30.10.2012 Views

Public Management and Administration - Owen E.hughes

Public Management and Administration - Owen E.hughes

Public Management and Administration - Owen E.hughes

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

access. It will be necessary to allow other channels for government communication,<br />

such as telephone call centres.<br />

Another aspect of the digital divide is that people in developing countries<br />

have less access than those in developed ones; this exacerbates the differentials<br />

between rich <strong>and</strong> poor nations. The lowest usage of the Internet <strong>and</strong> e-government<br />

are in developing countries. In India, only 20 people in 1000 have telephone<br />

access; only 3 in 1000 have access to a computer (Holmes, 2001, p. 26).<br />

Although governments in such circumstances are trying to bridge the gap it is<br />

obviously more difficult than in developed countries.<br />

Privacy <strong>and</strong> security<br />

E-government 197<br />

The advances in information <strong>and</strong> communication technologies do offer much<br />

for governments as well as offering enhanced service delivery for its clients.<br />

However, the problem is that ‘these capabilities have the potential for surveillance<br />

<strong>and</strong> control’ (Bellamy <strong>and</strong> Taylor, 1998, p. 86). Safeguarding privacy <strong>and</strong><br />

security are important aspects of e-government. While files are technically able<br />

to be shared between agencies for efficiency reasons, they also impose problems<br />

of privacy invasion.<br />

E-government does bring with it an enhanced surveillance capability over<br />

the citizens in a society. Internet or e-mail usage is recorded <strong>and</strong> able to be<br />

traced far easier than ordinary mail or telephone calls; both leave electronic<br />

traces <strong>and</strong> can be stored for long periods of time in an easily accessible form.<br />

All e-mails can be searched for key words of interest to police or intelligence<br />

agencies, where intercepting telephone calls or mail in the traditional way is<br />

much more labour intensive <strong>and</strong> usually confined to a few suspects. It is technically<br />

possible for many more people to be under surveillance electronically<br />

for the same level of police resources. The FBI in the US, for example, has programmes<br />

to tap the Web <strong>and</strong> can collect data <strong>and</strong> read the e-mail of criminal<br />

suspects (Holmes, 2001). The police in the UK have powers under the<br />

Regulation of Investigatory Powers Act passed in 2000 to require Internet<br />

service providers to install interception devices on e-mail <strong>and</strong> Internet activity<br />

<strong>and</strong> relay it back to a government monitoring centre. Other governments have<br />

enacted similar legislation, such as Singapore, <strong>and</strong> as The Economist argues<br />

(24 June 2000):<br />

Singapore’s somewhat authoritarian government is probably not too worried by the threat to<br />

privacy or civil liberties. The point of the Web is that it is a two-way street. E-governments<br />

may be more transparent <strong>and</strong> accountable than the old-fashioned kind – a risk Singapore<br />

seems willing to run – but they will also know far more about their citizens than they do<br />

now, <strong>and</strong> have much more efficient ways of putting to use what they know.<br />

Computer security is also currently inadequate. Hackers have been able to<br />

find their way into government computers. The systems for the electronic use

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!