and control, the methodologies of information systems will
•
Use the experience of experts and other system developers for reference, and thus provide
managers who are new to the process with a check list of steps that should be taken and
questions that should be answered so as to facilitate the development of information
systems.
•
Provide a historical record of the development process, through the use of a formal
methodology and required documentation that could be used for the future planning and
evaluation of information systems.
•
Allow user-managers better control over the progress of the project and thus increase the
usability of the end results.
•
Permit the transfer of design from one application to another and the transfer of personnel
from one project to another.
It is essential, therefore, that the development of e-government systems be undertaken according to a
set of formal procedures or methodologies.
Before an e-government system is developed, an in-depth examination of the business processes
associated with the system, including interactions within or between the government agencies, must be
carried out. Information systems are designed to computerize and re-engineer related business
processes so as to improve effectiveness, efficiency, and productivity of government business. Obviously,
without streamlined business processes, or business flow, there will never be streamlined information
flow within or between government agencies. That is the reason why Business Process Redesign (BPR)
and re-engineering have been very popular in industrial countries since the 1980s.
There are three different types of information system development resulting variously in
•
Information systems which have custom-designed software, i.e., system application software
are custom-designed to meet the special needs of the users of the information systems to
Methodologies of e-Government Systems Development
be developed.
•
Information systems which use packaged software, i.e., software developed by a third party,
either vendors or consultants, which is used as the fundamental application software. Of
course, some customization work may be inevitable.
•
Information systems re-engineered from existing ones, i.e., existing code and data is reengineered and migrated to a new advanced software technology environment and
platform in order to modernize and enhance the functionality of existing information
systems. Or, getting old ‘legacy’ systems to fit into a modern system, by the use of
connectivity products.
With the development of software technology, information systems are increasingly being developed
by packaged software. Regardless of which type of information system mentioned above is being
developed, an appropriate methodology of information system engineering must be adopted to ensure the
success of the system development.
There are four different methods of systems development as follows:
1. The Data Oriented Method, used when data/information necessary to carry out the
institution’s work forms the basis of the system change. The data oriented method is suitable
for processing large, non-homogeneous amounts of information and very dynamic
procedures.
2. The Functional Method, used when the organizational units (functions) and their mutual
communications form the basis. The functional method is suitable for processing complicated
procedures with many surfaces or points of contact and processing rules. In addition, the
method is suitable for well defined tasks.
3. The Evolutionary Method, which involves a successive development. Higher priority system
parts are introduced before the lower priority parts, but in such a way that all parts of the
system form part of a planned totality. The evolutionary method is suitable for the introduction
of systems in phases, or when parts of the system are more important than the others.
Furthermore, the method is well suited for complicated systems.
4. The Prototyping Method, used when a functioning model of a future system is desired. The
prototyping method is suitable for highly non-structured tasks, e.g., dynamic environments,
experimental situations, dialogue systems, and for preparing organizations for the
introduction of e-government systems. Prototyping is a method where development of test
versions (prototypes) of the system is carried out at a very early stage. The method is also
called experimental system development, systems development with prototypes, or
interactive systems development.
Selection of a systems development method is based on an evaluation of the totality of the four main
areas and takes into account: the nature of the tasks; the organization involved; the technology available;
and the personnel, which includes users and technical professionals.
2.
E-Government System Engineering
The effective, efficient development of e-government systems is based on many factors, including
understanding the user’s requirements and being able to determine the most effective means to satisfy
them. The former requires detailed knowledge and expertise in the user’s business. This is essential and
E-Government – What a Government Leader Should Know
Page 2 of 13
Methodologies of e-Government Systems Development
requires the availability and involvement of managers and users with an expert knowledge of their
business. The latter, determining the means to meet user requirements, requires the involvement of egovernment system analysts who have expertise in the state-of-the-art information technology. Therefore,
e-government system development requires a design partnership: the users provide business design;
the e-government system analysts provide technical design.
This is easy to say, but in practice very difficult to do. E-government system design, as with business
processes analysis, is at best an inexact science, one that is highly dependent upon a clear, precise,
and accurate communication of information and ideas between users, analysts, and designers. If
successful e-government system development is to be achieved, e-government system engineering
methodologies, which summarize and incorporate the experience and lessons of previous system
development, whether successful or not, must be followed.
In order to accomplish any given set of tasks effectively, the team must have a work plan or
procedure. Without it, activities are performed in a haphazard manner and with little, if any, coordination.
The results are that various intermediate products rarely fit together into a cohesive whole, and worse
yet, the finished product rarely meets the initial specifications. In some cases, because of the lack of a
work plan, there are no initial specifications. The detailed work plans for e-government systems
development are called methodologies. In fact, a methodology is a system of principles, practices, and
procedures applied to, and informed by, a specific branch of knowledge. As mentioned in the opening
paragraph methodologies provide the framework and the sets of procedures within which the myriad of
development tasks can be performed. Most methodologies cover the entire span of development activities,
from project initiation through to post-implementation review.
E-government system engineering leads to gains in productivity and to the quality of system
development. Some of the significant issues relating to information system development that are
addressed by e-government system engineering methods are as follows.
2.1 Data Administration and Information Resource Management
E-government system engineering attaches great importance to data administration and information
resource management and is a powerful vehicle for the establishment of data administration and
information resource management functions in an organization. Data administration is a function that
defines standards, stewardship, and control of information in an organization. Information resource
management has a similar purpose to data administration, but also includes the planning, organizing, and
control of data and process models and designs, defining configurations of hardware, software, and
network facilities, and training of the people required to support the e-government systems of the
organization.
2.2 Productivity and System Quality
Increased productivity with poor quality will not achieve the desired result of e-government;
productivity and quality must be improved together. E-government system engineering stresses and
assures quality by capturing business requirements before creating solutions. The rigor in the
techniques and phases of this methodology ensures that the initial quality is carried through to
implementation. Although it certainly costs an organization precious resources to establish and maintain
information resource management functions, the increase in the productivity of systems development using
e-government system engineering more than compensates for this investment.
E-Government – What a Government Leader Should Know
Page 3 of 13
Methodologies of e-Government Systems Development
2.3 Change Management and Evolution
E-government system engineering provides a mechanism to manage change in an organization. The
addition, deletion, or revision of a business rule requires evaluation of the data and process model from a
broad perspective. This might lead to modifications in many systems. Changes in technology or system
requirements require modifications to system designs as well as to systems already implemented. By
separating technology-independent aspects of change management from technology-dependent
implementations, system maintenance is an evolutionary process that allows an organization to control
its own destiny.
2.4 Migrating to Alternative Architecture
Once technology-independent data and process models have been developed for a functional area,
they provide the basis for system design and implementation. In some cases the target environment for
implementation of a particular functional area may have already been specified. In many situations,
however, the data and business models become the baseline to evaluate alternative technologies. This
allows an organization to select the optimum configurations of hardware and software, and the network
based on the available budget to meet its needs. More than one target environment may be required to
satisfy the business needs depicted by the data and process models. Rather than merely interfacing these
different environments, however, they can be fully integrated, thereby taking advantage of the key
features of each environment.
2.5 Re-engineering and Reverse Engineering
Re-engineering emphasizes streamlining the business processes of an organization to take full
advantage of modern information technology and takes a top-down approach to building data and business
models. It yields high-quality results in a short period of time, while also ensuring user understanding. For
organizations with current systems that are not well documented, a bottom-up approach, reverse
engineering, might be necessary. E-government system engineering uses business normalization and
reverse engineering principles to extract database designs from data structures and programme code,
and develops technology-independent data and process models that are able to adapt to different
technology-dependent platforms. This process of reverse engineering is feasible for those organizations that
are not subject to business change because of regulatory or other constraints.
3.
Structured e-Government Systems Development
E-government system engineering enables an organization to maximize the advantages gained
from emerging technologies. The benefits realized range from new insights into the strategic business
vision of an organization, to detailed planning and optimized use of new technologies. Both short- and
long-term benefits can be attained. Once established, the returns from implementing e-government
system engineering ensure not only productivity and quality but also the long-term success of the
organization.
For this reason, this module gives a brief introduction to the methodology of structured egovernment system development, which is one of the important techniques of e-government system
engineering and is very useful, in particular, for large and complex e-government system development. As
the size of the project decreases, some development phases might be combined.
Assuming that an e-government project proceeds in a normal and orderly fashion, it can be expected to
follow the following general phases:
E-Government – What a Government Leader Should Know
Page 4 of 13
Methodologies of e-Government Systems Development
•
Project initiation.
•
Requirements analysis, including business analysis, evaluation of the existing system
components, problem identification, and feasibility analysis of alternative approaches; logical
design, including redesign of the business flow, streamlining the information flow, and design
of system architecture.
•
Physical design, including specifications of hardware, software, and communication facilities,
network design and wiring, and system security.
•
Implementation, including establishment of databases, data entry, and application software
development.
•
Operation, including merging the system into the normal business environment, data
updating, and system maintenance.
•
Post-implementation evaluation.
There are many different ways to phase the life cycle of an information system development.
However, they all can be simplified into three main stages: analysis, design, and implementation. These
three are bracketed (preceded and succeeded) by project initiation and project review. Additionally, all
these activities include the administrative tasks of planning, scheduling, and control.
3.1 Preliminary Analysis
Project initiation is carried out through a preliminary analysis. The preliminary analysis forms the first
and perhaps the most critical phase of the project development. In many cases, it becomes the entire
project itself since the information developed in this phase may indicate that no further work is
necessary, feasible, or desirable. In all cases, the results of the analysis phase determine if there is a
problem to be addressed; if there is a feasible solution to the problem; and if developing a solution to the
problem is cost-beneficial to the user and to the government agency as a whole.
The primary objective of the preliminary analysis is to decide whether or not a project should be
initiated to develop an e-government system requested by the users. Even at this early stage, the results of
the preliminary study will determine if there are sufficient anticipated benefits to justify continuing the project
into the next development phase.
A detailed preliminary analysis would address the following:
•
The current problems to be eliminated from the user environment and the exploitation of
current and future business opportunities.
•
The definition of the system mission and the translation of user business needs into a clear
set of project business objectives.
•
The setting of delimiters for the area of study of the project.
•
The identification of possible project constraints and risks.
•
The initial search for potential system implementation solutions.
•
Cost-benefit analysis.
E-Government – What a Government Leader Should Know
Page 5 of 13
Methodologies of e-Government Systems Development
While identifying the current problems, much attention usually is given to how information technology
could be used to improve the effectiveness, efficiency, productivity, and quality of government agencies.
However, this is far from enough. Strong emphasis should be placed on examining the current business
processes of the organization to see if they are fit for purpose. The new e-government system should be
integrated into the existing business environment only if justified by the demonstrable efficiency of the
current business processes. Otherwise, redesigning the business processes must be considered.
The problems and/or opportunities identified or described by the users should be prioritized by order
of importance. This ranking is necessary to differentiate between those issues that are very important
and those that, although useful to address, are not essential to the project at hand. One possible way of
categorizing them would be as follows:
1. Essential. Requirements without which the user could not properly operate in the business
environment.
2. Adaptable. Requirements that, if necessary, can be partly modified to allow alternative
modes of operation.
3. Nice to have. Requirements that the user is willing to document but that can be excluded from
the system list of requirements, if they prove to be too costly to satisfy.
Project objectives should address the problems and/or opportunities that were identified during the
analysis of the current situation. The project objectives should be stated in a concise, measurable, and
attainable format.
As a matter of fact, a formal feasibility study should be conducted during this phase. Through the study,
an agreement on the scope of the project should be obtained between the management of the user
organization and the project team. Included with the report are justifications for the project, clearly defined
boundaries for the development, and a work plan outline indicating how the development should be
completed.
3.2 Requirement Analysis
Requirement analysis attempts to discover what is desired and actually needed by the users; clarify
the products that will try to satisfy a complex set of desires; and to discover who should play a major part
in, the requirements process. Obviously, requirements analysis is crucial to the successful development
of an e-government system because if the system developers do not know what the users (i.e. businesses
or citizens) need, or do not communicate with the users adequately, the system functions and
performance cannot be correctly defined. Any e-government system, which fails to meet the real needs
of the end-users, will not last long.
Determining requirements begins with a thorough analysis of the current business flows and
organizational structures of relevance to the proposed system. Through data collection and by
interviewing the users of the system to be developed, the analysis aims to answer the questions specified
in the following paragraphs.
3.3 Activities of the Analysis Phase
The most important way to conduct a requirement analysis is to interview the users, in particular the
people essential to the business process and the end-users of the system. For different levels of egovernment systems, different levels of users need to be selected for interviewing. When interviewing
the users, the key issues are to learn all about the user’s business, understand the user’s terminology,
E-Government – What a Government Leader Should Know
Page 6 of 13
Methodologies of e-Government Systems Development
and ask all the right questions. The logical sequence of the interview is
•
First, find out about the flow of business and information in the organization. Start with the
outputs: What is the information needed to run the business? How must the data flow among
agencies and individuals? Determine the frequency, timing, and accuracy.
•
Second, identify the inputs driven by the outputs: What information is required to produce
each of the outputs? What information is available, when, where? What new information
will have to be gathered?
The aim of requirement analysis is to document the existing user functions, processes, activities,
and data. The activities in the analysis phase are as follows: current function analysis; development of the
current functional model; current process and activity analysis; development of the current process model;
current data source and use analysis; current data analysis; and development of the current data model.
Following the analysis, the appropriate approach to meet the user requirements may be recommended,
usually selecting from: developing a customized system; implementing a vendor-supplied package with
or without modification; and re-engineering the existing computer system. The design of any new system
must be predicated upon an understanding of the old system. Even for a completely new system,
making full use of existing resources must be carefully considered.
The validation of the requirements analysis is important enough to warrant separate treatment. The
completed analytic documentation must be validated to ensure that all parties agree that the conditions
presented in the documentation accurately represent the environment, and that the documents generated
contain statements that are complete, accurate, unambiguous, and testable.
The requirements analysis should result in a Requirement Document (RD), which states the user’s
problems and demands and the general solutions required. The language should be oriented to the user’s
business, and avoid computer jargon. The RD is sometimes used as a Request for Proposal (RFP) when
the user tenders the project to outside contractors. However, a user written RD is usually inadequate for
estimating development because the user may be unaware of what a computer-based system can do, and
so the RD is often vague. A user may not even perceive his/her own needs correctly if they are not up-todate with computer and communication technologies. Other problems arise out of communication
difficulties. A non-technical person cannot be expected to learn computer language and jargon in order to
explain his/her requirements to the computer analyst. It is up to the project team to notice and solve any
problem related to this. The experiences of many system analysts have shown that it is worthwhile for the
project team to spend some time working with the user to help him/her to write a good requirement
document.
3.4 Users Participation
It is mandatory during this phase to obtain the active participation of users, including business,
citizens and government employees, and anyone else who may be necessary because they are
significant in the system. This is, beyond a shadow of a doubt, a very critical success factor. For instance,
the business needs and objectives of the project cannot be properly developed without the user’s firm
commitment to assist in the initial process to define them. This is the only way to ensure that the requested
system will precisely align with the business goals of their departments and those of the entire
organization. Hence, users must actively participate and articulate their own needs. In fact, this statement
remains true for all the deliverables that are produced during the preliminary analysis and requirement
analysis phases. This emphasis on user involvement should be seen as conducive to the success of the
project. The system that will be developed will be as effective in supporting the user’s functional areas as
the users are in participating in the development of the system’s requirements, especially during the
critical stages of the analysis process. By means of user-oriented development techniques, such as
E-Government – What a Government Leader Should Know
Page 7 of 13
Methodologies of e-Government Systems Development
prototyping, more and more e-government systems will be developed successfully by a team of users and
systems analysts who work closely together during the entire project.
The most successful projects are often those placed under the formal responsibility of the users.
Although the system may be developed by computer and communication professionals, the ultimate
responsibility of the project lies in the hands of knowledgeable and capable user representatives who are
officially held accountable for the new system.
3.5 Users Training
It is important to familiarize the users who will directly participate in the project with the requirement
definition techniques that will be used. This will help in bridging the communication gap that might exist
between the users and the system developers. Courses should be designed specifically to help in
removing the cloud of mystery surrounding the development of an e-government system. In general,
these courses describe the system development process in simple terms that are easy to understand
from a user point of view. During these seminars, the specialized (and often esoteric) e-government system
concepts and vocabulary used by information system developers are also explained, along with a brief
description of the various graphical tools and techniques that are applied during the business process
and data modeling tasks. Given the investment that will be poured into the development of a large egovernment system, not to mention the fact that it is likely that such a system will last between 10 to 15
years, a one- to five-day course for users is a small price to pay for attempting to deliver a high-quality
system that aims to truly meet user needs.
3.6 System Design
The purpose of the system design is to define the internal architecture of the e-government system.
For a large, complex application, the design issues associated with the performance, usability, and
maintainability characteristics of the system are of paramount importance. Consequently, the physical data
and process models should be engineered in such a way as to offer as much flexibility as possible while
taking into account the physical constraints that might be imposed by the technology being selected to
implement the system. Any deviation from the original requirements in the functional process and data
models that might be necessary to accommodate specific system operational criteria should be properly
documented and thoroughly discussed with the users. The strategies for the testing of the system, data
conversion, end-user training, and installation of the system should also be carefully designed.
On the basis of user requirement analysis, the functions of the system to be developed can be
defined. While defining the functions, system developers must capture all relevant functions and
understand evident, hidden, and frill functions. Evident functions are those to be performed in a manner
that is as visible, or evident, to the users as possible. Hidden functions are to be as imperceptible to the
user as possible. Frill functions are those that the user would like, but not if they cost anything, either
directly or if they compromises other functions. Classifying the functions list into hidden and evident
functions helps to identify possibilities that may be overlooked. This is because classifying in this way
highlights functions essential to the system that might otherwise be taken for granted.
The definition of the functions should be produced collaboratively with the users by developing an
initial list of potential functions and by classifying each function as evident, hidden, or frill. Brainstorming
may assist to uncover unmentioned hidden functions that will augment the function list. In the process of
classifying these functions, look for functions with wording that implies some constraint on solutions and
transform the wording to become problem statements, rather than solution statements and, finally, create
a list of the frill functions.
E-Government – What a Government Leader Should Know
Page 8 of 13
Methodologies of e-Government Systems Development
There are several issues which are also important and must be elaborated in a logical system design.
They are identifying the constraints and risks, defining preference, and limiting expectations of the system
being developed.
Identifying constraints and risks that exist in the system development is an important issue. The
business and technical constraints and risks pertain to those conditions that are considered outside the
direct influence or control of project team members. At the same time, however, they might have a direct
impact on the scope of the project, its schedule, and the proposed implementation solution alternatives.
Constraints or risks that might affect the project include the following: organizational stability in terms of
policies, functions and structures; government regulations; budget limitations; political considerations;
schedule considerations; legal considerations; environment considerations; operational limitations; data
availability; hardware/software/networking considerations; personnel considerations; technical limitations;
and risks associated with use of untested new technology. For the final design solution to be acceptable,
every constraint or risk must be satisfied. Therefore, a constraint or a risk must be defined in terms that will
enable participants to determine objectively whether or not it has been satisfied in the finished product.
Defining preference is another task in the system analysis phase. A preference is a desirable but
optional condition placed on an attribute. Any final design solution that satisfies every constraint is an
acceptable solution, but some acceptable solutions might be more preferable than others. Preferences
enable the designer to compare acceptable solutions and to choose the better ones. It is better to make
preferences measurable since preferences are used by designers to guide them in satisfying their clients.
Therefore, preferences would not be of much use unless each is defined in terms that will enable
designers to determine to what degree the preference has been satisfied.
Limiting expectations of the system to be developed is important as well. If the developer thinks of the
design process as a way of providing for all expectations and avoiding all disappointment, he/she will
never be successful. It is important to understand, define, communicate, and control the expectations of
everyone involved. In order to raise and document expectations and limitations, a list of specific
expectations from representative users should be generated first. System developers must work with the
list to understand and generalize each expectation. They must then negotiate to limit expectations to a
reasonable level, leaving open possibilities for future modifications of the system, but definitely ruling out
anything that cannot reasonably be expected. When setting a limit, the source of the limitation should be
documented, because today’s limitation may become tomorrow’s opportunity.
Logical system design identifies the logical relationships of essential elements internal and external
to the system, i.e., the business process flows that the system will support, and the information flows
that will be processed by the system. Business process flows represent the business model of the
organization, and information flows depict the data/information model of the organization. Business
models and data/information models are both technology-independent and address the system
architecture at the logic level. Logical system design will also identify the functions performed by the new
or improved system and specify what the new or improved system will do to support the business flow of
the organization.
The logical design should be a non-technical document accessible to system professionals and
users alike. Once the user-manager is confident that the new system will meet the organization’s needs
and approves the logical design, the physical design of the system can begin.
Physical design determines the system architecture at the physical level, which is technologydependent, and develops the system model. The physical design of an e-government system includes
the specifications for how the logical design will be implemented. This involves things such as
specifications of all manual and computerized procedures; system architecture and network topology;
E-Government – What a Government Leader Should Know
Page 9 of 13
Methodologies of e-Government Systems Development
computer hardware and software selection; design of physical data files required; specifications of all
necessary programmes and/or procedures; and the system’s physical security. This process is a fairly
technical one and requires user participation, especially in detailing the manual data processing
procedures.
The completed physical system design should be documented at two levels. A design overview
should be written that includes descriptions of the system and application subsystems; inter-relationships
of the subsystems; system architecture; the procedures of operation or data capture; and the auditing
procedure. It should also include a description of its databases, a sample of all input/output documents
or formats, and the measures of system security. It should also detail the relationship and interface of the
present system to other e-government systems within the organization’s environment. This design
overview should be approved by the management of the government agency before the detailed
technical specifications are specified.
In addition to design overview and at the second level of documentation, there should be detailed
specifications for a data dictionary, files, databases, input/output documents, display screens,
programmes and procedures, a wiring system, and user training programmes.
3.7 System Implementation
The primary purpose of the implementation phase is to deliver a fully operational system to the users.
Based on the system design specifications that were produced during the previous phases, the software
programmes are coded, tested, and gradually integrated into a complete system. The manual and
administrative procedures of the system are finalized and tested in conjunction with the automated
portion of the system. The user and system documentation manuals are completed and the staff is
appropriately trained. The data in the old files are located into the new file/database structures of the
system. The proper hardware/software/networking equipment and facilities are installed at the user sites,
and the system and its supporting materials are transferred into the production environment. If necessary,
the system is fine-tuned during the first month following its installation in production.
The users must participate in the testing of the application software, programmes, procedures and
databases so as to better understand the system. A number of techniques can be used to ensure quality.
Special attention should be given to documentation. Training programmes for users at different levels and
materials related to the new system should be developed as part of the implementation process. These
should include the preparation of notices and seminars for conveying general information about the system;
class outlines and materials for providing detailed training in system concepts and procedures; on-thejob or in-service training programmes for those who would be assigned daily work with the new system.
An acceptance test is necessary before putting a new system into operation. All of the promised
functions and deliverables should be demonstrated in the acceptance test. The system is complete as a
whole project when:
•
The new system is set up and running smoothly.
•
Conversion or cutover from any older systems is complete. Cutover should be done in
stages if possible.
•
The end users are trained and comfortable with the new system.
•
A post project review is held and all items that can benefit future projects are documented.
•
The responsibility and method of ongoing maintenance is defined.
E-Government – What a Government Leader Should Know
Page 10 of 13
Methodologies of e-Government Systems Development
There is always a need to change a system in order to improve it, add new features, or fix any
problems still left after the system acceptance or warranty is over. Most of the time, the user’s business will
change with time and so will his/her requirements. These changes or enhancements make system
maintenance indispensable.
Conversion should be a well-planned process in its own right, in which users should participate. Files
and documents must be created, forms printed, and new procedures instituted.
A preliminary version of the different types of system manuals required to use, operate, and maintain
the system in production should be developed. At the early stage of the implementation phase, these
manuals can be developed in a draft manner. However, they should contain enough information to
support the users and eventually the system operations staff during the user acceptance and production
acceptance testing cycle.
The system user’s guide should always be written in a language that is easy to understand from a
user’s point of view. Technical jargon should be avoided. Users do not need to know how the system works
internally but rather how to interface with its automated component properly and efficiently.
The system maintenance guide describes the high-level functions and facilities that are carried out by
the software application, primarily focusing on a technical perspective. It contains general programme
narratives and describes the important technical characteristics of the system (i.e., its internal and
external architecture). It is primarily aimed at supporting the maintenance team’s efforts. However, it does
not necessarily describe in detail the programme specifications. The detailed information associated with a
programme could be in a separate guide.
The system operations guide provides a description of the detailed documentation required by the
data/information center personnel to operate the system in production. Typically, the type of information
that should be described for each production job within a specific processing cycle (daily, weekly,
monthly, yearly) includes job preparation, job execution, and job output distribution.
A system-training package should be prepared during the implementation phase. The training
materials can be developed in a draft form at the early stage of this phase. The draft should contain
enough information to support the initial training of the user team participants who will conduct the user
acceptance tests. The detailed system training strategy should be reviewed in light of all the information
that has been produced so far on the new system. In addition, the draft system-training package should be
walked through to verify that it is accurate and meets the stated training objectives.
The final draft of the formal training materials should adequately prepare and train users and system
operations and maintenance personnel how to use, operate, and support the system in the most effective
manner, prior to its implementation in the production environment. The training materials could include
handouts, slides, overhead transparencies, and so forth. These materials should be designed in a topdown manner, describing the system from the very general down to the very specific. In some instances, it
will be necessary to tailor some specific components of the training package to suit the specific needs of
the target audience.
Once the system is in operation, a post-implementation evaluation should be conducted. The
purpose of doing so is to determine how well the system meets its design objectives. The overall
performance and level of operability of the entire system should be judged from the viewpoint of
response time of the online programmes; execution time of the batch programmes; execution time of
the software utility runs; security facilities; installed computer equipment; computer operating and job
control instructions; user/system documentation in general; and the effectiveness of the system
communication network, as well as any additional indicators related to the original objectives. The
E-Government – What a Government Leader Should Know
Page 11 of 13
Methodologies of e-Government Systems Development
evaluation may be performed by the project team or by internal systems auditors.
System post-implementation optimization can be performed based on the outcomes of the evaluation.
The specific areas where the original system requirements have not been fully attained should be
identified. The project team should also determine the causes of the problems and apply the appropriate
remedies. A complete set of system documents and the production system optimization should also be
included in the optimization task.
The methodology of e-government system development introduced in this module is based on the
principles and practices of a system development life cycle. There are different types of e-government
systems. However, the main three stages remain the same, i.e., analysis, design, and implementation.
Some of the phases and activities within the stages will be different depending on which type of egovernment system development is being carried out.
4.
Project Management
Planning, organizing, staffing, and controlling are the four key activities that make
programmes/projects successful.
Successful projects must have a clear beginning - a written plan that defines what will be delivered,
and how it will be accomplished. Measurable acceptance criteria should be documented so that they can be
used as a reference to establish that the promises have been met.
During development, close monitoring should be conducted to ensure that the project proceeds as
planned. The staff of the project team should have adequate experience to produce the product. The right
documents for the right people must be produced even in a tight situation, because management should
realize that documentation is one of the most important aspects of the project. Frequent reviews of the
project are necessary to measure progress against the schedule. When a problem occurs, it should be
noticed at once, and solved if possible; otherwise estimates and schedules should be redrawn, and
expectations should be reset as necessary.
In the end, the user’s satisfaction should be the primary concern of the project team. The product that
the team has delivered should be as promised. The project cost must be controlled so as to be
‘reasonably close’ to the estimates quoted. There should be no disagreement about acceptance. The
precise and detailed method that will be used to demonstrate the required functions of the product
should be approved by the users ahead of time.
An effective team organization, for a small or medium e-government system project, consists of
project manager, project leader, system analysts, and software programmers.
Each person on the team has a specific job description. The system analysts are responsible for
system analysis and logical design of the system. The physical design and implementation of the system
are jointly accomplished by system analysts and programmers. The programmers programme applications
software and conduct database design. The project leader provides close supervision by leading
technical activities and solving any system problems. The major responsibility of the project leader is to
ensure product quality. The project manager, to whom the project leader reports, is there to provide
management leadership and handle all communications between the project team and the outside. The
responsibilities of the project manager include the overall management of the project’s resources and the
successful implementation of the project’s objectives, outputs and activities.
E-Government – What a Government Leader Should Know
Page 12 of 13
Methodologies of e-Government Systems Development
For a larger project, system analysts and programmers can be divided into several teams. Through
this approach individual teams can treat their portion of the project as a subsystem, or stand-alone project.
The terms of reference of team leaders need to be clearly defined and all team leaders should report to, and
be supervised by, the project leader.
Project managers are key to ensure the success of any e-government system project. They are
responsible for the successful design, implementation, integration, operation, and maintenance of the
systems. The most difficult part in e-government system development is to make sure that the project
manager, as the system integrator, understands exactly what the users want and to ensure that they do not
speak a different language from the users. In general, users are looking for more than technical expertise
from their systems integrators. Project managers should have a good understanding of the core
businesses of e-government system users. A purely technical solution can only minimally benefit users. A
project manager should have the following attributes:
1. Must possess a thorough knowledge of the vertical organization of the industry and
preferably should have held an executive post in that line.
2. Should be able to work with line managers in the business to define requirements and carry
out the actual implementation of e-government systems.
3. Should have an in-depth understanding of the relevant technical concepts and the ability to
translate between business requirements and requirements for the technical development of
systems.
4. Must be a good communicator who works well with teams and has good negotiating skills.
5. Must be a detail-oriented person who can chart out actual time lines for the completion of a
given project, track milestones and be the single point of reference, as the systems
integrator, for users.
E-Government – What a Government Leader Should Know
Page 13 of 13
Critical Success Factors of e-Government
1.
Introduction
Although many governments have attached great importance to the development of e-government and
have invested considerable resources, the rate of success has not been high. Over the past twenty years or
more, the rate of success for the implementation of information systems, whether in business or in
government, has been between 30 – 40 percent. According to the Standish Group, in the year 2000 only
28 percent of information technology projects introduced in businesses and government in the United
States of America, succeeded, 23 percent were withdrawn and the remaining projects were deemed to be
not entirely successful. Three indices formed the basis for these assessments: budget, functions, and the
extent to which they were on time.
Hence, Government leaders need to be aware that it is not easy to make an e-government project
succeed. The experience and lessons from both business and government circles in many countries show
that the following critical success factors are important and must be taken into consideration when an egovernment project is going to be launched. The factors of success are grouped under three headings:
Leadership and Commitment of Top Management; Effective User Relationships; and Institutional
Arrangements.
2.
Leadership and Commitment of Top Management
The top management’s awareness of and commitment to the role that e-government systems play is
crucial to effective systems development.
They should be aware of how the new systems can provide support to government decision-making,
policy development, administration and management. It is obvious that a commitment to the
development of e-government must also begin with the top management of the government. Research
shows that overall progress in e-government is not closely correlated with social, political or economic
characteristics. Rather, leadership, political will, commitment to deliverables and accountability for
results show greater correlation and are the factors that appear to have the greatest influence on
progress.
Leadership and commitment from top management is essential because:
•
Governments need leadership in order to articulate a vision of e-government; a vision
that identifies the purpose of the development of e-government and sets out the longterm objectives and short- or medium-term goals.
•
Governments need leadership to formulate and establish political will. Obviously,
without strong political will the resources needed by e-government projects will not
materialize and obstacles in e-government development cannot be overcome.
•
Governments need leadership to create an enabling environment for the development
Critical Success Factors of e-Government
of e-government, including putting into place the right administrative and
management mechanisms for defining the objectives and goals, setting priorities,
defining the deliverables, and allocating the necessary resources, both human and
financial.
An important factor underpins the above three reasons for top management involvement in egovernment developments. The implementation of e-government requires strong political leadership
instead of technical leadership. This is because, rather than dealing with technical problems, the most
difficult issue in implementation is to overcome various social resistances and to coordinate the
conflicting interests between the diverse departments and agencies of the government.
The leadership and commitment of top management have a number of aspects that require further
scrutiny and explanation. First of all, top management’s awareness and appreciation of ICT for
development helps to articulate a vision of e-government. Various international and regional
conferences, workshops, and seminars are helpful in raising awareness and appreciation in this regard;
and attendance at them may be useful at key stages in the life of the development.
Secondly, top management needs to be convinced by the opportunities that e-government and ICT
represent for a country’s development, either because they can help find solutions to the urgent needs
of the country in terms of its economic and social development, or because they can provide more
effective support to the conduct of its internal or external affairs.
Top management will need to be sure that there will be substantive and observable benefits from
e-government projects if it is to be confident in formulating and establishing the necessary political will.
In addition, it may help the top management of a government to continue to exert political will if the
chief information officer can frequently report to the highest levels of the government to keep them
informed and up to date on the progress, experiences, achievements, and advances of information
technology and e-government worldwide.
In particular, the government chief information officer should enter into dialogue with the highest
level of government in order to understand the issues with which the top management team is most
concerned and to explore the possible solutions that could be provided by modern information
technology and e-government. This should help the top team identify opportunities and maintain
determination.
Early political leadership builds momentum. In order to keep the momentum going and to make the
leadership sustainable, projects for e-government should be selected and decided by the highest level of
government, instead of by the chief information officer alone.
E-government projects must address and provide solutions to the urgent issues faced by the
country in its economic and social development, as seen through the eyes of the highest level of
government. In other words, these projects should be demand-driven instead of technology-driven. The
projects should have the potential for evident economic or social benefit, and be able to deliver costbenefit effectiveness. In other words, it will be better if the projects do not only ‘burn money’ but also
show a return on investment in one form or another. The projects should not be too big and should be
implemented within an acceptable timeframe.
Overtly successful implementation of e-government projects is another key to keeping the political
leadership active and sustainable. To achieve this, the right administrative mechanism for egovernment development should be established; standardization and normalization must be carried out
in the process of e-government development; and the necessary resources, either human or financial,
E-Government – What a Government Leader Should Know
Page 2 of 8
Critical Success Factors of e-Government
must be in place. A continuous dialogue with the highest level of the government is the key to success
as it enables the project team to understand their needs and their concerns.
It is worth repeating that effective communication between the chief information officer and top
management, as well as participation by senior management in information management decisions, is
essential to the success of e-government particularly in securing top management’s support for the
necessary actions and resources. It is the information manager’s job, to promote this involvement, not top
management’s. In general, surprisingly few information managers make a concerted effort to get time with
senior management in order to help them understand the issues, trends, and problems of e-government
development and few information managers report directly to the top. A good place to start is with
education. This is achieved by helping members of the top management team and others to develop
knowledge and understanding, not of the technical aspects of computers, but of the impact of
information management and e-government on the business of the organization. This will include an
explanation of business and management issues and the key decisions to be made in the information
management arena. It will also include the issues, trends, and impact of technological forecasting on the
business of the organization.
A year plan is an important medium of communications with senior management. Preparation of a
year plan in support of the annual e-government budget could help to win top management’s support for
needed resources. The budget review process could be used as a means of communicating to senior
executives current technological issues and trends together with their likely impact on the organization.
The year plan also shows how information management objectives are tied to the organization objectives
and it links major accomplishments with those objectives in the year just past, as well as identifying plans
to meet objectives in the year to come. The year plan should not only be distributed to the chief
executive officers but also to the executive directors of all user divisions. Although a simple device, it can
be an effective communication tool with top and line managements. More importantly, it can help gain
senior management support for needed resources.
One of the persistent problems that information managers have always had is the inability of top
management to evaluate and measure the contribution of e-government to the organization. Although
computers and systems services benefit the users of those services, it is not always easy to demonstrate
the productivity and the project contribution which different information management functions make
possible for an organization. Therefore, performance reporting is required if e-government is to gain top
management support.
The strategy of performance reporting is concerned with measuring the contribution of e-government
systems to the organization. Measuring improved productivity or effectiveness has not always been easy
because there are no industry standards against which it can be measured. Thus, there is no easy way for
management to evaluate the true contribution of e-government to the organization. Evaluation is made
even more difficult because few top managers understand enough about computerization and
information systems business to make intelligent judgments about its performance. Hence, the chief
information officer is left with the task of finding ways to demonstrate the value of their contribution and
performance, if for no other reason than to get approval for needed resources. In this regard, a cost-benefit
analysis of e-government systems is a good tool to employ.
There is another performance management strategy which can be useful to information managers
and top management as a vehicle for measuring the performance of e-government systems in an
organization. It is the establishment of an information management performance reporting and evaluation
system. Information managers usually manage six major areas: planning, projects, data/information,
human resources, technology, and money. Through the use of a reporting and evaluation system, the
efficiency and effectiveness of the six areas can be measured and reported. On the efficiency side, it
E-Government – What a Government Leader Should Know
Page 3 of 8
Critical Success Factors of e-Government
measures how resources are utilized (equipment and people). On the effectiveness side, it measures user
service levels and systems project performance (user concerns). Finally, it measures overall financial
performance.
Chief information officers cannot afford to neglect the information needs of government’s senior
management. Efforts to provide information services to senior management can result in a far greater
investment in the performance of the organization and higher rewards for information management,
relative to those resources allocated to serve lower-level managers and clerical staff.
3.
Effective User Relationship
Another critical factor to the success of any e-government systems lies in the effectiveness of its user
relations. However, this is one of the most difficult challenges faced by information managers. Many
organizations do an excellent job in managing their technical resources but a dismal job in user relations.
The inadequacy in this area has, in fact, caused the fall of many information managers over the years.
The reasons are not simple. High demands and expectations, shortages of resources, the rapid pace of
technological growth, the long lead times needed for equipment planning and systems development,
constantly changing requirements, technical obsolescence, communications problems, and interpersonal
relationships - all of these are contributing factors. However, part of the answer must lie in a better
understanding by information mangers and users of each other’s business problems and opportunities.
Information managers need to understand the user’s business needs; user managers need to understand
more about data processing and information systems work. Learning more about each other requires
greater involvement in each other’s business. The successful marriage of business and technology
requires participatory management by information managers and user managers. In addition, it is important
to understand that attitude, sensitivity, and effective communication, rather than technical competence, is
what impresses users.
E-government systems serve various users in the different levels of a government organization, as
well as businesses and citizens. Discovering user characteristics is important. There are passive users
who will almost never ask for assistance from information systems regardless of the opportunities for
improved management effectiveness or operational efficiency that can be achieved. There are overly active
users who want information systems to produce solutions even when such applications cannot be costjustified. This kind of user tends not to consider the costs versus the benefits when requesting such
service. There are semi-informed users who consider themselves systems-wise and tend to insist on
their right to make decisions about information services and equipment. This is a frequent cause of the
serious difficulties that have given e-government systems a bad reputation in some organizations.
A user-service strategy should be developed taking into account that users can range from top
management to a middle-level director to a junior clerk, and from internal to external of the government.
Often, information professionals spend most of their time serving junior level people, neglecting the needs
of top and middle-level management. In fact, users who contribute most to the organization’s business
should receive more services from e-government systems; and users who are receiving high-quality
services from the system should be aware of it. Of course, a user-service strategy will be closely
associated with the development of a long-term plan for future information utilization at the organization,
division, and functional levels of management.
A formal user-satisfaction survey can be conducted to monitor user satisfaction with e-government
systems services. The survey can be carried out by the e-government development branch itself,
although this approach might inhibit frank and candid responses. As an alternative, the management of
the organization can initiate the survey through either some other function (e.g. auditing) or the
appointment of an ad hoc committee. Another option is for the survey to be conducted by an outside
E-Government – What a Government Leader Should Know
Page 4 of 8
Critical Success Factors of e-Government
consultant or consulting firm. The value of the latter approach is that it assures objectivity and, in some
cases, allows for outside comparisons. Obviously, a positive report validates user satisfaction ratings and
provides meaningful feedback to top management.
The questions a survey could address include: overall evaluation; accuracy; timeliness; ease of use;
responsiveness to requests for change in functions (outputs, etc.); the quality of support provided by egovernment systems (e.g. answers to questions, user assistance); integration with other applications;
average number of questions for each application; number of responses; and so forth.
User involvement in e-government system development should cover the entire life cycle of the
project, from getting started and strategic planning, through to system development and the information
management activity of the users.
It is frequently a strategic error to attempt a major improvement in the utilization of e-government
systems resources when the potential user has had little experience with modern technology. Such users
are ill prepared to cope with a massive infusion of new technology. Even if information systems specialists
see a very favourable cost-benefit ratio for a big investment in information technology, a cautious
strategy may be warranted for several reasons: a big proposal may frighten management in the user
division; the user may not be prepared to assimilate a major change in business processes; and the user’s
lack of knowledge of systems and technology could result in communication difficulties and
misunderstandings. In such cases, the e-government manager should take a ‘gradual advance’ strategy one that demonstrates the costs and benefits of the proposed project, starting by providing simple, low-cost,
rapid response to users.
The involvement of users in their own projects has been a demonstrable success strategy for many
years. This joint system development strategy includes the involvement of users in the following four
facets of system projects: planning, project team organization, system development, and post-evaluation.
The planning phase deals with business system planning; that is, determination of needs and
identification of e-government projects that will solve user’s business problems. This phase would be
more accurately described as system involvement with the users, rather than the other way around.
High-level user representatives with a thorough grounding in their business should be assigned full
time to every major system project for the duration of the project. This should be a matter of an
organization’s policy that is endorsed and supported by top management. The user’s representatives on the
project are responsible for ensuring that the system delivered is, in fact, what is wanted and needed. This
means they are responsible for defining the functional requirements of the system, not the technical
development.
The user should be committed throughout the project. User management should also be involved in
periodic project reviews and approval processes. The user’s representatives on the project look out for
the user’s interests by checking that system specifications accurately match needs. System development
must not simply be left to system professionals; it is the user’s responsibility as well.
When a project is completed, a post-evaluation should be conducted to determine whether the
project has met its goals, what benefits have been derived, what problems were encountered, what
lessons were learned, and what improvements should be made, etc. Once again, the users should
participate in the review process.
Users play a key role in e-government system development. Without active participation of the
users, any information system development will lose its direction. For instance, the business needs and
objectives of an information system cannot be properly developed without the user’s firm commitment to
E-Government – What a Government Leader Should Know
Page 5 of 8
Critical Success Factors of e-Government
assist in the initial process of defining them. This is the only way to ensure that the requested system will
be precisely aligned with the business goals of their departments and of the entire government. Hence,
users must actively participate and articulate their own requirements. The system that is developed will be
as effective in supporting the user’s functional areas, as the users will be in participating in the
development of the system’s requirements, especially during the crucial stages of the system analysis
process. User’s participation is also crucial to developing a transition plan which reflects a realistic and
feasible measure of improvement that is gradually attainable within a reasonable time frame. Therefore,
users must be convinced that their input is not only invited, but also meaningful.
The advantages of user participation in purchasing, support and other development activities are
obvious as well. First of all, application development cycles can be shortened if users are involved in all
aspects of the effort, from initial requirement analysis to design and implementation. Secondly,
government organizations can reduce technology evaluation and testing time, and the potential for missing
critical bugs or glitches, if users can participate in widespread pilot or test programmes. Thirdly,
organizations can dramatically reduce support costs if users can help each other on routine operational
questions and take responsibility as specialists for more advanced questions. Finally, especially for
developing countries, end-user participation will favor the internalization of all the project outputs as well
as the sustainability of the institution building effort after project completion.
A simple strategy for improving user satisfaction is the establishment of a help desk or customer
service center by the e-government department. The responsibility of the service center is to keep itself
appraised of both production and output distribution problems so as to keep users informed when
downtime, reruns, or backlog problems will effect online operations, report deliveries, and the like. The
service center could give users a single telephone number to call about service problems, or the option of
simply registering complaints about services (e.g. late reports, etc.) through the Internet.
The benefits of a customer service center include higher user service levels through an increased
service orientation; quick response to and resolution of user problems; provision of a single interface for
users with service problems; and assistance to users so that they use the center more efficiently. However,
the center’s response to the customers must be rapid, accurate, and credible. If the center works in this
way, it will be likely to be welcomed by users as an aid to the resolution of service problems. Otherwise,
users will soon lose confidence in its efficacy.
It should also be noted that there may be some disadvantages that accompany user participation. For
example, a large, varied user community can have difficulty reaching a consensus on important
development issues. Generally speaking, users are not always aware of the latest technology and not
always able to make the best judgments about future directions. Accordingly, users can often fail to see
the broader and long-term picture, and are driven by what is needed at a particular moment and fail to
see the long-range effects of adopting a particular technology. Therefore, if user participation proceeds
without periodic appraisal, particularly in the development and implementation of a new system, the result
could be negative.
Another important reason for organizing successful user participation is managing the expectations of
the users involved. It can help resolve difficulties that may arise when employee suggestions or opinions
cannot be adopted or when they conflict with each other.
4.
Institutional Arrangements
Appropriate institutional arrangements are required for the smooth and effective development of egovernment, particularly for developing countries. Rational formulation and implementation of
government policies, integrated planning, development strategies, and standardization of e-government
E-Government – What a Government Leader Should Know
Page 6 of 8
Critical Success Factors of e-Government
systems, cannot be carried out without the appropriate institutional arrangements within the government.
Centralized technical support, including methodologies of modern systems development, hardware and
software procurement and maintenance, education and training, etc., will undoubtedly economize a
great deal on scarce resources for the government and greatly benefit system development, operation, and
maintenance. Whatever these institutional arrangements may be, there should be a central focal agency.
When there is no existing appropriate central agency, a new institution must be created for this purpose.
Both the creation of new agencies and the adaptation of existing agencies have proved successful in
different countries.
At the national level, a ministerial level commission with appropriate representation on both the
legislative and executive branches needs to be organized. This commission must concentrate on the
formulation of government policies on e-government systems; the establishment of long-term goals and
strategies for stimulating e-government development in public administration; setting priorities; and the
allocation of information resources. The role of the committee or council is to concentrate on
•
Instructions for the formulation of government policies for information technology.
•
The establishment of long-term goals, strategies, priorities, and plans of the government for
e-government.
•
The allocation of government resources for e-government systems and establishment of
realistic funding limits.
•
The coordination, interpretation and resolution of conflicting interests, needs, and
expectations of the ministries and agencies of the government.
•
The review of long-term and annual plans, as well as evaluation of important investment
proposals and approval of key e-government system projects on a prioritized basis
consistent with the available resources and the needs of the government.
•
Other important issues that need to be addressed by the Committee.
One of the most important, but often overlooked, benefits of such a commission is its use as a vehicle
for improving communications between government decision-makers and information officers. For instance,
minutes of meetings should be circulated to the members of cabinet as well as to the members of the
commission.
A central focal agency, which has principal responsibility for developing e-government systems in
the country, should be of high-level and headed by a top-ranking official. In many cases this official
should be of cabinet or ministerial rank. This confirms the importance of the agency’s mission and
strengthens its position in negotiating matters of policy or coordination with the other ministries and
departments.
This central focal agency, if established, could not only be an information technology policy initiation
body, but also an e-government system development and management center. In some developing
countries, it could also be a technical support center, at least for the use of information technology in the
public sector. Functions of the agency are mainly:
•
To initiate, develop, and ensure the execution of government policies for e-government
development.
•
To work out a long-term strategic plan and the annual development plans of egovernment.
E-Government – What a Government Leader Should Know
Page 7 of 8
Critical Success Factors of e-Government
•
To administer, manage and coordinate the development projects regarding e-government
systems in the government.
•
To administer, manage and coordinate data/information resources as a national information
center.
•
To promote the application of methodologies and the development of standardization of egovernment systems.
•
To provide technical assistance and support services to government agencies in their
information system development, operation, and maintenance.
•
To organize and conduct various training programmes and to stimulate the popularization
of information technology in the public sector.
This agency will play a leading role in the computerization and e-government systems development
of a country. Therefore, it should be equipped with advanced IT facilities and be staffed by well educated,
highly trained, and experienced personnel.
In the practice of many developing countries, it is often found that it is easier to create a central
focal agency than it is to maintain and keep it going. The problems are generally two-fold: on the one
hand, the government needs to understand that it takes time for such an agency to get on right track and
that it is not an easy job to fulfill its functions; on the other hand, searching for a qualified head of the central
agency is critically important. The head of agency should not only have knowledge of modern information
technology but also, more importantly, the management capabilities and the political skills to deal with
various aspects of government. However, as long as the central focal agency delivers services of direct
value to e-government system development, there should be no problem in justifying its existence.
Unfortunately, if this is not the case, then the agency runs the risk of being dismantled quite rapidly. During
that time, government will only focus on the cost of supporting the functioning of the central agency set
against the benefits generated in return.
E-Government – What a Government Leader Should Know
Page 8 of 8
Funding of e-Government
1.
Introduction
Most IT systems become obsolete in three to five years. Hence, continuous funding for IT should
be made available in the government sector in order to keep the systems up to date and moving forward.
Funding mechanisms should be planned out effectively to make sure that all the infrastructure
requirements are met through the project cycle.
2.
Public-Private Partnership
For the long-term success of any e-government project, it is crucial that sustainable relationships
are developed across the public, private, and other sectors. Links with ICT companies and central or
local government agencies are important for the development of technical infrastructure, equipment,
and services. Effective relationships with other associate organizations for the distribution of
government services are also key to success. There is no doubt that, without proper funding
mechanisms, e-government projects cannot advance.
E-government projects can be marketable and attractive to organizations in the private as well as
the public sector. In fact, their development might benefit considerably from partnerships between the
public and private sectors. Although direct funding from the government may be fundamental for certain
projects, or at certain times in the project lifecycle, it is important to raise awareness in both the public
and private sectors and to explore possibilities of funding from other sources.
However, direct investment by government may be inevitable where: the e-government initiative is
knowingly non-profitable; returns are going to take a long time to arrive; or, returns will always be less
than the investment required.
Whatever the particular circumstance, there are at least two types of benefit from partnerships.
Firstly, the investment of resources and expertise from other enterprises can help projects improve their
productivity, while the investors themselves will benefit from and expand through the e-government
project. Secondly, the investment made by other enterprises in the public or private sectors gives them
an active role in e-government projects, and this is important for the healthy development of egovernment.
Any partnership will be strongly in favor of the development of a clear national strategy to enable
local government and enterprise to develop their e-government work. Both the benefits and risks of egovernment will be shared between the public and private members of the partnership. Moreover, such
partnerships are good for the development of government as well as for the enterprises themselves.
From the government side, with limited revenue, it is impossible to invest endlessly in e-government
projects and so the involvement of other organizations may be critical to success of these projects.
From the enterprise side, through an investment in e-government projects, enterprises will help develop
the market for their products thus creating opportunities to expand their business. This is a win-win
strategy for the continuous development of both government and enterprise.
Funding of e-Government
Figure 1.1 The Government and Enterprise Partnership in e-Government Development
In this regard, an impressive achievement was made by the Motor Vehicle Department of the State
of Arizona of the United States (Figure 1.1). The drivers’ license management system of the State was
outsourced to IBM. IBM took full responsibility for the system, from system design and implementation
to operation and maintenance. The State Government had no input into the system in terms of the
financial aspect and the agreement was that IBM would charge 1 US dollar for each driver’s license
issued. After the system was established, a triple-win situation was achieved
•
The cost to the State Government for each driver’s license issued was reduced from 6.6
US dollars to 1.6 US dollars, - a five dollars saving. In addition, the efficiency and
productivity of license-issuing work was greatly improved.
•
IBM created an almost endless source of income for the company given that the demand
for driver’s licenses to be issued is likely to be on-going.
•
The waiting time to receive a new license was reduced from 45 minutes to 3 minutes
without extra charge to the client.
This typical example illustrates and confirms that:
•
It is not the case that every e-government project must be invested in only by government.
Instead, a public and private partnership, if it can be developed, can play a highly
significant role in e-government development.
•
Information systems development is not within the mandate or competence of government.
What government should do in e-government development is to concentrate on
streamlining their business processes. Development of the information system can be left
to qualified enterprises with the appropriate expertise.
As a matter of fact, a lot of effort has been made to find new ways to fund the development of egovernment and to make it sustainable. A number of models have emerged and they are described in
the following paragraphs.
3.
Government - Enterprise Partnership
The government – enterprise partnership is a win-win model exemplified by the example from
Arizona. Under this model, the development of e-government is the responsibility of the enterprise, not
only for system design and implementation, but also for system maintenance and upgrading.
E-Government – What a Government Leader Should Know
Page 2 of 6
Funding of e-Government
Government, remains the owner of the e-government system, but does not invest in any of the activities.
The investment of the enterprise can be covered by the processing fees of government business,
license fees, consultancy services, or any combination of these. As the government is the owner of the
system it has complete authority over it and so can ensure the system’s vision and its compliance with
legal requirements. The portal of the Government of Tennessee State is another example of this model
since the National Information Consortium in the United States designed and maintains it.
4.
Outsourcing
With this model, government invests directly in an e-government project, but system design,
implementation and/or maintenance are outsourced to associated enterprises. The government owns
the system and has complete control of the project. The government focuses on its business functions
and it is not required to maintain a team of technical professionals to support the operation and
maintenance of the e-government system. The system is designed by professionals and maintained by
technicians from the contracted enterprise; the quality of the system is ensured and the risk of project
failure is reduced.
With this model, even though government must still invest in its e-government projects, it obtains
savings by not keeping a team of professionals, and benefits from the quality of the services and from
the use of state -of -the -art technologies. Therefore, from a long-term perspective, outsourcing is a
good model.
5.
Divide the Work Between Government and Enterprise
With this model, government is responsible for the operation and management of its own internal
management information systems, while all the services to enterprises and citizens are implemented by
contracted enterprises. This model divides the work between the government and the enterprise, i.e.,
the government is in charge of ‘the internal part’ and the enterprise is in charge of ‘the external part’. For
the external part, government will neither invest, nor participate in the development, operation and
maintenance of the system. The contracted enterprise will invest and be responsible for: design of the
website and interface with users; development of indispensable software; and integration of
government information systems with the website and the external system. Businesses and citizens can
use the website to access government services and to accomplish business transactions.
The enterprise will receive a return on its investment through software license fees, system
maintenance charges and other service tolls. The govWorks initiative in the United States developed this
model and successfully connected 62 federal and local governments to its website so as to provide
various government services to businesses and citizens.
This model minimizes a government’s investment and energy in the development of e-government
while businesses and citizens can still benefit from the availability of online services. However, a mature
set of internal management information systems within government is a prerequisite for applying this
model. In addition, under this model, the government may lose opportunities of transforming
government through the development of e-government because there will be no momentum to effect
changes.
E-Government – What a Government Leader Should Know
Page 3 of 6
Funding of e-Government
6.
Issuance of Bonds
This model provides an effective way of raising funds for e-government development. In some
countries and regions, governments issue bonds of e-government to facilitate the construction of a
national or regional information infrastructure. This may apply especially to the development of data
communication networks where the purpose is to create a favorable and fundamental environment for
e-government development. These funds could be paid back from the service charges applied to the
infrastructure.
Of course, there is a risk with the adoption of this model. If the infrastructure is not adequately
used, or if the service charges prove insufficient, it will be impossible to provide returns from the bonds.
If this is the case, government will have to find some other resources from which to pay the bonds back,
and this model becomes a model of ‘deficit spending’, i.e., ‘eating one’s corn in the blade’. Deficit
spending may add an extra burden to the current government or its successor.
7.
Advertising
Advertisement is a very traditional tool for marketing and promotion. With a large user group and a
good reputation, government websites have become an ideal and attractive place for commercial
advertisements. Even though there is still debate on the appropriateness of, advertising on government
websites, it has become acceptable to the public. The income generated by advertisements not only
supports the operation and maintenance of e-government systems, but also reduces government’s
expenditure on e-government projects.
However, it is important that government should set up a strict policy on advertising on government
websites, in order to avoid abuse or overuse of government websites for commercial purposes. To
protect the reputation of a government, some countries have established laws and regulations which
restrict advertising texts that misguide users. In addition, laws and regulations that prevent pornography
advertisements from appearing on government websites may also restrict advertisements for cigarettes
or alcohol.
E-Government – What a Government Leader Should Know
Page 4 of 6
Funding of e-Government
Table 1. Examples of Public/Private Cooperation Initiatives related to Public Key
Infrastructure and Digital Signature1
COUNTRY PROJECT
DESCRIPTION
EU
Italy
AIPA (Authority for IT in
In support of an effective spread of electronic signatures, a
the Public Administration), “Working Group for the Certification Authorities (CAs)’
Banca d’Italia, Italian
Interoperability” was established by AIPA to understand if and
how interoperability among CA’s could be established. The
WG has produced the ‘Interoperability Guidelines’ as the
result of the definition and operational verification of a set of
technology independent interoperability rules. The definition
approach has been based on operational and practical
solutions to the identified problems, on the market availability
of the tools needed to realize them, on simplicity and
applicability to all CA’s. Consistency with on-going
standardization processes in the field of electronic signatures
has also been taken into account.
UK
Barclays Endorse
Smart card digital signature service, launched in June 1998.
The Government was first to make use of this service
enabling the newly self-employed to register their tax status
across Internet. Service is open to all, neither the acceptor
nor the cardholder need to be existing customers of Barclays
Bank. Different levels of security and liability are provided.
Looking for new commercial opportunities within the private
sector as well as continuing to support Government’s
applications in the public sector.
UK
Vodafone UK,
Government Department of Trade &
Industry, Radio
Communications Agency
(RA), Smart Trust
Start of a technology trial on July 2001. 50 staff complete and
sign travel or subsistence forms on the Internet and sign the
complete form by using their mobile handset. A hash of the
form and completed information is sent to the user via SMS,
who signs this information by entering a signature PIN on his
mobile. Project is a proof of concept, focusing on technology.
Norway
Telenor and Ergo Group
(previously Posten SDS)
Have built a CA that provides services to the government.
1
Source: Centeno C. 2002 “Securing Internet Payment – The Potential of Public Key Cryptography,
Public Key Infrastructure and Digital Signatures”, Institute of Prospective Technological Studies.
E-Government – What a Government Leader Should Know
Page 5 of 6
Funding of e-Government
Sweden
Swedish Post and Telia
Finland,
EEPOCH (eEurope SC)
France,
Germany,
Irland,
Israel, Italy,
& Spain
Provide certificate for internal government services. Contract
negotiations undergoing for banks to issue citizen certificates.
Multi-application card with EID, digital signature and financial
applications (timing: under definition in the eEurope Smart
Card initiative)
Outside Europe
Japan
Co-operation platform
Pilot planned for a contact-less multi-application smart card
based cyberspace passport, an electronic ID to check the
cardholders’ citizenship, issued by the government on request
when people want to receive e-government services in the
cyberspace. May also record services that the holder receives
at his request (public and private applications) and could also
support electronic signature (PKI). 1 - 3 million cards were
planned by the end of 2001, 10-50 million people were
expected to have cards from Aug 2003.
Malaysia
Co-operation smart card
platform
A government multi-purpose card (24 July 2001). The GMPC,
the Government Multi-Purpose Card will replace the
Malaysian national identity card and driving license. Will also
contain passport information, national health application and
non-government applications such as e-purse, ATM cash
withdrawal application and digital signature application based
on the PKI. 600,000 cards are planned by end of 2001, rising
to 19 million by the end of 2008.
More information about Public Key Infrastructure and digital signature can be found in the module
‘Authentication and Digital Signature’ (Part 2 Module No. 2). Also, Part 2, Module 4 details the
importance of a government portal as a key feature of e-government. Funding is a key issue to the
long-term sustainability of a portal. While many funding models exist, none provide the perfect solution.
Individual agencies can jointly fund a portal. However, because a portal involves organizations
throughout the government, a central fund for such efforts is preferred. To ensure that a portal is self
sufficient, funding options include the resale of data, the sale of advertising space on the site, or
subscription or transaction/convenience fees.
E-Government – What a Government Leader Should Know
Page 6 of 6